SCIENTIFIC-LINUX-ERRATA Archives

December 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Tue, 27 Dec 2011 10:17:35 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (72 lines)
Synopsis:    Moderate: Scientific Linux 6 kernel security, bug fix and enhancement update
Issue Date:  2011-12-06
CVE Numbers: CVE-2011-1020
             CVE-2011-3347
             CVE-2011-3638
             CVE-2011-4110


The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* The proc file system could allow a local, unprivileged user to obtain
sensitive information or possibly cause integrity issues. (CVE-2011-1020,
Moderate)

* Non-member VLAN (virtual LAN) packet handling for interfaces in
promiscuous mode and also using the be2net driver could allow an attacker
on the local network to cause a denial of service. (CVE-2011-3347,
Moderate)

* A flaw was found in the Linux kernel in the way splitting two extents in
ext4_ext_convert_to_initialized() worked. A local, unprivileged user with
access to mount and unmount ext4 file systems could use this flaw to cause
a denial of service. (CVE-2011-3638, Moderate)

* A NULL pointer dereference flaw was found in the way the Linux kernel's
key management facility handled user-defined key types. A local,
unprivileged user could use the keyctl utility to cause a denial of
service. (CVE-2011-4110, Moderate)


This update also fixes several hundred bugs and adds enhancements. Refer to
the upstream Release Notes for information on the most significant of these changes.

All Scientific Linux 6 users are advised to install these updated
packages, which correct these issues, and fix the bugs and add the
enhancements noted. The system must be rebooted for this update to take
effect.

SL6:
  i386
     kernel-2.6.32-220.el6.i686.rpm
     kernel-debug-2.6.32-220.el6.i686.rpm
     kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm
     kernel-debug-devel-2.6.32-220.el6.i686.rpm
     kernel-debuginfo-2.6.32-220.el6.i686.rpm
     kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm
     kernel-devel-2.6.32-220.el6.i686.rpm
     kernel-headers-2.6.32-220.el6.i686.rpm
     perf-2.6.32-220.el6.i686.rpm
     perf-debuginfo-2.6.32-220.el6.i686.rpm
     python-perf-2.6.32-220.el6.i686.rpm
  noarch
     kernel-doc-2.6.32-220.el6.noarch.rpm
     kernel-firmware-2.6.32-220.el6.noarch.rpm
  x86_64
     kernel-2.6.32-220.el6.x86_64.rpm
     kernel-debug-2.6.32-220.el6.x86_64.rpm
     kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm
     kernel-debug-devel-2.6.32-220.el6.x86_64.rpm
     kernel-debuginfo-2.6.32-220.el6.x86_64.rpm
     kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm
     kernel-devel-2.6.32-220.el6.x86_64.rpm
     kernel-headers-2.6.32-220.el6.x86_64.rpm
     perf-2.6.32-220.el6.x86_64.rpm
     perf-debuginfo-2.6.32-220.el6.x86_64.rpm
     python-perf-2.6.32-220.el6.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2