-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Important: kernel security update Advisory ID: RHSA-2006:0101-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0101.html Issue date: 2006-01-17 Updated on: 2006-01-17 Product: Red Hat Enterprise Linux Obsoletes: RHSA-2005:808 CVE Names: CVE-2002-2185 CVE-2004-1190 CVE-2005-2458 CVE-2005-2709 CVE-2005-2800 CVE-2005-3044 CVE-2005-3106 CVE-2005-3109 CVE-2005-3276 CVE-2005-3356 CVE-2005-3358 CVE-2005-3784 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 - ---------------------------------------------------------------------
1. Summary:
Updated kernel packages that fix several security issues in the Red Hat Enterprise Linux 4 kernel are now available.
This security advisory has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64
3. Problem description:
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described below:
- - a flaw in network IGMP processing that a allowed a remote user on the local network to cause a denial of service (disabling of multicast reports) if the system is running multicast applications (CVE-2002-2185, moderate)
- - a flaw which allowed a local user to write to firmware on read-only opened /dev/cdrom devices (CVE-2004-1190, moderate)
- - a flaw in gzip/zlib handling internal to the kernel that may allow a local user to cause a denial of service (crash) (CVE-2005-2458, low)
- - a flaw in procfs handling during unloading of modules that allowed a local user to cause a denial of service or potentially gain privileges (CVE-2005-2709, moderate)
- - a flaw in the SCSI procfs interface that allowed a local user to cause a denial of service (crash) (CVE-2005-2800, moderate)
- - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed a local user to cause a denial of service (crash) (CVE-2005-3044, important)
- - a race condition when threads share memory mapping that allowed local users to cause a denial of service (deadlock) (CVE-2005-3106, important)
- - a flaw when trying to mount a non-hfsplus filesystem using hfsplus that allowed local users to cause a denial of service (crash) (CVE-2005-3109, moderate)
- - a minor info leak with the get_thread_area() syscall that allowed a local user to view uninitialized kernel stack data (CVE-2005-3276, low)
- - a flaw in mq_open system call that allowed a local user to cause a denial of service (crash) (CVE-2005-3356, important)
- - a flaw in set_mempolicy that allowed a local user on some 64-bit architectures to cause a denial of service (crash) (CVE-2005-3358, important)
- - a flaw in the auto-reap of child processes that allowed a local user to cause a denial of service (crash) (CVE-2005-3784, important)
- - a flaw in the IPv6 flowlabel code that allowed a local user to cause a denial of service (crash) (CVE-2005-3806, important)
- - a flaw in network ICMP processing that allowed a local user to cause a denial of service (memory exhaustion) (CVE-2005-3848, important)
- - a flaw in file lease time-out handling that allowed a local user to cause a denial of service (log file overflow) (CVE-2005-3857, moderate)
- - a flaw in network IPv6 xfrm handling that allowed a local user to cause a denial of service (memory exhaustion) (CVE-2005-3858, important)
- - a flaw in procfs handling that allowed a local user to read kernel memory (CVE-2005-4605, important)
All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
158861 - CVE-2004-1190 Continued raw access issues 165679 - CVE-2005-2458 gzip/zlib flaws 167696 - CVE-2005-2800 SCSI proc DoS 168659 - CVE-2005-3044 lost fput and sockfd_put could lead to DoS 168777 - CVE-2005-3276 sys_get_thread_area minor info leak 168924 - CVE-2005-2709 More sysctl flaws 169130 - CVE-2005-3356 double decrement of mqueue_mnt->mnt_count in sys_mq_open 170262 - CVE-2005-3106 exec_mmap race DoS 171002 - CVE-2005-3109 HFS oops 174078 - [RHEL4] CVE-2005-3784 auto-reap DoS 174081 - CVE-2005-3806 ipv6 DOS 174337 - [RHEL4] CVE-2005-3857 lease printk DoS 174343 - CVE-2005-3858 ip6_input_finish DoS 174345 - CVE-2005-3848 dst_entry leak DoS 174807 - CVE-2002-2185 IGMP DoS 175683 - CVE-2005-3358 panic caused by bad args to set_mempolicy 176812 - CVE-2005-4605 Kernel memory disclosure
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: kernel-2.6.9-22.0.2.EL.src.rpm b50fbbd12e29a3ca1bfa7b4310fdc18d kernel-2.6.9-22.0.2.EL.src.rpm
i386: a9054fd42cd3105a673f2066caf4de15 kernel-2.6.9-22.0.2.EL.i686.rpm e3a7fef199a480936043131ca10945e1 kernel-devel-2.6.9-22.0.2.EL.i686.rpm 0e26e14f1de7f0e8d39ac918af2a8494 kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm dcb79758906cc2ba683d5b1beadf6db1 kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm e66a773b0425948807df2369519c8416 kernel-smp-2.6.9-22.0.2.EL.i686.rpm 52aef02b73f55f9a28308713e3cad221 kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm
ia64: 2567e86652683fc131d6298a9466d9f4 kernel-2.6.9-22.0.2.EL.ia64.rpm 15bfd72b79b20e2d90fd47fbf68deda0 kernel-devel-2.6.9-22.0.2.EL.ia64.rpm
