[Ksplice][RHEL6-Updates] New updates available via Ksplice (RHSA-2011:1530-3)
Anders Kaseorg
anders.kaseorg at oracle.com
Tue Dec 6 15:26:02 PST 2011
Synopsis: RHSA-2011:1530-3 can now be patched using Ksplice
CVEs: CVE-2011-1020 CVE-2011-3638 CVE-2011-4110
Red Hat Security Advisory Severity: Moderate
Systems running Red Hat Enterprise Linux 6, CentOS 6, and Scientific
Linux 6 can now use Ksplice to patch against the latest Red Hat
Security Advisory, RHSA-2011:1530-3.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on RHEL 6, CentOS 6,
and Scientific Linux 6 install these updates. You can install these
updates by running:
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
DESCRIPTION
* CVE-2011-4110: Denial of service in kernel key management facilities.
A flaw in the way user-defined key types were handled allowed an
uprivileged local user to crash the system via a NULL pointer
dereference and kernel OOPS.
* CVE-2011-3638: Disk layout corruption bug in ext4 filesystem.
When splitting two extents in ext4_ext_convert_to_initialized(), an
extent was incorrectly not dirtied, resulting in the disk layout being
corrupted, which will eventually cause a kernel crash.
* CVE-2011-1020: Missing access restrictions in /proc subsystem.
The proc filesystem implementation did not restrict access to the /proc
directory tree of a process after this process performs an exec of a
setuid program, which allowed local users to obtain sensitive information
or potentially cause other integrity issues.
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Ksplice-EL6-Updates
mailing list