Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2004.0771 -- RHSA-2004:504-01 Updated Itanium kernel packages resolve security issues 14 December 2004 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Itanium kernel Publisher: Red Hat Operating System: Red Hat Enterprise Linux AS/ES/WS 2.1 Red Hat Linux Advanced Workstation 2.1 Platform: IA-64 Impact: Execute Arbitrary Code/Commands Denial of Service Increased Privileges Inappropriate Access Access: Existing Account CVE Names: CAN-2004-1073 CAN-2004-1072 CAN-2004-1071 CAN-2004-1070 CAN-2004-1068 CAN-2004-0949 CAN-2004-0883 CAN-2004-0685 CAN-2004-0565 CAN-2004-0181 CAN-2004-0177 CAN-2004-0136 Ref: ESB-2004.0770 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2004-504.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated Itanium kernel packages resolve security issues Advisory ID: RHSA-2004:504-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2004-504.html Issue date: 2004-12-13 Updated on: 2004-12-13 Product: Red Hat Enterprise Linux CVE Names: CAN-2004-0177 CAN-2004-0181 CAN-2004-0136 CAN-2004-0565 CAN-2004-0685 CAN-2004-0883 CAN-2004-0949 CAN-2004-1068 CAN-2004-1070 CAN-2004-1071 CAN-2004-1072 CAN-2004-1073 - - --------------------------------------------------------------------- 1. Summary: Updated Itanium kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 2.1. This is the sixth regular update. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 3. Problem description: The Linux kernel handles the basic functions of the operating system. This is the sixth regular Itanium kernel update to Red Hat Enterprise Linux version 2.1. This kernel updates several important drivers and fixes a number of bugs. This update includes fixes for several security issues: Paul Starzetz of iSEC discovered various flaws in the ELF binary loader affecting kernels prior to 2.4.28. A local user could use these flaws to gain read access to executable-only binaries or possibly gain privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071, CAN-2004-1072, and CAN-2004-1073 to these issues. A missing serialization flaw in unix_dgram_recvmsg was discovered that affects kernels prior to 2.4.28. A local user could potentially make use of a race condition in order to gain privileges. (CAN-2004-1068) SGI discovered a bug in the elf loader that affects kernels before 2.4.25 which could be triggered by a malformed binary. On architectures other than x86, a local user could create a malicious binary which could cause a denial of service (crash). (CAN-2004-0136) Stefan Esser discovered various flaws including buffer overflows in the smbfs driver affecting kernels before 2.4.28. A local user may be able to cause a denial of service (crash) or possibly gain privileges. In order to exploit these flaws the user would need to have control of a connected smb server. (CAN-2004-0883, CAN-2004-0949) A floating point information leak was discovered in the ia64 architecture context switch code in kernels before 2.4.27. A local user could use this flaw to read register values of other processes by setting the MFH bit. (CAN-2004-0565) Conectiva discovered flaws in certain USB drivers affecting kernels before 2.4.27 which used the copy_to_user function on uninitialized structures. These flaws could allow local users to read small amounts of kernel memory. (CAN-2004-0685) The ext3 and jfs code in kernels before 2.4.26 did not properly initialize journal descriptor blocks. A privileged local user could read portions of kernel memory. (CAN-2004-0177, CAN-2004-0181) The following drivers have been updated: * fusion to 2.05.16.16.02 * e1000 to 5.3.19-k2 * e100 to 3.0.27-k2 All Red Hat Enterprise Linux 2.1 users running Itanium are advised to upgrade their kernels to the packages listed in this erratum. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info): 130702 - RHEL 2.1 U6 (x86 and IPF): Refresh e100 driver (v 3.0.27) 130700 - RHEL 2.1 U6 x86 and IPF): Refresh e1000 driver (v 5.3.19) 127385 - Machines don't boot on LSI22320-R adapters 131392 - RHEL 2.1 U6: Update LSI mptfusion driver to v2.05.16.02 or greater 124832 - Random stall during boot-up on RHEL 2.1 IPF 129168 - [RHEL2.1 IPF] Securepath & Oracle with RHAS2.1 / Experiencing performance problem 131493 - [RHEL2.1] SCSI midlayer race on scsi_devicelist 132609 - RHEL2.1 U6: Vendor/board name of Broadcom BCM5704 is not shown in /proc/pci 134373 - Need O_LARGEFILE when generating corefiles on ia64. 134802 - keyboard.c : Can't emulate raw mode for keycode 272 135299 - Add support for BLIST_NOSTARTONADD to derry 137446 - ioctl on HP Smart Array 532 failure 138042 - Add sparse LUN support for IBM ESS Model 2105 and 2145 138443 - Wrong Chaparral FR1422 identifier JSS224 instead of JFS224 127916 - CAN-2004-0136 Verify interpreter (ipf) 134876 - CAN-2004-1070 binfmt_elf loader vulnerabilities (CAN-2004-1071 CAN-2004-1072 CAN-2004-1073) 140712 - CAN-2004-1068 Missing serialisation in unix_dgram_recvmsg (ia64) 134722 - CAN-2004-0883 smbfs potential DOS (CAN-2004-0949) 127920 - CAN-2004-0685 usb sparse fixes in 2.4 (ipf) 126127 - CAN-2004-0565 Information leak on Linux/ia64 121034 - CAN-2004-0177 ext3 infoleak (ipf) 121040 - CAN-2004-0181 jfs infoleak 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.18-e.52.src.rpm 972767d473106d47003c0679f5247dc7 kernel-2.4.18-e.52.src.rpm ia64: c2964fc55400ebea4644ba58dac7c5bd kernel-2.4.18-e.52.ia64.rpm 15b24ec2a96dda49d9725999c16f3157 kernel-doc-2.4.18-e.52.ia64.rpm 09412dcc7474cfca750b913d1dc15cf5 kernel-smp-2.4.18-e.52.ia64.rpm d867f9313bac8181f381c2f071e12abc kernel-source-2.4.18-e.52.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/kernel-2.4.18-e.52.src.rpm 972767d473106d47003c0679f5247dc7 kernel-2.4.18-e.52.src.rpm ia64: c2964fc55400ebea4644ba58dac7c5bd kernel-2.4.18-e.52.ia64.rpm 15b24ec2a96dda49d9725999c16f3157 kernel-doc-2.4.18-e.52.ia64.rpm 09412dcc7474cfca750b913d1dc15cf5 kernel-smp-2.4.18-e.52.ia64.rpm d867f9313bac8181f381c2f071e12abc kernel-source-2.4.18-e.52.ia64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0177 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0136 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0685 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0883 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0949 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1068 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1070 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1071 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1072 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1073 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact.html Copyright 2004 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFBvfjfXlSAg2UNWIIRAvCPAKCxmHjNLte2oa82ks3lQ2svm4qxuQCgptye Zmtvjr9bXVGfapGdRCxEFHc= =DJCp - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQb5NPih9+71yA2DNAQIJkwP/dFmC1TZ/MBWrwrnvpZHlTO65qYrEAgvk mZCrxs7D4rvCt9EagmOasq4mp3l2BQ378tTOiw66/5o0vhYhoQuNxxT0kgx7tKtV a2wnyJVu6AFnL509jForLhjxBgeDr6FeKic7stQh/x2gY11YOMbpETuAJCf1keW6 rsSVggpy+m4= =5+BL -----END PGP SIGNATURE-----