[<prev] [next>] [day] [month] [year] [list]
Message-ID: <42A20104.2030801@videotron.ca>
Date: Sat Jun 4 20:28:56 2005
From: marcdeslauriers at videotron.ca (Marc Deslauriers)
Subject: [FLSA-2005:152532] Updated kernel packages fix
security issues
---------------------------------------------------------------------
Fedora Legacy Update Advisory
Synopsis: Updated kernel packages fix security issues
Advisory ID: FLSA:152532
Issue date: 2005-06-04
Product: Red Hat Linux, Fedora Core
Keywords: Bugfix
CVE Names: CAN-2004-1058 CAN-2004-1333 CAN-2005-0384
CAN-2005-0400 CAN-2005-0449 CAN-2005-0504
CAN-2005-0749 CAN-2005-0750 CAN-2005-0815
---------------------------------------------------------------------
---------------------------------------------------------------------
1. Topic:
Updated kernel packages that fix several security issues are now
available.
The Linux kernel handles the basic functions of the operating system.
2. Relevant releases/architectures:
Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386
3. Problem description:
This update includes fixes for several security issues:
A race condition was discovered. Local users could use this flaw to read
the environment variables of another process that is still spawning via
/proc/.../cmdline. (CAN-2004-1058)
An integer overflow was discovered in the vc_resize function. A local
user could cause a denial of service (kernel crash) via a short new
screen value, which leads to a buffer overflow. (CAN-2004-1333)
A flaw was discovered in the Linux PPP driver. On systems allowing
remote users to connect to a server using ppp, a remote client could
cause a denial of service (system crash). (CAN-2005-0384)
A flaw was discovered in ext2 filesystem support. When a new directory
is created, the ext2 block written to disk is not initialized, leading
to an information leak. (CAN-2005-0400)
A flaw in fragment queuing was discovered affecting the netfilter
subsystem. On systems configured to filter or process network packets
(for example those configured to do firewalling), a remote attacker
could send a carefully crafted set of fragmented packets to a machine
and cause a denial of service (system crash). In order to sucessfully
exploit this flaw, the attacker would need to know (or guess) some
aspects of the firewall ruleset in place on the target system to be able
to craft the right fragmented packets. (CAN-2005-0449)
The moxa char driver was missing a CAP_SYS_RAWIO check which could allow
a local user the ability to do things like replace the firmware.
(CAN-2005-0504)
A flaw when freeing a pointer in load_elf_library was discovered. A
local user could potentially use this flaw to cause a denial of service
(system crash). (CAN-2005-0749)
A flaw was discovered in the bluetooth driver system. On system where
the bluetooth modules are loaded, a local user could use this flaw to
gain elevated (root) privileges. (CAN-2005-0750)
Michal Zalewski discovered some flaws in the iso9660 filesystem. These
flaws could allow a malicious iso filesystem to cause a DoS or
potentially execute arbitrary code if mounted/examined. (CAN-2005-0815)
All users are advised to upgrade their kernels to the packages
associated with their machine architectures and configurations as listed
in this erratum.
Please note that the fix for CAN-2005-0449 required changing the
external symbol linkages (kernel module ABI) for the ip_defrag()
and ip_ct_gather_frags() functions. Any third-party module using either
of these would also need to be fixed.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To install kernel packages manually, use "rpm -ivh <package>" and modify
system settings to boot the kernel you have installed. To do this, edit
/boot/grub/grub.conf and change the default entry to "default=0" (or, if
you have chosen to use LILO as your boot loader, edit /etc/lilo.conf and
run lilo)
Please note that this update is also available via yum and apt. Many
people find this an easier way to apply updates. To use yum issue:
yum update
or to use apt:
apt-get update; apt-get upgrade
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system. This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.
Note that this may not automatically pull the new kernel in if you have
configured apt/yum to ignore kernels. If so, follow the manual
instructions above.
