Date:         Thu, 18 Mar 2010 12:36:13 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Important: kernel on SL5.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Important: kernel security and bug fix update
Issue date:	2010-03-16
CVE Names:	CVE-2009-4308 CVE-2010-0003 CVE-2010-0007
                   CVE-2010-0008 CVE-2010-0415 CVE-2010-0437

Security fixes:

* a NULL pointer dereference flaw was found in the sctp_rcv_ootb() 
function in the Linux kernel Stream Control Transmission Protocol (SCTP)
implementation. A remote attacker could send a specially-crafted SCTP
packet to a target system, resulting in a denial of service.
(CVE-2010-0008, Important)

* a missing boundary check was found in the do_move_pages() function in
the memory migration functionality in the Linux kernel. A local user 
could use this flaw to cause a local denial of service or an information 
leak. (CVE-2010-0415, Important)

* a NULL pointer dereference flaw was found in the ip6_dst_lookup_tail()
function in the Linux kernel. An attacker on the local network could
trigger this flaw by sending IPv6 traffic to a target system, leading to 
a system crash (kernel OOPS) if dst->neighbour is NULL on the target 
system when receiving an IPv6 packet. (CVE-2010-0437, Important)

* a NULL pointer dereference flaw was found in the ext4 file system code 
in the Linux kernel. A local attacker could use this flaw to trigger a 
local denial of service by mounting a specially-crafted, journal-less 
ext4 file system, if that file system forced an EROFS error. 
(CVE-2009-4308, Moderate)

* an information leak was found in the print_fatal_signal() 
implementation in the Linux kernel. When 
"/proc/sys/kernel/print-fatal-signals" is set to 1 (the default value is 
0), memory that is reachable by the kernel could be leaked to 
user-space. This issue could also result in a system crash. Note
that this flaw only affected the i386 architecture. (CVE-2010-0003,
Moderate)

* missing capability checks were found in the ebtables implementation, 
used for creating an Ethernet bridge firewall. This could allow a local,
unprivileged user to bypass intended capability restrictions and modify
ebtables rules. (CVE-2010-0007, Low)

Bug fixes:

* a bug prevented Wake on LAN (WoL) being enabled on certain Intel
hardware. (BZ#543449)

* a race issue in the Journaling Block Device. (BZ#553132)

* programs compiled on x86, and that also call sched_rr_get_interval(),
were silently corrupted when run on 64-bit systems. (BZ#557684)

* the RHSA-2010:0019 update introduced a regression, preventing WoL from
working for network devices using the e1000e driver. (BZ#559335)

* adding a bonding interface in mode balance-alb to a bridge was not
functional. (BZ#560588)

* some KVM (Kernel-based Virtual Machine) guests experienced slow
performance (and possibly a crash) after suspend/resume. (BZ#560640)

* on some systems, VF cannot be enabled in dom0. (BZ#560665)

* on systems with certain network cards, a system crash occurred after
enabling GRO. (BZ#561417)

* for x86 KVM guests with pvclock enabled, the boot clocks were 
registered twice, possibly causing KVM to write data to a random memory 
area during the guest's life. (BZ#561454)

* serious performance degradation for 32-bit applications, that map 
(mmap) thousands of small files, when run on a 64-bit system. (BZ#562746)

* improved kexec/kdump handling. Previously, on some systems under heavy
load, kexec/kdump was not functional. (BZ#562772)

* dom0 was unable to boot when using the Xen hypervisor on a system with 
a large number of logical CPUs. (BZ#562777)

* a fix for a bug that could potentially cause file system corruption.
(BZ#564281)

* a bug caused infrequent cluster issues for users of GFS2. (BZ#564288)

* gfs2_delete_inode failed on read-only file systems. (BZ#564290)

The system must be rebooted for this update to take effect.

