[Ksplice][Debian 6.0 Updates] New updates available via Ksplice (Debian 6.0.2)
Tim Abbott
tabbott at ksplice.com
Sat Jun 25 20:23:35 PDT 2011
Synopsis: Debian 6.0.2 can now be patched using Ksplice
CVEs: CVE-2011-1017 CVE-2011-1577 CVE-2011-1768
Systems running Debian 6.0 Squeeze can now use Ksplice to patch against
the latest Debian kernel update, Debian 6.0.2.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Debian 6.0 Squeeze
install these updates. You can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to take
any additional action.
DESCRIPTION
* CVE-2011-1577: Missing boundary checks in EFI partition table parsing.
Timo Warns reported an issue in the Linux implementation for GUID
partitions. Users with physical access can gain access to sensitive
kernel memory by adding a storage device with a specially crafted
corrupted invalid partition table.
* Improved fix for CVE-2011-1017.
Debian's original patch for CVE-2011-1017 was not sufficient to close the
vulnerability.
* NULL pointer deference with unix seqpacket sockets.
With UNIX seqpacket sockets, unconnected sockets calling the recvmsg()
method could end up trying to receive a pseudo packet used for connecting,
resulting in a NULL pointer deference.
* Use after free bug in iwlwifi driver.
A use-after-free bug was found in the iwl_tx_queue_reclaim function in the
iwlwifi driver.
* Buffer underflow in CIFS driver.
When decoding the string area in a SESSION_SETUP response, the
ssetup_ntlmssp_authenticate function in the CIFS subsystems did not check
whether for bytes_remaining having reached 0, resulting in a buffer
underflow.
* Buffer overflow in CIFS password processing.
When processing passwords, the cifs_parse_mount_options function in the
CIFS subsystem did not properly bounds-check the options array, resulting
in a buffer overflow.
* CVE-2011-1768: Remote denial of service in network protocols.
Alexecy Dobriyan reported an issue in several network protocol
implementations. Remote users can cause a denial of service by sending a
packet during module initialization.
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Debian-6.0-Updates
mailing list