drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme im Kernel
Name: |
Mehrere Probleme im Kernel |
|
ID: |
RHSA-2007:0993-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Do, 29. November 2007, 16:57 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5494 |
|
Applikationen: |
Linux |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Important: kernel security update Advisory ID: RHSA-2007:0993-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0993.html Issue date: 2007-11-29 Updated on: 2007-11-29 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-4571 CVE-2007-4997 CVE-2007-5494 - ---------------------------------------------------------------------
1. Summary:
Updated kernel packages that fix various security issues in the Red Hat Enterprise Linux 5 kernel are now available.
This update has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64
3. Problem description:
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the following security issues:
A memory leak was found in the Red Hat Content Accelerator kernel patch. A local user could use this flaw to cause a denial of service (memory exhaustion). (CVE-2007-5494, Important)
A flaw was found in the handling of IEEE 802.11 frames affecting several wireless LAN modules. In certain circumstances, a remote attacker could trigger this flaw by sending a malicious packet over a wireless network and cause a denial of service (kernel crash). (CVE-2007-4997, Important).
A flaw was found in the Advanced Linux Sound Architecture (ALSA). A local user who had the ability to read the /proc/driver/snd-page-alloc file could see portions of kernel memory. (CVE-2007-4571, Moderate).
In addition to the security issues described above, several bug fixes preventing possible memory corruption, system crashes, SCSI I/O fails, networking drivers performance regression and journaling block device layer issue were also included.
Red Hat Enterprise Linux 5 users are advised to upgrade to these packages, which contain backported patches to resolve these issues.
Red Hat would like to credit Vasily Averin, Chris Evans, and Neil Kettle for reporting the security issues corrected by this update.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
288961 - CVE-2007-4571 ALSA memory disclosure flaw 305011 - [RHEL 5.1.z]: Tick divider bugs on x86_64 315051 - CVE-2007-5494 open(O_ATOMICLOOKUP) leaks dentry 345141 - [PATCH] jbd: wait for already submitted t_sync_datalist buffer to complete (Possibility of in-place data destruction) 345151 - LSPP: audit rule causes kernel 'out of memory' condition and auditd failure 345161 - [EL5][BUG] Unexpected SIGILL on NFS/Montecito(ia64) 345171 - task->mm or slab corruption with CIFS 346341 - CVE-2007-4997 kernel ieee80211 off-by-two integer underflow 381001 - LSPP: audit enable not picking up all processes 381021 - [Broadcom 5.1.z bug] Performance regression on 5705 TG3 NICs 381101 - LTC35628-kexec/kdump kernel hung on Power5+ and Power6 based systems 381121 - LTC38135-vSCSI client reports 'Device sdX not ready' after deactive/active device on vSCSI server 381131 - forcedeth driver mishandles MSI interrupts under high load
6. RPMs required:
Red Hat Enterprise Linux Desktop (v. 5 client):
SRPMS: kernel-2.6.18-53.1.4.el5.src.rpm f4ddc1c32090e95051a82221882f7f07 kernel-2.6.18-53.1.4.el5.src.rpm
