[Ksplice][Ubuntu-16.04-Updates] New Ksplice updates for Ubuntu 16.04 Xenial (4.4.0-59.80)
Oracle Ksplice
ksplice-support_ww at oracle.com
Tue Jan 10 12:16:10 PST 2017
Synopsis: 4.4.0-59.80 can now be patched using Ksplice
CVEs: CVE-2016-9756 CVE-2016-9793 CVE-2016-9794
Systems running Ubuntu 16.04 Xenial can now use Ksplice to patch
against the latest Ubuntu kernel update, 4.4.0-59.80.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Ubuntu 16.04
Xenial install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2016-9756: Information leak in KVM x86 emulator.
Failure to initialize memory in generic x86 emulator resulted in leaking
of kernel stack into userspace. An attacker can use this vulnerability
to introspect kernel memory.
* CVE-2016-9793: Denial-of-service in socket configuration.
Incorrect validation of arguments for the setsockopt ioctl could allow
a local user with CAP_NET_ADMIN privileges to cause memory corruption
or crash the kernel.
* CVE-2016-9794: Denial-of-service when playing audio stream.
A missing lock when computing elapsed period of the playing stream
could lead to a use-after-free if the stream is released in a concurrent
thread. An attacker could use this flaw to cause a denial-of-service.
* Use-after-free in TCM/User subsystem.
A cleanup routine in Target Core Mod (TCM) / User subsystem free'd a
pointer too early. This can cause use-after-free later in a different
routine and crash the kernel, resulting in denial of service.
* Denial of service in vmxnet3 driver.
An incorrect assertion in vmxnet3 driver could cause kernel panic on
receiving valid packet when Large Receive Offload (LRO) is enabled.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-16.04-updates
mailing list