[CentOS-announce] CESA-2005:366 Important CentOS 4 i386 and x86_64 kernel - security update

Wed Apr 20 14:50:55 UTC 2005
Johnny Hughes <johnny at centos.org>

CentOS Errata and Security Advisory CESA-2005:366 for i386 and x86_64

https://rhn.redhat.com/errata/RHSA-2005-366.html refers,

The following updated files have been uploaded and are currently
syncing to the mirrors:

i386:
kernel-2.6.9-5.0.5.EL.i586.rpm
kernel-2.6.9-5.0.5.EL.i686.rpm
kernel-devel-2.6.9-5.0.5.EL.i586.rpm
kernel-devel-2.6.9-5.0.5.EL.i686.rpm
kernel-doc-2.6.9-5.0.5.EL.noarch.rpm
kernel-hugemem-2.6.9-5.0.5.EL.i686.rpm
kernel-hugemem-devel-2.6.9-5.0.5.EL.i686.rpm
kernel-smp-2.6.9-5.0.5.EL.i586.rpm
kernel-smp-2.6.9-5.0.5.EL.i686.rpm
kernel-smp-devel-2.6.9-5.0.5.EL.i586.rpm
kernel-smp-devel-2.6.9-5.0.5.EL.i686.rpm
kernel-sourcecode-2.6.9-5.0.5.EL.noarch.rpm

x86_64:
kernel-2.6.9-5.0.5.EL.x86_64.rpm
kernel-devel-2.6.9-5.0.5.EL.x86_64.rpm
kernel-doc-2.6.9-5.0.5.EL.noarch.rpm
kernel-hugemem-devel-2.6.9-5.0.5.EL.i686.rpm
kernel-smp-2.6.9-5.0.5.EL.x86_64.rpm
kernel-smp-devel-2.6.9-5.0.5.EL.x86_64.rpm
kernel-sourcecode-2.6.9-5.0.5.EL.noarch.rpm

src:
kernel-2.6.9-5.0.5.EL.src.rpm


To get the update do:

yum update kernel-*

-------------------------------------------
This is a very important update, as some of the security issues are
concerning ... specifically these three:

A flaw in fragment queuing was discovered that affected the Linux kernel
netfilter subsystem. On systems configured to filter or process network
packets (e.g. firewalling), a remote attacker could send a carefully
crafted set of fragmented packets to a machine and cause a denial of
service (system crash). In order to successfully exploit this flaw, the
attacker would need to know or guess some aspects of the firewall
ruleset on the target system. (CAN-2005-0449)


A flaw was discovered in the bluetooth driver system. On systems where
the bluetooth modules are loaded, a local user could use this flaw to
gain elevated (root) privileges. (CAN-2005-0750)


A race condition was discovered that affected the Radeon DRI driver. A
local user who has DRI privileges on a Radeon graphics card may be able
to use this flaw to gain root privileges. (CAN-2005-0767)

Thanks,
Johnny Hughes
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://lists.centos.org/pipermail/centos-announce/attachments/20050420/30818e78/attachment-0004.sig>