i386: 7db3e79c57682e6ccd52808899b615df kernel-2.6.18-53.1.4.el5.i686.rpm 3c710dd56c71e05a719254eabe5bef4e kernel-PAE-2.6.18-53.1.4.el5.i686.rpm f7abc5aa783e93096d38c54b59c090d2 kernel-PAE-debuginfo-2.6.18-53.1.4.el5.i686.rpm dc530282b624ccba683f4b181a6f3a07 kernel-PAE-devel-2.6.18-53.1.4.el5.i686.rpm f18ab8596f0de5f8aec9c5c06aa0772c kernel-debug-2.6.18-53.1.4.el5.i686.rpm 78fb69f9be4c5e3376ef657578bcbf3b kernel-debug-debuginfo-2.6.18-53.1.4.el5.i686.rpm 9e7dabd8afecabf2d81b7244e248d085 kernel-debug-devel-2.6.18-53.1.4.el5.i686.rpm 8ced8998555bd4ca582718aa4de6491a kernel-debuginfo-2.6.18-53.1.4.el5.i686.rpm 82cb46f9d27253be25240cdae5303f48 kernel-debuginfo-common-2.6.18-53.1.4.el5.i686.rpm 46c3986d06610e1ff1f13aea20e12a55 kernel-devel-2.6.18-53.1.4.el5.i686.rpm 03ecab2d61860ff849f17ed525f68a9b kernel-headers-2.6.18-53.1.4.el5.i386.rpm 3ac39f5fcd33e7c1e8d374cf26f23bba kernel-xen-2.6.18-53.1.4.el5.i686.rpm 866a71427e007f544ffa867f14e4ec2d kernel-xen-debuginfo-2.6.18-53.1.4.el5.i686.rpm 2d25af7fd212ed6bfe30b0fefd89e400 kernel-xen-devel-2.6.18-53.1.4.el5.i686.rpm
noarch: ab3753a735ea61deb37182250b04c9d0 kernel-doc-2.6.18-53.1.4.el5.noarch.rpm
x86_64: e071879c6de07723825ff525634ef14a kernel-2.6.18-53.1.4.el5.x86_64.rpm a328b40f9eb70cf9e0a4340ffcec53c8 kernel-debug-2.6.18-53.1.4.el5.x86_64.rpm 45e5066c1c1cdfe1c920f1ace4cf7268 kernel-debug-debuginfo-2.6.18-53.1.4.el5.x86_64.rpm 98613f3375199acf9ee60b5c8c407958 kernel-debug-devel-2.6.18-53.1.4.el5.x86_64.rpm 82206cb4393732d240ac50dce71c1510 kernel-debuginfo-2.6.18-53.1.4.el5.x86_64.rpm 4d470ccb5145a0fc225f44afca2c32ae kernel-debuginfo-common-2.6.18-53.1.4.el5.x86_64.rpm 5302a54d9169a4df8a048f67d3b2e518 kernel-devel-2.6.18-53.1.4.el5.x86_64.rpm a63da08cd0cca7cec81542537decb183 kernel-headers-2.6.18-53.1.4.el5.x86_64.rpm 5fa46572f8d861903ecf1d6d983e7153 kernel-xen-2.6.18-53.1.4.el5.x86_64.rpm 8ea07b9267a2c3265fb285a05b2ca982 kernel-xen-debuginfo-2.6.18-53.1.4.el5.x86_64.rpm 9877be5ebfd8402f5bd65d241bcf55f3 kernel-xen-devel-2.6.18-53.1.4.el5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
SRPMS: kernel-2.6.18-53.1.4.el5.src.rpm f4ddc1c32090e95051a82221882f7f07 kernel-2.6.18-53.1.4.el5.src.rpm
i386: 7db3e79c57682e6ccd52808899b615df kernel-2.6.18-53.1.4.el5.i686.rpm 3c710dd56c71e05a719254eabe5bef4e kernel-PAE-2.6.18-53.1.4.el5.i686.rpm f7abc5aa783e93096d38c54b59c090d2 kernel-PAE-debuginfo-2.6.18-53.1.4.el5.i686.rpm dc530282b624ccba683f4b181a6f3a07 kernel-PAE-devel-2.6.18-53.1.4.el5.i686.rpm f18ab8596f0de5f8aec9c5c06aa0772c kernel-debug-2.6.18-53.1.4.el5.i686.rpm 78fb69f9be4c5e3376ef657578bcbf3b kernel-debug-debuginfo-2.6.18-53.1.4.el5.i686.rpm 9e7dabd8afecabf2d81b7244e248d085 kernel-debug-devel-2.6.18-53.1.4.el5.i686.rpm 8ced8998555bd4ca582718aa4de6491a kernel-debuginfo-2.6.18-53.1.4.el5.i686.rpm 82cb46f9d27253be25240cdae5303f48 kernel-debuginfo-common-2.6.18-53.1.4.el5.i686.rpm 46c3986d06610e1ff1f13aea20e12a55 kernel-devel-2.6.18-53.1.4.el5.i686.rpm 03ecab2d61860ff849f17ed525f68a9b kernel-headers-2.6.18-53.1.4.el5.i386.rpm 3ac39f5fcd33e7c1e8d374cf26f23bba kernel-xen-2.6.18-53.1.4.el5.i686.rpm 866a71427e007f544ffa867f14e4ec2d kernel-xen-debuginfo-2.6.18-53.1.4.el5.i686.rpm 2d25af7fd212ed6bfe30b0fefd89e400 kernel-xen-devel-2.6.18-53.1.4.el5.i686.rpm
