[Ksplice][Ubuntu 10.04 Updates] New updates available via Ksplice (USN-2064-1)
Oracle Ksplice
ksplice-support_ww at oracle.com
Fri Jan 3 09:01:38 PST 2014
Synopsis: USN-2064-1 can now be patched using Ksplice
CVEs: CVE-2013-4345 CVE-2013-4588 CVE-2013-6378
Systems running Ubuntu 10.04 Lucid can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-2064-1.
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack on Ubuntu 10.04 Lucid
install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2013-4345: Off-by-one in the ANSI Crypto RNG.
An off-by-one flaw was found in the way the ANSI CPRNG implementation in
the Linux kernel processed non-block size aligned requests. This could lead
to random numbers being generated with less bits of entropy than expected
when ANSI CPRNG was used.
* CVE-2013-6378: Denial-of-service in Marvell 8xxx Libertas WLAN driver.
Incorrect validation of user supplied data in the Marvell 8xxx Libertas
WLAN driver could allow a privileged user to trigger an invalid pointer
dereference and crash the system.
* CVE-2013-4588: Buffer overflow in ipvs.
Missing boundary checks in the ipvs code could allow local users to gain
privileges when CONFIG_IP_VS is used by leveraging the CAP_NET_ADMIN
capability for a get- or setsockopt system call.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Ksplice-Ubuntu-10.04-Updates
mailing list