[Ksplice][RHEL 5 Updates] New updates available via Ksplice (RHSA-2010-0398)
Anders Kaseorg
andersk at ksplice.com
Fri May 7 14:07:38 PDT 2010
Synopsis: RHSA-2010-0398 can now be patched using Ksplice
CVEs: CVE-2010-0307 CVE-2010-1085 CVE-2010-1086
Red Hat Security Advisory Severity: Important
Systems running Red Hat Enterprise Linux 5 and CentOS 5 can now use
Ksplice to patch against the latest Red Hat Security Advisory,
RHSA-2010-0398.
INSTALLING THE UPDATES
We recommend that all Ksplice Uptrack RHEL 5 and CentOS 5 users
install these updates. You can install these updates by running:
# uptrack-upgrade -y
DESCRIPTION
* Floating point state corruption after signal.
The context save/restore done by the kernel for a signal handler caused
floating point register state corruption in certain circumstances.
* CVE-2010-1086: Infinite loop in ULE implementation.
A flaw was found in the kernel's Unidirectional Lightweight
Encapsulation (ULE) implementation. A remote attacker could send a
specially-crafted ISO MPEG-2 Transport Stream (TS) frame to a target
system, resulting in a denial of service. (CVE-2010-1086, Important)
* CVE-2010-1085: Divide-by-zero in Intel HDA driver.
A divide-by-zero flaw was found in azx_position_ok() in the Intel High
Definition Audio driver, snd-hda-intel. A local, unprivileged user
could trigger this flaw to cause a denial of service. (CVE-2010-1085,
Moderate)
* CVE-2010-0307: Denial of service on amd64
A programming error in the load_elf_binary function on Linux could
result in a denial of service on 64-bit machines by attempting to exec
a 32-bit binary with an invalid interpreter, and then causing a
coredump.
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Ksplice-EL5-Updates
mailing list