[Ksplice][Fedora-18-updates] New updates available via Ksplice (FEDORA-2013-21822)
Oracle Ksplice
ksplice-support_ww at oracle.com
Mon Dec 2 02:10:32 PST 2013
Synopsis: FEDORA-2013-21822 can now be patched using Ksplice
CVEs: CVE-2013-4513
Systems running Fedora 18 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2013-21822.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Fedora 18 install
these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* Deadlock in block device caching.
The block device cache subsystem allocates memory with incorrect options
potentially causing a deadlock and kernel panic.
* Infinite loop in cgroup task attaching.
A race condition when attaching threads into an existing cgroup can trigger an
infinite loop if the cgroup is exiting leading to a kernel panic.
* Deadlock in JFS inode allocation.
When failing to allocate new inodes on a JFS filesystem, the JFS filesystem
driver incorrectly unlocks inodes leading to a deadlock and kernel panic.
* Memory leak in ecrypt filesystem initialization.
When initializing a ecrypt filesystem the ecryptfs driver does not free memory
when decrypting the session key causing a kernel memory leak.
* Data loss in ecryptfs on 32-bit systems.
An integer overflow in the ecryptfs driver can lead to data loss when writing to
files that are over 4GB in size.
* Kernel panic in RAID5 buffer merging.
The kernel RAID5 driver does not correctly manage buffers when merging multiple
requests leading to a kernel panic in the kernel SCSI driver.
* NULL pointer dereference in pSCSI device initialization.
A NULL pointer dereference and kernel panic can be triggered when the pass-
through SCSI driver fails to lookup a host.
* CVE-2013-4513: Memory corruption in USB-over-WiFi host driver.
The Ozmo USB-over-WiFi driver does not fully validate userspace arguments allowing
a malicious local user to trigger kernel memory corruption and gain elevated privileges.
* Missing capability check in AAC RAID compatibility ioctl.
A missing capability check in the AAC RAID compatibility ioctl allows local users
to gain elevated privileges.
* Kernel panic in procfs pagemap reading.
If a process contains memory ranges not managed by the kernel then a local user
can trigger a kernel panic by reading the contents of /proc/*/pagemap.
* Memory corruption in DRM ioctl.
The DRM driver incorrectly allocated memory when processing a ioctl from userspace
allowing a malicious local user to trigger kernel memory corruption and gain elevated
privileges.
* Kernel BUG in SCTP traffic control.
With certain traffic control configurations, it is possible to hit an
assertion failure which should not be fatal.
* Buffer overrun in the tracing subsystem.
An incorrect bounds check in the kernel tracing subsystem could lead to
writing past the end of a buffer. A privileged local user can use this
flaw to crash the kernel or potentially gain additional privileges.
* Use of uninitialized memory in USB hub configuration.
In low memory situations, due to incorrect error handling, configuring
a USB hub could lead to use of uninitialized memory and a kernel crash.
A person with physical access to the machine could use this flaw to
cause denial of service.
* Kernel panic in UDP/IPv6 fragmentation offloading.
Erroneous size calculations in the UDP fragmentation offloading code
could lead to a kernel panic. A remote user could potentially exploit
this bug to cause denial of service.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Fedora-18-Updates
mailing list