[Ksplice][Ubuntu 10.04 Updates] New updates available via Ksplice (2.6.32-43.97)

Jamie Iles jamie.iles at oracle.com
Tue Sep 18 06:30:30 PDT 2012


Synopsis: 2.6.32-43.97 can now be patched using Ksplice
CVEs: CVE-2012-3412 CVE-2012-3430 CVE-2012-3511

Systems running Ubuntu 10.04 Lucid can now use Ksplice to patch
against the latest Ubuntu kernel update, 2.6.32-43.97.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Ubuntu 10.04 Lucid
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Reduce usage of reserved percpu memory.

The kernel reserves a limited area of percpu memory for loadable modules
containing static percpu data and exhausting this can limit the ability
to load modules.


* CVE-2012-3430: kernel information leak in RDS sockets.

Calling recvfrom() on an RDS socket could result in leaking the contents
of kernel stack memory to userspace.


* CVE-2012-3511: Use-after-free due to race condition in madvise.

A race condition between munmap and madvise can cause a use-after-free
in the memory management system.


* CVE-2012-3412: Remote denial of service through TCP MSS option in SFC NIC.

A malicious remote user may trigger a denial-of-service in hosts using the SFC
NIC by reducing the size of the TCP MSS and causing the victim to run out
of resources while processing the packets.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-Ubuntu-10.04-Updates mailing list