copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2006.0058 -- [UNIX/Linux][RedHat] -- Important: kernel security update

Date: 20 January 2006
References: ESB-2006.0231  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                   ESB-2006.0058 -- [UNIX/Linux][RedHat]
                     Important: kernel security update
                              20 January 2006

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux AS/ES/WS 4
                   Red Hat Enterprise Linux Desktop 4
Impact:            Inappropriate Access
                   Increased Privileges
                   Denial of Service
Access:            Remote/Unauthenticated
CVE Names:         CVE-2005-4605 CVE-2005-3858 CVE-2005-3857
                   CVE-2005-3848 CVE-2005-3806 CVE-2005-3784
                   CVE-2005-3358 CVE-2005-3356 CVE-2005-3276
                   CVE-2005-3109 CVE-2005-3106 CVE-2005-3044
                   CVE-2005-2800 CVE-2005-2709 CVE-2005-2458
                   CVE-2004-1190 CVE-2002-2185

Comment: Please see https://rhn.redhat.com/errata/RHSA-2006-0140.html for 
         kernel updates to the Red Hat Linux 3 family.

Revision History:  January 20 2006: Similar kernel updates are now 
                   available for the Red Hat Linux 3 family of operating 
                   systems
                   January 18 2006: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: kernel security update
Advisory ID:       RHSA-2006:0101-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0101.html
Issue date:        2006-01-17
Updated on:        2006-01-17
Product:           Red Hat Enterprise Linux
Obsoletes:         RHSA-2005:808
CVE Names:         CVE-2002-2185 CVE-2004-1190 CVE-2005-2458 CVE-2005-2709 CVE-2005-2800 CVE-2005-3044 CVE-2005-3106 CVE-2005-3109 CVE-2005-3276 CVE-2005-3356 CVE-2005-3358 CVE-2005-3784 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605
- - ---------------------------------------------------------------------

1. Summary:

Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available. 

This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues
described below:

- - - a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)

- - - a flaw which allowed a local user to write to firmware on read-only
opened /dev/cdrom devices (CVE-2004-1190, moderate) 

- - - a flaw in gzip/zlib handling internal to the kernel that may allow a
local user to cause a denial of service (crash) (CVE-2005-2458, low) 

- - - a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)

- - - a flaw in the SCSI procfs interface that allowed a local user to cause a
denial of service (crash) (CVE-2005-2800, moderate)

- - - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed
a local user to cause a denial of service (crash) (CVE-2005-3044, important)

- - - a race condition when threads share memory mapping that allowed local
users to cause a denial of service (deadlock) (CVE-2005-3106, important)

- - - a flaw when trying to mount a non-hfsplus filesystem using hfsplus that
allowed local users to cause a denial of service (crash) (CVE-2005-3109,
moderate)

- - - a minor info leak with the get_thread_area() syscall that allowed
a local user to view uninitialized kernel stack data (CVE-2005-3276, low) 

- - - a flaw in mq_open system call that allowed a local user to cause a denial
of service (crash) (CVE-2005-3356, important)

- - - a flaw in set_mempolicy that allowed a local user on some 64-bit
architectures to cause a denial of service (crash) (CVE-2005-3358, important)

- - - a flaw in the auto-reap of child processes that allowed a local user to
cause a denial of service (crash) (CVE-2005-3784, important)

- - - a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)

- - - a flaw in network ICMP processing that allowed a local user to cause
a denial of service (memory exhaustion) (CVE-2005-3848, important)

- - - a flaw in file lease time-out handling that allowed a local user to cause
a denial of service (log file overflow) (CVE-2005-3857, moderate) 

- - - a flaw in network IPv6 xfrm handling that allowed a local user to
cause a denial of service (memory exhaustion) (CVE-2005-3858, important) 

- - - a flaw in procfs handling that allowed a local user to read kernel memory
(CVE-2005-4605, important)

