Revision Date: | 2004-12-23 | Version: | 502 |
Title: | RHSA-2004:689: kernel security update (Important) |
Description: | The Linux kernel handles the basic functions of the operating system.
This advisory includes fixes for several security issues:
Petr Vandrovec discovered a flaw in the 32bit emulation code affecting the Linux 2.4 kernel on the AMD64 architecture. A local attacker could use this flaw to gain privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1144 to this issue.
ISEC security research discovered multiple vulnerabilities in the IGMP functionality which was backported in the Red Hat Enterprise Linux 3 kernels. These flaws could allow a local user to cause a denial of service (crash) or potentially gain privileges. Where multicast applications are being used on a system, these flaws may also allow remote users to cause a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1137 to this issue.
ISEC security research and Georgi Guninski independantly discovered a flaw in the scm_send function in the auxiliary message layer. A local user could create a carefully crafted auxiliary message which could cause a denial of service (system hang). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.
A floating point information leak was discovered in the ia64 architecture context switch code. A local user could use this flaw to read register values of other processes by setting the MFH bit. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0565 to this issue.
Kirill Korotaev found a flaw in load_elf_binary affecting kernels prior to 2.4.26. A local user could create a carefully crafted binary in such a way that it would cause a denial of service (system crash). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1234 to this issue.
These packages also fix issues in the io_edgeport driver, and a memory leak in ip_options_get.
Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | CVE-2004-0565 CVE-2004-1016 CVE-2004-1017 CVE-2004-1137 CVE-2004-1144 CVE-2004-1234 CVE-2004-1335 RHSA-2004:689-01
|
Platform(s): | Red Hat Enterprise Linux 3
| Product(s): | |
Definition Synopsis |
Red Hat Enterprise Linux 3 is installed AND Package Information
kernel-source is earlier than 0:2.4.21-27.0.1.EL
AND kernel-source is signed with Red Hat master key
OR
kernel is earlier than 0:2.4.21-27.0.1.EL
AND kernel is signed with Red Hat master key
OR
kernel-doc is earlier than 0:2.4.21-27.0.1.EL
AND kernel-doc is signed with Red Hat master key
OR
kernel-hugemem-unsupported is earlier than 0:2.4.21-27.0.1.EL
AND kernel-hugemem-unsupported is signed with Red Hat master key
OR
kernel-hugemem is earlier than 0:2.4.21-27.0.1.EL
AND kernel-hugemem is signed with Red Hat master key
OR
kernel-BOOT is earlier than 0:2.4.21-27.0.1.EL
AND kernel-BOOT is signed with Red Hat master key
OR
kernel-smp-unsupported is earlier than 0:2.4.21-27.0.1.EL
AND kernel-smp-unsupported is signed with Red Hat master key
OR
kernel-unsupported is earlier than 0:2.4.21-27.0.1.EL
AND kernel-unsupported is signed with Red Hat master key
OR
kernel-smp is earlier than 0:2.4.21-27.0.1.EL
AND kernel-smp is signed with Red Hat master key
|