[Ksplice][Ubuntu-12.04-Updates] New updates available via Ksplice (3.2.0-26.41)
Jamie Iles
jamie.iles at oracle.com
Fri Jun 29 04:46:37 PDT 2012
Synopsis: 3.2.0-26.41 can now be patched using Ksplice
CVEs: CVE-2012-2375
Systems running Ubuntu 12.04 Precise can now use Ksplice to patch
against the latest Ubuntu kernel update, 3.2.0-26.41.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 12.04 Precise
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Memory leak in memory control group.
The memory control group did not free all data structures on removal of
the last event leading to a memory leak.
* Deadlock in device mapper subsystem.
The device mapper used the wrong type of memory allocation in flush
submission resulting in possible deadlock and a denial-of-service.
* Use-after-free in USB userspace device I/O.
Incorrect reference counting lead to a possible race condition in
several paths and a possible use-after-free resulting in undefined
behaviour.
* Insufficient validation in asynchronous I/O.
Insufficient validation in the asynchronous I/O setup code could result
in accessing files locked with a mandatory file lock or overflowing the
file offset leading to data corruption.
* Out-of-bounds memory access in IOMMU subsystem.
An off-by-one error in the IOMMU subsystem when processing a fault could
result in undefined behaviour.
* Use-after-free in selinux policy loading.
Incorrect initialisation of the number of policy booleans could result
in accessing stale data after failing to load a new policy and undefined
behaviour.
* Memory corruption in KVM device assignment slot handling.
A race condition in the KVM device assignment slot handling caused by
missing locks around the unmapping of memory slots could cause a memory
corruption.
* CVE-2012-2375: Kernel crash in NFSv4.
The upstream fix for CVE-2010-4131 was incomplete and still exploitable
under certain circumstances. nfs4_getfacl decoding causes a kernel
crash when a server returns more than 2 GETATTR bitmap words in response
to the FATTR4_ACL attribute request.
* Integer overflow in block I/O layer.
An integer overflow in the block I/O layer could result in a kernel
BUG_ON() or allocation failure resulting in loss of disk I/O.
* Memory leak in CDC-WDM driver.
A sequencing error in the disconnect and close operations could result
in a memory leak in the CDC-WDM driver.
* Invalid limit calculation in i386 non-executable emulation.
An incorrect parameter to the obtain i386 VDSO VMA could result in using
an invalid address limit for the non-executable area of memory.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-12.04-Updates
mailing list