[Ksplice][Ubuntu-12.04-Updates] New updates available via Ksplice (3.2.0-107.148)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Aug 8 18:19:59 PDT 2016
Synopsis: 3.2.0-107.148 can now be patched using Ksplice
CVEs: CVE-2016-3134 CVE-2016-3961 CVE-2016-4470 CVE-2016-5243
Systems running Ubuntu 12.04 Precise can now use Ksplice to patch
against the latest Ubuntu kernel update, 3.2.0-107.148.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 12.04 Precise
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Improved fix for CVE-2016-3134: Memory corruption when parsing netfilter source chains.
A logic error when parsing netfilter source chains can allow local users
to corrupt kernel memory.
* CVE-2016-3961: Xen PV guest crash when using HugeTLBFS.
HugeTLBFS is not supported on Xen PV guests and leads to a kernel crash
when an application tries to mmap() a Huge TLB. A local user with the
ability to mmap() Huge TLB pages in a Xen PV guest can cause a
denial-of-service of the guest.
* CVE-2016-4470: Kernel panic when adding a negative key to a keyring.
A logic error in the kernel keyring subsystem can cause a write to an
uninitialized pointer which can trigger kernel memory corruption and a
kernel panic.
* CVE-2016-5243: Information leak in the Transparent Inter Process Communication protocol.
The use of strcpy() inside the Transparant Inter Process Communication
protocol (TIPC) when dumping the link name leads to a maximum of 58 bytes
leaked to userspace. A local attacker could use this flaw to gain
information about the running kernel and facilitate an attack.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-12.04-Updates
mailing list