SL 5.x

     SRPMS:
kernel-2.6.18-164.15.1.el5.src.rpm
     i386:
kernel-2.6.18-164.15.1.el5.i686.rpm
kernel-debug-2.6.18-164.15.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.15.1.el5.i686.rpm
kernel-devel-2.6.18-164.15.1.el5.i686.rpm
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
kernel-headers-2.6.18-164.15.1.el5.i386.rpm
kernel-PAE-2.6.18-164.15.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.15.1.el5.i686.rpm
kernel-xen-2.6.18-164.15.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.15.1.el5.i686.rpm
   Dependancies:
kernel-module-aufs-2.6.18-164.15.1.el5-0.20090202.cvs-6.sl5.i686.rpm
kernel-module-aufs-2.6.18-164.15.1.el5PAE-0.20090202.cvs-6.sl5.i686.rpm
kernel-module-aufs-2.6.18-164.15.1.el5xen-0.20090202.cvs-6.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5-1.2.0-2.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5PAE-1.2.0-2.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5xen-1.2.0-2.sl5.i686.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5PAE-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5PAE-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.i686.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5-1.55-1.SL.i686.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5PAE-1.55-1.SL.i686.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5xen-1.55-1.SL.i686.rpm
kernel-module-openafs-2.6.18-164.15.1.el5-1.4.11-76.sl5.i686.rpm
kernel-module-openafs-2.6.18-164.15.1.el5PAE-1.4.11-76.sl5.i686.rpm
kernel-module-openafs-2.6.18-164.15.1.el5xen-1.4.11-76.sl5.i686.rpm
kernel-module-xfs-2.6.18-164.15.1.el5-0.4-2.sl5.i686.rpm
kernel-module-xfs-2.6.18-164.15.1.el5PAE-0.4-2.sl5.i686.rpm
kernel-module-xfs-2.6.18-164.15.1.el5xen-0.4-2.sl5.i686.rpm

     x86_64:
kernel-2.6.18-164.15.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.15.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.15.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.15.1.el5.x86_64.rpm
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
kernel-headers-2.6.18-164.15.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.15.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.15.1.el5.x86_64.rpm
   Dependancies:
kernel-module-aufs-2.6.18-164.15.1.el5-0.20090202.cvs-6.sl5.x86_64.rpm
kernel-module-aufs-2.6.18-164.15.1.el5xen-0.20090202.cvs-6.sl5.x86_64.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5-1.2.0-2.sl5.x86_64.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5xen-1.2.0-2.sl5.x86_64.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5-0.9.4-15.sl5.x86_64.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.x86_64.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5-0.9.4-15.sl5.x86_64.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.x86_64.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5-1.55-1.SL.x86_64.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5xen-1.55-1.SL.x86_64.rpm
kernel-module-openafs-2.6.18-164.15.1.el5-1.4.11-76.sl5.x86_64.rpm
kernel-module-openafs-2.6.18-164.15.1.el5xen-1.4.11-76.sl5.x86_64.rpm
kernel-module-xfs-2.6.18-164.15.1.el5-0.4-2.sl5.x86_64.rpm
kernel-module-xfs-2.6.18-164.15.1.el5xen-0.4-2.sl5.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2009-4308 Important: kernel SL5.x i386/x86_64

