LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 19th, 2014
Linux Security Week: September 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Important: kernel security update Print E-mail
User Rating:      How can I rate this item?
Posted by Pax Dickinson   
RedHat Linux Updated kernel packages that fix several security issues in the Red Hat Enterprise Linux 4 kernel are now available. This security advisory has been rated as having important security impact by the Red Hat Security Response Team.

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: kernel security update
Advisory ID: RHSA-2006:0101-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0101.html
Issue date: 2006-01-17
Updated on: 2006-01-17
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2005:808
CVE Names: CVE-2002-2185 CVE-2004-1190 CVE-2005-2458 CVE-2005-2709 
CVE-2005-2800 CVE-2005-3044 CVE-2005-3106 CVE-2005-3109 CVE-2005-3276
CVE-2005-3356 CVE-2005-3358 CVE-2005-3784 CVE-2005-3806 CVE-2005-3848
CVE-2005-3857 CVE-2005-3858 CVE-2005-4605
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available.

This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues
described below:

- - a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)

- - a flaw which allowed a local user to write to firmware on read-only
opened /dev/cdrom devices (CVE-2004-1190, moderate)

- - a flaw in gzip/zlib handling internal to the kernel that may allow a
local user to cause a denial of service (crash) (CVE-2005-2458, low)

- - a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)

- - a flaw in the SCSI procfs interface that allowed a local user to cause a
denial of service (crash) (CVE-2005-2800, moderate)

- - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed
a local user to cause a denial of service (crash) (CVE-2005-3044, important)

- - a race condition when threads share memory mapping that allowed local
users to cause a denial of service (deadlock) (CVE-2005-3106, important)

- - a flaw when trying to mount a non-hfsplus filesystem using hfsplus that
allowed local users to cause a denial of service (crash) (CVE-2005-3109,
moderate)

- - a minor info leak with the get_thread_area() syscall that allowed
a local user to view uninitialized kernel stack data (CVE-2005-3276, low)

- - a flaw in mq_open system call that allowed a local user to cause a denial
of service (crash) (CVE-2005-3356, important)

- - a flaw in set_mempolicy that allowed a local user on some 64-bit
architectures to cause a denial of service (crash) (CVE-2005-3358, important)

- - a flaw in the auto-reap of child processes that allowed a local user to
cause a denial of service (crash) (CVE-2005-3784, important)

- - a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)

- - a flaw in network ICMP processing that allowed a local user to cause
a denial of service (memory exhaustion) (CVE-2005-3848, important)

- - a flaw in file lease time-out handling that allowed a local user to cause
a denial of service (log file overflow) (CVE-2005-3857, moderate)

- - a flaw in network IPv6 xfrm handling that allowed a local user to
cause a denial of service (memory exhaustion) (CVE-2005-3858, important)

- - a flaw in procfs handling that allowed a local user to read kernel memory
(CVE-2005-4605, important)

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

158861 - CVE-2004-1190 Continued raw access issues
165679 - CVE-2005-2458 gzip/zlib flaws
167696 - CVE-2005-2800 SCSI proc DoS
168659 - CVE-2005-3044 lost fput and sockfd_put could lead to DoS
168777 - CVE-2005-3276 sys_get_thread_area minor info leak
168924 - CVE-2005-2709 More sysctl flaws
169130 - CVE-2005-3356 double decrement of mqueue_mnt->mnt_count in sys_mq_open
170262 - CVE-2005-3106 exec_mmap race DoS
171002 - CVE-2005-3109 HFS oops
174078 - [RHEL4] CVE-2005-3784 auto-reap DoS
174081 - CVE-2005-3806 ipv6 DOS
174337 - [RHEL4] CVE-2005-3857 lease printk DoS
174343 - CVE-2005-3858 ip6_input_finish DoS
174345 - CVE-2005-3848 dst_entry leak DoS
174807 - CVE-2002-2185 IGMP DoS
175683 - CVE-2005-3358 panic caused by bad args to set_mempolicy
176812 - CVE-2005-4605 Kernel memory disclosure


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-22.0.2.EL.src.rpm
b50fbbd12e29a3ca1bfa7b4310fdc18d kernel-2.6.9-22.0.2.EL.src.rpm

i386:
a9054fd42cd3105a673f2066caf4de15 kernel-2.6.9-22.0.2.EL.i686.rpm
e3a7fef199a480936043131ca10945e1 kernel-devel-2.6.9-22.0.2.EL.i686.rpm
0e26e14f1de7f0e8d39ac918af2a8494 kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm
dcb79758906cc2ba683d5b1beadf6db1 kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm
e66a773b0425948807df2369519c8416 kernel-smp-2.6.9-22.0.2.EL.i686.rpm
52aef02b73f55f9a28308713e3cad221 kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm

ia64:
2567e86652683fc131d6298a9466d9f4 kernel-2.6.9-22.0.2.EL.ia64.rpm
15bfd72b79b20e2d90fd47fbf68deda0 kernel-devel-2.6.9-22.0.2.EL.ia64.rpm

noarch:
bb0a0d5917b0d63d9c683a7f33e519a9 kernel-doc-2.6.9-22.0.2.EL.noarch.rpm

ppc:
68686b0f7065d72e01090af2c3c12413 kernel-2.6.9-22.0.2.EL.ppc64.rpm
1220c56733452c55c87ae7a7fc6da952 kernel-2.6.9-22.0.2.EL.ppc64iseries.rpm
6d50c9ead773ce1b5a033ef794107dd0 kernel-devel-2.6.9-22.0.2.EL.ppc64.rpm
edd38da55bca79d91268ccb39dc001e3 kernel-devel-2.6.9-22.0.2.EL.ppc64iseries.rpm

