rPath Security Advisory: 2007-0164-1 Published: 2007-08-16 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Local Root Deterministic Privilege Escalation Updated Versions: kernel=/conary.rpath.com@rpl:devel//1/2.6.22.3-0.1-1 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3851 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3105 https://issues.rpath.com/browse/RPL-1620 https://issues.rpath.com/browse/RPL-1648 https://issues.rpath.com/browse/RPL-1650 Description: Previous versions of the kernel package are vulnerable to a local root privilege escalation if running the X Window System server with DRM enabled on Intel 965 video chipsets. They also inappropriately allow unpriviledged users to send signals to setuid processes that they start, which may in some circumstances allow either denial of service or privilege escalation attacks. This is the first release of the 2.6.22.x kernel for rPath Linux 1, which enables significant additional hardware support. This includes support for new hardware in existing drivers, as well as additional drivers. This update requires a system reboot to implement the fixes. Copyright 2007 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html