noarch: bb0a0d5917b0d63d9c683a7f33e519a9 kernel-doc-2.6.9-22.0.2.EL.noarch.rpm
ppc: 68686b0f7065d72e01090af2c3c12413 kernel-2.6.9-22.0.2.EL.ppc64.rpm 1220c56733452c55c87ae7a7fc6da952 kernel-2.6.9-22.0.2.EL.ppc64iseries.rpm 6d50c9ead773ce1b5a033ef794107dd0 kernel-devel-2.6.9-22.0.2.EL.ppc64.rpm edd38da55bca79d91268ccb39dc001e3 kernel-devel-2.6.9-22.0.2.EL.ppc64iseries.rpm
s390: fd2526e4e7fdac29d15a836554d18002 kernel-2.6.9-22.0.2.EL.s390.rpm 55e50f39b2cae60dae41c19187513f85 kernel-devel-2.6.9-22.0.2.EL.s390.rpm
s390x: 94ffb16f720bd5e58c7ed16af7b8ad6c kernel-2.6.9-22.0.2.EL.s390x.rpm f05df19613aab4d3a3efbc04c83632c2 kernel-devel-2.6.9-22.0.2.EL.s390x.rpm
x86_64: aa26a1be88624b4dd72b21878d051f2c kernel-2.6.9-22.0.2.EL.x86_64.rpm 2bdb46d99ab6ec0a7e2cb40c27caf557 kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm e9cdbe981b52ec9f3cf52e6e48c4f99c kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm 1397c66c010c457c5d9203f5af6eb410 kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: kernel-2.6.9-22.0.2.EL.src.rpm b50fbbd12e29a3ca1bfa7b4310fdc18d kernel-2.6.9-22.0.2.EL.src.rpm
i386: a9054fd42cd3105a673f2066caf4de15 kernel-2.6.9-22.0.2.EL.i686.rpm e3a7fef199a480936043131ca10945e1 kernel-devel-2.6.9-22.0.2.EL.i686.rpm 0e26e14f1de7f0e8d39ac918af2a8494 kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm dcb79758906cc2ba683d5b1beadf6db1 kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm e66a773b0425948807df2369519c8416 kernel-smp-2.6.9-22.0.2.EL.i686.rpm 52aef02b73f55f9a28308713e3cad221 kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm
noarch: bb0a0d5917b0d63d9c683a7f33e519a9 kernel-doc-2.6.9-22.0.2.EL.noarch.rpm
x86_64: aa26a1be88624b4dd72b21878d051f2c kernel-2.6.9-22.0.2.EL.x86_64.rpm 2bdb46d99ab6ec0a7e2cb40c27caf557 kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm e9cdbe981b52ec9f3cf52e6e48c4f99c kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm 1397c66c010c457c5d9203f5af6eb410 kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: kernel-2.6.9-22.0.2.EL.src.rpm b50fbbd12e29a3ca1bfa7b4310fdc18d kernel-2.6.9-22.0.2.EL.src.rpm
i386: a9054fd42cd3105a673f2066caf4de15 kernel-2.6.9-22.0.2.EL.i686.rpm e3a7fef199a480936043131ca10945e1 kernel-devel-2.6.9-22.0.2.EL.i686.rpm 0e26e14f1de7f0e8d39ac918af2a8494 kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm dcb79758906cc2ba683d5b1beadf6db1 kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm e66a773b0425948807df2369519c8416 kernel-smp-2.6.9-22.0.2.EL.i686.rpm 52aef02b73f55f9a28308713e3cad221 kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm
ia64: 2567e86652683fc131d6298a9466d9f4 kernel-2.6.9-22.0.2.EL.ia64.rpm 15bfd72b79b20e2d90fd47fbf68deda0 kernel-devel-2.6.9-22.0.2.EL.ia64.rpm
noarch: bb0a0d5917b0d63d9c683a7f33e519a9 kernel-doc-2.6.9-22.0.2.EL.noarch.rpm
x86_64: aa26a1be88624b4dd72b21878d051f2c kernel-2.6.9-22.0.2.EL.x86_64.rpm 2bdb46d99ab6ec0a7e2cb40c27caf557 kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm e9cdbe981b52ec9f3cf52e6e48c4f99c kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm 1397c66c010c457c5d9203f5af6eb410 kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: kernel-2.6.9-22.0.2.EL.src.rpm b50fbbd12e29a3ca1bfa7b4310fdc18d kernel-2.6.9-22.0.2.EL.src.rpm
i386: a9054fd42cd3105a673f2066caf4de15 kernel-2.6.9-22.0.2.EL.i686.rpm e3a7fef199a480936043131ca10945e1 kernel-devel-2.6.9-22.0.2.EL.i686.rpm 0e26e14f1de7f0e8d39ac918af2a8494 kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm dcb79758906cc2ba683d5b1beadf6db1 kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm e66a773b0425948807df2369519c8416 kernel-smp-2.6.9-22.0.2.EL.i686.rpm 52aef02b73f55f9a28308713e3cad221 kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm
ia64: 2567e86652683fc131d6298a9466d9f4 kernel-2.6.9-22.0.2.EL.ia64.rpm 15bfd72b79b20e2d90fd47fbf68deda0 kernel-devel-2.6.9-22.0.2.EL.ia64.rpm
noarch: bb0a0d5917b0d63d9c683a7f33e519a9 kernel-doc-2.6.9-22.0.2.EL.noarch.rpm
x86_64: aa26a1be88624b4dd72b21878d051f2c kernel-2.6.9-22.0.2.EL.x86_64.rpm 2bdb46d99ab6ec0a7e2cb40c27caf557 kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm e9cdbe981b52ec9f3cf52e6e48c4f99c kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm 1397c66c010c457c5d9203f5af6eb410 kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2185 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1190 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2709 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3106 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3109 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3356 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3358 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3857 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4605
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFDzLDtXlSAg2UNWIIRAsr6AJ9sA/JCRnGWQt/GWuOMXb+vgkUZhACggde5 ySCTmyGqid+L88n3jiy1k3s= =4vhW -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|