[Ksplice][Ubuntu-11.04-Updates] New updates available via Ksplice (2.6.38-13.55)
Tim Abbott
tim.abbott at oracle.com
Fri Feb 10 15:00:25 PST 2012
Synopsis: 2.6.38-13.55 can now be patched using Ksplice
CVEs: CVE-2011-3353 CVE-2011-4622 CVE-2012-0038 CVE-2012-0044
Systems running Ubuntu 11.04 Natty can now use Ksplice to patch
against the latest Ubuntu kernel update, 2.6.38-13.55.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 11.04 Natty
install these updates. You can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
DESCRIPTION
* CVE-2011-3353: Denial of service in FUSE via FUSE_NOTIFY_INVAL_ENTRY.
A buffer overflow flaw was found in the Linux kernel's FUSE
(Filesystem in Userspace) implementation. A local user in the fuse
group who has access to mount a FUSE file system could use this flaw
to cause a denial of service. (CVE-2011-3353, Moderate)
* CVE-2011-4622: NULL pointer deference in KVM interval timer emulation.
Starting PIT timers in the absence of irqchip support could cause a
NULL pointer dereference and kernel OOPs.
* CVE-2012-0038: In-memory corruption in XFS ACL processing.
A missing check in xfs_acl_from_disk on the number of XFS ACLs could
result in in-memory corruption and a kernel panic.
* CVE-2012-0044: Integer overflow and memory corruption in DRM CRTC support.
A missing size check in drm_mode_dirtyfb_ioctl allowed an attacker to
overflow num_clips, causing a buffer allocation of an unintended,
small size. Future calls to fb->funcs->dirty could result in memory
corruption beyond that buffer.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-11.04-Updates
mailing list