[Ksplice][Ubuntu-10.10-Updates] New updates available via Ksplice (2.6.35-32.65)
Tim Abbott
tim.abbott at oracle.com
Fri Feb 10 15:01:43 PST 2012
Synopsis: 2.6.35-32.65 can now be patched using Ksplice
CVEs: CVE-2011-3353 CVE-2011-4622 CVE-2012-0038 CVE-2012-0044
Systems running Ubuntu 10.10 Maverick can now use Ksplice to patch
against the latest Ubuntu kernel update, 2.6.35-32.65.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 10.10
Maverick install these updates. You can install these updates by
running:
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
DESCRIPTION
* CVE-2011-3353: Denial of service in FUSE via FUSE_NOTIFY_INVAL_ENTRY.
A buffer overflow flaw was found in the Linux kernel's FUSE
(Filesystem in Userspace) implementation. A local user in the fuse
group who has access to mount a FUSE file system could use this flaw
to cause a denial of service. (CVE-2011-3353, Moderate)
* CVE-2011-4622: NULL pointer deference in KVM interval timer emulation.
Starting PIT timers in the absence of irqchip support could cause a
NULL pointer dereference and kernel OOPs.
* CVE-2012-0038: Buffer overflow in XFS ACL handling code.
An integer overflow bug in the XFS filesystem's ACL handling could
lead to a heap-based buffed overflow when mounting a maliciously
crafted XFS filesystem.
* CVE-2012-0044: Integer overflow and memory corruption in DRM CRTC support.
A missing size check in drm_mode_dirtyfb_ioctl allowed an attacker to
overflow num_clips, causing a buffer allocation of an unintended,
small size. Future calls to fb->funcs->dirty could result in memory
corruption beyond that buffer.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-10.10-Updates
mailing list