[Ksplice][CloudLinux 5 Updates] New updates available via Ksplice (2.6.18-338.12.1.el5.lve0.8.34)

Tim Abbott tabbott at ksplice.com
Tue Jun 14 17:11:29 PDT 2011


Synopsis: 2.6.18-338.12.1.el5.lve0.8.34 can now be patched using Ksplice
CVEs: CVE-2010-1083 CVE-2011-0726 CVE-2011-1078 CVE-2011-1079 CVE-2011-1080 CVE-2011-1093 CVE-2011-1163 CVE-2011-1170 CVE-2011-1171 CVE-2011-1172 CVE-2011-1494 CVE-2011-1495 CVE-2011-1577
Red Hat Security Advisory Severity: Important

Systems running CloudLinux 5 can now use Ksplice to patch against the 
latest CloudLinux 5 kernel update, 2.6.18-338.12.1.el5.lve0.8.34.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on CloudLinux 5 install 
these updates.  You can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, 
these updates will be installed automatically and you do not need to take 
any additional action.


DESCRIPTION

* CVE-2011-1079: Missing validation in bnep_sock_ioctl.

A missing validation of a null-terminated string data structure element in 
the bnep_sock_ioctl() function could allow a local user to cause an 
information leak or a denial of service.


* CVE-2011-1093: Remote Denial of Service in DCCP.

A flaw in the dccp_rcv_state_process() function could allow a remote 
attacker to cause a denial of service, even when the socket was already 
closed. (CVE-2011-1093, Important)


* CVE-2011-0726: Information leak in /proc/[pid]/stat.

The start_code and end_code values in "/proc/[pid]/stat" were not 
protected. In certain scenarios, this flaw could be used to defeat Address 
Space Layout Randomization (ASLR).


* CVE-2011-1080, CVE-2011-1170, CVE-2011-1171, CVE-2011-1172: Information leaks in netfilter.

Missing validations of null-terminated string data structure elements in 
the do_replace(), compat_do_replace(), do_ipt_get_ctl(), 
do_ip6t_get_ctl(), and do_arpt_get_ctl() functions could allow a local 
user who has the CAP_NET_ADMIN capability to cause an information leak. 
(CVE-2011-1080, CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, Low)


* Buffer overflow in iptables CLUSTERIP target.

The ipt_CLUSTERIP module parses a user-provided string without checking it 
for null termination, resulting in a possible buffer overflow.


* CVE-2011-1163: Kernel information leak parsing malformed OSF partition tables.

A buffer overflow flaw in the DEC Alpha OSF partition implementation in 
the Linux kernel could allow a local attacker to cause an information leak 
by mounting a disk that contains specially-crafted partition tables.  
(CVE-2011-1163, Low)


* USB Audio regression introduced by CVE-2010-1083 fix.

An incorrect fix by Red Hat for CVE-2010-1083 introduced a regression in 
USB data transfer, which could result in significant audio degredation 
using USB audo devices.


* Denial of service in NFS server via reference count leak.

Repeated NLM lock operations can cause a reference count to overflow, 
eventually leading to a use-after-free causing a denial of service (kernel 
panic) or other unspecified impact.


* Fix a packet flood when initializing a bridge device without STP.

If bridge was configured with no STP and forwarding delay of 0 then when 
the link started it would flood packets for the first 20 seconds.


* CVE-2011-1577: Missing boundary checks in GPT partition handling.

A heap overflow flaw in the Linux kernel's EFI GUID Partition Table (GPT) 
implementation could allow a local attacker to cause a denial of service 
by mounting a disk that contains specially-crafted partition tables.  
(CVE-2011-1577, Low)


* CVE-2011-1078: Information leak in Bluetooth sco.

A missing initialization flaw in the sco_sock_getsockopt() function could 
allow a local, unprivileged user to cause an information leak. 
(CVE-2011-1078, Low)


* CVE-2011-1494, CVE-2011-1495: Privilege escalation in LSI MPT Fusion SAS 2.0 driver.

Multiple buffer overflow flaws were found in the Linux kernel's Management 
Module Support for Message Passing Technology (MPT) based controllers. A 
local, unprivileged user could use these flaws to cause a denial of 
service, an information leak, or escalate their privileges.  
(CVE-2011-1494, CVE-2011-1495, Important)


* Infinite loop on CPT kernel thread creation.

The local_kernel_thread function in the CPT subsystem was missing a check 
for pending signals, which could lead to an infinite loop while creating 
kernel threads.

SUPPORT

Ksplice support is available at support at ksplice.com or +1 765-577-5423.



More information about the CloudLinux5-Updates mailing list