아이디/패스워드 기억
최근사진
Total : 64,502
Yesterday : 1,665
Today : 476

Updated kernel packages fix security issues

ino | 2005.06.19 17:43 | 조회 2276
---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated kernel packages fix security issues
Advisory ID: FLSA:152532
Issue date: 2005-06-04
Product: Red Hat Linux, Fedora Core
Keywords: Bugfix
CVE Names: CAN-2004-1058 CAN-2004-1333 CAN-2005-0384
CAN-2005-0400 CAN-2005-0449 CAN-2005-0504
CAN-2005-0749 CAN-2005-0750 CAN-2005-0815
---------------------------------------------------------------------

---------------------------------------------------------------------
1. Topic:

Updated kernel packages that fix several security issues are now
available.

The Linux kernel handles the basic functions of the operating system.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386

3. Problem description:

This update includes fixes for several security issues:

A race condition was discovered. Local users could use this flaw to read
the environment variables of another process that is still spawning via
/proc/.../cmdline. (CAN-2004-1058)

An integer overflow was discovered in the vc_resize function. A local
user could cause a denial of service (kernel crash) via a short new
screen value, which leads to a buffer overflow. (CAN-2004-1333)

A flaw was discovered in the Linux PPP driver. On systems allowing
remote users to connect to a server using ppp, a remote client could
cause a denial of service (system crash). (CAN-2005-0384)

A flaw was discovered in ext2 filesystem support. When a new directory
is created, the ext2 block written to disk is not initialized, leading
to an information leak. (CAN-2005-0400)

A flaw in fragment queuing was discovered affecting the netfilter
subsystem. On systems configured to filter or process network packets
(for example those configured to do firewalling), a remote attacker
could send a carefully crafted set of fragmented packets to a machine
and cause a denial of service (system crash). In order to sucessfully
exploit this flaw, the attacker would need to know (or guess) some
aspects of the firewall ruleset in place on the target system to be able
to craft the right fragmented packets. (CAN-2005-0449)

The moxa char driver was missing a CAP_SYS_RAWIO check which could allow
a local user the ability to do things like replace the firmware.
(CAN-2005-0504)

A flaw when freeing a pointer in load_elf_library was discovered. A
local user could potentially use this flaw to cause a denial of service
(system crash). (CAN-2005-0749)

A flaw was discovered in the bluetooth driver system. On system where
the bluetooth modules are loaded, a local user could use this flaw to
gain elevated (root) privileges. (CAN-2005-0750)

Michal Zalewski discovered some flaws in the iso9660 filesystem. These
flaws could allow a malicious iso filesystem to cause a DoS or
potentially execute arbitrary code if mounted/examined. (CAN-2005-0815)

All users are advised to upgrade their kernels to the packages
associated with their machine architectures and configurations as listed
in this erratum.

Please note that the fix for CAN-2005-0449 required changing the
external symbol linkages (kernel module ABI) for the ip_defrag()
and ip_ct_gather_frags() functions. Any third-party module using either
of these would also need to be fixed.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To install kernel packages manually, use "rpm -ivh " and modify
system settings to boot the kernel you have installed. To do this, edit
/boot/grub/grub.conf and change the default entry to "default=0" (or, if
you have chosen to use LILO as your boot loader, edit /etc/lilo.conf and
run lilo)

Please note that this update is also available via yum and apt. Many
people find this an easier way to apply updates. To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system. This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

Note that this may not automatically pull the new kernel in if you have
configured apt/yum to ignore kernels. If so, follow the manual
instructions above.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532

6. RPMs required:

Red Hat Linux 7.3:

SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/kernel-2.4.20-43.7.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-BOOT-2.4.20-43.7.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-doc-2.4.20-43.7.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-source-2.4.20-43.7.legacy.i386.rpm

i586:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i586.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.i586.rpm

i686:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i686.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-bigmem-2.4.20-43.7.legacy.i686.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.i686.rpm

athlon:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.athlon.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.athlon.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/kernel-2.4.20-43.9.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-BOOT-2.4.20-43.9.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-doc-2.4.20-43.9.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-source-2.4.20-43.9.legacy.i386.rpm

i586:
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i586.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.i586.rpm

i686:
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i686.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-bigmem-2.4.20-43.9.legacy.i686.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.i686.rpm

athlon:
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.athlon.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.athlon.rpm

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/kernel-2.4.22-1.2199.5.legacy.nptl.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-BOOT-2.4.22-1.2199.5.legacy.nptl.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-doc-2.4.22-1.2199.5.legacy.nptl.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-source-2.4.22-1.2199.5.legacy.nptl.i386.rpm

i586:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i586.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i586.rpm

i686:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i686.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i686.rpm

athlon:
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.athlon.rpm

7. Verification:

SHA1 sum Package Name
---------------------------------------------------------------------

33794472a5fa20539f29eb7cc4a1d2e6ce769b06
redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.athlon.rpm
230a9443c30eb7d9733c16568a4d937ea2276bd4
redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i386.rpm
17d0026c8cf717ed74be70b25b13da6063ec7e30
redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i586.rpm
5dc8f0385fd068bd2274337989faebc7c6ec1726
redhat/7.3/updates/i386/kernel-2.4.20-43.7.legacy.i686.rpm
f286d3c08cf28c9c4a20c950d2eb795c5b5737ff
redhat/7.3/updates/i386/kernel-bigmem-2.4.20-43.7.legacy.i686.rpm
ddb00a518b2426230fe5e1da5e115691e39f09c8
redhat/7.3/updates/i386/kernel-BOOT-2.4.20-43.7.legacy.i386.rpm
904f2b51aaed8aa96583b7e2bd40365b75cb6faa
redhat/7.3/updates/i386/kernel-doc-2.4.20-43.7.legacy.i386.rpm
b332b272d0a4854af3131693708c05f39797e9af
redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.athlon.rpm
933b9cb0ca14334c320c7458f61a700a8e002abd
redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.i586.rpm
95339a7d9b57381d6a967d7fa0c70675b1c2e34a
redhat/7.3/updates/i386/kernel-smp-2.4.20-43.7.legacy.i686.rpm
c054c08870c77ce47030511ebfc35566fcd216f5
redhat/7.3/updates/i386/kernel-source-2.4.20-43.7.legacy.i386.rpm
c7b8495a1c84cdcf22bf99748e1346614777cdba
redhat/7.3/updates/SRPMS/kernel-2.4.20-43.7.legacy.src.rpm
06664b11750a20c552ef4f9f391976429335516e
redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.athlon.rpm
523c7336e869cc3aac6356b838eb3e7458f7b471
redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i386.rpm
66a5186361dcdb4cb4c8c1dccb63e56d11a14f58
redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i586.rpm
a138ce79569e85745c9cc2e352ec03c32d048de5
redhat/9/updates/i386/kernel-2.4.20-43.9.legacy.i686.rpm
e595403bc87b08c1dd4090de032bf7d9b4400a67
redhat/9/updates/i386/kernel-bigmem-2.4.20-43.9.legacy.i686.rpm
ec99c85958ab259128855cc1b0be74c83e6e3f0e
redhat/9/updates/i386/kernel-BOOT-2.4.20-43.9.legacy.i386.rpm
536fa79aa0a5f02e9f8b54c5c88e5a429dbdb114
redhat/9/updates/i386/kernel-doc-2.4.20-43.9.legacy.i386.rpm
b16cc40913f423d5c8adbcf755c07621d42b1df0
redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.athlon.rpm
8db2f89803e02ee40af386e192813c3441d9ef12
redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.i586.rpm
9665eda39738126699e2e999c5563e47826270c8
redhat/9/updates/i386/kernel-smp-2.4.20-43.9.legacy.i686.rpm
6a61f8971a1ba0f51399956aed24789065ece2b4
redhat/9/updates/i386/kernel-source-2.4.20-43.9.legacy.i386.rpm
35d0fc7714b2c0274b6af35996c26335ea8d3555
redhat/9/updates/SRPMS/kernel-2.4.20-43.9.legacy.src.rpm
e1dd5d1ee6ba69871dd06ce679734eadf5c4c9ed
fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
23a4afe07cd72f23b429730c32f88f5fe92e8f6f
fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i586.rpm
5da916582b12a4625e54eb0cfb3d200dbeb5360b
fedora/1/updates/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i686.rpm
fbdf463056180fd41abe4d8afc165d187163390d
fedora/1/updates/i386/kernel-BOOT-2.4.22-1.2199.5.legacy.nptl.i386.rpm
03298f9d3057661b2912fefa73cde94c42d2377e
fedora/1/updates/i386/kernel-doc-2.4.22-1.2199.5.legacy.nptl.i386.rpm
2419d19c66420c55a50ca82d0ef41aaab7992136
fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
8dcd88461c7922a07b7c1bad054b480a997828ea
fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i586.rpm
c95bddfc477c11c46d562c3bd28f407ebdcd8ae3
fedora/1/updates/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i686.rpm
0fe3402917235049865cedc80ad5eb72c1984df2
fedora/1/updates/i386/kernel-source-2.4.22-1.2199.5.legacy.nptl.i386.rpm
cfb0d7b297116b99ef08a30d7d9fef0c9e24a490
fedora/1/updates/SRPMS/kernel-2.4.22-1.2199.5.legacy.nptl.src.rpm

