Rapid7 Vulnerability & Exploit Database

CESA-2007:0774: kernel security and bugfix update

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

CESA-2007:0774: kernel security and bugfix update



Updated kernel packages that fix several security issues and bugs in the CentOS Linux 4 kernel are now available. This security advisory has been rated as having moderate security impact by the CentOS Security Response Team.

The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the security issues described below: * a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a denial of service or potential remote access. Exploitation would require the attacker to be able to send arbitrary frames over the ISDN network to the victim's machine. (CVE-2007-1217, Moderate) * a flaw in the perfmon subsystem on ia64 platforms that allowed a local user to cause a denial of service. (CVE-2006-0558, Moderate) In addition, the following bugs were addressed: * a panic after reloading of the LSI Fusion driver. * a vm performance problem was corrected by balancing inactive page lists. * added a nodirplus option to address NFSv3 performance issues with large directories. * changed the personality handling to disallow personality changes of setuid and setgid binaries. This ensures they keep any randomization and Exec-shield protection. All CentOS Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.


  • centos-upgrade-kernel
  • centos-upgrade-kernel-devel
  • centos-upgrade-kernel-doc
  • centos-upgrade-kernel-hugemem
  • centos-upgrade-kernel-hugemem-devel
  • centos-upgrade-kernel-largesmp
  • centos-upgrade-kernel-largesmp-devel
  • centos-upgrade-kernel-smp
  • centos-upgrade-kernel-smp-devel
  • centos-upgrade-kernel-xenu
  • centos-upgrade-kernel-xenu-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center