LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Red Hat: kernel Multiple vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux Updated kernel packages that fix potential information leaks and a incorrect driver permission for Red Hat Enterprise Linux 2.1 are now available.

Red Hat Security Advisory

Synopsis:          Updated kernel packages fix security issues
Advisory ID:       RHSA-2004:418-01
Issue date:        2004-08-03
Updated on:        2004-08-03
Product:           Red Hat Enterprise Linux
Obsoletes:         RHSA-2004:354
CVE Names:         CAN-2004-0415 CAN-2004-0535 CAN-2004-0587
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages that fix potential information leaks and a
incorrect driver permission for Red Hat Enterprise Linux 2.1 are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

Paul Starzetz discovered flaws in the Linux kernel when handling file
offset pointers.  These consist of invalid conversions of 64 to 32-bit file
offset pointers and possible race conditions.  A local unprivileged user
could make use of these flaws to access large portions of kernel memory. 
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0415 to this issue.

These packages contain a patch written by Al Viro to correct these flaws.
Red Hat would like to thank iSEC Security Research for disclosing this
issue and a number of vendor-sec participants for reviewing and working on
the patch to this issue.

In addition, these packages correct two minor issues:

An bug in the e1000 network driver. This bug could be used by local users
to leak small amounts of kernel memory (CAN-2004-0535).

Inappropriate permissions on /proc/scsi/qla2300/HbaApiNode (CAN-2004-0587).

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to these erratum packages which contain backported patches to correct these
issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed  (http://bugzilla.redhat.com/ for more info):

125170 - CAN-2004-0535 e100e1000 kernel memory leak (x86)
126400 - CAN-2004-0587 Bad permissions on qla* drivers

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.9-e.48.src.rpm
4d90231c550b10a94c3e612fc86bfac4  kernel-2.4.9-e.48.src.rpm

athlon:
32482bbacba7aed44aea420da0ef1418  kernel-2.4.9-e.48.athlon.rpm
675a499b8c0225f35660ef9f0a72ec3d  kernel-smp-2.4.9-e.48.athlon.rpm

i386:
e1b4abb4e387ef87f2ba6428783973f5  kernel-BOOT-2.4.9-e.48.i386.rpm
8c7745b52ed0732e3347a1beb3365cce  kernel-doc-2.4.9-e.48.i386.rpm
1b3c3dab9a7a935c731fd38401ec2a2f  kernel-headers-2.4.9-e.48.i386.rpm
34961632e9384621acd93e6a66d3731a  kernel-source-2.4.9-e.48.i386.rpm

i686:
a3e6271399611b981291df8bcd992717  kernel-2.4.9-e.48.i686.rpm
3383e7a871f2ca6bf291efc571c9f159  kernel-debug-2.4.9-e.48.i686.rpm
5d08fb530d37c1e4bec8222fc6e8430b  kernel-enterprise-2.4.9-e.48.i686.rpm
71a58c709571f8ae8d313cf89d800c03  kernel-smp-2.4.9-e.48.i686.rpm
aa870614772046934a1872fc89908a4b  kernel-summit-2.4.9-e.48.i686.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kernel-2.4.9-e.48.src.rpm
4d90231c550b10a94c3e612fc86bfac4  kernel-2.4.9-e.48.src.rpm

athlon:
32482bbacba7aed44aea420da0ef1418  kernel-2.4.9-e.48.athlon.rpm
675a499b8c0225f35660ef9f0a72ec3d  kernel-smp-2.4.9-e.48.athlon.rpm

i386:
e1b4abb4e387ef87f2ba6428783973f5  kernel-BOOT-2.4.9-e.48.i386.rpm
8c7745b52ed0732e3347a1beb3365cce  kernel-doc-2.4.9-e.48.i386.rpm
1b3c3dab9a7a935c731fd38401ec2a2f  kernel-headers-2.4.9-e.48.i386.rpm
34961632e9384621acd93e6a66d3731a  kernel-source-2.4.9-e.48.i386.rpm

i686:
a3e6271399611b981291df8bcd992717  kernel-2.4.9-e.48.i686.rpm
3383e7a871f2ca6bf291efc571c9f159  kernel-debug-2.4.9-e.48.i686.rpm
71a58c709571f8ae8d313cf89d800c03  kernel-smp-2.4.9-e.48.i686.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kernel-2.4.9-e.48.src.rpm
4d90231c550b10a94c3e612fc86bfac4  kernel-2.4.9-e.48.src.rpm

athlon:
32482bbacba7aed44aea420da0ef1418  kernel-2.4.9-e.48.athlon.rpm
675a499b8c0225f35660ef9f0a72ec3d  kernel-smp-2.4.9-e.48.athlon.rpm

i386:
e1b4abb4e387ef87f2ba6428783973f5  kernel-BOOT-2.4.9-e.48.i386.rpm
8c7745b52ed0732e3347a1beb3365cce  kernel-doc-2.4.9-e.48.i386.rpm
1b3c3dab9a7a935c731fd38401ec2a2f  kernel-headers-2.4.9-e.48.i386.rpm
34961632e9384621acd93e6a66d3731a  kernel-source-2.4.9-e.48.i386.rpm

i686:
a3e6271399611b981291df8bcd992717  kernel-2.4.9-e.48.i686.rpm
3383e7a871f2ca6bf291efc571c9f159  kernel-debug-2.4.9-e.48.i686.rpm
5d08fb530d37c1e4bec8222fc6e8430b  kernel-enterprise-2.4.9-e.48.i686.rpm
71a58c709571f8ae8d313cf89d800c03  kernel-smp-2.4.9-e.48.i686.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:
 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0415 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0535 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0587

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.