[El-errata] New glibc updates available via Ksplice (ELSA-2018-0805)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Apr 19 09:53:11 PDT 2018


Synopsis: ELSA-2018-0805 can now be patched using Ksplice
CVEs: CVE-2017-15670 CVE-2017-15804 CVE-2018-1000001

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2018-0805.

INSTALLING THE UPDATES

We recommend that all users of Ksplice on OL 7 install these updates.

You can install these updates by running:

# ksplice -y user upgrade

32-bit applications should be restarted after upgrading the on-disk
glibc RPMs and statically linked applications using
glibc should be rebuilt to include these fixes.

Ksplice user-space patching requires installation of Ksplice-aware
packages and the system must be rebooted after the first installation of
these packages.  Refer to the installation instructions for the Enhanced
Ksplice Client in the Ksplice User's Guide for more details.  Systems
may be prepared for Ksplice patching by installing the Ksplice aware
packages in advance, prior to installing the enhanced Ksplice client.

DESCRIPTION

* CVE-2017-15670: Code execution in glob().

An off-by-one error in glob() could result in a heap overflow when
processing user home directory expansion.  An attacker could use
maliciously crafted expansions to gain code execution inside the target
process.


* CVE-2017-15804: Code execution in glob() username unescaping.

A buffer overflow when expanding user home directories could allow an
attacker to use specially crafted expansions to gain code execution
inside the process.


* CVE-2018-1000001: Privilege escalation in getcwd().

Incorrect assumptions about POSIX compliance of the Linux kernel could
result in a buffer underflow when calling getcwd().  A malicious local
user could use this flaw to escalate privileges by attacking setuid
binaries.


Ksplice will not be providing rebootless updates for CVE-2017-12132
(CVSS3 3), CVE-2015-5180 (CVSS3 1.2) and CVE-2014-9402 (CVSS3 1.2).

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the El-errata mailing list