[Ksplice][RHEL6-Updates] New updates available via Ksplice (RHSA-2011:1465-1)
Anders Kaseorg
anders.kaseorg at oracle.com
Wed Nov 23 10:47:18 PST 2011
Synopsis: RHSA-2011:1465-1 can now be patched using Ksplice
CVEs: CVE-2011-1162 CVE-2011-1577 CVE-2011-2494 CVE-2011-2699
CVE-2011-3188 CVE-2011-3191 CVE-2011-3353 CVE-2011-3359 CVE-2011-3363
CVE-2011-3593 CVE-2011-4326
Red Hat Security Advisory Severity: Important
Systems running Red Hat Enterprise Linux 6, CentOS 6, and Scientific
Linux 6 can now use Ksplice to patch against the latest Red Hat
Security Advisory, RHSA-2011:1465-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on RHEL 6, CentOS 6,
and Scientific Linux 6 install these updates. You can install these
updates by running:
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
DESCRIPTION
* CVE-2011-3359: Denial of service in Broadcom 43xx wireless driver.
A flaw was found in the b43 driver in the Linux kernel. If a system
had an active wireless interface that uses the b43 driver, an attacker
able to send a specially-crafted frame to that interface could cause a
denial of service. (CVE-2011-3359, Moderate)
* CVE-2011-3363: Denial of service in CIFS via malicious DFS referrals.
A flaw was found in the way CIFS shares with DFS referrals at their
root were handled. An attacker on the local network who is able to
deploy a malicious CIFS server could create a CIFS network share that,
when mounted, would cause the client system to crash. (CVE-2011-3363,
Moderate)
* CVE-2011-3188: Weak TCP sequence number generation.
The way IPv4 and IPv6 protocol sequence numbers and fragment IDs were
generated could allow a man-in-the-middle attacker to inject packets
and possibly hijack connections. Protocol sequence numbers and
fragment IDs are now more random. (CVE-2011-3188, Moderate)
* CVE-2011-1577: Denial of service in GPT partition handling.
A heap overflow flaw was found in the Linux kernel's EFI GUID
Partition Table (GPT) implementation. A local attacker could use this
flaw to cause a denial of service by mounting a disk that contains
specially-crafted partition tables. (CVE-2011-1577, Low)
* CVE-2011-3353: Denial of service in FUSE via FUSE_NOTIFY_INVAL_ENTRY.
A buffer overflow flaw was found in the Linux kernel's FUSE
(Filesystem in Userspace) implementation. A local user in the fuse
group who has access to mount a FUSE file system could use this flaw
to cause a denial of service. (CVE-2011-3353, Moderate)
* CVE-2011-3191: Privilege escalation in CIFS directory reading.
A signedness issue was found in the Linux kernel's CIFS (Common
Internet File System) implementation. A malicious CIFS server could
send a specially-crafted response to a directory read request that
would result in a denial of service or privilege escalation on a
system that has a CIFS share mounted. (CVE-2011-3191, Important)
* CVE-2011-1162: Information leak in TPM driver.
A flaw in the way memory containing security-related data was handled
in tpm_read() could allow a local, unprivileged user to read the
results of a previously run TPM command. (CVE-2011-1162, Low)
* CVE-2011-4326: Denial of service in IPv6 UDP Fragmentation Offload.
A flaw was found in the way the Linux kernel handled fragmented IPv6
UDP datagrams over the bridge with UDP Fragmentation Offload (UFO)
functionality on. A remote attacker could use this flaw to cause a
denial of service. (CVE-2011-4326, Important)
* CVE-2011-2699: Predictable IPv6 fragment identification numbers.
IPv6 fragment identification value generation could allow a remote
attacker to disrupt a target system's networking, preventing
legitimate users from accessing its services. (CVE-2011-2699,
Important)
* CVE-2011-2494: Information leak in task/process statistics.
The I/O statistics from the taskstats subsystem could be read without
any restrictions. A local, unprivileged user could use this flaw to
gather confidential information, such as the length of a password used
in a process. (CVE-2011-2494, Low)
* CVE-2011-3593: Denial of service in VLAN with priority tagged frames.
A flaw was found in the way the Linux kernel handled VLAN 0 frames
with the priority tag set. When using certain network drivers, an
attacker on the local network could use this flaw to cause a denial of
service. (CVE-2011-3593, Moderate)
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Ksplice-EL6-Updates
mailing list