[Ksplice][RHEL 5 Updates] New updates available via Ksplice (RHSA-2011:1479-01)
Tim Abbott
tim.abbott at oracle.com
Thu Dec 1 10:43:13 PST 2011
Synopsis: RHSA-2011:1479-01 can now be patched using Ksplice
CVEs: CVE-2011-1162 CVE-2011-2203 CVE-2011-2494 CVE-2011-3363 CVE-2011-4110
Red Hat Security Advisory Severity: Important
Systems running Red Hat Enterprise Linux 5, CentOS 5, Scientific Linux
5, and CentOSPlus 5 can now use Ksplice to patch against the latest
Red Hat Security Advisory, RHSA-2011:1479-01.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on RHEL 5, CentOS 5,
Scientific Linux 5, and CentOSPlus 5 install these updates. You can
install these updates by running:
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
DESCRIPTION
* CVE-2011-3363: Remote denial of service in cifs_mount.
The kernel's CIFS client code could trigger a denial of service (BUG()
assertion failure) when connecting to a CIFS server providing unusual
shares.
* CVE-2011-4110: Null pointer dereference in key subsystem.
A NULL pointer dereference flaw was found in the way the Linux
kernel's key management facility handled user-defined key types. A
local, unprivileged user could use the keyctl utility to cause a
denial of service. (CVE-2011-4110, Moderate)
* CVE-2011-1162: Information leak in TPM driver.
A flaw in the way memory containing security-related data was handled
in tpm_read() could allow a local, unprivileged user to read the
results of a previously run TPM command. (CVE-2011-1162, Low)
* CVE-2011-2494: Information leak in task/process statistics.
The I/O statistics from the taskstats subsystem could be read without
any restrictions. A local, unprivileged user could use this flaw to
gather confidential information, such as the length of a password used
in a process. (CVE-2011-2494, Low)
* CVE-2011-2203: Null pointer dereference mounting HFS filesystems.
A NULL pointer dereference flaw was found in the Linux kernel's HFS
file system implementation. A local attacker could use this flaw to
cause a denial of service by mounting a disk that contains a
specially-crafted HFS file system with a corrupted MDB extent
record. (CVE-2011-2203, Low)
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Ksplice-EL5-Updates
mailing list