[Ksplice][Ubuntu-12.04-Updates] New updates available via Ksplice (3.2.0-26.41)

Jamie Iles jamie.iles at oracle.com
Fri Jun 29 04:46:37 PDT 2012


Synopsis: 3.2.0-26.41 can now be patched using Ksplice
CVEs: CVE-2012-2375

Systems running Ubuntu 12.04 Precise can now use Ksplice to patch
against the latest Ubuntu kernel update, 3.2.0-26.41.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Ubuntu 12.04 Precise
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Memory leak in memory control group.

The memory control group did not free all data structures on removal of
the last event leading to a memory leak.


* Deadlock in device mapper subsystem.

The device mapper used the wrong type of memory allocation in flush
submission resulting in possible deadlock and a denial-of-service.


* Use-after-free in USB userspace device I/O.

Incorrect reference counting lead to a possible race condition in
several paths and a possible use-after-free resulting in undefined
behaviour.


* Insufficient validation in asynchronous I/O.

Insufficient validation in the asynchronous I/O setup code could result
in accessing files locked with a mandatory file lock or overflowing the
file offset leading to data corruption.


* Out-of-bounds memory access in IOMMU subsystem.

An off-by-one error in the IOMMU subsystem when processing a fault could
result in undefined behaviour.


* Use-after-free in selinux policy loading.

Incorrect initialisation of the number of policy booleans could result
in accessing stale data after failing to load a new policy and undefined
behaviour.


* Memory corruption in KVM device assignment slot handling.

A race condition in the KVM device assignment slot handling caused by
missing locks around the unmapping of memory slots could cause a memory
corruption.


* CVE-2012-2375: Kernel crash in NFSv4.

The upstream fix for CVE-2010-4131 was incomplete and still exploitable
under certain circumstances.  nfs4_getfacl decoding causes a kernel
crash when a server returns more than 2 GETATTR bitmap words in response
to the FATTR4_ACL attribute request.


* Integer overflow in block I/O layer.

An integer overflow in the block I/O layer could result in a kernel
BUG_ON() or allocation failure resulting in loss of disk I/O.


* Memory leak in CDC-WDM driver.

A sequencing error in the disconnect and close operations could result
in a memory leak in the CDC-WDM driver.


* Invalid limit calculation in i386 non-executable emulation.

An incorrect parameter to the obtain i386 VDSO VMA could result in using
an invalid address limit for the non-executable area of memory.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-Ubuntu-12.04-Updates mailing list