[Ksplice][RHEL 5 Updates] New updates available via Ksplice (RHSA-2011:1212-1)

Tim Abbott tim.abbott at oracle.com
Thu Sep 8 11:59:59 PDT 2011


Synopsis: RHSA-2011:1212-1 can now be patched using Ksplice
CVEs: CVE-2011-2482 CVE-2011-2491 CVE-2011-2495 CVE-2011-2517
Red Hat Security Advisory Severity: Important

Systems running Red Hat Enterprise Linux 5, CentOS 5, Scientific Linux
5, and CentOSPlus 5 can now use Ksplice to patch against the latest
Red Hat Security Advisory, RHSA-2011:1212-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on RHEL 5, CentOS 5,
Scientific Linux 5, and CentOSPlus 5 install these updates.  You can
install these updates by running:

# /usr/sbin/uptrack-upgrade -y

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.


DESCRIPTION

* CVE-2011-2482: Remote denial of service vulnerability in SCTP.

A NULL pointer dereference flaw was found in the Linux kernel's Stream
Control Transmission Protocol (SCTP) implementation.  A remote
attacker could send a specially-crafted SCTP packet to a target
system, resulting in a denial of service. (CVE-2011-2482, Important).


* CVE-2011-2495: Information leak in /proc/PID/io.

/proc/[PID]/io is world-readable by default. Previously, these files
could be read without any further restrictions.  A local, unprivileged
user could read these files, belonging to other, possibly privileged
processes to gather confidential information, such as the length of a
password used in a process. (CVE-2011-2495, Low)


* CVE-2011-2517: Buffer overflow in 802.11 netlink interface.

The nl80211_trigger_scan function failed to check for a valid SSID
length, leading to denial of service via buffer
overflow. (CVE-2011-2517, Important).


* Hangs using direct I/O with XFS filesystem.

An error path in the xfs_write function did not correctly unlock the
inode mutex, resulting in hung task timeouts.


* CVE-2011-2491: Local denial of service in NLM subsystem.

A flaw in the client-side NLM implementation could allow a local,
unprivileged user to cause a denial of service. (CVE-2011-2491,
Important)

SUPPORT

Ksplice support is available at support at ksplice.com or +1 765-577-5423.




More information about the Ksplice-EL5-Updates mailing list