[Ksplice][Ubuntu-16.10-Updates] New Ksplice updates for Ubuntu 16.10 Yakkety (4.8.0-34.36)

Oracle Ksplice ksplice-support_ww at oracle.com
Tue Jan 10 12:16:50 PST 2017


Synopsis: 4.8.0-34.36 can now be patched using Ksplice
CVEs: CVE-2016-9756 CVE-2016-9793

Systems running Ubuntu 16.10 Yakkety can now use Ksplice to patch
against the latest Ubuntu kernel update, 4.8.0-34.36.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running Ubuntu 16.10
Yakkety install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2016-9793: Denial-of-service in socket configuration.

Incorrect validation of arguments for the setsockopt ioctl could allow
a local user with CAP_NET_ADMIN privileges to cause memory corruption
or crash the kernel.


* CVE-2016-9756: Information leak in KVM x86 emulator.

Failure to initialize memory in generic x86 emulator resulted in leaking
of kernel stack into userspace. An attacker can use this vulnerability
to introspect kernel memory.


* Kernel BUG due to incorrect abort handling in lpfc driver.

An incorrect change to the lpfc driver can cause a kernel BUG to be
incorrectly asserted during error handling.


* Use-after-free in TCM/User subsystem.

A cleanup routine in Target Core Mod (TCM) / User subsystem free'd a
pointer too early. This can cause use-after-free later in a different
routine and crash the kernel, resulting in denial of service.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Ubuntu-16.10-updates mailing list