[El-errata] New updates available via Ksplice (kernels/oracle-uek-2.6.32-400.33.2/testing)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon Oct 21 09:05:44 PDT 2013
Synopsis: kernels/oracle-uek-2.6.32-400.33.2/testing can now be patched using Ksplice
CVEs: CVE-2013-4162 CVE-2013-4299
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle kernel update, kernels/oracle-
uek-2.6.32-400.33.2/testing.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on EL 5 install these
updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2013-4162: Denial-of-service with IPv6 sockets with UDP_CORK.
When pushing pending frames in IPv6 udp code, an incorrect function call can
be made. This allows local users to cause a denial of service (BUG and system
crash) via a crafted application that uses the UDP_CORK option in a
setsockopt system call.
* CVE-2013-4299: Information leak in device mapper persistent snapshots.
An information leak flaw was found in the way Linux kernel's device
mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data
from disk blocks in free space, which are normally inaccessible.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list