[Ksplice][Debian 5.0 Updates] New updates available via Ksplice (DSA-1996-1)

Tim Abbott tabbott at ksplice.com
Sun Feb 14 23:08:32 PST 2010


Synopsis: DSA-1996-1 can now be patched using Ksplice
CVEs: CVE-2009-4027 CVE-2009-4536 CVE-2009-4538 CVE-2010-0007 CVE-2010-0291 CVE-2010-0298 CVE-2010-0306 CVE-2010-0307 CVE-2010-0309 CVE-2010-0415

Systems running Debian 5.0 Lenny can now use Ksplice to patch against
the latest Debian Security Advisory, DSA-1996-1.

INSTALLING THE UPDATES

We recommend that all Ksplice Uptrack Debian 5.0 Lenny users install
these updates.  You can install these updates by running:

# uptrack-upgrade -y

DESCRIPTION

* CVE-2010-0007: Missing capabilities check in ebtables module.

The ebtables module in the netfilter framework in the Linux kernel did
not require the CAP_NET_ADMIN capability for setting or modifying
rules, which allows local users to bypass intended access restrictions
and configure arbitrary network-traffic filtering via a modified
ebtables application.


* CVE-2009-4027: Remote denial of service in mac80211 DELBA handling.

A race condition in the mac80211 subsystem in the Linux kernel allows
remote attackers to cause a denial of service (system crash) via a
Delete Block ACK (aka DELBA) packet that triggers a certain state
change in the absence of an aggregation session.


* CVE-2010-0415: Information leak in sys_move_pages.

Ramon de Carvalho Valle discovered an issue in the sys_move_pages
interface, limited to 64-bit kernels.  Local users can exploit this
issue to cause a denial of service (system crash) or gain access to
sensitive kernel memory.


* CVE-2009-4536: Denial of service in e1000 driver.

The e1000 driver did not properly handle packets which span multiple
receive buffers, which could be potentially be exploited by a remote
attacker to lead to memory corruption and denial of service.


* CVE-2009-4538: Denial of service in e1000e driver.

The e1000e driver did not properly handle packets which span multiple
receive buffers, which could be potentially be exploited by a remote
attacker to lead to memory corruption and denial of service.


* CVE-2010-0307: Denial of service on amd64

A programming error in the load_elf_binary function on Linux could
result in a denial of service on 64-bit machines by attempting to exec
a 32-bit binary with an invalid interpreter, and then causing a
coredump.


* CVE-2010-0291: Multiple Denial of Service bugs in mmap() and mremap().

The Linux kernel is exposed to multiple denial of service issues when
mapping memory addresses.


* CVE-2010-0309: KVM: Host denial of service reading /dev/port from guest.

Marcelo Tosatti fixed an issue in the PIT emulation code in the KVM
subsystem that allows privileged users in a guest domain to cause a
denial of service (crash) of the host system.


* CVE-2010-0298 and CVE-2010-0306: KVM guest privilege escalations.

Gleb Natapov discovered issues in the KVM subsystem where missing
permission checks on the CPL and IOPL levels permit a user in a guest
system to denial of service a guest (system crash) or gain escalated
privileges with the guest.

SUPPORT

Ksplice support is available at support at ksplice.com or +1 765-577-5423.



More information about the Debian-5.0-Updates mailing list