drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung im Kernel
Name: |
Mangelnde Rechteprüfung im Kernel |
|
ID: |
RHSA-2007:0936-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Do, 27. September 2007, 22:47 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573 |
|
Applikationen: |
Linux |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Important: kernel security update Advisory ID: RHSA-2007:0936-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0936.html Issue date: 2007-09-27 Updated on: 2007-09-27 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-4573 - ---------------------------------------------------------------------
1. Summary:
Updated kernel packages that fix a security issue in the Red Hat Enterprise Linux 5 kernel are now available.
This update has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64
3. Problem description:
The Linux kernel handles the basic functions of the operating system.
A flaw was found in the IA32 system call emulation provided on AMD64 and Intel 64 platforms. An improperly validated 64-bit value could be stored in the %RAX register, which could trigger an out-of-bounds system call table access. An untrusted local user could exploit this flaw to run code in the kernel (ie a root privilege escalation). (CVE-2007-4573).
Red Hat would like to thank Wojciech Purczynski for reporting this issue.
Red Hat Enterprise Linux 5 users are advised to upgrade to these packages, which contain a backported patch to correct this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
294541 - CVE-2007-4573 x86_64 syscall vulnerability
6. RPMs required:
Red Hat Enterprise Linux Desktop (v. 5 client):
SRPMS: kernel-2.6.18-8.1.14.el5.src.rpm e864e7c886ad6bd8a466d601e124d173 kernel-2.6.18-8.1.14.el5.src.rpm
i386: c5708f61da5a1cd657387fd668c09070 kernel-2.6.18-8.1.14.el5.i686.rpm bff45b4bb682aac45063413899a06576 kernel-PAE-2.6.18-8.1.14.el5.i686.rpm f1340a36d2502c69628d3eec6bf3aced kernel-PAE-debuginfo-2.6.18-8.1.14.el5.i686.rpm babeefe626d9cfa77e916def06eebca8 kernel-PAE-devel-2.6.18-8.1.14.el5.i686.rpm 2226da55579693babc8113450571bd74 kernel-debuginfo-2.6.18-8.1.14.el5.i686.rpm 238955fa7b46e9ec95b948c1ec821d3f kernel-debuginfo-common-2.6.18-8.1.14.el5.i686.rpm 5e4a74221dc2d89eb61687483d765da7 kernel-devel-2.6.18-8.1.14.el5.i686.rpm 3a6500224f3247fb02eb15fdf1dcf7fa kernel-headers-2.6.18-8.1.14.el5.i386.rpm 6e6ff28d8bc48e9227bd15e30fe6a222 kernel-xen-2.6.18-8.1.14.el5.i686.rpm 56a014181ae3b33498d7d5422cfc7bcf kernel-xen-debuginfo-2.6.18-8.1.14.el5.i686.rpm 3d8089808868c8848160c50f9836c50d kernel-xen-devel-2.6.18-8.1.14.el5.i686.rpm
noarch: c126057734f1b94f43174a83ab6614a9 kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
x86_64: 768d7dcf7eed6bbf7add28d46237d3e5 kernel-2.6.18-8.1.14.el5.x86_64.rpm 34a96bd8dc10cc9c9d3a78a6ecd2e419 kernel-debuginfo-2.6.18-8.1.14.el5.x86_64.rpm 31fcccdbdca394554da986ab0c942926 kernel-debuginfo-common-2.6.18-8.1.14.el5.x86_64.rpm 181e5913174d98cc4bb0f919ddc770b2 kernel-devel-2.6.18-8.1.14.el5.x86_64.rpm 60bd95d21e87bf5f8b7cd6b2eae982e1 kernel-headers-2.6.18-8.1.14.el5.x86_64.rpm 413f70b178c8374137d3305ea1a4cc36 kernel-xen-2.6.18-8.1.14.el5.x86_64.rpm e7f3adcf9c4a948b9e9468c55eca9f3e kernel-xen-debuginfo-2.6.18-8.1.14.el5.x86_64.rpm 5f7ffa8121bb45510b25110973ff677f kernel-xen-devel-2.6.18-8.1.14.el5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
SRPMS: kernel-2.6.18-8.1.14.el5.src.rpm e864e7c886ad6bd8a466d601e124d173 kernel-2.6.18-8.1.14.el5.src.rpm
