[Ksplice][Fedora-17-updates] New updates available via Ksplice (FEDORA-2012-20614)
Jamie Iles
jamie.iles at oracle.com
Sun Jan 6 06:16:13 PST 2013
Synopsis: FEDORA-2012-20614 can now be patched using Ksplice
Systems running Fedora 17 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2012-20614.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Fedora 17 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Use-after-free in TPCI-200 IndustryPack device removal.
A use-after-free in on device removal of a TPCI-200 device could result
in a kernel crash or data corruption.
* NULL pointer dereference in tracing ring buffer.
Missing error checks in the tracing ring buffer management could result
in a NULL pointer dereference and kernel crash.
* NULL pointer dereference in IPv6 path MTU updating.
Incorrect error checks when updating the path MTU could result in using
an invalid pointer and a subsequent NULL pointer dereference.
* NULL pointer dereference in IRDA SIR network device.
An invalid check in the IRDA SIR network device driver could result in
calling a NULL pointer and crashing the kernel.
* NULL pointer dereference in IPv4 ICMP peer management.
Missing NULL pointer checks could result in a NULL pointer dereference
when managing IPv4 peers in the ICMP protocol family.
* Memory corruption in IPv4 packet defragmentation.
A race condition when checking packet defragmentation could cause packet
corruption.
* Information leaks in INET transport monitoring bytecode.
Invalid validation of monitoring bytecode could allow a malicous user to
leak a number of bytes of kernel heap memory or to crash the kernel by
reading off the end of mapped memory.
* NULL pointer dereference in bonding slave management.
Missing locking in bonding slave management could result in a NULL
pointer dereference and kernel crash.
* Denial-of-service in SCTP message sending.
The SCTP protocol implementation did not correctly release memory when
passed an invalid source buffer. This could allow an unprivileged user
to cause a denial-of-service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-17-Updates
mailing list