LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: kernel 2.4 ptrace vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux The kernel package version 2.4.20-6 has a security hole in ptrace. Using USB CD-ROMs on some ServerWorks systems can hang older versions of the kernel.

---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated 2.4 kernel fixes USB storage
Advisory ID:       RHSA-2003:135-00
Issue date:        2003-04-08
Updated on:        2003-04-08
Product:           Red Hat Linux
Keywords:          ptrace usb storage cdrom bind netdump
Cross references:  RHSA-2003-098
Obsoletes:         
CVE Names:         CAN-2003-0127
---------------------------------------------------------------------

1. Topic:

Updated kernel packages for Red Hat Linux 9 are now available. 
The kernel package version 2.4.20-6 has a security hole in ptrace.
Using USB CD-ROMs on some ServerWorks systems can hang older versions
of the kernel.

2. Relevant releases/architectures:

Red Hat Linux 9 - athlon, i386, i586, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

A vulnerability in ptrace handling has been found in version 2.4.20-6
of the kernel. This vulnerability makes it possible for local users to
gain elevated (root) privileges without authorization. This vulnerability
is fixed in kernel-2.4.20-8 and kernel-2.4.20-9.

Please note this vulnerability only affects Red Hat Linux 9 boxed sets
manufactured for distribution within the United States. The part numbers,
which can be found on the bottom flap of the box, are RHF0120US and
RHF0121US. Copies of Red Hat Linux 9 obtained through other means (such as
from Red Hat Network, FTP, or international boxed sets) already contain
kernel-2.4.20-8 and are therefore not vulnerable to this issue. 

An NPTL support defect in the kernel causes bind not to restart on
uniprocessor systems; this bug has been fixed in kernel-2.4.20-9.

USB mass storage devices (in particular, USB CD-ROMs) and the ohci driver
sometimes causes system hangs; this defect has been fixed.

Additionally, support for the tg3, e100, and e1000 drivers has been added.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To use Red Hat Network to upgrade the kernel, launch the Red Hat Update
Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.  Note that you need to select the
kernel explicitly if you are using the default configuration of up2date.

To install kernel packages manually, use "rpm -ivh " and
modify system settings to boot the kernel you have installed.  To
do this, edit /boot/grub/grub.conf and change the default entry to
"default=0" (or, if you have chosen to use LILO as your boot loader,
edit /etc/lilo.conf and run lilo)

Do not use "rpm -Uvh" as that will remove your running kernel binaries
from your system.  You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

5. RPMs required:

Red Hat Linux 9:

SRPMS: 
ftp://updates.Red Hat.com/9/en/os/SRPMS/kernel-2.4.20-9.src.rpm

athlon: 
ftp://updates.Red Hat.com/9/en/os/athlon/kernel-2.4.20-9.athlon.rpm 
ftp://updates.Red Hat.com/9/en/os/athlon/kernel-smp-2.4.20-9.athlon.rpm

i386: 
ftp://updates.Red Hat.com/9/en/os/i386/kernel-source-2.4.20-9.i386.rpm 
ftp://updates.Red Hat.com/9/en/os/i386/kernel-doc-2.4.20-9.i386.rpm 
ftp://updates.Red Hat.com/9/en/os/i386/kernel-BOOT-2.4.20-9.i386.rpm

i586: 
ftp://updates.Red Hat.com/9/en/os/i586/kernel-2.4.20-9.i586.rpm

i686: 
ftp://updates.Red Hat.com/9/en/os/i686/kernel-2.4.20-9.i686.rpm 
ftp://updates.Red Hat.com/9/en/os/i686/kernel-smp-2.4.20-9.i686.rpm 
ftp://updates.Red Hat.com/9/en/os/i686/kernel-bigmem-2.4.20-9.i686.rpm



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
907a4a6ccd687be8cdb4c38b66d10e67 9/en/os/SRPMS/kernel-2.4.20-9.src.rpm
3cf6f66ef44bd670cacf4768b20f503c 9/en/os/athlon/kernel-2.4.20-9.athlon.rpm
984d637b03b999ec8d09d778acc06c04 9/en/os/athlon/kernel-smp-2.4.20-9.athlon.rpm
18d0088eae5b5f2daf2f3a955f0812e3 9/en/os/i386/kernel-BOOT-2.4.20-9.i386.rpm
b987cbd4bbec07a65ca882e8276f7d96 9/en/os/i386/kernel-doc-2.4.20-9.i386.rpm
153b636ac64f7f52e62f1fba47b0ccf7 9/en/os/i386/kernel-source-2.4.20-9.i386.rpm
7aed26e3c4393f433255e3aa4d0bb409 9/en/os/i586/kernel-2.4.20-9.i586.rpm
c78a4bb56e6acf96375ebb4a646f6826 9/en/os/i686/kernel-2.4.20-9.i686.rpm
0b9ce410c8a3e7639b8a2e82a53abf0e 9/en/os/i686/kernel-bigmem-2.4.20-9.i686.rpm
3ad01acbf3504ef601518e0489d5ce3f 9/en/os/i686/kernel-smp-2.4.20-9.i686.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available at  http://www.Red Hat.com/solutions/security/news/publickey/

You can verify each package with the following command:
    
    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum 


7. References:
 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0127

8. Contact:

The Red Hat security contact is <security@Red Hat.com>.  More contact
details at  http://www.Red Hat.com/solutions/security/news/contact/

Copyright 2003 Red Hat, Inc.



_______________________________________________
Red Hat-watch-list mailing list
To unsubscribe, visit: https://listman.Red Hat.com/mailman/listinfo/Red Hat-watch-list

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hacker Halted 2014: Johnny Long Calls for Hackers for Charity Volunteers
RIPS – Static Source Code Analysis For PHP Vulnerabilities
Finding a Video Poker Bug Made These Guys Rich—Then Vegas Made Them Pay
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.