[Ksplice][Ubuntu 10.04 Updates] New updates available via Ksplice (2.6.32-27.49)

Nelson Elhage nelhage at ksplice.com
Tue Dec 21 08:34:20 PST 2010


Synopsis: 2.6.32-27.49 can now be patched using Ksplice
CVEs: CVE-2010-2943 CVE-2010-2962 CVE-2010-3861 CVE-2010-4072 CVE-2010-4157

Systems running Ubuntu 10.04 Lucid can now use Ksplice to patch against
the latest Ubuntu Security Notice, 2.6.32-27.49.


INSTALLING THE UPDATES

We recommend that all Ksplice Uptrack Ubuntu 10.04 Lucid users install
these updates.  You can install these updates by running:

# uptrack-upgrade -y


DESCRIPTION

* Mitigate denial of service attacks with large argument lists.

This update corrects a series of issues where an attacker could crash
a system or make it unresponsive through attacks involving processes
with very large argument lists.


* CVE-2010-2943: Missing inode validation in XFS.

The xfs implementation in the Linux kernel does properly validate inode numbers,
which allows remote authenticated users to read unlinked files, or potentially
read or overwrite other files, by accessing a stale NFS filehandle.


* CVE-2010-2962: Privilege escalation in i915 pread/pwrite ioctls.

The i915 driver's pread and pwrite ioctls had several bugs in their
access control checks that could be used to achieve privilege
escalation.


* CVE-2010-3861: Kernel buffer overflow in ETHTOOL_GRXCLSRLALL ioctl.

An integer overflow error in the ETHTOOL_GRXCLSRLALL ioctl could result in a
denial of service or potential privilege escalation by a local user.


* CVE-2010-4072: Information leak in System V IPC

System V IPC leaks uninitialized kernel stack memory to user programs
in unused fields of the shmid_ds structure.


* CVE-2010-4157: Memory corruption in Intel/ICP RAID driver.

An integer overflow in ioc_general() may cause the computation of an incorrect
buffer size, leading to memory corruption.


SUPPORT

Ksplice support is available at support at ksplice.com or +1 765-577-5423.



More information about the Ubuntu-10.04-Updates mailing list