Important: kernel security and bug fix update

Summary

* a NULL pointer dereference flaw was found in the sctp_rcv_ootb()function in the Linux kernel Stream Control Transmission Protocol (SCTP)implementation. A remote attacker could send a specially-crafted SCTPpacket to a target system, resulting in a denial of service.(CVE-2010-0008, Important)* a missing boundary check was found in the do_move_pages() function inthe memory migration functionality in the Linux kernel. A local usercould use this flaw to cause a local denial of service or an informationleak. (CVE-2010-0415, Important)* a NULL pointer dereference flaw was found in the ip6_dst_lookup_tail()function in the Linux kernel. An attacker on the local network couldtrigger this flaw by sending IPv6 traffic to a target system, leading toa system crash (kernel OOPS) if dst->neighbour is NULL on the targetsystem when receiving an IPv6 packet. (CVE-2010-0437, Important)* a NULL pointer dereference flaw was found in the ext4 file system codein the Linux kernel. A local attacker could use this flaw to trigger alocal denial of service by mounting a specially-crafted, journal-lessext4 file system, if that file system forced an EROFS error.(CVE-2009-4308, Moderate)* an information leak was found in the print_fatal_signal()implementation in the Linux kernel. When"/proc/sys/kernel/print-fatal-signals" is set to 1 (the default value is0), memory that is reachable by the kernel could be leaked touser-space. This issue could also result in a system crash. Notethat this flaw only affected the i386 architecture. (CVE-2010-0003,Moderate)* missing capability checks were found in the ebtables implementation,used for creating an Ethernet bridge firewall. This could allow a local,unprivileged user to bypass intended capability restrictions and modifyebtables rules. (CVE-2010-0007, Low)Bug fixes:* a bug prevented Wake on LAN (WoL) being enabled on certain Intelhardware. (BZ#543449)* a race issue in the Journaling Block Device. (BZ#553132)* programs compiled on x86, and that also call sched_rr_get_interval(),were silently corrupted when run on 64-bit systems. (BZ#557684)* the RHSA-2010:0019 update introduced a regression, preventing WoL fromworking for network devices using the e1000e driver. (BZ#559335)* adding a bonding interface in mode balance-alb to a bridge was notfunctional. (BZ#560588)* some KVM (Kernel-based Virtual Machine) guests experienced slowperformance (and possibly a crash) after suspend/resume. (BZ#560640)* on some systems, VF cannot be enabled in dom0. (BZ#560665)* on systems with certain network cards, a system crash occurred afterenabling GRO. (BZ#561417)* for x86 KVM guests with pvclock enabled, the boot clocks wereregistered twice, possibly causing KVM to write data to a random memoryarea during the guest's life. (BZ#561454)* serious performance degradation for 32-bit applications, that map(mmap) thousands of small files, when run on a 64-bit system. (BZ#562746)* improved kexec/kdump handling. Previously, on some systems under heavyload, kexec/kdump was not functional. (BZ#562772)* dom0 was unable to boot when using the Xen hypervisor on a system witha large number of logical CPUs. (BZ#562777)* a fix for a bug that could potentially cause file system corruption.