[Ksplice][Ubuntu-12.04-Updates] New updates available via Ksplice (USN-2911-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Feb 22 18:41:00 PST 2016
Synopsis: USN-2911-1 can now be patched using Ksplice
CVEs: CVE-2015-7550
Systems running Ubuntu 12.04 Precise can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-2911-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 12.04 Precise
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* NULL pointer dereference in the TTY line discipline on receival.
A missing check for NULL before calling the receive_buf function pointer on
a line discipline could lead to a NULL pointer dereference. A local,
unprivileged user could use this flaw to cause a denial-of-service.
* Memory leak in SPI stack when allocating master device.
A reference was taken on the wrong device when allocating a SPI master
device, leading to a memory leak. A local user could use this flaw to
exhaust the memory on the system.
* CVE-2015-7550: Denial-of-service when reading and revoking a key concurrently.
A race condition in the cryptographic key management sub-system could lead
to a kernel crash when revoking and reading a key concurrently. A local,
unprivileged user could use this flaw to cause a denial-of-service.
* Use-after-free when taking a reference on an IPv6 label.
A logic error in the IPv6 stack could lead to a use-after-free under
certain circumstances. A local, unprivileged user could use this flaw to
cause a denial-of-service.
* Use-after-free in network destination cache removal.
A use-after-free when removing a network destination cache entry could
result in a kernel crash and denial-of-service.
* Multiple out-of-bounds memory accesses in SCSI enclosure support.
Multiples flaw in the SCSI enclosure support driver could lead to
out-of-bounds memory accesses and kernel panic. A local user could use
this flaw to cause a denial-of-service.
* Use-after-free in ISDN Gigaset driver on device shutdown.
A logic error in the ISDDB Gigaset device shutdown path could lead to a
use-after-free and kernel panic.
* Denial-of-service when hot-removing memory on missing sections.
A logic error in the routine checking the pages in a memory zone could lead
to a kernel crash when offlining memory. A local, privileged user could
use this flaw to cause a denial-of-service.
* Kernel panic when encrypting zero-length data.
The kernel crypto subsystem does not correctly handle encrypting
zero-length data which can lead to a kernel panic. A local, unprivileged
user could use this flaw to cause a denial of service.
* Kernel panic in OCFS2 when extending size of filesystem.
A logic error in the OCFS2 filesystem driver can trigger an assertion
failure and kernel panic when extending the size of an existing
filesystem. A local user could use this flaw to trigger a
denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-12.04-Updates
mailing list