[Ksplice-cloudlinux6-updates] New updates available via Ksplice (2.6.32-231.21.1.lve0.9.18)

Tim Abbott tim.abbott at oracle.com
Wed Dec 28 22:22:39 PST 2011


Synopsis: 2.6.32-231.21.1.lve0.9.18 can now be patched using Ksplice
CVEs: CVE-2011-1162 CVE-2011-1577 CVE-2011-2494 CVE-2011-2699 
CVE-2011-3188 CVE-2011-3191 CVE-2011-3353 CVE-2011-3359 CVE-2011-3363 
CVE-2011-3593 CVE-2011-4326
Red Hat Security Advisory Severity: Important

Systems running CloudLinux 6 can now use Ksplice to patch against the
latest CloudLinux 6 kernel update, 2.6.32-231.21.1.lve0.9.18.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on CloudLinux 6 install
these updates.  You can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.


DESCRIPTION

* CVE-2011-3359: Denial of service in Broadcom 43xx wireless driver.

A flaw was found in the b43 driver in the Linux kernel.  If a system
had an active wireless interface that uses the b43 driver, an attacker
able to send a specially-crafted frame to that interface could cause a
denial of service.  (CVE-2011-3359, Moderate)


* CVE-2011-3363: Denial of service in CIFS via malicious DFS referrals.

A flaw was found in the way CIFS shares with DFS referrals at their
root were handled.  An attacker on the local network who is able to
deploy a malicious CIFS server could create a CIFS network share that,
when mounted, would cause the client system to crash.  (CVE-2011-3363,
Moderate)


* CVE-2011-3188: Weak TCP sequence number generation.

The way IPv4 and IPv6 protocol sequence numbers and fragment IDs were
generated could allow a man-in-the-middle attacker to inject packets
and possibly hijack connections.  Protocol sequence numbers and
fragment IDs are now more random. (CVE-2011-3188, Moderate)


* CVE-2011-1577: Denial of service in GPT partition handling.

A heap overflow flaw was found in the Linux kernel's EFI GUID
Partition Table (GPT) implementation.  A local attacker could use this
flaw to cause a denial of service by mounting a disk that contains
specially-crafted partition tables.  (CVE-2011-1577, Low)


* CVE-2011-3353: Denial of service in FUSE via FUSE_NOTIFY_INVAL_ENTRY.

A buffer overflow flaw was found in the Linux kernel's FUSE
(Filesystem in Userspace) implementation.  A local user in the fuse
group who has access to mount a FUSE file system could use this flaw
to cause a denial of service.  (CVE-2011-3353, Moderate)


* CVE-2011-3191: Privilege escalation in CIFS directory reading.

A signedness issue was found in the Linux kernel's CIFS (Common
Internet File System) implementation.  A malicious CIFS server could
send a specially-crafted response to a directory read request that
would result in a denial of service or privilege escalation on a
system that has a CIFS share mounted.  (CVE-2011-3191, Important)


* CVE-2011-1162: Information leak in TPM driver.

A flaw in the way memory containing security-related data was handled
in tpm_read() could allow a local, unprivileged user to read the
results of a previously run TPM command.  (CVE-2011-1162, Low)


* CVE-2011-4326: Denial of service in IPv6 UDP Fragmentation Offload.

A flaw was found in the way the Linux kernel handled fragmented IPv6
UDP datagrams over the bridge with UDP Fragmentation Offload (UFO)
functionality on.  A remote attacker could use this flaw to cause a
denial of service.  (CVE-2011-4326, Important)


* CVE-2011-2699: Predictable IPv6 fragment identification numbers.

IPv6 fragment identification value generation could allow a remote
attacker to disrupt a target system's networking, preventing
legitimate users from accessing its services.  (CVE-2011-2699,
Important)


* CVE-2011-2494: Information leak in task/process statistics.

The I/O statistics from the taskstats subsystem could be read without
any restrictions.  A local, unprivileged user could use this flaw to
gather confidential information, such as the length of a password used
in a process.  (CVE-2011-2494, Low)


* CVE-2011-3593: Denial of service in VLAN with priority tagged frames.

A flaw was found in the way the Linux kernel handled VLAN 0 frames
with the priority tag set.  When using certain network drivers, an
attacker on the local network could use this flaw to cause a denial of
service.  (CVE-2011-3593, Moderate)

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-CloudLinux6-Updates mailing list