i386: c5708f61da5a1cd657387fd668c09070 kernel-2.6.18-8.1.14.el5.i686.rpm bff45b4bb682aac45063413899a06576 kernel-PAE-2.6.18-8.1.14.el5.i686.rpm f1340a36d2502c69628d3eec6bf3aced kernel-PAE-debuginfo-2.6.18-8.1.14.el5.i686.rpm babeefe626d9cfa77e916def06eebca8 kernel-PAE-devel-2.6.18-8.1.14.el5.i686.rpm 2226da55579693babc8113450571bd74 kernel-debuginfo-2.6.18-8.1.14.el5.i686.rpm 238955fa7b46e9ec95b948c1ec821d3f kernel-debuginfo-common-2.6.18-8.1.14.el5.i686.rpm 5e4a74221dc2d89eb61687483d765da7 kernel-devel-2.6.18-8.1.14.el5.i686.rpm 3a6500224f3247fb02eb15fdf1dcf7fa kernel-headers-2.6.18-8.1.14.el5.i386.rpm 6e6ff28d8bc48e9227bd15e30fe6a222 kernel-xen-2.6.18-8.1.14.el5.i686.rpm 56a014181ae3b33498d7d5422cfc7bcf kernel-xen-debuginfo-2.6.18-8.1.14.el5.i686.rpm 3d8089808868c8848160c50f9836c50d kernel-xen-devel-2.6.18-8.1.14.el5.i686.rpm
ia64: 04f3f9061fdd5dd13976ec24d6490f3c kernel-2.6.18-8.1.14.el5.ia64.rpm 0f804d732e7869362216f882c6aeb99c kernel-debuginfo-2.6.18-8.1.14.el5.ia64.rpm 10b8906a5c548a72d59eb171d632e40f kernel-debuginfo-common-2.6.18-8.1.14.el5.ia64.rpm f1ea0fc12a5f524207b352bb2797797b kernel-devel-2.6.18-8.1.14.el5.ia64.rpm bf20f192973330148a4e39fb01ebb2ac kernel-headers-2.6.18-8.1.14.el5.ia64.rpm 043bea776071be0fbec7bfcb2ca26c71 kernel-xen-2.6.18-8.1.14.el5.ia64.rpm 4c031c561f03481f63ee6e0f8a1e1cc5 kernel-xen-debuginfo-2.6.18-8.1.14.el5.ia64.rpm 642a0cc7fb33898b1c8e29c0b3b2144d kernel-xen-devel-2.6.18-8.1.14.el5.ia64.rpm
noarch: c126057734f1b94f43174a83ab6614a9 kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
ppc: fd1014c95cdafb8f2f5821edb8fe3e3e kernel-2.6.18-8.1.14.el5.ppc64.rpm 15688f40cd935515c60a1dfb2d7d01d7 kernel-debuginfo-2.6.18-8.1.14.el5.ppc64.rpm edb244df09f6a0d7a9e4b313622ae8db kernel-debuginfo-common-2.6.18-8.1.14.el5.ppc64.rpm 6f90335fc97510f00d412433d2cac5d6 kernel-devel-2.6.18-8.1.14.el5.ppc64.rpm b198a4254da4be818b65568f43a1d13f kernel-headers-2.6.18-8.1.14.el5.ppc.rpm 912b2826d06f1ec64c5285d210cdcda3 kernel-headers-2.6.18-8.1.14.el5.ppc64.rpm 9bcded50fdf04a34cf068be0205751ba kernel-kdump-2.6.18-8.1.14.el5.ppc64.rpm e10571322f9432ee69237110c74be0a9 kernel-kdump-debuginfo-2.6.18-8.1.14.el5.ppc64.rpm 18c9d8881fb4ac39b9a147f75aec7d8b kernel-kdump-devel-2.6.18-8.1.14.el5.ppc64.rpm
s390x: e9e962c7ef8589a669ff3491bd65d294 kernel-2.6.18-8.1.14.el5.s390x.rpm 6b85cf0a62dd346f3a1d939f44d06964 kernel-debuginfo-2.6.18-8.1.14.el5.s390x.rpm 6c80a98df0f1836c3571d60f05d57a03 kernel-debuginfo-common-2.6.18-8.1.14.el5.s390x.rpm b3a54a09be16b1a727e54364755514f4 kernel-devel-2.6.18-8.1.14.el5.s390x.rpm 5f94fecd0b8622617fb48c49819b97bb kernel-headers-2.6.18-8.1.14.el5.s390x.rpm
x86_64: 768d7dcf7eed6bbf7add28d46237d3e5 kernel-2.6.18-8.1.14.el5.x86_64.rpm 34a96bd8dc10cc9c9d3a78a6ecd2e419 kernel-debuginfo-2.6.18-8.1.14.el5.x86_64.rpm 31fcccdbdca394554da986ab0c942926 kernel-debuginfo-common-2.6.18-8.1.14.el5.x86_64.rpm 181e5913174d98cc4bb0f919ddc770b2 kernel-devel-2.6.18-8.1.14.el5.x86_64.rpm 60bd95d21e87bf5f8b7cd6b2eae982e1 kernel-headers-2.6.18-8.1.14.el5.x86_64.rpm 413f70b178c8374137d3305ea1a4cc36 kernel-xen-2.6.18-8.1.14.el5.x86_64.rpm e7f3adcf9c4a948b9e9468c55eca9f3e kernel-xen-debuginfo-2.6.18-8.1.14.el5.x86_64.rpm 5f7ffa8121bb45510b25110973ff677f kernel-xen-devel-2.6.18-8.1.14.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573 http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFG/BGFXlSAg2UNWIIRAt9NAJ49Vjm0TpqrMauOx7j5i2Cwwjn/FQCgm5CO l4j/K59utB9Q4PDK7v1IgWE= =Tqx8 -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|