[Ksplice][Fedora-17-updates] New updates available via Ksplice (FEDORA-2012-19337)

Jamie Iles jamie.iles at oracle.com
Sat Dec 1 04:36:06 PST 2012


Synopsis: FEDORA-2012-19337 can now be patched using Ksplice
CVEs: CVE-2012-4530

Systems running Fedora 17 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2012-19337.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Fedora 17 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* NULL pointer dereference in SATA PMP drive attach with ACPI.

A missing check for device attachment could result in a NULL pointer
dereference and kernel crash when binding devices.


* Resource leak in XFS buffer I/O error handling.

Invalid reference counting when ending a failed I/O would result in a
memory leak.


* Memory corruption in WiFi station wakeup handling.

Missing locking could result in the corruption of internal lists leading
to a kernel crash.


* Resource leak in WiFi status management.

Incorrect resource freeing could result in a memory leak and hangs in
userspace WiFi applications such as wpa_supplicant and hostapd.


* Use-after-free in virtio device unregistration.

Members of a virtio device were accessed after registration resulting in
a use-after-free and a possible kernel crash.


* NULL pointer dereference in persistent store console writes.

A NULL pointer dereference when writing to the persistent store console
could cause a crash by a privileged local user.


* Kernel crash in tmpfs page allocations.

A kernel assertion could cause a panic under specific circumstances when
allocating memory for a shared memory filesystem.


* Kernel crash in DRM memory type subsystem.

Incorrect memory allocation routines could result in a kernel crash when
allocating memory on systems with high memory.


* Kernel crash in TCP repair mode during transmission.

Triggering TCP socket repair whilst there was data queued for writing
could result in a kernel crash.


* Kernel crash in shared memory inode eviction.

Incorrect locking in shared memory filesystems could result in a kernel
BUG_ON() and subsequent kernel crash.


* Kernel crash in GFS2 filesystem on mmap().

Invalid locking in GFS2 could result in kernel crash when modifying the
access time of a file under mmap().


* CVE-2012-4530: Kernel information leak in binfmt execution.

Execution of a carefully crafted sequence of scripts could allow an
unprivileged user to leak kernel stack information to userspace.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-Fedora-17-Updates mailing list