[Ksplice][RHEL 5 Updates] New updates available via Ksplice (RHSA-2011:0303-1)
Tim Abbott
tabbott at ksplice.com
Thu Mar 3 10:25:15 PST 2011
Synopsis: RHSA-2011:0303-1 can now be patched using Ksplice
CVEs: CVE-2010-4249 CVE-2010-4655
Red Hat Security Advisory Severity: Moderate
Systems running Red Hat Enterprise Linux 5, CentOS 5, and CentOSPlus 5 can
now use Ksplice to patch against the latest Red Hat Security Advisory,
RHSA-2011:0303-1.
INSTALLING THE UPDATES
We recommend that all Ksplice Uptrack RHEL 5, CentOS 5, and CentOSPlus 5
users install these updates. You can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to take
any additional action.
DESCRIPTION
* CVE-2010-4655: Information leak in ethtool_get_regs.
A missing initialization flaw was found in the ethtool_get_regs() function
in the Linux kernel's ethtool IOCTL handler. A local user who has the
CAP_NET_ADMIN capability could use this flaw to cause an information leak.
(CVE-2010-4655, Low).
* CVE-2010-4249: Local denial of service vulnerability in UNIX sockets.
A flaw was found in the Linux kernel's garbage collector for AF_UNIX
sockets. A local, unprivileged user could use this flaw to trigger a
denial of service (out-of-memory condition). (CVE-2010-4249, Moderate).
* Panic in kfree() due to race condition in acpi_bus_receive_event.
The acpi_bus_receive_event() function left the acpi_bus_event_list
unlocked between checking it was empty and extracting its first element to
pass to kfree().
* Fix connection timeouts due to shrinking tcp window with window scaling.
A problem with the IPV4 tcp window scaling code would, under certain
circumstances, incorrectly shrink the TCP window in a way that could
result in a constant flood of duplicate ACKs until the connection times
out.
SUPPORT
Ksplice support is available at support at ksplice.com or +1 765-577-5423.
More information about the Ksplice-EL5-Updates
mailing list