[Ksplice][RHEL 5 Updates] New updates available via Ksplice (RHSA-2009:1670-1)
Nelson Elhage
nelhage at ksplice.com
Tue Dec 15 23:53:33 PST 2009
Synopsis: RHSA-2009:1670-1 can now be patched using Ksplice
CVEs: CVE-2009-3612 CVE-2009-3726 CVE-2009-3620 CVE-2009-3621
Red Hat Security Advisory Severity: Important
Systems running Red Hat Enterprise Linux 5 and CentOS 5 can now use
Ksplice to patch against the latest Red Hat Security Advisory,
RHSA-2009:1670-1
INSTALLING THE UPDATES
We recommend that all RHEL 5 and CentOS 5 users install these updates.
You can install these updates by running:
# uptrack-upgrade -y
DESCRIPTION
* CVE-2009-3612: Information leak in the netlink subsystem.
The tcf_fill_node function in net/sched/cls_api.c in the netlink
subsystem does not initialize a certain tcm__pad2 structure member,
which might allow local users to obtain sensitive information from
kernel memory. NOTE: this issue exists because of a typo in the fix
for CVE-2005-4881.
* CVE-2009-3726: NFSv4: Denial of Service in NFS client.
A programming error in the Linux NFSv4 client could allow a buggy or
malicious NFS server to cause a denial of service (kernel panic) in
the client.
* CVE-2009-3620: NULL pointer dereference in ATI Rage 128 driver.
The ATI Rage 128 (aka r128) driver in the Linux kernel does not
properly verify Concurrent Command Engine (CCE) state initialization,
which allows local users to cause a denial of service or privilege
escalation.
* CVE-2009-3621: Denial of service shutting down abstract-namespace sockets.
Local users can cause a denial of service (system hang) by creating an
abstract-namespace AF_UNIX listening socket, performing a shutdown
operation on this socket, and then performing a series of connect
operations to this socket.
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Ksplice-EL5-Updates
mailing list