[Ksplice][RHEL 5 Updates] New updates available via Ksplice (RHSA-2010-0398)

Anders Kaseorg andersk at ksplice.com
Fri May 7 14:07:38 PDT 2010


Synopsis: RHSA-2010-0398 can now be patched using Ksplice
CVEs: CVE-2010-0307 CVE-2010-1085 CVE-2010-1086
Red Hat Security Advisory Severity: Important

Systems running Red Hat Enterprise Linux 5 and CentOS 5 can now use
Ksplice to patch against the latest Red Hat Security Advisory,
RHSA-2010-0398.

INSTALLING THE UPDATES

We recommend that all Ksplice Uptrack RHEL 5 and CentOS 5 users
install these updates.  You can install these updates by running:

# uptrack-upgrade -y

DESCRIPTION

* Floating point state corruption after signal.

The context save/restore done by the kernel for a signal handler caused
floating point register state corruption in certain circumstances.

* CVE-2010-1086: Infinite loop in ULE implementation.

A flaw was found in the kernel's Unidirectional Lightweight
Encapsulation (ULE) implementation. A remote attacker could send a
specially-crafted ISO MPEG-2 Transport Stream (TS) frame to a target
system, resulting in a denial of service. (CVE-2010-1086, Important)

* CVE-2010-1085: Divide-by-zero in Intel HDA driver.

A divide-by-zero flaw was found in azx_position_ok() in the Intel High
Definition Audio driver, snd-hda-intel. A local, unprivileged user
could trigger this flaw to cause a denial of service. (CVE-2010-1085,
Moderate)

* CVE-2010-0307: Denial of service on amd64

A programming error in the load_elf_binary function on Linux could
result in a denial of service on 64-bit machines by attempting to exec
a 32-bit binary with an invalid interpreter, and then causing a
coredump.

SUPPORT

Ksplice support is available at support at ksplice.com or +1 765-577-5423.



More information about the Ksplice-EL5-Updates mailing list