s390:
fd2526e4e7fdac29d15a836554d18002 kernel-2.6.9-22.0.2.EL.s390.rpm
55e50f39b2cae60dae41c19187513f85 kernel-devel-2.6.9-22.0.2.EL.s390.rpm

s390x:
94ffb16f720bd5e58c7ed16af7b8ad6c kernel-2.6.9-22.0.2.EL.s390x.rpm
f05df19613aab4d3a3efbc04c83632c2 kernel-devel-2.6.9-22.0.2.EL.s390x.rpm

x86_64:
aa26a1be88624b4dd72b21878d051f2c kernel-2.6.9-22.0.2.EL.x86_64.rpm
2bdb46d99ab6ec0a7e2cb40c27caf557 kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm
e9cdbe981b52ec9f3cf52e6e48c4f99c kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm
1397c66c010c457c5d9203f5af6eb410 kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-22.0.2.EL.src.rpm
b50fbbd12e29a3ca1bfa7b4310fdc18d kernel-2.6.9-22.0.2.EL.src.rpm

i386:
a9054fd42cd3105a673f2066caf4de15 kernel-2.6.9-22.0.2.EL.i686.rpm
e3a7fef199a480936043131ca10945e1 kernel-devel-2.6.9-22.0.2.EL.i686.rpm
0e26e14f1de7f0e8d39ac918af2a8494 kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm
dcb79758906cc2ba683d5b1beadf6db1 kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm
e66a773b0425948807df2369519c8416 kernel-smp-2.6.9-22.0.2.EL.i686.rpm
52aef02b73f55f9a28308713e3cad221 kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm

noarch:
bb0a0d5917b0d63d9c683a7f33e519a9 kernel-doc-2.6.9-22.0.2.EL.noarch.rpm

x86_64:
aa26a1be88624b4dd72b21878d051f2c kernel-2.6.9-22.0.2.EL.x86_64.rpm
2bdb46d99ab6ec0a7e2cb40c27caf557 kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm
e9cdbe981b52ec9f3cf52e6e48c4f99c kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm
1397c66c010c457c5d9203f5af6eb410 kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-22.0.2.EL.src.rpm
b50fbbd12e29a3ca1bfa7b4310fdc18d kernel-2.6.9-22.0.2.EL.src.rpm

i386:
a9054fd42cd3105a673f2066caf4de15 kernel-2.6.9-22.0.2.EL.i686.rpm
e3a7fef199a480936043131ca10945e1 kernel-devel-2.6.9-22.0.2.EL.i686.rpm
0e26e14f1de7f0e8d39ac918af2a8494 kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm
dcb79758906cc2ba683d5b1beadf6db1 kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm
e66a773b0425948807df2369519c8416 kernel-smp-2.6.9-22.0.2.EL.i686.rpm
52aef02b73f55f9a28308713e3cad221 kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm

ia64:
2567e86652683fc131d6298a9466d9f4 kernel-2.6.9-22.0.2.EL.ia64.rpm
15bfd72b79b20e2d90fd47fbf68deda0 kernel-devel-2.6.9-22.0.2.EL.ia64.rpm

noarch:
bb0a0d5917b0d63d9c683a7f33e519a9 kernel-doc-2.6.9-22.0.2.EL.noarch.rpm

x86_64:
aa26a1be88624b4dd72b21878d051f2c kernel-2.6.9-22.0.2.EL.x86_64.rpm
2bdb46d99ab6ec0a7e2cb40c27caf557 kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm
e9cdbe981b52ec9f3cf52e6e48c4f99c kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm
1397c66c010c457c5d9203f5af6eb410 kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-22.0.2.EL.src.rpm
b50fbbd12e29a3ca1bfa7b4310fdc18d kernel-2.6.9-22.0.2.EL.src.rpm

i386:
a9054fd42cd3105a673f2066caf4de15 kernel-2.6.9-22.0.2.EL.i686.rpm
e3a7fef199a480936043131ca10945e1 kernel-devel-2.6.9-22.0.2.EL.i686.rpm
0e26e14f1de7f0e8d39ac918af2a8494 kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm
dcb79758906cc2ba683d5b1beadf6db1 kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm
e66a773b0425948807df2369519c8416 kernel-smp-2.6.9-22.0.2.EL.i686.rpm
52aef02b73f55f9a28308713e3cad221 kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm

ia64:
2567e86652683fc131d6298a9466d9f4 kernel-2.6.9-22.0.2.EL.ia64.rpm
15bfd72b79b20e2d90fd47fbf68deda0 kernel-devel-2.6.9-22.0.2.EL.ia64.rpm

noarch:
bb0a0d5917b0d63d9c683a7f33e519a9 kernel-doc-2.6.9-22.0.2.EL.noarch.rpm

x86_64:
aa26a1be88624b4dd72b21878d051f2c kernel-2.6.9-22.0.2.EL.x86_64.rpm
2bdb46d99ab6ec0a7e2cb40c27caf557 kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm
e9cdbe981b52ec9f3cf52e6e48c4f99c kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm
1397c66c010c457c5d9203f5af6eb410 kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4605

8. Contact:

The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc. 
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Encryption goof fixed in TorrentLocker file-locking malware
Qubes: The Open Source OS Built for Security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.