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

158861 - CVE-2004-1190 Continued raw access issues
165679 - CVE-2005-2458 gzip/zlib flaws
167696 - CVE-2005-2800 SCSI proc DoS
168659 - CVE-2005-3044 lost fput and sockfd_put could lead to DoS
168777 - CVE-2005-3276 sys_get_thread_area minor info leak
168924 - CVE-2005-2709 More sysctl flaws
169130 - CVE-2005-3356 double decrement of mqueue_mnt->mnt_count in sys_mq_open
170262 - CVE-2005-3106 exec_mmap race DoS
171002 - CVE-2005-3109 HFS oops
174078 - [RHEL4] CVE-2005-3784 auto-reap DoS
174081 - CVE-2005-3806 ipv6 DOS
174337 - [RHEL4] CVE-2005-3857 lease printk DoS
174343 - CVE-2005-3858 ip6_input_finish DoS
174345 - CVE-2005-3848 dst_entry leak DoS
174807 - CVE-2002-2185 IGMP DoS
175683 - CVE-2005-3358 panic caused by bad args to set_mempolicy
176812 - CVE-2005-4605 Kernel memory disclosure


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-22.0.2.EL.src.rpm
b50fbbd12e29a3ca1bfa7b4310fdc18d  kernel-2.6.9-22.0.2.EL.src.rpm

i386:
a9054fd42cd3105a673f2066caf4de15  kernel-2.6.9-22.0.2.EL.i686.rpm
e3a7fef199a480936043131ca10945e1  kernel-devel-2.6.9-22.0.2.EL.i686.rpm
0e26e14f1de7f0e8d39ac918af2a8494  kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm
dcb79758906cc2ba683d5b1beadf6db1  kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm
e66a773b0425948807df2369519c8416  kernel-smp-2.6.9-22.0.2.EL.i686.rpm
52aef02b73f55f9a28308713e3cad221  kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm

ia64:
2567e86652683fc131d6298a9466d9f4  kernel-2.6.9-22.0.2.EL.ia64.rpm
15bfd72b79b20e2d90fd47fbf68deda0  kernel-devel-2.6.9-22.0.2.EL.ia64.rpm

noarch:
bb0a0d5917b0d63d9c683a7f33e519a9  kernel-doc-2.6.9-22.0.2.EL.noarch.rpm

ppc:
68686b0f7065d72e01090af2c3c12413  kernel-2.6.9-22.0.2.EL.ppc64.rpm
1220c56733452c55c87ae7a7fc6da952  kernel-2.6.9-22.0.2.EL.ppc64iseries.rpm
6d50c9ead773ce1b5a033ef794107dd0  kernel-devel-2.6.9-22.0.2.EL.ppc64.rpm
edd38da55bca79d91268ccb39dc001e3  kernel-devel-2.6.9-22.0.2.EL.ppc64iseries.rpm

s390:
fd2526e4e7fdac29d15a836554d18002  kernel-2.6.9-22.0.2.EL.s390.rpm
55e50f39b2cae60dae41c19187513f85  kernel-devel-2.6.9-22.0.2.EL.s390.rpm

s390x:
94ffb16f720bd5e58c7ed16af7b8ad6c  kernel-2.6.9-22.0.2.EL.s390x.rpm
f05df19613aab4d3a3efbc04c83632c2  kernel-devel-2.6.9-22.0.2.EL.s390x.rpm

x86_64:
aa26a1be88624b4dd72b21878d051f2c  kernel-2.6.9-22.0.2.EL.x86_64.rpm
2bdb46d99ab6ec0a7e2cb40c27caf557  kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm
e9cdbe981b52ec9f3cf52e6e48c4f99c  kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm
1397c66c010c457c5d9203f5af6eb410  kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-22.0.2.EL.src.rpm
b50fbbd12e29a3ca1bfa7b4310fdc18d  kernel-2.6.9-22.0.2.EL.src.rpm

i386:
a9054fd42cd3105a673f2066caf4de15  kernel-2.6.9-22.0.2.EL.i686.rpm
e3a7fef199a480936043131ca10945e1  kernel-devel-2.6.9-22.0.2.EL.i686.rpm
0e26e14f1de7f0e8d39ac918af2a8494  kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm
dcb79758906cc2ba683d5b1beadf6db1  kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm
e66a773b0425948807df2369519c8416  kernel-smp-2.6.9-22.0.2.EL.i686.rpm
52aef02b73f55f9a28308713e3cad221  kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm

noarch:
bb0a0d5917b0d63d9c683a7f33e519a9  kernel-doc-2.6.9-22.0.2.EL.noarch.rpm

x86_64:
aa26a1be88624b4dd72b21878d051f2c  kernel-2.6.9-22.0.2.EL.x86_64.rpm
2bdb46d99ab6ec0a7e2cb40c27caf557  kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm
e9cdbe981b52ec9f3cf52e6e48c4f99c  kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm
1397c66c010c457c5d9203f5af6eb410  kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-22.0.2.EL.src.rpm
b50fbbd12e29a3ca1bfa7b4310fdc18d  kernel-2.6.9-22.0.2.EL.src.rpm

