From nelhage at ksplice.com Sat Aug 7 12:38:00 2010 From: nelhage at ksplice.com (Nelson Elhage) Date: Sat, 7 Aug 2010 15:38:00 -0400 Subject: [Ksplice][Ubuntu 9.04 Updates] New updates available via Ksplice (USN-966-1) Message-ID: <20100807193800.GI32527@ksplice.com> Synopsis: USN-966-1 can now be patched using Ksplice CVEs: CVE-2010-1173 CVE-2010-1436 CVE-2010-1437 CVE-2010-1641 CVE-2010-2492 Systems running Ubuntu 9.04 Jaunty can now use Ksplice to patch against the latest Ubuntu Security Notice, USN-966-1. INSTALLING THE UPDATES We recommend that all Ksplice Uptrack Ubuntu 9.04 Jaunty users install these updates. You can install these updates by running: # uptrack-upgrade -y DESCRIPTION * CVE-2010-1173: Remote denial of service in SCTP. Chris Guo, Jukka Taimisto, and Olli Jarva discovered that SCTP did not correctly handle invalid parameters. A remote attacker could send specially crafted traffic that could crash the system, leading to a denial of service. * CVE-2010-1436: Denial of service writing GFS2 quota. Mario Mikocevic discovered that GFS2 did not correctly handle certain quota structures. A local attacker could exploit this to crash the system, leading to a denial of service. * CVE-2010-1437: Denial of service in keyring subsytem. Toshiyuki Okajima reported a race condition in the keyring subsystem. Local users can cause memory corruption via keyctl commands that access a keyring in the process of being deleted, resulting in a denial of service. * CVE-2010-1641: Insufficient privilege checking in GFS2 set_flags. Dan Rosenberg discovered that GFS2 set_flags function did not correctly validate permissions. A local attacker could exploit this to gain access to files, leading to a loss of privacy and potential privilege escalation. * CVE-2010-2492: Privilege Escalation in eCryptfs. Andre Osterhues discovered that eCryptfs did not correctly calculate hash values. A local attacker with certain uids could exploit this to crash the system or potentially gain root privileges. SUPPORT Ksplice support is available at support at ksplice.com or +1 765-577-5423. From nelhage at ksplice.com Sat Aug 21 17:17:44 2010 From: nelhage at ksplice.com (Nelson Elhage) Date: Sat, 21 Aug 2010 20:17:44 -0400 Subject: [Ksplice][Ubuntu 9.04 Updates] New updates available via Ksplice (USN-974-1) Message-ID: <20100822001744.GY27700@ksplice.com> Synopsis: USN-974-1 can now be patched using Ksplice CVEs: CVE-2010-2240 CVE-2010-2803 CVE-2010-2959 Systems running Ubuntu 9.04 Jaunty can now use Ksplice to patch against the latest Ubuntu Security Notice, USN-974-1. INSTALLING THE UPDATES We recommend that all Ksplice Uptrack Ubuntu 9.04 Jaunty users install these updates. You can install these updates by running: # uptrack-upgrade -y DESCRIPTION * CVE-2010-2803: Information leak in drm subsystem. Kees Cook discovered that under certain situations the ioctl subsystem for DRM did not properly sanitize its arguments. A local attacker could exploit this to read previously freed kernel memory. (CVE-2010-2803). * CVE-2010-2959: Privilege escalation in Controller Area Network subsystem. Ben Hawkes discovered an integer overflow in the Controller Area Network (CAN) subsystem when setting up frame content and filtering certain messages. An attacker could send specially crafted CAN traffic to crash the system or gain root privileges. (CVE-2010-2959). * CVE-2010-2240: Privilege escalation vulnerability in memory manager. Gael Delalleu, Rafal Wojtczuk, and Brad Spengler discovered that the memory manager did not properly handle when applications grow stacks into adjacent memory regions. A local attacker could exploit this to gain control of certain applications, potentially leading to privilege escalation, as demonstrated in attacks against the X server. (CVE-2010-2240). SUPPORT Ksplice support is available at support at ksplice.com or +1 765-577-5423.