ia64: c4b5c7f03fe8aa5770515d2926360589 kernel-2.6.18-53.1.4.el5.ia64.rpm 9d93070855eb35f4c9c51ba96544513b kernel-debug-2.6.18-53.1.4.el5.ia64.rpm 0724c9c99e58c2acc4190e5ed49f7a05 kernel-debug-debuginfo-2.6.18-53.1.4.el5.ia64.rpm d920157b8a5bb9c9b908924e1fe1ca5f kernel-debug-devel-2.6.18-53.1.4.el5.ia64.rpm 8685ce4e872ab826646f1db5193480e9 kernel-debuginfo-2.6.18-53.1.4.el5.ia64.rpm f8db66a50e12476bb86186bf9715d4cc kernel-debuginfo-common-2.6.18-53.1.4.el5.ia64.rpm ddffbae0bc152f6863d0ee443de9048c kernel-devel-2.6.18-53.1.4.el5.ia64.rpm 20971ff3bd352465d95f9687256b15df kernel-headers-2.6.18-53.1.4.el5.ia64.rpm d28c5d53ae4bf8f382ec428e32203e66 kernel-xen-2.6.18-53.1.4.el5.ia64.rpm 408a5a1dd9994a11a0547b8750def8a0 kernel-xen-debuginfo-2.6.18-53.1.4.el5.ia64.rpm 8f4c718a88b46be011e49c745d6ce4f2 kernel-xen-devel-2.6.18-53.1.4.el5.ia64.rpm
noarch: ab3753a735ea61deb37182250b04c9d0 kernel-doc-2.6.18-53.1.4.el5.noarch.rpm
ppc: bd068aebc02e617f34caee156d252841 kernel-2.6.18-53.1.4.el5.ppc64.rpm d277953a40d21ba17dbed7fd6c6f680f kernel-debug-2.6.18-53.1.4.el5.ppc64.rpm 0c62d227991dbaee59c812d1c252df88 kernel-debug-debuginfo-2.6.18-53.1.4.el5.ppc64.rpm 5ef886d8a3eece47fd0232d229264bac kernel-debug-devel-2.6.18-53.1.4.el5.ppc64.rpm eb49f51637a97ad6806cc19a3bc078d0 kernel-debuginfo-2.6.18-53.1.4.el5.ppc64.rpm 45131661332edcf45b864400399abb9c kernel-debuginfo-common-2.6.18-53.1.4.el5.ppc64.rpm 4164d433f794761cd04d2d455f3924e4 kernel-devel-2.6.18-53.1.4.el5.ppc64.rpm 951eee41009d6a83c90c535864f5bad7 kernel-headers-2.6.18-53.1.4.el5.ppc.rpm 3b14f2e47dde5989f2f26794b2fe012c kernel-headers-2.6.18-53.1.4.el5.ppc64.rpm fc215987bde440bbf9890392ad349a05 kernel-kdump-2.6.18-53.1.4.el5.ppc64.rpm 444294c39857ad466ab0bb4dab2b8f71 kernel-kdump-debuginfo-2.6.18-53.1.4.el5.ppc64.rpm fc5c6c3f402b21502ef445ac0b7feefd kernel-kdump-devel-2.6.18-53.1.4.el5.ppc64.rpm
s390x: 2c3701f34e15686807a362d304b8894f kernel-2.6.18-53.1.4.el5.s390x.rpm d47000222a8ec41fad683f222b0594a4 kernel-debug-2.6.18-53.1.4.el5.s390x.rpm e674b9c3f52f21850e8ebaeb68e8758b kernel-debug-debuginfo-2.6.18-53.1.4.el5.s390x.rpm a4ce8f8b5cdd2655b69f39445de25825 kernel-debug-devel-2.6.18-53.1.4.el5.s390x.rpm f86888ee8a26a352070cc3523c75e7c9 kernel-debuginfo-2.6.18-53.1.4.el5.s390x.rpm abee5165caaad3c697fc4934f874090a kernel-debuginfo-common-2.6.18-53.1.4.el5.s390x.rpm 8578e33e3544a093221a9299b0b50c1b kernel-devel-2.6.18-53.1.4.el5.s390x.rpm 9d94999160c4adeea1e65b0207219628 kernel-headers-2.6.18-53.1.4.el5.s390x.rpm
x86_64: e071879c6de07723825ff525634ef14a kernel-2.6.18-53.1.4.el5.x86_64.rpm a328b40f9eb70cf9e0a4340ffcec53c8 kernel-debug-2.6.18-53.1.4.el5.x86_64.rpm 45e5066c1c1cdfe1c920f1ace4cf7268 kernel-debug-debuginfo-2.6.18-53.1.4.el5.x86_64.rpm 98613f3375199acf9ee60b5c8c407958 kernel-debug-devel-2.6.18-53.1.4.el5.x86_64.rpm 82206cb4393732d240ac50dce71c1510 kernel-debuginfo-2.6.18-53.1.4.el5.x86_64.rpm 4d470ccb5145a0fc225f44afca2c32ae kernel-debuginfo-common-2.6.18-53.1.4.el5.x86_64.rpm 5302a54d9169a4df8a048f67d3b2e518 kernel-devel-2.6.18-53.1.4.el5.x86_64.rpm a63da08cd0cca7cec81542537decb183 kernel-headers-2.6.18-53.1.4.el5.x86_64.rpm 5fa46572f8d861903ecf1d6d983e7153 kernel-xen-2.6.18-53.1.4.el5.x86_64.rpm 8ea07b9267a2c3265fb285a05b2ca982 kernel-xen-debuginfo-2.6.18-53.1.4.el5.x86_64.rpm 9877be5ebfd8402f5bd65d241bcf55f3 kernel-xen-devel-2.6.18-53.1.4.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571 http://cve.mitre.org/cgi-bin/cvename.cgi?name= http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5494 http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHTtFLXlSAg2UNWIIRAgoWAJsHN/PKUKAfrg+z2CKG88A8BcFnSgCgtLOp 90k6eLxwtAXrJpXPKfYbmbs= =6rbk -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|