[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4637cd36.0sSSxlDpC0omg9N7%announce-noreply@rpath.com>
Date: Tue, 01 May 2007 19:28:54 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2007-0084-1 kernel
rPath Security Advisory: 2007-0084-1
Published: 2007-05-01
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Remote Deterministic Denial of Service
Updated Versions:
kernel=/conary.rpath.com@rpl:devel//1/2.6.19.7-0.4-1
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1861
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2242
https://issues.rpath.com/browse/RPL-1309
https://issues.rpath.com/browse/RPL-1310
Description:
Previous versions of the kernel package are vulnerable to one
local user Denial of Service attack in which local users can
trigger a kernel stack overflow using the netlink layer, and to one
remote Denial of Service attack in which if IPv6 routing has been
configured, a remote user can cause the system to use all available
network bandwidth by sending a specially-crafted IPv6 packet.
In addition, several issues have been resolved that caused some
systems to have difficulty booting: attempting to initialize the
Intel random number generator caused some recent systems to hang
during boot, and NUMA capability was also causing some systems to
hang during boot and so has been disabled on x86, where it is
generally not needed.
A system reboot is required to resolve these issues.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists