The following Ksplice updates has been released for Oracle Linux:
New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2017-3607)
New Ksplice updates for UEKR3 3.8.13 on OL6 and OL7 (ELSA-2017-3606)
New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2017-3607)
New Ksplice updates for UEKR3 3.8.13 on OL6 and OL7 (ELSA-2017-3606)
New Ksplice updates for UEKR2 2.6.39 on OL5 and OL6 (ELSA-2017-3607)
Synopsis: ELSA-2017-3607 can now be patched using Ksplice
CVEs: CVE-2016-10200 CVE-2016-9604 CVE-2016-9685 CVE-2017-9242
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-3607.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR2 2.6.39 on
OL5 and OL6 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-9242: Denial-of-service when using send syscall of IPV6 socket.
A missing check when sending messages over IPV6 sockets could lead to an
out-of-bound access. A local user could use this flaw to cause a
denial-of-service.
* CVE-2016-9604: Permission bypass when creating key using keyring subsystem.
A missing check when an user create a key beginning with '.' could lead
to a permission bypass. A local attacker could use this flaw to access
sensitive information.
* CVE-2016-9685: Memory leak in XFS filesystem operations.
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the
Linux kernel before 4.5.1 allow local users to cause a denial of service
(memory consumption) via crafted XFS filesystem operations.
* CVE-2016-10200: Denial-of-service when creating L2TP sockets using concurrent thread.
A missing check when creating L2TP socket could lead to a use-after-free
if a concurrent thread modify socket's flag while creating it. An attacker
could use this flaw to cause a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.
New Ksplice updates for UEKR3 3.8.13 on OL6 and OL7 (ELSA-2017-3606)
Synopsis: ELSA-2017-3606 can now be patched using Ksplice
CVEs: CVE-2016-10200 CVE-2016-9604 CVE-2016-9685 CVE-2017-1000365 CVE-2017-9242
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-3606.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR3 3.8.13 on
OL6 and OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2017-9242: Denial-of-service when using send syscall of IPV6 socket.
A missing check when sending messages over IPV6 sockets could lead to an
out-of-bound access. A local user could use this flaw to cause a
denial-of-service.
* CVE-2016-9604: Permission bypass when creating key using keyring subsystem.
A missing check when an user create a key beginning with '.' could lead
to a permission bypass. A local attacker could use this flaw to access
sensitive information.
* CVE-2016-9685: Memory leak in XFS filesystem operations.
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the
Linux kernel before 4.5.1 allow local users to cause a denial of service
(memory consumption) via crafted XFS filesystem operations.
* CVE-2016-10200: Denial-of-service when creating L2TP sockets using concurrent thread.
A missing check when creating L2TP socket could lead to a use-after-free
if a concurrent thread modify socket's flag while creating it. An attacker
could use this flaw to cause a denial-of-service.
* CVE-2017-1000365: Privilege escalation when performing exec.
A logic error allows an unprivileged local user to bypass argument and
environmental string size limits when performing an exec syscall. A
local user could use this flaw to bypass guard pages between the stack
and another mapping, leading to potential privilege escalation.
SUPPORT
Ksplice support is available at ksplice-support_ww@oracle.com.