[Ksplice][RHEL6-Updates] New updates available via Ksplice (RHSA-2011:1530-3)

Anders Kaseorg anders.kaseorg at oracle.com
Tue Dec 6 15:26:02 PST 2011


Synopsis: RHSA-2011:1530-3 can now be patched using Ksplice
CVEs: CVE-2011-1020 CVE-2011-3638 CVE-2011-4110
Red Hat Security Advisory Severity: Moderate

Systems running Red Hat Enterprise Linux 6, CentOS 6, and Scientific
Linux 6 can now use Ksplice to patch against the latest Red Hat
Security Advisory, RHSA-2011:1530-3.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on RHEL 6, CentOS 6,
and Scientific Linux 6 install these updates.  You can install these
updates by running:

# /usr/sbin/uptrack-upgrade -y

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.


DESCRIPTION

* CVE-2011-4110: Denial of service in kernel key management facilities.

A flaw in the way user-defined key types were handled allowed an
uprivileged local user to crash the system via a NULL pointer
dereference and kernel OOPS.


* CVE-2011-3638: Disk layout corruption bug in ext4 filesystem.

When splitting two extents in ext4_ext_convert_to_initialized(), an
extent was incorrectly not dirtied, resulting in the disk layout being
corrupted, which will eventually cause a kernel crash.


* CVE-2011-1020: Missing access restrictions in /proc subsystem.

The proc filesystem implementation did not restrict access to the /proc
directory tree of a process after this process performs an exec of a
setuid program, which allowed local users to obtain sensitive information
or potentially cause other integrity issues.

SUPPORT

Ksplice support is available at support at ksplice.com or +1 765-577-5423.




More information about the Ksplice-EL6-Updates mailing list