[Ksplice][RHEL 5 Updates] New updates available via Ksplice (RHSA-2010:0147-1)
Nelson Elhage
nelhage at ksplice.com
Wed Mar 17 13:01:35 PDT 2010
Synopsis: RHSA-2010:0147-1 can now be patched using Ksplice
CVEs: CVE-2009-4308 CVE-2010-0007 CVE-2010-0415 CVE-2010-0437
Red Hat Security Advisory Severity: Important
Systems running Red Hat Enterprise Linux 5 and CentOS 5 can now use
Ksplice to patch against the latest Red Hat Security Advisory,
RHSA-2010:0147-1.
INSTALLING THE UPDATES
We recommend that all Ksplice Uptrack RHEL 5 and CentOS 5 users
install these updates. You can install these updates by running:
# uptrack-upgrade -y
DESCRIPTION
* Kernel crash forwarding network traffic.
A programming error in the Generic Receive Offload implementation in
the linux kernel could generate invalid packet structures with certain
network cards, resulting in a kernel crash (BUG) if those packets are
then forwarded to another network interface.
* CVE-2010-0437: NULL pointer dereference in ip6_dst_lookup_tail.
A NULL pointer dereference flaw was found in the ip6_dst_lookup_tail()
function in the Linux kernel. An attacker on the local network could
trigger this flaw by sending IPv6 traffic to a target system, leading
to a system crash (kernel OOPS) if dst->neighbour is NULL on the
target system when receiving an IPv6 packet. (CVE-2010-0437,
Important)
* CVE-2010-0007: Missing capabilities check in ebtables module.
The ebtables module in the netfilter framework in the Linux kernel did
not require the CAP_NET_ADMIN capability for setting or modifying
rules, which allows local users to bypass intended access restrictions
and configure arbitrary network-traffic filtering via a modified
ebtables application. (CVE-2010-0007, Low)
* CVE-2010-0415: Information Leak in sys_move_pages
A missing boundary check was found in the do_move_pages() function in
the memory migration functionality in the Linux kernel. A local user
could use this flaw to cause a local denial of service or an
information leak. (CVE-2010-0415, Important)
* CVE-2009-4308: NULL pointer dereference in ext4 decoding EROFS w/o a journal.
The ext4_decode_error function in fs/ext4/super.c in the ext4
filesystem in the Linux kernel before 2.6.32 allows user-assisted
remote attackers to cause a denial of service (NULL pointer
dereference), and possibly have unspecified other impact, via a
crafted read-only filesystem that lacks a journal. (CVE-2009-4308,
Moderate)
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Ksplice-EL5-Updates
mailing list