[Ksplice][Ubuntu 10.04 Updates] New updates available via Ksplice (USN-2064-1)

Oracle Ksplice ksplice-support_ww at oracle.com
Fri Jan 3 09:01:38 PST 2014


Synopsis: USN-2064-1 can now be patched using Ksplice
CVEs: CVE-2013-4345 CVE-2013-4588 CVE-2013-6378

Systems running Ubuntu 10.04 Lucid can now use Ksplice to patch
against the latest Ubuntu Security Notice, USN-2064-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on Ubuntu 10.04 Lucid
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2013-4345: Off-by-one in the ANSI Crypto RNG.

An off-by-one flaw was found in the way the ANSI CPRNG implementation in
the Linux kernel processed non-block size aligned requests. This could lead
to random numbers being generated with less bits of entropy than expected
when ANSI CPRNG was used.


* CVE-2013-6378: Denial-of-service in Marvell 8xxx Libertas WLAN driver.

Incorrect validation of user supplied data in the Marvell 8xxx Libertas
WLAN driver could allow a privileged user to trigger an invalid pointer
dereference and crash the system.


* CVE-2013-4588: Buffer overflow in ipvs.

Missing boundary checks in the ipvs code could allow local users to gain
privileges when CONFIG_IP_VS is used by leveraging the CAP_NET_ADMIN
capability for a get- or setsockopt system call.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.


  



More information about the Ksplice-Ubuntu-10.04-Updates mailing list