Lucene search

K
centosCentOS ProjectCESA-2007:0939
HistoryNov 03, 2007 - 2:32 a.m.

kernel security update

2007-11-0302:32:41
CentOS Project
lists.centos.org
53

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.012 Low

EPSS

Percentile

85.5%

CentOS Errata and Security Advisory CESA-2007:0939

The Linux kernel is the core of the operating system.

These updated kernel packages contain fixes for the following security
issues:

  • A flaw was found in the handling of process death signals. This allowed a
    local user to send arbitrary signals to the suid-process executed by that
    user. A successful exploitation of this flaw depends on the structure of
    the suid-program and its signal handling. (CVE-2007-3848, Important)

  • A flaw was found in the CIFS file system. This could cause the umask
    values of a process to not be honored on CIFS file systems where UNIX
    extensions are supported. (CVE-2007-3740, Important)

  • A flaw was found in the VFAT compat ioctl handling on 64-bit systems.
    This allowed a local user to corrupt a kernel_dirent struct and cause a
    denial of service. (CVE-2007-2878, Important)

  • A flaw was found in the Advanced Linux Sound Architecture (ALSA). A local
    user who had the ability to read the /proc/driver/snd-page-alloc file could
    see portions of kernel memory. (CVE-2007-4571, Moderate)

  • A flaw was found in the aacraid SCSI driver. This allowed a local user to
    make ioctl calls to the driver that should be restricted to privileged
    users. (CVE-2007-4308, Moderate)

  • A flaw was found in the stack expansion when using the hugetlb kernel on
    PowerPC systems. This allowed a local user to cause a denial of service.
    (CVE-2007-3739, Moderate)

  • A flaw was found in the handling of zombie processes. A local user could
    create processes that would not be properly reaped which could lead to a
    denial of service. (CVE-2006-6921, Moderate)

  • A flaw was found in the CIFS file system handling. The mount option
    “sec=” did not enable integrity checking or produce an error message if
    used. (CVE-2007-3843, Low)

  • A flaw was found in the random number generator implementation that
    allowed a local user to cause a denial of service or possibly gain
    privileges. This flaw could be exploited if the root user raised the
    default wakeup threshold over the size of the output pool.
    (CVE-2007-3105, Low)

Additionally, the following bugs were fixed:

  • A flaw was found in the kernel netpoll code, creating a potential
    deadlock condition. If the xmit_lock for a given network interface is
    held, and a subsequent netpoll event is generated from within the lock
    owning context (a console message for example), deadlock on that cpu will
    result, because the netpoll code will attempt to re-acquire the xmit_lock.
    The fix is to, in the netpoll code, only attempt to take the lock, and
    fail if it is already acquired (rather than block on it), and queue the
    message to be sent for later delivery. Any user of netpoll code in the
    kernel (netdump or netconsole services), is exposed to this problem, and
    should resolve the issue by upgrading to this kernel release immediately.

  • A flaw was found where, under 64-bit mode (x86_64), AMD processors were
    not able to address greater than a 40-bit physical address space; and Intel
    processors were only able to address up to a 36-bit physical address space.
    The fix is to increase the physical addressing for an AMD processor to 48
    bits, and an Intel processor to 38 bits. Please see the Red Hat
    Knowledgebase for more detailed information.

  • A flaw was found in the xenU kernel that may prevent a paravirtualized
    guest with more than one CPU from starting when running under an Enterprise
    Linux 5.1 hypervisor. The fix is to allow your Enterprise Linux 4 Xen SMP
    guests to boot under a 5.1 hypervisor. Please see the Red Hat Knowledgebase
    for more detailed information.

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-November/076520.html
https://lists.centos.org/pipermail/centos-announce/2007-November/076521.html
https://lists.centos.org/pipermail/centos-announce/2007-November/076522.html
https://lists.centos.org/pipermail/centos-announce/2007-November/076523.html

Affected packages:
kernel
kernel-devel
kernel-doc
kernel-hugemem
kernel-hugemem-devel
kernel-largesmp
kernel-largesmp-devel
kernel-smp
kernel-smp-devel
kernel-xenU
kernel-xenU-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2007:0939

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.012 Low

EPSS

Percentile

85.5%