[Ksplice][Virtuozzo 4 Updates] New updates available via Ksplice (CU-2.6.18-028stab099.3)
Sasha Levin
sasha.levin at oracle.com
Tue Mar 13 12:10:23 PDT 2012
Synopsis: CU-2.6.18-028stab099.3 can now be patched using Ksplice
CVEs: CVE-2011-1083
Red Hat Security Advisory Severity: Important
Systems running Virtuozzo 4 or the OpenVZ RHEL 5 kernel can now use
Ksplice to patch against the latest Parallels Virtuozzo Containers
kernel security update, CU-2.6.18-028stab099.3.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Virtuozzo 4 or
OpenVZ on RHEL 5 install these updates. You can install these updates
by running:
# /usr/sbin/uptrack-upgrade -y
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any additional action.
DESCRIPTION
* CVE-2011-1083: Algorithmic denial of service in epoll.
A flaw was found in the way the Linux kernel's Event Poll (epoll)
subsystem handled large, nested epoll structures. A local,
unprivileged user could use this flaw to cause a denial of service.
* Incorrect permissions checks in dmesg_restrict sysctl.
An incorrect permissions check prevented guests from accessing the
kernel log buffer and dmesg facilities resulting in syslog access
failures.
* Denial of service in persistent tun devices.
The check preventing a persistent tunnel device from being created from
inside a container caused a networking mutex to be incorrectly held
resulting in a system hang and denial of service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-VZ4-Updates
mailing list