[Ksplice][Ubuntu-12.04-Updates] New updates available via Ksplice (3.2.0-27.43)
Jamie Iles
jamie.iles at oracle.com
Mon Jul 23 12:44:14 PDT 2012
Synopsis: 3.2.0-27.43 can now be patched using Ksplice
CVEs: CVE-2012-2390
Systems running Ubuntu 12.04 Precise can now use Ksplice to patch
against the latest Ubuntu kernel update, 3.2.0-27.43.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 12.04 Precise
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Kernel crash in AESNI decryption for CBC mode.
The AESNI driver did not ensure the correct alignment of memory when
performing AES decryption in CBC mode leading to a kernel crash.
* Memory corruption in B+Tree iterators.
Incorrect handling of B+Tree iterator internals could result in memory
corruption of the tree even on read-only operations leading to undefined
behaviour.
* Kernel oops in unbound L2TP IP sockets.
Missing checks for unbound sockets in the connect() path when using the
AF_UNSPEC address family could result in a kernel oops.
* Out-of-bounds memory access in VMWare DRM driver.
An incorrect check for the command word size could result in corrupted
addresses being passed to the emulated device and memory corruption.
* Memory leak in usb-audio PCM driver.
A missing free() in the hardware unplug code resulted in a memory leak.
* Kernel oops in CIFS open file list traversal.
The modification of a list whilst traversing it looking for open file
handles could result in accessing an invalid list element and a kernel
oops.
* Kernel crash in EXO filesystem on early I/O error.
An I/O error whilst initializing an EXO filesystem could result in a
kernel crash due to incorrect initialization of internal state.
* Kernel oops on interrupt in wl1251 driver.
A kernel oops could be triggered if the wl1251 driver received an
interrupt before it was ready to process it.
* Use-after-free in ath9k driver.
Failing to setup a transmit buffer could result in a use-after-free
condition when transmitting other buffers.
* Integer overflow in mmap copying on clone().
An integer overflow mean that a fork/clone of a process could succeed,
even when the caller did not have enough memory to copy all mmaps
resulting in a denial-of-service.
* Memory leak in SLUB allocator.
Incorrect management of the freelist resulted in a memory leak and
denial of service.
* Deadlock in ext4 hard-linked directories.
A hard-linked directory to it's parent could result in deadlock when
using a corrupted filesystem image.
* Memory leak in ext4 filesystem.
A missing memory resource free in a memory allocation failure path could
result in a memory leak and denial of service condition.
* Lockup in DRM TTM layer.
A missing lock operation could result in a lockup in TTM buffer swapout.
* Use-after-free in IPv4 forwarding table.
Entries in the IPv4 forwarding table could be access whilst they were
being torn down resulting in a use-after-free condition.
* Race condition in IPv4 forwarding table.
A race condition in the IPv4 forwarding table code could result in a
kernel oops and denial of service.
* CVE-2012-2390: Memory leak in hugetlbfs mmap() failure.
Incorrect error handling in the mmap() implementation for hugetlbfs
could result in reservations not being freed resulting in a denial of
service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-12.04-Updates
mailing list