[Ksplice][Ubuntu 10.04 Updates] New updates available via Ksplice (USN-1555-1)
Samson Yeung
samson.yeung at oracle.com
Wed Sep 5 15:14:59 PDT 2012
Synopsis: USN-1555-1 can now be patched using Ksplice
CVEs: CVE-2012-0044 CVE-2012-2372 CVE-2012-3400
Systems running Ubuntu 10.04 Lucid can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-1555-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 10.04 Lucid
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2012-2372: Denial of service in Reliable Datagram Sockets protocol.
A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS)
protocol implementation. A local, unprivileged user could use this flaw
to cause a denial of service.
* CVE-2012-3400: Buffer overflow in UDF parsing.
A bug in the kernel's UDF file system driver could be exploited by an
unprivileged local user to crash the system.
* CVE-2012-0044: Integer overflow and memory corruption in DRM CRTC support.
A missing size check in drm_mode_dirtyfb_ioctl allowed an attacker to
overflow num_clips, causing a buffer allocation of an unintended,
small size. Future calls to fb->funcs->dirty could result in memory
corruption beyond that buffer.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-10.04-Updates
mailing list