(BZ#564281)* a bug caused infrequent cluster issues for users of GFS2. (BZ#564288)* gfs2_delete_inode failed on read-only file systems. (BZ#564290)The system must be rebooted for this update to take effect.SL 5.xSRPMS:kernel-2.6.18-164.15.1.el5.src.rpmi386:kernel-2.6.18-164.15.1.el5.i686.rpmkernel-debug-2.6.18-164.15.1.el5.i686.rpmkernel-debug-devel-2.6.18-164.15.1.el5.i686.rpmkernel-devel-2.6.18-164.15.1.el5.i686.rpmkernel-doc-2.6.18-164.15.1.el5.noarch.rpmkernel-headers-2.6.18-164.15.1.el5.i386.rpmkernel-PAE-2.6.18-164.15.1.el5.i686.rpmkernel-PAE-devel-2.6.18-164.15.1.el5.i686.rpmkernel-xen-2.6.18-164.15.1.el5.i686.rpmkernel-xen-devel-2.6.18-164.15.1.el5.i686.rpmDependancies:kernel-module-aufs-2.6.18-164.15.1.el5-0.20090202.cvs-6.sl5.i686.rpmkernel-module-aufs-2.6.18-164.15.1.el5PAE-0.20090202.cvs-6.sl5.i686.rpmkernel-module-aufs-2.6.18-164.15.1.el5xen-0.20090202.cvs-6.sl5.i686.rpmkernel-module-ipw3945-2.6.18-164.15.1.el5-1.2.0-2.sl5.i686.rpmkernel-module-ipw3945-2.6.18-164.15.1.el5PAE-1.2.0-2.sl5.i686.rpmkernel-module-ipw3945-2.6.18-164.15.1.el5xen-1.2.0-2.sl5.i686.rpmkernel-module-madwifi-2.6.18-164.15.1.el5-0.9.4-15.sl5.i686.rpmkernel-module-madwifi-2.6.18-164.15.1.el5PAE-0.9.4-15.sl5.i686.rpmkernel-module-madwifi-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-164.15.1.el5-0.9.4-15.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-164.15.1.el5PAE-0.9.4-15.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.i686.rpmkernel-module-ndiswrapper-2.6.18-164.15.1.el5-1.55-1.SL.i686.rpmkernel-module-ndiswrapper-2.6.18-164.15.1.el5PAE-1.55-1.SL.i686.rpmkernel-module-ndiswrapper-2.6.18-164.15.1.el5xen-1.55-1.SL.i686.rpmkernel-module-openafs-2.6.18-164.15.1.el5-1.4.11-76.sl5.i686.rpmkernel-module-openafs-2.6.18-164.15.1.el5PAE-1.4.11-76.sl5.i686.rpmkernel-module-openafs-2.6.18-164.15.1.el5xen-1.4.11-76.sl5.i686.rpmkernel-module-xfs-2.6.18-164.15.1.el5-0.4-2.sl5.i686.rpmkernel-module-xfs-2.6.18-164.15.1.el5PAE-0.4-2.sl5.i686.rpmkernel-module-xfs-2.6.18-164.15.1.el5xen-0.4-2.sl5.i686.rpmx86_64:kernel-2.6.18-164.15.1.el5.x86_64.rpmkernel-debug-2.6.18-164.15.1.el5.x86_64.rpmkernel-debug-devel-2.6.18-164.15.1.el5.x86_64.rpmkernel-devel-2.6.18-164.15.1.el5.x86_64.rpmkernel-doc-2.6.18-164.15.1.el5.noarch.rpmkernel-headers-2.6.18-164.15.1.el5.x86_64.rpmkernel-xen-2.6.18-164.15.1.el5.x86_64.rpmkernel-xen-devel-2.6.18-164.15.1.el5.x86_64.rpmDependancies:kernel-module-aufs-2.6.18-164.15.1.el5-0.20090202.cvs-6.sl5.x86_64.rpmkernel-module-aufs-2.6.18-164.15.1.el5xen-0.20090202.cvs-6.sl5.x86_64.rpmkernel-module-ipw3945-2.6.18-164.15.1.el5-1.2.0-2.sl5.x86_64.rpmkernel-module-ipw3945-2.6.18-164.15.1.el5xen-1.2.0-2.sl5.x86_64.rpmkernel-module-madwifi-2.6.18-164.15.1.el5-0.9.4-15.sl5.x86_64.rpmkernel-module-madwifi-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.x86_64.rpmkernel-module-madwifi-hal-2.6.18-164.15.1.el5-0.9.4-15.sl5.x86_64.rpmkernel-module-madwifi-hal-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.x86_64.rpmkernel-module-ndiswrapper-2.6.18-164.15.1.el5-1.55-1.SL.x86_64.rpmkernel-module-ndiswrapper-2.6.18-164.15.1.el5xen-1.55-1.SL.x86_64.rpmkernel-module-openafs-2.6.18-164.15.1.el5-1.4.11-76.sl5.x86_64.rpmkernel-module-openafs-2.6.18-164.15.1.el5xen-1.4.11-76.sl5.x86_64.rpmkernel-module-xfs-2.6.18-164.15.1.el5-0.4-2.sl5.x86_64.rpmkernel-module-xfs-2.6.18-164.15.1.el5xen-0.4-2.sl5.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity
Issued Date: : 2010-03-16
CVE Names: CVE-2009-4308 CVE-2010-0003 CVE-2010-0007
CVE-2010-0008 CVE-2010-0415 CVE-2010-0437
Security fixes:

Related News