[Ksplice-cloudlinux6-updates] New updates available via Ksplice (2.6.32-458.23.2.lve1.2.48)

Oracle Ksplice ksplice-support_ww at oracle.com
Tue Jan 14 06:02:34 PST 2014


Synopsis: 2.6.32-458.23.2.lve1.2.48 can now be patched using Ksplice
CVEs: CVE-2013-2141 CVE-2013-4470

Systems running CloudLinux 6 can now use Ksplice to patch against the
latest CloudLinux 6 kernel update, 2.6.32-458.23.2.lve1.2.48.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on CloudLinux 6 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Data corruption on Container's live migration.

A race condition could cause data corruption on Container's live
migration.


* CVE-2013-2141: Information leak in tkill() and tgkill() system calls.

Due to a lack of proper initialisation, the tkill() and tgkill() system
calls may leak data from the kernel stack to an unprivileged local user.


* CVE-2013-4470: Memory corruption in IPv4 and IPv6 networking corking with UFO.

The kernel IP stack does not correctly handle sending fragmented packets via a
device which has UDP Fragmentation Offload enabled leading to memory corruption
and a kernel panic.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-CloudLinux6-Updates mailing list