[El-errata] New updates available via Ksplice (ELSA-2013-1449-1)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Fri Oct 25 06:24:47 PDT 2013
Synopsis: ELSA-2013-1449-1 can now be patched using Ksplice
CVEs: CVE-2013-0343 CVE-2013-4299 CVE-2013-4345
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Security Advisory, ELSA-2013-1449-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on EL 5 install these
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
* CVE-2013-4299: Information leak in device mapper persistent snapshots.
An information leak flaw was found in the way Linux kernel's device
mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data
from disk blocks in free space, which are normally inaccessible.
* CVE-2013-4345: Off-by-one in the ANSI Crypto RNG.
An off-by-one flaw was found in the way the ANSI CPRNG implementation in
the Linux kernel processed non-block size aligned requests. This could lead
to random numbers being generated with less bits of entropy than expected
when ANSI CPRNG was used.
* CVE-2013-0343: Denial of service in IPv6 privacy extensions.
A malicious remote user can disable IPv6 privacy extensions by flooding the host
with malicious temporary addresses.
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata