CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
94.0%
CentOS Errata and Security Advisory CESA-2005:366
The Linux kernel handles the basic functions of the operating system.
A flaw in the fib_seq_start function was discovered. A local user could use
this flaw to cause a denial of service (system crash) via /proc/net/route.
(CAN-2005-1041)
A flaw in the tmpfs file system was discovered. A local user could use this
flaw to cause a denial of service (system crash). (CAN-2005-0977)
An integer overflow flaw was found when writing to a sysfs file. A local
user could use this flaw to overwrite kernel memory, causing a denial of
service (system crash) or arbitrary code execution. (CAN-2005-0867)
Keith Owens reported a flaw in the Itanium unw_unwind_to_user function. A
local user could use this flaw to cause a denial of service (system crash)
on Itanium architectures. (CAN-2005-0135)
A flaw in the NFS client O_DIRECT error case handling was discovered. A
local user could use this flaw to cause a denial of service (system crash).
(CAN-2005-0207)
A small memory leak when defragmenting local packets was discovered that
affected the Linux 2.6 kernel netfilter subsystem. A local user could send
a large number of carefully crafted fragments leading to memory exhaustion
(CAN-2005-0210)
A flaw was discovered in the Linux PPP driver. On systems allowing remote
users to connect to a server using ppp, a remote client could cause a
denial of service (system crash). (CAN-2005-0384)
A flaw was discovered in the ext2 file system code. When a new directory is
created, the ext2 block written to disk is not initialized, which could
lead to an information leak if a disk image is made available to
unprivileged users. (CAN-2005-0400)
A flaw in fragment queuing was discovered that affected the Linux kernel
netfilter subsystem. On systems configured to filter or process network
packets (e.g. firewalling), a remote attacker could send a carefully
crafted set of fragmented packets to a machine and cause a denial of
service (system crash). In order to sucessfully exploit this flaw, the
attacker would need to know or guess some aspects of the firewall ruleset
on the target system. (CAN-2005-0449)
A number of flaws were found in the Linux 2.6 kernel. A local user could
use these flaws to read kernel memory or cause a denial of service (crash).
(CAN-2005-0529, CAN-2005-0530, CAN-2005-0531)
An integer overflow in sys_epoll_wait in eventpoll.c was discovered. A
local user could use this flaw to overwrite low kernel memory. This memory
is usually unused, not usually resulting in a security consequence.
(CAN-2005-0736)
A flaw when freeing a pointer in load_elf_library was discovered. A local
user could potentially use this flaw to cause a denial of service (crash).
(CAN-2005-0749)
A flaw was discovered in the bluetooth driver system. On systems where the
bluetooth modules are loaded, a local user could use this flaw to gain
elevated (root) privileges. (CAN-2005-0750)
A race condition was discovered that affected the Radeon DRI driver. A
local user who has DRI privileges on a Radeon graphics card may be able to
use this flaw to gain root privileges. (CAN-2005-0767)
Multiple range checking flaws were discovered in the iso9660 file system
handler. An attacker could create a malicious file system image which would
cause a denial or service or potentially execute arbitrary code if mounted.
(CAN-2005-0815)
A flaw was discovered when setting line discipline on a serial tty. A local
user may be able to use this flaw to inject mouse movements or keystrokes
when another user is logged in. (CAN-2005-0839)
Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Please note that
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-April/073741.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073745.html
Affected packages:
kernel
kernel-devel
kernel-doc
kernel-hugemem
kernel-hugemem-devel
kernel-smp
kernel-smp-devel
kernel-sourcecode
Upstream details at:
https://access.redhat.com/errata/RHSA-2005:366
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | ia64 | kernel | < 2.6.9-5.0.5.EL | kernel-2.6.9-5.0.5.EL.ia64.rpm |
CentOS | 3 | ia64 | kernel-devel | < 2.6.9-5.0.5.EL | kernel-devel-2.6.9-5.0.5.EL.ia64.rpm |
CentOS | 3 | noarch | kernel-doc | < 2.6.9-5.0.5.EL | kernel-doc-2.6.9-5.0.5.EL.noarch.rpm |
CentOS | 3 | noarch | kernel-sourcecode | < 2.6.9-5.0.5.EL | kernel-sourcecode-2.6.9-5.0.5.EL.noarch.rpm |
CentOS | 3 | ia64 | kernel | < 2.6.9-5.0.5.105.EC | kernel-2.6.9-5.0.5.105.EC.ia64.rpm |
CentOS | 3 | ia64 | kernel-devel | < 2.6.9-5.0.5.105.EC | kernel-devel-2.6.9-5.0.5.105.EC.ia64.rpm |
CentOS | 3 | noarch | kernel-doc | < 2.6.9-5.0.5.105.EC | kernel-doc-2.6.9-5.0.5.105.EC.noarch.rpm |
CentOS | 3 | noarch | kernel-sourcecode | < 2.6.9-5.0.5.105.EC | kernel-sourcecode-2.6.9-5.0.5.105.EC.noarch.rpm |
CentOS | 4 | i586 | kernel | < 2.6.9-5.0.5.EL | kernel-2.6.9-5.0.5.EL.i586.rpm |
CentOS | 4 | i686 | kernel | < 2.6.9-5.0.5.EL | kernel-2.6.9-5.0.5.EL.i686.rpm |