7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.055 Low
EPSS
Percentile
93.1%
CentOS Errata and Security Advisory CESA-2006:0140
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues
described below:
a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)
a flaw in remap_page_range() with O_DIRECT writes that allowed a local
user to cause a denial of service (crash) (CVE-2004-1057, important)
a flaw in exec() handling on some 64-bit architectures that allowed
a local user to cause a denial of service (crash) (CVE-2005-2708, important)
a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)
a flaw in IPv6 network UDP port hash table lookups that allowed a local
user to cause a denial of service (hang) (CVE-2005-2973, important)
a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed
a local user to cause a denial of service (crash) (CVE-2005-3044, important)
a network buffer info leak using the orinoco driver that allowed
a remote user to possibly view uninitialized data (CVE-2005-3180, important)
a flaw in IPv4 network TCP and UDP netfilter handling that allowed
a local user to cause a denial of service (crash) (CVE-2005-3275, important)
a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)
a flaw in network ICMP processing that allowed a local user to cause
a denial of service (memory exhaustion) (CVE-2005-3848, important)
a flaw in file lease time-out handling that allowed a local user to cause
a denial of service (log file overflow) (CVE-2005-3857, moderate)
a flaw in network IPv6 xfrm handling that allowed a local user to
cause a denial of service (memory exhaustion) (CVE-2005-3858, important)
All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels
to the packages associated with their machine architecture and
configurations as listed in this erratum.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2006-January/074751.html
https://lists.centos.org/pipermail/centos-announce/2006-January/074752.html
https://lists.centos.org/pipermail/centos-announce/2006-January/074755.html
https://lists.centos.org/pipermail/centos-announce/2006-January/074763.html
Affected packages:
kernel
kernel-BOOT
kernel-doc
kernel-hugemem
kernel-hugemem-unsupported
kernel-smp
kernel-smp-unsupported
kernel-source
kernel-unsupported
Upstream details at:
https://access.redhat.com/errata/RHSA-2006:0140
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | i586 | kernel | <Β 2.4.21-37.0.1.EL | kernel-2.4.21-37.0.1.EL.i586.rpm |
CentOS | 3 | i686 | kernel | <Β 2.4.21-37.0.1.EL | kernel-2.4.21-37.0.1.EL.i686.rpm |
CentOS | 3 | i386 | kernel-boot | <Β 2.4.21-37.0.1.EL | kernel-BOOT-2.4.21-37.0.1.EL.i386.rpm |
CentOS | 3 | i386 | kernel-doc | <Β 2.4.21-37.0.1.EL | kernel-doc-2.4.21-37.0.1.EL.i386.rpm |
CentOS | 3 | i686 | kernel-hugemem | <Β 2.4.21-37.0.1.EL | kernel-hugemem-2.4.21-37.0.1.EL.i686.rpm |
CentOS | 3 | i686 | kernel-hugemem-unsupported | <Β 2.4.21-37.0.1.EL | kernel-hugemem-unsupported-2.4.21-37.0.1.EL.i686.rpm |
CentOS | 3 | i686 | kernel-smp | <Β 2.4.21-37.0.1.EL | kernel-smp-2.4.21-37.0.1.EL.i686.rpm |
CentOS | 3 | i686 | kernel-smp-unsupported | <Β 2.4.21-37.0.1.EL | kernel-smp-unsupported-2.4.21-37.0.1.EL.i686.rpm |
CentOS | 3 | i386 | kernel-source | <Β 2.4.21-37.0.1.EL | kernel-source-2.4.21-37.0.1.EL.i386.rpm |
CentOS | 3 | i586 | kernel-unsupported | <Β 2.4.21-37.0.1.EL | kernel-unsupported-2.4.21-37.0.1.EL.i586.rpm |