[Ksplice][Ubuntu-12.04-Updates] New updates available via Ksplice (USN-1699-1)
Jamie Iles
jamie.iles at oracle.com
Fri Jan 18 10:46:03 PST 2013
Synopsis: USN-1699-1 can now be patched using Ksplice
CVEs: CVE-2012-4461 CVE-2012-4530
Systems running Ubuntu 12.04 Precise can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-1699-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 12.04 Precise
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Kernel crash in block subsystem.
Accessing a request after it has been freed can cause a crash
in the block driver subsystem.
* NULL pointer dereference in mtd subsystem.
An incorrect check for a NULL pointer could allow a later NULL
pointer deference in the mtd subsystem.
* Memory corruption in WiFi station wakeup handling.
Missing locking could result in the corruption of internal lists leading
to a kernel crash.
* Remote information leak in netfilter TCP connection tracking.
An attacker on a shared routing queue with the victim can gain information
about the victim's TCP connections by sending malformed TCP packets.
* Kernel crash in shared memory inode eviction.
Incorrect locking in shared memory filesystems could result in a kernel
BUG_ON() and subsequent kernel crash.
* Kernel crash in DRM memory type subsystem.
Incorrect memory allocation routines could result in a kernel crash when
allocating memory on systems with high memory.
* NULL pointer dereference on futex wakeup.
Incorrect synchronization during a futex wakeup sequence can trigger a
NULL pointer dereference by trying to wake up a locked futex.
* Deadlock in ISDN gigaset.
Fix a potential deadlock with the delayed work function in the ISDN
gigaset driver.
* Deadlock in software RAID subsystem.
Fix a deadlock in the software RAID subsystem caused by attempting
recurse back into the request queue.
* CVE-2012-4461: Kernel panic KVM XSAVE support.
On machines without XSAVE instruction support a malicious guest can cause
a host kernel panic via the SET_SREGS ioctl.
* Resource leak in XFS buffer I/O error handling.
Invalid reference counting when ending a failed I/O would result in a
memory leak.
* CVE-2012-4530: Kernel information leak in binfmt execution.
Execution of a carefully crafted sequence of scripts could allow an
unprivileged user to leak kernel stack information to userspace.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-12.04-Updates
mailing list