[Ksplice][Fedora-17-updates] New updates available via Ksplice (FEDORA-2012-12064)
Sasha Levin
sasha.levin at oracle.com
Fri Aug 17 11:29:39 PDT 2012
Synopsis: FEDORA-2012-12064 can now be patched using Ksplice
CVEs: CVE-2012-3412
Systems running Fedora 17 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2012-12064.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Fedora 16 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* NULL pointer dereference in qeth driver.
Missing NULL pointer checks could result in a kernel crash and
denial-of-service.
* NULL pointer dereference in non-pi futexes.
Incorrect configuration of futex addresses could lead to a NULL pointer
dereference and kernel crash.
* Kernel stack information leak in tun ioctls.
Incorrect initialization of ioctl structures could result in leaking
stack bytes to a userspace process.
* Use-after-free in tg3 network driver stats.
Invalid locking could result in a use-after-free condition when
accessing device statistics.
* Kernel panic on SUNRPC initialization failure.
A kernel panic may occur due to a failed SUNRPC initialization due to invalid
return values returned by the initialization function.
* NULL pointer dereference in non-persistent tunnel devices.
A NULL pointer dereference in the tunnelling network device may occur
when closing a tunnel device.
* Kernel information leak in put_cmsg_compat().
A networking compatibility handler for 32-bit processes used stack
variables outside of their scope resulting in a kernel stack information
leak to users.
* Memory leak in radeon buffer object management.
Incorrect error handling could result in a memory leak and
denial-of-service.
* Denial of service in hugetlbfs shared page table teardown.
A race condition in hugetlbfs shared page table teardown may cause a corruption
of the pagetables, leading to a kernel BUG.
* Memory leak in device mapper thin provisioning driver.
Incorrect error handling could result in a memory leak and denial of
service.
* NULL pointer dereference in Ralink rt2x00 wireless network driver.
Due to incorrect initialization of a data structure, a NULL pointer
dereference may occur on device wakeup.
* Data loss in ext4 filesystems.
An integer underflow in metadata block management could result in
allocation failure and data loss.
* Kernel crash in radeon DRM driver.
Incorrect error handling in the CS parser could result in a kernel oops
when managing fence buffer objects.
* NULL pointer dereference in futex requeuing.
A missing NULL pointer check could result in a kernel crash when
attempting to requeue a futex.
* CVE-2012-3412: Remote denial of service through TCP MSS option in SFC NIC.
A malicious remote user may trigger a denial-of-service in hosts using the SFC
NIC by reducing the size of the TCP MSS and causing the victim to run out
of resources while processing the packets.
* NULL pointer dereference in caif tty driver.
A missing NULL pointer check could result in a kernel crash when opening
the tty device.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-17-Updates
mailing list