These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0815

9. Contact:

The Fedora Legacy security contact is . More
project details at http://www.fedoralegacy.org

---------------------------------------------------------------------
twitter facebook me2day 요즘
110개(1/6페이지)
보안
번호 제목 글쓴이 조회 날짜
110 공유기별 기본 패스워드 및 포트포워딩 위치. 몰라맨 80 2016.07.25 09:58
109 usb 사용흔적제거에 강력한 유틸 몰라맨 69 2014.03.14 21:33
108 Adobe Flash Player/Reader/Acrobat 신규 취약점 몰라맨 122 2011.03.21 10:10
107 제로보드 보안 패치 pl9 첨부파일 ino 353 2009.02.10 18:45
106 [일반] Google's new Web browser (Chrome) allows ino 373 2008.09.05 09:47
105 [일반] 해킹의 표적 -가상 메모리 파일(Pagefile.sys)을 윈도우 종료시 ino 537 2008.02.19 13:25
104 [일반] 시스템 분석 - 추적 비밀글 ino 5 2008.02.05 16:16
103 [일반] Updated sendmail packages fix security i ino 1054 2006.04.18 10:37
102 [일반] 공개 웹 게시판 제로보드 취약점 패치 권고 ino 3438 2006.04.02 18:22
101 [일반] Microsoft Windows WMF/EMF File Handling ino 1156 2005.11.17 11:13
100 [일반] openssl 보안 업데이트 ino 1135 2005.10.17 21:19
99 [일반] Linux Kernel Local Denial of Service and ino 1136 2005.10.11 23:29
98 [일반] Kaspersky Anti-Virus Products Remote Hea ino 967 2005.10.04 15:20
97 [일반] ProZilla "ftpsearch" Option Client-Side ino 1008 2005.10.03 18:40
>> [일반] Updated kernel packages fix security iss ino 2277 2005.06.19 17:43
95 [일반] MySQL MaxDB Webtool Remote Stack Overflo ino 1346 2005.05.11 21:39
94 [일반] IBM AS/400 LDAP Server User Accounts Dis ino 1352 2005.04.06 11:01
93 [일반] PHP 4.x/5.x Denial of Service and Securi ino 1334 2005.04.03 13:23
92 [일반] Linux Kernel v2.6.10 Remote Denial of Se ino 1356 2005.03.30 21:22
91 [일반] overwriting low kernel memory ino 1312 2005.03.23 15:02