5. Bug IDs fixed:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
6. RPMs required:
Red Hat Linux 7.3:
SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/kernel-2.4.20-43.7.legacy.src.rpm
i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-BOOT-2.4.20-43.7.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-doc-2.4.20-43.7.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-source-2.4.20-43.7.legacy.i386.rpm
i586:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i586.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.i586.rpm
i686:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i686.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-bigmem-2.4.20-43.7.legacy.i686.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.i686.rpm
athlon:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.athlon.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.athlon.rpm
Red Hat Linux 9:
SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/kernel-2.4.20-43.9.legacy.src.rpm
i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-BOOT-2.4.20-43.9.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-doc-2.4.20-43.9.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-source-2.4.20-43.9.legacy.i386.rpm
i586:
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i586.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.i586.rpm
i686:
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i686.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-bigmem-2.4.20-43.9.legacy.i686.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.i686.rpm
athlon:
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.athlon.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.athlon.rpm
Fedora Core 1:
SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/kernel-2.4.22-1.2199.5.legacy.nptl.src.rpm
i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-BOOT-2.4.22-1.2199.5.legacy.nptl.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-doc-2.4.22-1.2199.5.legacy.nptl.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-source-2.4.22-1.2199.5.legacy.nptl.i386.rpm
i586:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i586.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i586.rpm
i686:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i686.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i686.rpm
athlon:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
7. Verification:
SHA1 sum Package Name
---------------------------------------------------------------------
33794472a5fa20539f29eb7cc4a1d2e6ce769b06
redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.athlon.rpm
230a9443c30eb7d9733c16568a4d937ea2276bd4
redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i386.rpm
17d0026c8cf717ed74be70b25b13da6063ec7e30
redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i586.rpm
5dc8f0385fd068bd2274337989faebc7c6ec1726
redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i686.rpm
f286d3c08cf28c9c4a20c950d2eb795c5b5737ff
redhat/7.3/updates/i386/kernel-bigmem-2.4.20-43.7.legacy.i686.rpm
ddb00a518b2426230fe5e1da5e115691e39f09c8
redhat/7.3/updates/i386/kernel-BOOT-2.4.20-43.7.legacy.i386.rpm
904f2b51aaed8aa96583b7e2bd40365b75cb6faa
redhat/7.3/updates/i386/kernel-doc-2.4.20-43.7.legacy.i386.rpm
b332b272d0a4854af3131693708c05f39797e9af
redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.athlon.rpm
933b9cb0ca14334c320c7458f61a700a8e002abd
redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.i586.rpm
95339a7d9b57381d6a967d7fa0c70675b1c2e34a
redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.i686.rpm
c054c08870c77ce47030511ebfc35566fcd216f5
redhat/7.3/updates/i386/kernel-source-2.4.20-43.7.legacy.i386.rpm
c7b8495a1c84cdcf22bf99748e1346614777cdba
redhat/7.3/updates/SRPMS/kernel-2.4.20-43.7.legacy.src.rpm
06664b11750a20c552ef4f9f391976429335516e
redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.athlon.rpm
523c7336e869cc3aac6356b838eb3e7458f7b471
redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i386.rpm
66a5186361dcdb4cb4c8c1dccb63e56d11a14f58
redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i586.rpm
a138ce79569e85745c9cc2e352ec03c32d048de5
redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i686.rpm
e595403bc87b08c1dd4090de032bf7d9b4400a67
redhat/9/updates/i386/kernel-bigmem-2.4.20-43.9.legacy.i686.rpm
ec99c85958ab259128855cc1b0be74c83e6e3f0e
redhat/9/updates/i386/kernel-BOOT-2.4.20-43.9.legacy.i386.rpm
536fa79aa0a5f02e9f8b54c5c88e5a429dbdb114
redhat/9/updates/i386/kernel-doc-2.4.20-43.9.legacy.i386.rpm
b16cc40913f423d5c8adbcf755c07621d42b1df0
redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.athlon.rpm
8db2f89803e02ee40af386e192813c3441d9ef12
redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.i586.rpm
9665eda39738126699e2e999c5563e47826270c8
redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.i686.rpm
6a61f8971a1ba0f51399956aed24789065ece2b4
redhat/9/updates/i386/kernel-source-2.4.20-43.9.legacy.i386.rpm
35d0fc7714b2c0274b6af35996c26335ea8d3555
redhat/9/updates/SRPMS/kernel-2.4.20-43.9.legacy.src.rpm
e1dd5d1ee6ba69871dd06ce679734eadf5c4c9ed
fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
23a4afe07cd72f23b429730c32f88f5fe92e8f6f
fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i586.rpm
5da916582b12a4625e54eb0cfb3d200dbeb5360b
fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i686.rpm
fbdf463056180fd41abe4d8afc165d187163390d
fedora/1/updates/i386/kernel-BOOT-2.4.22-1.2199.5.legacy.nptl.i386.rpm
03298f9d3057661b2912fefa73cde94c42d2377e
fedora/1/updates/i386/kernel-doc-2.4.22-1.2199.5.legacy.nptl.i386.rpm
2419d19c66420c55a50ca82d0ef41aaab7992136
fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
8dcd88461c7922a07b7c1bad054b480a997828ea
fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i586.rpm
c95bddfc477c11c46d562c3bd28f407ebdcd8ae3
fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i686.rpm
0fe3402917235049865cedc80ad5eb72c1984df2
fedora/1/updates/i386/kernel-source-2.4.22-1.2199.5.legacy.nptl.i386.rpm
cfb0d7b297116b99ef08a30d7d9fef0c9e24a490
fedora/1/updates/SRPMS/kernel-2.4.22-1.2199.5.legacy.nptl.src.rpm
These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy.org/about/security.php
You can verify each package with the following command:
rpm --checksig -v <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:
sha1sum <filename>
8. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0815
9. Contact:
The Fedora Legacy security contact is <secnotice@...oralegacy.org>. More
project details at http://www.fedoralegacy.org
---------------------------------------------------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 251 bytes
Desc: OpenPGP digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050604/cf2527ab/signature.bin
Powered by blists - more mailing lists