[Ksplice][Debian 5.0 Updates] New updates available via Ksplice (Debian 5.0.5)

Tim Abbott tabbott at ksplice.com
Mon Jun 28 22:54:51 PDT 2010


Synopsis: Debian 5.0.5 can now be patched using Ksplice
CVEs: CVE-2008-7256 CVE-2009-4537 CVE-2010-1173 CVE-2010-1436 CVE-2010-1641 CVE-2010-1643

Systems running Debian 5.0 Lenny can now use Ksplice to patch against
the latest Debian update, 5.0.5.

INSTALLING THE UPDATES

We recommend that all Ksplice Uptrack Debian 5.0 Lenny users install
these updates.  You can install these updates by running:

# uptrack-upgrade -y

DESCRIPTION

* Improved fix to CVE-2010-1173.

The original fix to CVE-2010-1173 didn't properly add an append error
cause to the error chunks.


* CVE-2008-7256 and CVE-2010-1643: NULL pointer dereference in knfsd.

When strict overcommit is enabled, the shared memory subsystem does
not properly handle the export of shmemfs objects by knfsd, which
allows attackers to cause a denial of service (NULL pointer
dereference and knfsd crash).


* CVE-2010-1641: Missing permissions check in GFS2 SETFLAGS ioctl.

The do_gfs2_set_flags function in fs/gfs2/file.c did not verify the
ownership of a file, which allows local users to bypass intended
access restrictions via a SETFLAGS ioctl request.


* CVE-2010-1436: Out-of-bounds write in GFS2 quota subsystem.

The gfs2 filesystem did not properly handle the case where the
gfs2_quota struct crossed a page boundary.  A local user writing to a
gfs2 file system could cause the kernel to perform an out-of-bounds
write, resulting in a kernel panic.


* CVE-2009-4537: Buffer underflow in r8169 driver.

The r8169 driver did not correctly handle certain large packets, which
could potentially be exploited to lead to remote arbitrary code
execution.

SUPPORT

Ksplice support is available at support at ksplice.com or +1 765-577-5423.



More information about the Debian-5.0-Updates mailing list