[Ksplice][Ubuntu-16.04-Updates] New updates available via Ksplice (USN-3070-1)

Oracle Ksplice ksplice-support_ww at oracle.com
Mon Aug 29 15:23:00 PDT 2016


Synopsis: USN-3070-1 can now be patched using Ksplice
CVEs: CVE-2016-1237 CVE-2016-5244 CVE-2016-5400 CVE-2016-5696 CVE-2016-5728 CVE-2016-5829 CVE-2016-6197

Systems running Ubuntu 16.04 Xenial can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-3070-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Ubuntu 16.04 Xenial
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2016-5244: Information leak in the RDS network protocol.

Lack of on-stack struct initialization in the RDS network protocol leads to
one byte of kernel stack being leaked to userspace.  A local attacker could
use this flaw to gain information about the running kernel and facilitate
an attack.


* CVE-2016-5728: Memory corruption in virtio MIC driver.

A race-condition in the virtio MIC host driver can allow a malicious
guest to cause memory corruption in the host when adding a new guest MIC
device.


* CVE-2016-5400: Memory leak in AirSpy SDR device initialization.

A logic error when failing to initialize a AirSpy USB SDR device can
trigger a kernel memory leak and subsequent kernel panic. A local user
with USB access can use this flaw to cause a denial of service.


* Use after free in 802.11 mesh networking station cleanup.

A race condition when destroying 802.11 mesh network station information
can trigger a use after free and kernel panic.


* Deadlock when establishing new InfiniBand connection.

Incorrect locking in the InfiniBand connection manager can trigger a
deadlock and kernel panic when a new connection has been established.


* Permission bypass when mounting filesystem in user namespace.

A logic error when mounting a filesystem can allow a read-only
filesystem to be mounted read-write in a user namespace allowing an
unprivileged user to write data outside their namespace.


* Memory leak in NFS atomic file opening.

Incorrect reference counting in the kernel NFS client when an error is
encountered opening a file atomically can trigger a memory leak and
kernel panic.


* Memory leak when releasing IPv6 routes.

A logic error when an IPv6 route is released can lead to a kernel memory
leak and subsequent kernel panic. A remote attacker may be able to
trigger this issue by creating and destroying many routes.


* Kernel panic when removing ELO USB touchscreen device.

A logic error when removing a ELO USB 4000/4500 touchscreen device can
trigger a use after free condition and kernel panic.


* CVE-2016-5829: Memory corruption in unknown USB HID devices.

The USB HID driver does not validate USB data when an unknown HID device
is encountered which can allow a malicious USB device to trigger kernel
memory corruption and gain execution.


* Kernel panic with trace points with non-constant formats.

An invalid optimization can trigger a NULL pointer dereference and
kernel panic when a trace point contains a non-constant format string.


* Memory leak in industrial IO device polling.

Memory is incorrectly freed when attaching a polling function to an
industrial device fails which can trigger a kernel memory leak and
kernel panic.


* Information leak in virtual terminal key mapping.

A logic error when mapping raw scan codes to keys in the virtual
terminal driver can trigger an out-of-bounds read which can leak the
contents of kernel memory to userspace.


* Use after free when closing dummy soundcard.

Incorrect reference counting when closing a dummy soundcard with a
high-resolution timer backend can trigger a use after free condition and
kernel panic.


* Memory corruption when removing Echoaudio ALSA devices.

A logic error when allocating memory for Echoaudio ALSA devices can
trigger kernel memory corruption and kernel panic.


* Use after free when closing ALSA digital audio stream.

A logic error when closing an ALSA digital audio stream with channel
mapping controls can trigger a use after free and kernel panic.


* Denial of service in OverlayFS directory removal.

A race condition can allow a malicious user to remove an upper directory
while it is being hidden in the lower directory which can trigger a
kernel panic.


* Memory corruption in CIFS NTLM authentication.

Incorrect memory management in the kernel SMB server can allow a remote
user to cause kernel memory corruption by providing an over-sized
NTMLSSP message.


* CVE-2016-1237: Permission bypass in NFS filesystem when setting ACLs.

Missing permission checks when setting the ACLs on a file from a NFS mount
could allow unprivileged users to grant themselves access to an otherwise
not allowed file.  This could potentially be used to escalate privileges.


* CVE-2016-6197: Denial-of-service in OverlayFS.

Incorrect handling of hard links could result in a kernel panic when a
rename operation targets a hardlink. This flaw could be used by local
user to cause a denial of service.


* Denial of service in Emulex LightPulse device reset.

A logic error when resetting an Emulex LightPulse Fibre Channel device
which can trigger a NULL pointer dereference and kernel panic.


* Permission bypass when updating attributes on overlayfs files.

A logic error when updating attributes on an overlayfs file can allow a
local user to write to a setuid or setgid file. This could be used by a
malicious user to gain elevated privileges.


* CVE-2016-5696: Session hijacking in TCP connections.

A logic error in the core TCP subsystem can allow attackers to easily
guess secret information and inject arbitrary packets into a TCP stream.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Ubuntu-16.04-updates mailing list