Date:         Wed, 5 Dec 2007 17:13:40 -0600
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for kernel on SL3,x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Once again, with the right subject

Synopsis:       Important: kernel security and bug fix update
Issue date:     2007-12-03
CVE Names:      CVE-2007-2172  CVE-2007-3848
                  CVE-2006-4538 CVE-2007-3739
                  CVE-2007-4308

A flaw was found in the handling of process death signals. This allowed
a local user to send arbitrary signals to the suid-process executed by
that user. A successful exploitation of this flaw depends on the
structure of the suid-program and its signal handling. (CVE-2007-3848,
Important)

A flaw was found in the IPv4 forwarding base. This allowed a local user
to cause a denial of service. (CVE-2007-2172, Important)

A flaw was found where a corrupted executable file could cause
cross-region memory mappings on Itanium systems. This allowed a local
user to cause a denial of service. (CVE-2006-4538, Moderate)

A flaw was found in the stack expansion when using the hugetlb kernel on
PowerPC systems. This allowed a local user to cause a denial of service.
(CVE-2007-3739, Moderate)

A flaw was found in the aacraid SCSI driver. This allowed a local user
to make ioctl calls to the driver that should be restricted to
privileged users. (CVE-2007-4308, Moderate)

As well, these updated packages fix the following bug:

* a bug in the TCP header prediction code may have caused "TCP: Treason
uncloaked!" messages to be logged. In certain situations this may have
lead to TCP connections hanging or aborting.

SL 3.0.x

     SRPMS:
kernel-2.4.21-53.EL.src.rpm
     i386:
kernel-2.4.21-53.EL.athlon.rpm
kernel-2.4.21-53.EL.i686.rpm
kernel-BOOT-2.4.21-53.EL.i386.rpm
kernel-doc-2.4.21-53.EL.i386.rpm
kernel-hugemem-2.4.21-53.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-53.EL.i686.rpm
kernel-smp-2.4.21-53.EL.athlon.rpm
kernel-smp-2.4.21-53.EL.i686.rpm
kernel-smp-unsupported-2.4.21-53.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-53.EL.i686.rpm
kernel-source-2.4.21-53.EL.i386.rpm
kernel-unsupported-2.4.21-53.EL.athlon.rpm
kernel-unsupported-2.4.21-53.EL.i686.rpm
    Dependancies:
GFS-6.0.2.36-6.i686.rpm
GFS-devel-6.0.2.36-6.i686.rpm
GFS-modules-6.0.2.36-6.i686.rpm
GFS-modules-hugemem-6.0.2.36-6.i686.rpm
GFS-modules-smp-6.0.2.36-6.i686.rpm
kernel-module-openafs-2.4.21-53.EL-1.2.13-15.17.SL.athlon.rpm
kernel-module-openafs-2.4.21-53.EL-1.2.13-15.17.SL.i686.rpm
kernel-module-openafs-2.4.21-53.ELsmp-1.2.13-15.17.SL.athlon.rpm
kernel-module-openafs-2.4.21-53.ELsmp-1.2.13-15.17.SL.i686.rpm

     x86_64:
kernel-2.4.21-53.EL.ia32e.rpm
kernel-2.4.21-53.EL.x86_64.rpm
kernel-doc-2.4.21-53.EL.x86_64.rpm
kernel-smp-2.4.21-53.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-53.EL.x86_64.rpm
kernel-source-2.4.21-53.EL.x86_64.rpm
kernel-unsupported-2.4.21-53.EL.ia32e.rpm
kernel-unsupported-2.4.21-53.EL.x86_64.rpm
    Dependancies:
GFS-6.0.2.36-6.ia32e.rpm
GFS-6.0.2.36-6.x86_64.rpm
GFS-devel-6.0.2.36-6.ia32e.rpm
GFS-devel-6.0.2.36-6.x86_64.rpm
GFS-modules-6.0.2.36-6.ia32e.rpm
GFS-modules-6.0.2.36-6.x86_64.rpm
GFS-modules-smp-6.0.2.36-6.x86_64.rpm
kernel-module-openafs-2.4.21-53.EL-1.2.13-15.17.SL.ia32e.rpm
kernel-module-openafs-2.4.21-53.EL-1.2.13-15.17.SL.x86_64.rpm
kernel-module-openafs-2.4.21-53.ELsmp-1.2.13-15.17.SL.x86_64.rpm


