[Ksplice-Fedora-19-updates] New updates available via Ksplice (FEDORA-2013-20745)

Oracle Ksplice ksplice-support_ww at oracle.com
Fri Nov 8 14:31:13 PST 2013


Synopsis: FEDORA-2013-20745 can now be patched using Ksplice
CVEs: CVE-2013-4299

Systems running Fedora 19 can now use Ksplice to patch against the
latest Fedora kernel update, FEDORA-2013-20745.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Fedora 19 install
these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* Use-after-free in temporary files on ext3 and ext4 filesystems.

When opening a file on an ext3 or ext4 filesystem using the __O_TMPFILE flag, the
kernel does not correctly manage reference counts leading to a use-after-free
condition and kernel panic.


* CVE-2013-4299: Information leak in device mapper persistent snapshots.

An information leak flaw was found in the way Linux kernel's device
mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data
from disk blocks in free space, which are normally inaccessible.


* Denial-of-service in kernel huge page splitting.

A race condition in the kernel huge page implementation can trigger a BUG_ON and
kernel panic when splitting a huge page that has been marked MADV_DONTNEED.


* Denial-of-service in 802.11 radiotap packet parsing.

The kernel 802.11 radiotap interface does not correctly handle malformed packets
allowing a remote attacker to trigger an out-of-bounds read leading to a kernel
panic.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Fedora-19-Updates mailing list