Synopsis: RHSA-2014:0159-1 can now be patched using Ksplice CVEs: CVE-2013-2929 CVE-2013-7263 CVE-2013-7265
Systems running RHCK on Oracle Linux 6, Red Hat Enterprise Linux 6, CentOS 6, and Scientific Linux 6 can now use Ksplice to patch against the latest Red Hat Security Advisory, RHSA-2014:0159-1. INSTALLING THE UPDATES We recommend that all users of Ksplice Uptrack on OL 6, RHEL 6, CentOS 6, and Scientific Linux 6 install these updates. On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf, these updates will be installed automatically and you do not need to take any action. Alternatively, you can install these updates by running: # /usr/sbin/uptrack-upgrade -y DESCRIPTION * CVE-2013-2929: Incorrect permissions check in ptrace with dropped privileges. The ptrace subsystem incorrectly checked the state of the fs.suid_dumpable sysctl allowing a user to ptrace attach to a process if it had dropped privileges to that user. * CVE-2013-7263, CVE-2013-7265: Information leak in IPv4, IPv6 and PhoNet socket recvmsg. The IPv4, IPv6 and PhoNet recvmsg(2) ioctls do not initialise the length a network address causing the contents of kernel memory to be disclosed to userspace under certain circumstances. SUPPORT Ksplice support is available at [email protected]. _______________________________________________ Ksplice-EL6-Updates mailing list [email protected] https://oss.oracle.com/mailman/listinfo/ksplice-el6-updates
