rPath Security Advisory: 2006-0226-1 Published: 2006-12-06 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Local Root Non-deterministic Privilege Escalation Updated Versions: kernel=/conary.rpath.com@rpl:devel//1/2.6.17.14-0.4-1 kernel=/conary.rpath.com@rpl:devel//1-xen/2.6.16.29-0.11-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5751 https://issues.rpath.com/browse/RPL-803 https://issues.rpath.com/browse/RPL-837 Description: Previous versions of the kernel package are vulnerable to a local denial of service or privilege escalation attack by unprivileged users if any network bridge interface has been configured with more than two interfaces. The attacker can cause the system to crash, and is believed to be able to provide arbitrary code that may (with undetermined probability) run in kernel context. Xen dom0 instances in the default bridging configuration are vulnerable. Previous versions of the Xen dom0 kernel did not embed the firmware for QLogic 2XXX Fibre Channel adapters, disabling Xen dom0 on those systems. This update requires a system reboot to implement the fixes.