Rapid7 Vulnerability & Exploit Database

CESA-2007:0673: kernel security update

Back to Search

CESA-2007:0673: kernel security update

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
03/02/2007
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated kernel packages that fix a number of security issues are now available for CentOS Linux 2.1 (64-bit architectures). This security advisory has been rated as having important security impact by the CentOS Security Response Team.

The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the security issues described below: * a flaw in IPV6 flow label handling that allowed a local user to cause a denial of service (crash). (CVE-2007-1592, Important) * a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a denial of service or potential privilege escalation. (CVE-2007-1217, Moderate) * a flaw in the Bluetooth subsystem that allowed a local user to trigger an information leak. (CVE-2007-1353, Low) * a flaw in the supported filesystems that allowed a local privileged user to cause a denial of service. (CVE-2006-6054, Low) CentOS would like to thank Ilja van Sprundel for reporting an issue fixed in this erratum. All CentOS Linux 2.1 users are advised to upgrade their kernels to these updated packages, which contain backported fixes to correct these issues.

Solution(s)

  • centos-upgrade-kernel
  • centos-upgrade-kernel-doc
  • centos-upgrade-kernel-smp
  • centos-upgrade-kernel-source

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;