[Ksplice][Ubuntu-10.10-Updates] New updates available via Ksplice (2.6.35-32.65)

Tim Abbott tim.abbott at oracle.com
Fri Feb 10 15:01:43 PST 2012


Synopsis: 2.6.35-32.65 can now be patched using Ksplice
CVEs: CVE-2011-3353 CVE-2011-4622 CVE-2012-0038 CVE-2012-0044

Systems running Ubuntu 10.10 Maverick can now use Ksplice to patch
against the latest Ubuntu kernel update, 2.6.35-32.65.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Ubuntu 10.10
Maverick install these updates.  You can install these updates by
running:

# /usr/sbin/uptrack-upgrade -y

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.


DESCRIPTION

* CVE-2011-3353: Denial of service in FUSE via FUSE_NOTIFY_INVAL_ENTRY.

A buffer overflow flaw was found in the Linux kernel's FUSE
(Filesystem in Userspace) implementation.  A local user in the fuse
group who has access to mount a FUSE file system could use this flaw
to cause a denial of service.  (CVE-2011-3353, Moderate)


* CVE-2011-4622: NULL pointer deference in KVM interval timer emulation.

Starting PIT timers in the absence of irqchip support could cause a
NULL pointer dereference and kernel OOPs.


* CVE-2012-0038: Buffer overflow in XFS ACL handling code.

An integer overflow bug in the XFS filesystem's ACL handling could
lead to a heap-based buffed overflow when mounting a maliciously
crafted XFS filesystem.


* CVE-2012-0044: Integer overflow and memory corruption in DRM CRTC support.

A missing size check in drm_mode_dirtyfb_ioctl allowed an attacker to
overflow num_clips, causing a buffer allocation of an unintended,
small size. Future calls to fb->funcs->dirty could result in memory
corruption beyond that buffer.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-Ubuntu-10.10-Updates mailing list