[El-errata] New updates available via Ksplice (ELSA-2013-2534)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Jun 13 01:28:34 PDT 2013

Synopsis: ELSA-2013-2534 can now be patched using Ksplice
CVEs: CVE-2012-4542 CVE-2012-6542 CVE-2013-1860 CVE-2013-1929 CVE-2013-1943

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Security Advisory, ELSA-2013-2534.


We recommend that all users of Ksplice Uptrack on EL 5 install these

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


* CVE-2012-6542: Information leak in LLC socket name.

A malicious user can disclose the contents of kernel memory by calling
getsockname() on an LLC socket.

* NULL pointer dereference in filesystem automounting.

Incorrect handling of namespaces could trigger a NULL pointer
dereference when automounting a filesystem.

* CVE-2013-1929: Buffer overflow in TG3 VPD firmware parsing.

Incorrect length checks when parsing the firmware could cause a buffer
overflow and corruption of memory.

* CVE-2013-1860: Buffer overflow in Wireless Device Management driver.

A malicious USB device can cause a buffer overflow and gain kernel code execution
by sending malformed Wireless Device Management packets.

* Incorrect MAC address usage after bonding failover.

Missing events in the bonding subsystem could cause the old MAC address
to be used after a failover when the fail_over_mac parameter was set to

* Denial of service due to race condition in the scheduler subsystem.

A race condition between exiting a task on one CPU and waking it up by a
different CPU can cause a kernel panic when the second task will try
waking up a dead task.

* CVE-2012-4542: SCSI command filter does not restrict access to read-only devices.

The default SCSI command filter does not accommodate commands that overlap across
device classes. A privileged guest user could potentially use this flaw to write
arbitrary data to a LUN that is passed-through as read-only.

* Memory corruption with mprotect() calls.

Incorrect copying of anonymous Virtual Memory Area (VMA) pointers could
cause memory corruption and result in a kernel crash when the system was
under heavy memory pressure.

* Network failure on Xen live migration.

A race condition between sending the gratuitous ARP and activating the
Xen network backend device could cause the ARP to get lost when
migrating a domain causing networking to fail.

* Kernel crash in SUNRPC socket export removal.

Incorrect locking could result in a kernel crash when removing socket

* Kernel crash in address validation with 1GB pages.

Validating a kernel address on a system with 1GB pages could cause a
kernel crash.  This could be triggered by reading /proc/vmcore.

* CVE-2013-1943: Local privilege escalation in KVM memory mappings.

A missing sanity check was found in KVM's memory mapping subsystem,
allowing a user-space process to register memory regions pointing
to the kernel address space. A local, unprivileged user could use this flaw
to escalate their privileges.


Ksplice support is available at ksplice-support_ww at oracle.com.

More information about the El-errata mailing list