Synopsis: RHSA-2014:0159-1 can now be patched using Ksplice
CVEs: CVE-2013-2929 CVE-2013-7263 CVE-2013-7265

Systems running RHCK on Oracle Linux 6, Red Hat Enterprise Linux 6,
CentOS 6, and Scientific Linux 6 can now use Ksplice to patch against
the latest Red Hat Security Advisory, RHSA-2014:0159-1.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack on OL 6, RHEL 6, CentOS
6, and Scientific Linux 6 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2013-2929: Incorrect permissions check in ptrace with dropped privileges.

The ptrace subsystem incorrectly checked the state of the fs.suid_dumpable
sysctl allowing a user to ptrace attach to a process if it had dropped
privileges to that user.


* CVE-2013-7263, CVE-2013-7265: Information leak in IPv4, IPv6 and PhoNet 
socket recvmsg.

The IPv4, IPv6 and PhoNet recvmsg(2) ioctls do not initialise the length a 
network
address causing the contents of kernel memory to be disclosed to userspace under
certain circumstances.

SUPPORT

Ksplice support is available at [email protected].


  

_______________________________________________
Ksplice-EL6-Updates mailing list
[email protected]
https://oss.oracle.com/mailman/listinfo/ksplice-el6-updates

Reply via email to