[Ksplice][EL6-Updates] New updates available via Ksplice (RHSA-2013:1801)
Oracle Ksplice
ksplice-support_ww at oracle.com
Fri Dec 13 16:43:11 PST 2013
Synopsis: RHSA-2013:1801 can now be patched using Ksplice
CVEs: CVE-2013-2141 CVE-2013-4470 CVE-2013-6367 CVE-2013-6368
Systems running RHCK on Oracle Linux 6, Red Hat Enterprise Linux 6,
CentOS 6, and Scientific Linux 6 can now use Ksplice to patch against
the latest Red Hat Security Advisory, RHSA-2013:1801.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on OL 6, RHEL 6, CentOS
6, and Scientific Linux 6 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2013-2141: Information leak in tkill() and tgkill() system calls.
Due to a lack of proper initialisation, the tkill() and tgkill() system
calls may leak data from the kernel stack to an unprivileged local user.
* CVE-2013-4470: Memory corruption in IPv4 and IPv6 networking corking with UFO.
The kernel IP stack does not correctly handle sending fragmented packets via a
device which has UDP Fragmentation Offload enabled leading to memory corruption
and a kernel panic.
* CVE-2013-6367: Divide-by-zero in KVM LAPIC.
A divide-by-zero flaw was found in the apic_get_tmcct() function in KVM's
Local Advanced Programmable Interrupt Controller (LAPIC) implementation.
A privileged guest user could use this flaw to crash the host.
* CVE-2013-6368: Memory corruption in KVM virtual APIC accesses.
A memory corruption flaw was discovered in the way KVM handled virtual
APIC accesses that crossed a page boundary. A local, unprivileged user
could use this flaw to crash the system or, potentially, escalate their
privileges on the system.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-EL6-Updates
mailing list