[Ksplice][Ubuntu-11.10-Updates] New updates available via Ksplice (USN-1363-1)

Samson Yeung samson.yeung at oracle.com
Tue Feb 14 12:36:15 PST 2012


Synopsis: USN-1363-1 can now be patched using Ksplice
CVEs: CVE-2011-2203 CVE-2011-4097 CVE-2011-4622 CVE-2012-0038 
CVE-2012-0055 CVE-2012-0207

Systems running Ubuntu 11.10 Oneiric can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-1363-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Ubuntu 11.10 Oneiric
install these updates.  You can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.


DESCRIPTION

* Kernel crash caused by invalid page in vmlist.

A missing check in __vmalloc_node_range could cause an invalid page to
be added to the vmlist, later causing a kernel crash.


*Improved fix for CVE-2011-2203.

Ubuntu provided a revised patch for CVE-2011-2203.


* Fix incorrect jump offset calculation in JIT BPF.

JIT computation in Berkeley Packet Filter (BPF) incorrectly calculated
the jump offset when a conditional jump was followed by a long jump,
which a properly formatted packet could exploit.


* Information leak in ext4 page-IO.

Parts of a page beyond EOF were not zeroed before being returned to
the user in ext4_bio_write_page. This allowed an mmap of a size other
than a multiple of PAGE_SIZE to read uninitialized memory.


* Buffer overflow in FUSE page retrieval.

If more than FUSE_MAX_PAGES_PER_REQ pages were requested in
fuse_retrieve, the request page array would overflow.


* CVE-2011-4622: NULL pointer deference in KVM interval timer emulation.

Starting PIT timers in the absence of irqchip support could cause a
NULL pointer dereference and kernel OOPs.


* Denial of service in the CFQ I/O scheduler.

A race condition which may occur between two processes may stop any I/O 
to one of
the processes.


* CVE-2011-4097: Integer overflow of points in oom_badness.

On 64-bit architectures, a task could cause a local denial of service
from an integer overflow if a portion of its OOM score exceeded a
certain value.


* Potential deadlock in filesystem core.

An incorrect argument to a memory allocator function in the Linux
kernel's core filesystem layer could result in a denial of service
(kernel deadlock) in certain cases.


* CVE-2012-0038: Buffer overflow in XFS ACL handling code.

An integer overflow bug in the XFS filesystem's ACL handling could
lead to a heap-based buffed overflow when mounting a maliciously
crafted XFS filesystem.


* Use after free in the USB communication device driver.

A dangling pointer in the USB communication device driver which may 
occur as a result
of a previous failure in that device, may be used to corrupt kernel memory.


* Denial of service in the ASIX network controller.

The ASIX 88772 network controller may enter an infinite loop due to 
heavy load
for a short period of time.


* CVE-2012-0055: Insufficient permissions checking on overlayfs.

Security restrictions on overlayfs were not being applied, resulting in
a user being able to bypass permissions and open otherwise restricted
files.


* CVE-2012-0207: Denial of service bug in IGMP.

The IGMP subsystem's compatability handling of v2 packets had a bug in
the computation of a delay field which could result in division by
zero (causing a kernel panic).

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-Ubuntu-11.10-Updates mailing list