[El-errata] New updates available via Ksplice (ELSA-2014-3043)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Mon Jun 23 05:15:01 PDT 2014
Synopsis: ELSA-2014-3043 can now be patched using Ksplice
CVEs: CVE-2013-6378 CVE-2014-0203 CVE-2014-1737 CVE-2014-1738 CVE-2014-1874
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Security Advisory, ELSA-2014-3043.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on EL 5 install these
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
* CVE-2013-6378: Denial-of-service in Marvell 8xxx Libertas WLAN driver.
Incorrect validation of user supplied data in the Marvell 8xxx Libertas
WLAN driver could allow a privileged user to trigger an invalid pointer
dereference and crash the system.
* CVE-2014-1874: Denial-of-service in SELinux on empty security context.
Incorrect input validation in the SELinux subsystem could lead to a NULL
pointer dereference. A local, privileged user could use this flaw to cause
* CVE-2014-0203: Memory corruption on listing procfs symbolic links.
The symbolic link walking function didn't properly terminate it's return
value which could lead to excessive freeing of memory and consequent memory
corruption. A local, unprivileged user could use this flaw to crash the system.
* CVE-2014-1737, CVE-2014-1738: Local privilege escalation in floppy ioctl.
The floppy driver would leak internal memory addresses to userspace,
and would allow unprivileged userspace code to overwrite those
addresses, allowing for a local privilege escalation and gaining
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata