[Ksplice][Virtuozzo 4 Updates] New Ksplice updates for Virtuozzo 4 or OpenVZ on RHEL 5 (2.6.18-417.el5.028stab121.1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Tue Feb 7 23:36:06 PST 2017
Synopsis: 2.6.18-417.el5.028stab121.1 can now be patched using Ksplice
CVEs: CVE-2013-2596 CVE-2016-1583 CVE-2016-7117
Systems running Virtuozzo 4 or the OpenVZ RHEL 5 kernel can now use
Ksplice to patch against the latest Parallels Virtuozzo Containers
kernel security update, 2.6.18-417.el5.028stab121.1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running Virtuozzo 4 or
OpenVZ on RHEL 5 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2016-7117: Denial-of-service in recvmmsg() error handling.
Incorrect reference counting could result in a use-after-free in the
recvmmsg() system call. A local, unprivileged user could use this flaw
to trigger a denial-of-service.
* CVE-2013-2596: Privilege escalation in video frame buffer driver.
Integer overflow in the fb_mmap() function allows local users to create a
read-write memory mapping for the entirety of kernel memory, and
consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system
calls.
* CVE-2016-1583: Privilege escalation in eCryptfs.
Mounting eCryptfs over procfs could result in a stack overflow with deep
nesting allowing a local, unprivileged user to cause a
denial-of-service, or potentially escalate privileges.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-VZ4-Updates
mailing list