From bugzilla@redhat.com Mon Jul 21 18:48:49 2003 From: bugzilla@redhat.com To: redhat-watch-list@redhat.com Cc: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com Date: Mon, 21 Jul 2003 11:39 -0400 Subject: [Full-Disclosure] [RHSA-2003:238-01] Updated 2.4 kernel fixes vulnerabilities [ The following text is in the "iso-8859-1" character set. ] [ Your display is set for the "US-ASCII" character set. ] [ Some characters may be displayed incorrectly. ] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated 2.4 kernel fixes vulnerabilities Advisory ID: RHSA-2003:238-01 Issue date: 2003-07-21 Updated on: 2003-07-21 Product: Red Hat Linux Keywords: Cross references: Obsoletes: RHSA-2003:098 RHBA-2003:135 RHSA-2003:172 RHSA-2003:187 CVE Names: CAN-2003-0461 CAN-2003-0462 CAN-2003-0476 CAN-2003-0501 CAN-2003-0550 CAN-2003-0551 CAN-2003-0552 - --------------------------------------------------------------------- 1. Topic: Updated kernel packages are now available fixing several security vulnerabilities. 2. Relevant releases/architectures: Red Hat Linux 7.1 - athlon, i386, i586, i686 Red Hat Linux 7.2 - athlon, i386, i586, i686 Red Hat Linux 7.3 - athlon, i386, i586, i686 Red Hat Linux 8.0 - athlon, i386, i586, i686 Red Hat Linux 9 - athlon, i386, i586, i686 3. Problem description: The Linux kernel handles the basic functions of the operating system. Several security issues have been discovered affecting the Linux kernel: CAN-2003-0461: /proc/tty/driver/serial reveals the exact character counts for serial links. This could be used by a local attacker to infer password lengths and inter-keystroke timings during password entry. CAN-2003-0462: Paul Starzetz discovered a file read race condition existing in the execve() system call, which could cause a local crash. CAN-2003-0464: A recent change in the RPC code set the reuse flag on newly-created sockets. Olaf Kirch noticed that his could allow normal users to bind to UDP ports used for services such as nfsd. CAN-2003-0476: The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, allowing local users to gain read access to restricted file descriptors. CAN-2003-0501: The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program. This causes the program to fail to change the ownership and permissions of already opened entries. CAN-2003-0550: The STP protocol is known to have no security, which could allow attackers to alter the bridge topology. STP is now turned off by default. CAN-2003-0551: STP input processing was lax in its length checking, which could lead to a denial of service. CAN-2003-0552: Jerry Kreuscher discovered that the Forwarding table could be spoofed by sending forged packets with bogus source addresses the same as the local host. All users are advised to upgrade to these errata packages, which contain backported security patches correcting these vulnerabilities. Important: If you use Red Hat Linux 7.1, you must have installed quota-3.06-9.71 from RHSA-2003-187, and if you use Red Hat Linux 7.2 or 7.3, you must have installed quota-3.06-9.7 from RHSA-2003-187. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To use Red Hat Network to upgrade the kernel, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. Note that you need to select the kernel explicitly if you are using the default configuration of up2date. To install kernel packages manually, use "rpm -ivh " and modify system settings to boot the kernel you have installed. To do this, edit /boot/grub/grub.conf and change the default entry to "default=0" (or, if you have chosen to use LILO as your boot loader, edit /etc/lilo.conf and run lilo) Do not use "rpm -Uvh" as that will remove your running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. RPMs required: Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.20-19.7.src.rpm athlon: ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.20-19.7.athlon.rpm ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.20-19.7.athlon.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.20-19.7.i386.rpm i586: ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.20-19.7.i586.rpm ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.20-19.7.i586.rpm i686: ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.20-19.7.i686.rpm ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.20-19.7.i686.rpm ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.20-19.7.i686.