CentOS Errata and Security Advisory CESA-2005:366 for i386 and x86_64
https://rhn.redhat.com/errata/RHSA-2005-366.html refers,
The following updated files have been uploaded and are currently syncing to the mirrors:
i386: kernel-2.6.9-5.0.5.EL.i586.rpm kernel-2.6.9-5.0.5.EL.i686.rpm kernel-devel-2.6.9-5.0.5.EL.i586.rpm kernel-devel-2.6.9-5.0.5.EL.i686.rpm kernel-doc-2.6.9-5.0.5.EL.noarch.rpm kernel-hugemem-2.6.9-5.0.5.EL.i686.rpm kernel-hugemem-devel-2.6.9-5.0.5.EL.i686.rpm kernel-smp-2.6.9-5.0.5.EL.i586.rpm kernel-smp-2.6.9-5.0.5.EL.i686.rpm kernel-smp-devel-2.6.9-5.0.5.EL.i586.rpm kernel-smp-devel-2.6.9-5.0.5.EL.i686.rpm kernel-sourcecode-2.6.9-5.0.5.EL.noarch.rpm
x86_64: kernel-2.6.9-5.0.5.EL.x86_64.rpm kernel-devel-2.6.9-5.0.5.EL.x86_64.rpm kernel-doc-2.6.9-5.0.5.EL.noarch.rpm kernel-hugemem-devel-2.6.9-5.0.5.EL.i686.rpm kernel-smp-2.6.9-5.0.5.EL.x86_64.rpm kernel-smp-devel-2.6.9-5.0.5.EL.x86_64.rpm kernel-sourcecode-2.6.9-5.0.5.EL.noarch.rpm
src: kernel-2.6.9-5.0.5.EL.src.rpm
To get the update do:
yum update kernel-*
------------------------------------------- This is a very important update, as some of the security issues are concerning ... specifically these three:
A flaw in fragment queuing was discovered that affected the Linux kernel netfilter subsystem. On systems configured to filter or process network packets (e.g. firewalling), a remote attacker could send a carefully crafted set of fragmented packets to a machine and cause a denial of service (system crash). In order to successfully exploit this flaw, the attacker would need to know or guess some aspects of the firewall ruleset on the target system. (CAN-2005-0449)
A flaw was discovered in the bluetooth driver system. On systems where the bluetooth modules are loaded, a local user could use this flaw to gain elevated (root) privileges. (CAN-2005-0750)
A race condition was discovered that affected the Radeon DRI driver. A local user who has DRI privileges on a Radeon graphics card may be able to use this flaw to gain root privileges. (CAN-2005-0767)
Thanks, Johnny Hughes