SciLinux: CVE-2010-0727 Moderate: GFS SL3.x i386/x86_64
Summary
(set-group-ID on execution) in their mode set. A local, unprivilegeduser on a system that has a GFS file system mounted could use this flawto cause a kernel panic. (CVE-2010-0727)As well, these updated GFS packages are in sync with the latest kernel(2.4.21-63.EL). The modules in earlier GFS packages fail to load becausethey do not match the running kernel. It is possible to force-load themodules; however, with this update, force-loading the modules is notrequired. (BZ#525198)Users are advised to upgrade to these latest GFS packages, which resolvethis issue and are updated for use with the 2.4.21-63.EL kernel.SL 3.0.xSRPMS:GFS-6.0.2.36-13.src.rpmi386:GFS-6.0.2.36-13.i686.rpmGFS-devel-6.0.2.36-13.i686.rpmGFS-modules-6.0.2.36-13.i686.rpmGFS-modules-hugemem-6.0.2.36-13.i686.rpmGFS-modules-smp-6.0.2.36-13.i686.rpmx86_64:GFS-6.0.2.36-13.x86_64.rpmGFS-devel-6.0.2.36-13.x86_64.rpmGFS-modules-6.0.2.36-13.x86_64.rpmGFS-modules-smp-6.0.2.36-13.x86_64.rpm-Connie Sieh-Troy Dawson