[Ksplice][Ubuntu 8.04 Updates] New updates available via Ksplice (USN-914-1)
Greg Price
price at ksplice.com
Thu Mar 18 16:44:27 PDT 2010
Synopsis: USN-914-1 can now be patched using Ksplice
CVEs: CVE-2010-0307 CVE-2010-0415 CVE-2010-0622
Systems running Ubuntu 8.04 Hardy can now use Ksplice to patch against
the latest Ubuntu Security Notice, USN-914-1.
INSTALLING THE UPDATES
We recommend that all Ksplice Uptrack Ubuntu 8.04 Hardy users install
these updates. You can install these updates by running:
# uptrack-upgrade -y
DESCRIPTION
* CVE-2010-0415: Arbitrary information leak in sys_move_pages.
Ramon de Carvalho Valle discovered an issue in the sys_move_pages
interface affecting 64-bit kernels. Local users can exploit this
issue to cause a denial of service (system crash) or gain access to
sensitive kernel memory.
* CVE-2010-0622: Denial of service with corrupted futex.
Jermome Marchand reported that the wake_futex_pi function in
kernel/futex.c did not properly handle certain unlock operations for a
Priority Inheritance (PI) futex, which allows local users to cause a
denial of service (kernel oops) and possibly have unspecified other
impact via modification of the futex value from user space.
* Fix kernel address space randomization on x86_64 systems.
Previously, the kernel did not account for the randomized stack size
when calculating the mmap_base address, so that the reserved region
for the stack could overlap with the mmap region. This could result
in a growing stack overwriting data in the mmap region.
* CVE-2010-0307: Denial of service on x86_64 due to load_elf_binary.
Mathias Krause discovered that the load_elf_binary function in
fs/binfmt_elf.c did not ensure that the ELF interpreter is available
before a call to the SET_PERSONALITY macro, in a flaw related to the
flush_old_exec function. This flaw allows local users to cause a
denial of service (system crash) via a 32-bit application that
attempts to execute a 64-bit application, which fails, and then
triggers a segmentation fault. The issue is demonstrated by
"amd64_killer".
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Ubuntu-8.04-Updates
mailing list