English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 147413 CVE descriptions
and 71685 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Date: Wed Apr 20 01:47:26 2005
Subject: [CentOS-announce] CESA-2005:366 Important CentOS 3 ia64 kernel - kernel security update (Read the NOTES)

CentOS Errata and Security Advisory CESA-2005:366

https://rhn.redhat.com/errata/RHSA-2005-366.html

The following updated files have been uploaded and are currently
syncing to the mirrors:

files:
updates/ia64/RPMS/kernel-2.6.9-5.0.5.EL.ia64.rpm
updates/ia64/RPMS/kernel-devel-2.6.9-5.0.5.EL.ia64.rpm
updates/ia64/RPMS/kernel-doc-2.6.9-5.0.5.EL.noarch.rpm
updates/ia64/RPMS/kernel-sourcecode-2.6.9-5.0.5.EL.noarch.rpm

files centosplus:
centosplus/ia64/RPMS/kernel-2.6.9-5.0.5.105.EC.ia64.rpm
centosplus/ia64/RPMS/kernel-devel-2.6.9-5.0.5.105.EC.ia64.rpm
centosplus/ia64/RPMS/kernel-doc-2.6.9-5.0.5.105.EC.noarch.rpm
centosplus/ia64/RPMS/kernel-sourcecode-2.6.9-5.0.5.105.EC.noarch.rpm

sources:
centosplus/ia64/SRPMS/kernel-2.6.9-5.0.5.105.EC.src.rpm


README NOTES:

Due to the fact that the upstream kernel didn't quite work on basic
rx1600 box (the one w/o MC), there has been two kernels. The official
CentOS-4 one and the one i have patched to work on above mentioned box. 
I do myself have such boxen, so i need it myself.

So if you have installed on such box, be carefull about the update
process. Make sure you get the one from centosplus and not the stock one.

I've personally ran this kernel-2.6.9-5.0.5.105.EC myself now couple
hours while building the rest of the stuff. As the side effect, the
*EC* kernels does have XFS enabled as it has JFS too (JFS won't work on
ia64 with default page size tho). The side effect being that i do have
myself a unified codebase and this kernel is used on ppc32 too, so
there is some extra features in it for ia64 too because of that.

If you're still reading, the plan would be to release 4.1/U1 w/o modified
kernel as there is installation/update path for those whom might need
the modified kernel from the initial release.


-- 
Pasi Pirhonen - upi@iki.fi - http://iki.fi/upi/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.centos.org/pipermail/centos-announce/attachments/20050420/61f38e3c/attachment.bin




Date: Wed Apr 20 14:51:13 2005
Subject: [CentOS-announce] CESA-2005:366 Important CentOS 4 i386 and x86_64 kernel - security update

CentOS Errata and Security Advisory CESA-2005:366 for i386 and x86_64

https://rhn.redhat.com/errata/RHSA-2005-366.html refers,

The following updated files have been uploaded and are currently
syncing to the mirrors:

i386:
kernel-2.6.9-5.0.5.EL.i586.rpm
kernel-2.6.9-5.0.5.EL.i686.rpm
kernel-devel-2.6.9-5.0.5.EL.i586.rpm
kernel-devel-2.6.9-5.0.5.EL.i686.rpm
kernel-doc-2.6.9-5.0.5.EL.noarch.rpm
kernel-hugemem-2.6.9-5.0.5.EL.i686.rpm
kernel-hugemem-devel-2.6.9-5.0.5.EL.i686.rpm
kernel-smp-2.6.9-5.0.5.EL.i586.rpm
kernel-smp-2.6.9-5.0.5.EL.i686.rpm
kernel-smp-devel-2.6.9-5.0.5.EL.i586.rpm
kernel-smp-devel-2.6.9-5.0.5.EL.i686.rpm
kernel-sourcecode-2.6.9-5.0.5.EL.noarch.rpm

x86_64:
kernel-2.6.9-5.0.5.EL.x86_64.rpm
kernel-devel-2.6.9-5.0.5.EL.x86_64.rpm
kernel-doc-2.6.9-5.0.5.EL.noarch.rpm
kernel-hugemem-devel-2.6.9-5.0.5.EL.i686.rpm
kernel-smp-2.6.9-5.0.5.EL.x86_64.rpm
kernel-smp-devel-2.6.9-5.0.5.EL.x86_64.rpm
kernel-sourcecode-2.6.9-5.0.5.EL.noarch.rpm

src:
kernel-2.6.9-5.0.5.EL.src.rpm


To get the update do:

yum update kernel-*

-------------------------------------------
This is a very important update, as some of the security issues are
concerning ... specifically these three:

A flaw in fragment queuing was discovered that affected the Linux kernel
netfilter subsystem. On systems configured to filter or process network
packets (e.g. firewalling), a remote attacker could send a carefully
crafted set of fragmented packets to a machine and cause a denial of
service (system crash). In order to successfully exploit this flaw, the
attacker would need to know or guess some aspects of the firewall
ruleset on the target system. (CAN-2005-0449)


A flaw was discovered in the bluetooth driver system. On systems where
the bluetooth modules are loaded, a local user could use this flaw to
gain elevated (root) privileges. (CAN-2005-0750)


A race condition was discovered that affected the Radeon DRI driver. A
local user who has DRI privileges on a Radeon graphics card may be able
to use this flaw to gain root privileges. (CAN-2005-0767)

Thanks,
Johnny Hughes
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.centos.org/pipermail/centos-announce/attachments/20050420/30818e78/attachment.bin

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.