SCIENTIFIC-LINUX-ERRATA Archives

March 2010

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Thu, 18 Mar 2010 12:36:13 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (155 lines)
Synopsis:	Important: kernel security and bug fix update
Issue date:	2010-03-16
CVE Names:	CVE-2009-4308 CVE-2010-0003 CVE-2010-0007
                   CVE-2010-0008 CVE-2010-0415 CVE-2010-0437

Security fixes:

* a NULL pointer dereference flaw was found in the sctp_rcv_ootb() 
function in the Linux kernel Stream Control Transmission Protocol (SCTP)
implementation. A remote attacker could send a specially-crafted SCTP
packet to a target system, resulting in a denial of service.
(CVE-2010-0008, Important)

* a missing boundary check was found in the do_move_pages() function in
the memory migration functionality in the Linux kernel. A local user 
could use this flaw to cause a local denial of service or an information 
leak. (CVE-2010-0415, Important)

* a NULL pointer dereference flaw was found in the ip6_dst_lookup_tail()
function in the Linux kernel. An attacker on the local network could
trigger this flaw by sending IPv6 traffic to a target system, leading to 
a system crash (kernel OOPS) if dst->neighbour is NULL on the target 
system when receiving an IPv6 packet. (CVE-2010-0437, Important)

* a NULL pointer dereference flaw was found in the ext4 file system code 
in the Linux kernel. A local attacker could use this flaw to trigger a 
local denial of service by mounting a specially-crafted, journal-less 
ext4 file system, if that file system forced an EROFS error. 
(CVE-2009-4308, Moderate)

* an information leak was found in the print_fatal_signal() 
implementation in the Linux kernel. When 
"/proc/sys/kernel/print-fatal-signals" is set to 1 (the default value is 
0), memory that is reachable by the kernel could be leaked to 
user-space. This issue could also result in a system crash. Note
that this flaw only affected the i386 architecture. (CVE-2010-0003,
Moderate)

* missing capability checks were found in the ebtables implementation, 
used for creating an Ethernet bridge firewall. This could allow a local,
unprivileged user to bypass intended capability restrictions and modify
ebtables rules. (CVE-2010-0007, Low)

Bug fixes:

* a bug prevented Wake on LAN (WoL) being enabled on certain Intel
hardware. (BZ#543449)

* a race issue in the Journaling Block Device. (BZ#553132)

* programs compiled on x86, and that also call sched_rr_get_interval(),
were silently corrupted when run on 64-bit systems. (BZ#557684)

* the RHSA-2010:0019 update introduced a regression, preventing WoL from
working for network devices using the e1000e driver. (BZ#559335)

* adding a bonding interface in mode balance-alb to a bridge was not
functional. (BZ#560588)

* some KVM (Kernel-based Virtual Machine) guests experienced slow
performance (and possibly a crash) after suspend/resume. (BZ#560640)

* on some systems, VF cannot be enabled in dom0. (BZ#560665)

* on systems with certain network cards, a system crash occurred after
enabling GRO. (BZ#561417)

* for x86 KVM guests with pvclock enabled, the boot clocks were 
registered twice, possibly causing KVM to write data to a random memory 
area during the guest's life. (BZ#561454)

* serious performance degradation for 32-bit applications, that map 
(mmap) thousands of small files, when run on a 64-bit system. (BZ#562746)

* improved kexec/kdump handling. Previously, on some systems under heavy
load, kexec/kdump was not functional. (BZ#562772)

* dom0 was unable to boot when using the Xen hypervisor on a system with 
a large number of logical CPUs. (BZ#562777)

* a fix for a bug that could potentially cause file system corruption.
(BZ#564281)

* a bug caused infrequent cluster issues for users of GFS2. (BZ#564288)

* gfs2_delete_inode failed on read-only file systems. (BZ#564290)

The system must be rebooted for this update to take effect.

SL 5.x

     SRPMS:
kernel-2.6.18-164.15.1.el5.src.rpm
     i386:
kernel-2.6.18-164.15.1.el5.i686.rpm
kernel-debug-2.6.18-164.15.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.15.1.el5.i686.rpm
kernel-devel-2.6.18-164.15.1.el5.i686.rpm
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
kernel-headers-2.6.18-164.15.1.el5.i386.rpm
kernel-PAE-2.6.18-164.15.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.15.1.el5.i686.rpm
kernel-xen-2.6.18-164.15.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.15.1.el5.i686.rpm
   Dependancies:
kernel-module-aufs-2.6.18-164.15.1.el5-0.20090202.cvs-6.sl5.i686.rpm
kernel-module-aufs-2.6.18-164.15.1.el5PAE-0.20090202.cvs-6.sl5.i686.rpm
kernel-module-aufs-2.6.18-164.15.1.el5xen-0.20090202.cvs-6.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5-1.2.0-2.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5PAE-1.2.0-2.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5xen-1.2.0-2.sl5.i686.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5PAE-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5PAE-0.9.4-15.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.i686.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5-1.55-1.SL.i686.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5PAE-1.55-1.SL.i686.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5xen-1.55-1.SL.i686.rpm
kernel-module-openafs-2.6.18-164.15.1.el5-1.4.11-76.sl5.i686.rpm
kernel-module-openafs-2.6.18-164.15.1.el5PAE-1.4.11-76.sl5.i686.rpm
kernel-module-openafs-2.6.18-164.15.1.el5xen-1.4.11-76.sl5.i686.rpm
kernel-module-xfs-2.6.18-164.15.1.el5-0.4-2.sl5.i686.rpm
kernel-module-xfs-2.6.18-164.15.1.el5PAE-0.4-2.sl5.i686.rpm
kernel-module-xfs-2.6.18-164.15.1.el5xen-0.4-2.sl5.i686.rpm

     x86_64:
kernel-2.6.18-164.15.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.15.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.15.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.15.1.el5.x86_64.rpm
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
kernel-headers-2.6.18-164.15.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.15.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.15.1.el5.x86_64.rpm
   Dependancies:
kernel-module-aufs-2.6.18-164.15.1.el5-0.20090202.cvs-6.sl5.x86_64.rpm
kernel-module-aufs-2.6.18-164.15.1.el5xen-0.20090202.cvs-6.sl5.x86_64.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5-1.2.0-2.sl5.x86_64.rpm
kernel-module-ipw3945-2.6.18-164.15.1.el5xen-1.2.0-2.sl5.x86_64.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5-0.9.4-15.sl5.x86_64.rpm
kernel-module-madwifi-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.x86_64.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5-0.9.4-15.sl5.x86_64.rpm
kernel-module-madwifi-hal-2.6.18-164.15.1.el5xen-0.9.4-15.sl5.x86_64.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5-1.55-1.SL.x86_64.rpm
kernel-module-ndiswrapper-2.6.18-164.15.1.el5xen-1.55-1.SL.x86_64.rpm
kernel-module-openafs-2.6.18-164.15.1.el5-1.4.11-76.sl5.x86_64.rpm
kernel-module-openafs-2.6.18-164.15.1.el5xen-1.4.11-76.sl5.x86_64.rpm
kernel-module-xfs-2.6.18-164.15.1.el5-0.4-2.sl5.x86_64.rpm
kernel-module-xfs-2.6.18-164.15.1.el5xen-0.4-2.sl5.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2