i386:
a9054fd42cd3105a673f2066caf4de15  kernel-2.6.9-22.0.2.EL.i686.rpm
e3a7fef199a480936043131ca10945e1  kernel-devel-2.6.9-22.0.2.EL.i686.rpm
0e26e14f1de7f0e8d39ac918af2a8494  kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm
dcb79758906cc2ba683d5b1beadf6db1  kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm
e66a773b0425948807df2369519c8416  kernel-smp-2.6.9-22.0.2.EL.i686.rpm
52aef02b73f55f9a28308713e3cad221  kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm

ia64:
2567e86652683fc131d6298a9466d9f4  kernel-2.6.9-22.0.2.EL.ia64.rpm
15bfd72b79b20e2d90fd47fbf68deda0  kernel-devel-2.6.9-22.0.2.EL.ia64.rpm

noarch:
bb0a0d5917b0d63d9c683a7f33e519a9  kernel-doc-2.6.9-22.0.2.EL.noarch.rpm

x86_64:
aa26a1be88624b4dd72b21878d051f2c  kernel-2.6.9-22.0.2.EL.x86_64.rpm
2bdb46d99ab6ec0a7e2cb40c27caf557  kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm
e9cdbe981b52ec9f3cf52e6e48c4f99c  kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm
1397c66c010c457c5d9203f5af6eb410  kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-22.0.2.EL.src.rpm
b50fbbd12e29a3ca1bfa7b4310fdc18d  kernel-2.6.9-22.0.2.EL.src.rpm

i386:
a9054fd42cd3105a673f2066caf4de15  kernel-2.6.9-22.0.2.EL.i686.rpm
e3a7fef199a480936043131ca10945e1  kernel-devel-2.6.9-22.0.2.EL.i686.rpm
0e26e14f1de7f0e8d39ac918af2a8494  kernel-hugemem-2.6.9-22.0.2.EL.i686.rpm
dcb79758906cc2ba683d5b1beadf6db1  kernel-hugemem-devel-2.6.9-22.0.2.EL.i686.rpm
e66a773b0425948807df2369519c8416  kernel-smp-2.6.9-22.0.2.EL.i686.rpm
52aef02b73f55f9a28308713e3cad221  kernel-smp-devel-2.6.9-22.0.2.EL.i686.rpm

ia64:
2567e86652683fc131d6298a9466d9f4  kernel-2.6.9-22.0.2.EL.ia64.rpm
15bfd72b79b20e2d90fd47fbf68deda0  kernel-devel-2.6.9-22.0.2.EL.ia64.rpm

noarch:
bb0a0d5917b0d63d9c683a7f33e519a9  kernel-doc-2.6.9-22.0.2.EL.noarch.rpm

x86_64:
aa26a1be88624b4dd72b21878d051f2c  kernel-2.6.9-22.0.2.EL.x86_64.rpm
2bdb46d99ab6ec0a7e2cb40c27caf557  kernel-devel-2.6.9-22.0.2.EL.x86_64.rpm
e9cdbe981b52ec9f3cf52e6e48c4f99c  kernel-smp-2.6.9-22.0.2.EL.x86_64.rpm
1397c66c010c457c5d9203f5af6eb410  kernel-smp-devel-2.6.9-22.0.2.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4605

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFDzLDtXlSAg2UNWIIRAsr6AJ9sA/JCRnGWQt/GWuOMXb+vgkUZhACggde5
ySCTmyGqid+L88n3jiy1k3s=
=4vhW
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQ9A3RCh9+71yA2DNAQKUywP/QbSr5zZp6kvae0OA1jSSg6eS8PA8bo/K
Nx20+3viEDREJKnPN0Zbe1DhiaHcvDNp70tr/Ofkh/R4i3hFdZ4kuEe+FlO+jcnh
B6pYtCf5JTjcArUIIN/8lJ/t+hmHX47K+yBSBNHAGQOQ2AWovahguQFGuph0dwjt
F7vc33Ocv2E=
=OiBD
-----END PGP SIGNATURE-----