-Connie Sieh
-Troy Dawson

SciLinux: CVE-2007-2172 kernel SL3,x i386/x86_64

Important: kernel security and bug fix update

Summary

Date:         Wed, 5 Dec 2007 17:13:40 -0600Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for kernel on SL3,x i386/x86_64Comments: To: "scientific-linux-errata@fnal.gov"          Once again, with the right subjectSynopsis:       Important: kernel security and bug fix updateIssue date:     2007-12-03CVE Names:      CVE-2007-2172  CVE-2007-3848                  CVE-2006-4538 CVE-2007-3739                  CVE-2007-4308A flaw was found in the handling of process death signals. This alloweda local user to send arbitrary signals to the suid-process executed bythat user. A successful exploitation of this flaw depends on thestructure of the suid-program and its signal handling. (CVE-2007-3848,Important)A flaw was found in the IPv4 forwarding base. This allowed a local userto cause a denial of service. (CVE-2007-2172, Important)A flaw was found where a corrupted executable file could causecross-region memory mappings on Itanium systems. This allowed a localuser to cause a denial of service. (CVE-2006-4538, Moderate)A flaw was found in the stack expansion when using the hugetlb kernel onPowerPC systems. This allowed a local user to cause a denial of service.(CVE-2007-3739, Moderate)A flaw was found in the aacraid SCSI driver. This allowed a local userto make ioctl calls to the driver that should be restricted toprivileged users. (CVE-2007-4308, Moderate)As well, these updated packages fix the following bug:* a bug in the TCP header prediction code may have caused "TCP: Treasonuncloaked!" messages to be logged. In certain situations this may havelead to TCP connections hanging or aborting.SL 3.0.x     SRPMS:kernel-2.4.21-53.EL.src.rpm     i386:kernel-2.4.21-53.EL.athlon.rpmkernel-2.4.21-53.EL.i686.rpmkernel-BOOT-2.4.21-53.EL.i386.rpmkernel-doc-2.4.21-53.EL.i386.rpmkernel-hugemem-2.4.21-53.EL.i686.rpmkernel-hugemem-unsupported-2.4.21-53.EL.i686.rpmkernel-smp-2.4.21-53.EL.athlon.rpmkernel-smp-2.4.21-53.EL.i686.rpmkernel-smp-unsupported-2.4.21-53.EL.athlon.rpmkernel-smp-unsupported-2.4.21-53.EL.i686.rpmkernel-source-2.4.21-53.EL.i386.rpmkernel-unsupported-2.4.21-53.EL.athlon.rpmkernel-unsupported-2.4.21-53.EL.i686.rpm    Dependancies:GFS-6.0.2.36-6.i686.rpmGFS-devel-6.0.2.36-6.i686.rpmGFS-modules-6.0.2.36-6.i686.rpmGFS-modules-hugemem-6.0.2.36-6.i686.rpmGFS-modules-smp-6.0.2.36-6.i686.rpmkernel-module-openafs-2.4.21-53.EL-1.2.13-15.17.SL.athlon.rpmkernel-module-openafs-2.4.21-53.EL-1.2.13-15.17.SL.i686.rpmkernel-module-openafs-2.4.21-53.ELsmp-1.2.13-15.17.SL.athlon.rpmkernel-module-openafs-2.4.21-53.ELsmp-1.2.13-15.17.SL.i686.rpm     x86_64:kernel-2.4.21-53.EL.ia32e.rpmkernel-2.4.21-53.EL.x86_64.rpmkernel-doc-2.4.21-53.EL.x86_64.rpmkernel-smp-2.4.21-53.EL.x86_64.rpmkernel-smp-unsupported-2.4.21-53.EL.x86_64.rpmkernel-source-2.4.21-53.EL.x86_64.rpmkernel-unsupported-2.4.21-53.EL.ia32e.rpmkernel-unsupported-2.4.21-53.EL.x86_64.rpm    Dependancies:GFS-6.0.2.36-6.ia32e.rpmGFS-6.0.2.36-6.x86_64.rpmGFS-devel-6.0.2.36-6.ia32e.rpmGFS-devel-6.0.2.36-6.x86_64.rpmGFS-modules-6.0.2.36-6.ia32e.rpmGFS-modules-6.0.2.36-6.x86_64.rpmGFS-modules-smp-6.0.2.36-6.x86_64.rpmkernel-module-openafs-2.4.21-53.EL-1.2.13-15.17.SL.ia32e.rpmkernel-module-openafs-2.4.21-53.EL-1.2.13-15.17.SL.x86_64.rpmkernel-module-openafs-2.4.21-53.ELsmp-1.2.13-15.17.SL.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News