[Ksplice][Ubuntu-12.04-Updates] New updates available via Ksplice (USN-1767-1)

Sonja Tideman sonja.tideman at oracle.com
Mon Mar 18 16:25:37 PDT 2013


Synopsis: USN-1767-1 can now be patched using Ksplice
CVEs: CVE-2013-0190 CVE-2013-0216 CVE-2013-0217 CVE-2013-0268 
CVE-2013-0311 CVE-2013-0349 CVE-2013-1772

Systems running Ubuntu 12.04 Precise can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-1767-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Ubuntu 12.04 Precise
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Denial of service in Xen PVM.

A race condition in the Xen pv-ops spinlock code can cause deadlocks
which can cause a system to not be able to perform any work when a large
number of threads that use pv-ops spinlock are running.  This can be
exploited by an unprivileged user to cause a denial-of-service.


* Kernel panic on 802.11 driver unload.

The mac80211 wireless driver schedules an asynchronous job when unloading
leading to a use-after-free and kernel panic.


* NULL pointer dereference in USB Inside Out Edgeport serial driver.

A NULL pointer dereference may occur during disconnection of the driver
due to a missing check.


* NULL pointer dereference in ACPI with cpuidle disabled.

The ACPI code does not correctly handle all cases where cpuidle is
disabled, leading to a kernel NULL pointer dereference.


* Denial-of-service in Extended Verification Module.

A missing NULL pointer check could lead to an NULL pointer dereference
and a kernel oops when removing an extended attribute from a file that
does not implemented extended attributes.  This could allow an
unprivileged user to crash the system.


* Race condition in USB UHCI during initialization.

A race condition exists in the USB UHCI code that could cause the
interrupt handler to be called before all data structures are setup,
leading to potential invalid memory accesses.


* CVE-2013-0349: Kernel information leak in Bluetooth HIDP support.

An information leak was discovered in the Linux kernel's Bluetooth stack
when HIDP (Human Interface Device Protocol) support is enabled. A local
unprivileged user could exploit this flaw to cause an information leak
from the kernel.


* Memory leak in CIFS referral mount handling.

Allocated memory was not correctly freed in the CIFS referral mount
error handling path leading to a potential denial-of-service.


* Memory leak in ATH9K HTC layer skb allocation.

All SKBs which were allocated by the ATH9K HTC layer were not freed,
causing a memory leak.


* Memory corruption in ATH9K handling to flush command.

DMA activity wasn't stopped when handling a flush command, leading
to a memory corruption.


* Double free on ATH9K beacon generate failure.

An incorrect re-use of objects between beacon generation attempts would
lead to a system crash.


* Double free in radeon driver.

If certain memory allocations fail, the error path will free previously
allocated memory but leave a stale pointer around, which will be freed
for the second time later.


* CVE-2013-0268: /dev/cpu/*/msr local privilege escalation.

Access to /dev/cpu/*/msr was protected only using filesystem
checks. A local uid 0 (root) user with all capabilities dropped
could use this flaw to execute arbitrary code in kernel mode.


* Use-after-free in XFS AIO handling.

An inode reference was released before all operations on it were complete.
This might lead to a use-after-free if the inode was freed.


* CVE-2013-1772: Buffer overflow when writing to /dev/kmsg.

The log_prefix function in the printk code does not properly remove
a prefix string from a syslog header, which allows local users to
cause a denial of service (buffer overflow and system crash) by
leveraging /dev/kmsg write access and triggering a call_console_drivers
function call.


* CVE-2013-0190: stack corruption with Xen 32-bit paravirtualied guests.

Incorrect manipulation of the stack pointer in the error path for iret
failure with a 32-bit paravirtualized guest could result in stack
corruption.  This could be triggered by an unprivileged user in the
guest to cause a denial-of-service.


* CVE-2013-0217: Denial of server in Xen backend driver.

A malicious guest can cause the host networking stack to consume large
amounts of CPU by sending malformed requests to the Xen backend driver.


* CVE-2013-0216: Memory leak in Xen net backend driver.

A malicious guest can cause a memory leak in the host networking stack by
sending malformed requests to the Xen backend driver, leading to a kernel
panic.


* Memory leak in xHCI USB host request handler.

The private date related to TX events in the USB request handler was
not freed.


* NULL pointer dereference in Bluetooth SMP.

A race condition in the Bluetooth SMP code can lead to a NULL
pointer dereference if SMP messages come in at unexpected times.


* Kernel crash on virtio console removal.

The kernel could access uninitialized data on device removal causing a
kernel crash.


* Fix stack overflow in kernel resource allocation.

Recursive calls in kernel/resource.c could lead to a stack overflow when
reserving regions.


* Off-by-one error in qlogic netxen NIC driver.

An off by one bug in the qlogic netxen driver would trigger a kernel panic
on full size TSO packets.


* Use-after-free in IP loopback transmission handling.

The loopback driver didn't correctly handle a specific type of data, which
would allow a packet to be freed before being processed.


* Memory leak in memory mapped AF_PACKET transmission.

A memory leak in the memory mapped packet transmission code could result
in a denial-of-service against the system by a user with CAP_NET_RAW
capability.


* SCTP key leak in shared secret key setup.

The SCTP association key setup did not securely free the key memory
resulting in a possible leak of the key to an attacker.


* CVE-2013-0311: Privilege escalation in vhost descriptor management.

Incorrect handling of vhost descriptors that crossed regions could allow
a privileged guest user to crash the host or possibly escalate
privileges inside the host.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Ksplice-Ubuntu-12.04-Updates mailing list