Synopsis: Important: kernel security update Issue date: 2007-10-22 CVE Names: CVE-2007-3105 CVE-2007-3380 CVE-2007-3513 CVE-2007-3731 CVE-2007-3848 CVE-2007-3850 CVE-2007-4308 CVE-2007-4133 CVE-2007-4574 These new kernel packages contain fixes for the following security issues: * A flaw was found in the backported stack unwinder fixes in Red Hat Enterprise Linux 5. On AMD64 and Intel 64 platforms, a local user could trigger this flaw and cause a denial of service. (CVE-2007-4574, Important) * A flaw was found in the handling of process death signals. This allowed a local user to send arbitrary signals to the suid-process executed by that user. A successful exploitation of this flaw depends on the structure of the suid-program and its signal handling. (CVE-2007-3848, Important) * A flaw was found in the Distributed Lock Manager (DLM) in the cluster manager. This allowed a remote user who is able to connect to the DLM port to cause a denial of service. (CVE-2007-3380, Important) * A flaw was found in the aacraid SCSI driver. This allowed a local user to make ioctl calls to the driver which should otherwise be restricted to privileged users. (CVE-2007-4308, Moderate) * A flaw was found in the prio_tree handling of the hugetlb support that allowed a local user to cause a denial of service. This only affected kernels with hugetlb support. (CVE-2007-4133, Moderate) * A flaw was found in the eHCA driver on PowerPC architectures that allowed a local user to access 60k of physical address space. This address space could contain sensitive information. (CVE-2007-3850, Moderate) * A flaw was found in ptrace support that allowed a local user to cause a denial of service via a NULL pointer dereference. (CVE-2007-3731, Moderate) * A flaw was found in the usblcd driver that allowed a local user to cause a denial of service by writing data to the device node. To exploit this issue, write access to the device node was needed. (CVE-2007-3513, Moderate) * A flaw was found in the random number generator implementation that allowed a local user to cause a denial of service or possibly gain privileges. If the root user raised the default wakeup threshold over the size of the output pool, this flaw could be exploited. (CVE-2007-3105, Low) In addition to the security issues described above, several bug fixes preventing possible system crashes and data corruption were also included. SL 5.x SRPMS: kernel-2.6.18-8.1.15.el5.src.rpm i386: kernel-2.6.18-8.1.15.el5.i686.rpm kernel-devel-2.6.18-8.1.15.el5.i686.rpm kernel-doc-2.6.18-8.1.15.el5.noarch.rpm kernel-headers-2.6.18-8.1.15.el5.i386.rpm kernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.el5.i686.rpm kernel-module-fuse-2.6.18-8.1.15.el5PAE-2.6.3-1.el5.i686.rpm kernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.el5.i686.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.i686.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5PAE-1.2.0-1.sl5.i686.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.i686.rpm kernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.i686.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5PAE-1.41-1.SL.i686.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.i686.rpm kernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.i686.rpm kernel-module-openafs-2.6.18-8.1.15.el5PAE-1.4.4-42.SL5.i686.rpm kernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.i686.rpm kernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.i686.rpm kernel-module-r1000-2.6.18-8.1.15.el5PAE-1.05-1.sl.i686.rpm kernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.i686.rpm kernel-PAE-2.6.18-8.1.15.el5.i686.rpm kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm kernel-xen-2.6.18-8.1.15.el5.i686.rpm kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm Dependancies kernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.el5.i686.rpm kernel-module-fuse-2.6.18-8.1.15.el5PAE-2.6.3-1.el5.i686.rpm kernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.el5.i686.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.i686.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5PAE-1.2.0-1.sl5.i686.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.i686.rpm kernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.i686.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5PAE-1.41-1.SL.i686.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.i686.rpm kernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.i686.rpm kernel-module-openafs-2.6.18-8.1.15.el5PAE-1.4.4-42.SL5.i686.rpm kernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.i686.rpm kernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.i686.rpm kernel-module-r1000-2.6.18-8.1.15.el5PAE-1.05-1.sl.i686.rpm kernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.i686.rpm x86_64: kernel-2.6.18-8.1.15.el5.x86_64.rpm kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm kernel-doc-2.6.18-8.1.15.el5.noarch.rpm kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm kernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.SL.x86_64.rpm kernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.SL.x86_64.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.x86_64.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.x86_64.rpm kernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpm kernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.x86_64.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.x86_64.rpm kernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.x86_64.rpm kernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.x86_64.rpm kernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.x86_64.rpm kernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.x86_64.rpm kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm Dependancies kernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.SL.x86_64.rpm kernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.SL.x86_64.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.x86_64.rpm kernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.x86_64.rpm kernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpm kernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpm kernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.x86_64.rpm kernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.x86_64.rpm kernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.x86_64.rpm kernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.x86_64.rpm kernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.x86_64.rpm kernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.x86_64.rpm NOTE: At the time of this writting, The Upstream Vendor had not released the source rpm's for the GFS kernel modules. When they do, we will recompile them and push them out. But we felt it was better to get the kernel out as soon as possible. -Connie Sieh -Troy Dawson