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.20-19.7.src.rpm athlon: ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.20-19.7.athlon.rpm ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.20-19.7.athlon.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.20-19.7.i386.rpm i586: ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.20-19.7.i586.rpm ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.20-19.7.i586.rpm i686: ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.20-19.7.i686.rpm ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.20-19.7.i686.rpm ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.20-19.7.i686.rpm Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.20-19.7.src.rpm athlon: ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.20-19.7.athlon.rpm ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.20-19.7.athlon.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.20-19.7.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.20-19.7.i386.rpm i586: ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.20-19.7.i586.rpm ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.20-19.7.i586.rpm i686: ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.20-19.7.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.20-19.7.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.20-19.7.i686.rpm Red Hat Linux 8.0: SRPMS: ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.20-19.8.src.rpm athlon: ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.20-19.8.athlon.rpm ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.20-19.8.athlon.rpm i386: ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.20-19.8.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.20-19.8.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/kernel-doc-2.4.20-19.8.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/kernel-BOOT-2.4.20-19.8.i386.rpm i586: ftp://updates.redhat.com/8.0/en/os/i586/kernel-2.4.20-19.8.i586.rpm ftp://updates.redhat.com/8.0/en/os/i586/kernel-smp-2.4.20-19.8.i586.rpm i686: ftp://updates.redhat.com/8.0/en/os/i686/kernel-2.4.20-19.8.i686.rpm ftp://updates.redhat.com/8.0/en/os/i686/kernel-smp-2.4.20-19.8.i686.rpm ftp://updates.redhat.com/8.0/en/os/i686/kernel-bigmem-2.4.20-19.8.i686.rpm Red Hat Linux 9: SRPMS: ftp://updates.redhat.com/9/en/os/SRPMS/kernel-2.4.20-19.9.src.rpm athlon: ftp://updates.redhat.com/9/en/os/athlon/kernel-2.4.20-19.9.athlon.rpm ftp://updates.redhat.com/9/en/os/athlon/kernel-smp-2.4.20-19.9.athlon.rpm i386: ftp://updates.redhat.com/9/en/os/i386/kernel-2.4.20-19.9.i386.rpm ftp://updates.redhat.com/9/en/os/i386/kernel-source-2.4.20-19.9.i386.rpm ftp://updates.redhat.com/9/en/os/i386/kernel-doc-2.4.20-19.9.i386.rpm ftp://updates.redhat.com/9/en/os/i386/kernel-BOOT-2.4.20-19.9.i386.rpm i586: ftp://updates.redhat.com/9/en/os/i586/kernel-2.4.20-19.9.i586.rpm ftp://updates.redhat.com/9/en/os/i586/kernel-smp-2.4.20-19.9.i586.rpm i686: ftp://updates.redhat.com/9/en/os/i686/kernel-2.4.20-19.9.i686.rpm ftp://updates.redhat.com/9/en/os/i686/kernel-smp-2.4.20-19.9.i686.rpm ftp://updates.redhat.com/9/en/os/i686/kernel-bigmem-2.4.20-19.9.i686.rpm 6. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- 698d00bb8d014e20e717b554aa582bf5 7.1/en/os/SRPMS/kernel-2.4.20-19.7.src.rpm 41a8c2599df485a6299bcde0a25ae284 7.1/en/os/athlon/kernel-2.4.20-19.7.athlon.rpm dc872a77835fc0fd81d54905ba979183 7.1/en/os/athlon/kernel-smp-2.4.20-19.7.athlon.rpm 41e4f2992c6beaf0a4d3fdbb631c5e9d 7.1/en/os/i386/kernel-2.4.20-19.7.i386.rpm 64894543c12748599d6abb945d0c03c9 7.1/en/os/i386/kernel-BOOT-2.4.20-19.7.i386.rpm 02634a9fdecc9a9b8c028187b9c0dccc 7.1/en/os/i386/kernel-doc-2.4.20-19.7.i386.rpm 537f69c51f85b04130082d06a6497946 7.1/en/os/i386/kernel-source-2.4.20-19.7.i386.rpm 7e6672a3758853a9fe482dd1840b570c 7.1/en/os/i586/kernel-2.4.20-19.7.i586.rpm a17f6e2e1ec4cd10fa34377092bfb075 7.1/en/os/i586/kernel-smp-2.4.20-19.7.i586.rpm a7a968d159074b0d7d9bf570e0d4453b 7.1/en/os/i686/kernel-2.4.20-19.7.i686.rpm 50e7098370f3184b9f8170883a63af4c 7.1/en/os/i686/kernel-bigmem-2.4.20-19.7.i686.rpm 5e28ba6b0d2e8562f572de0b0724eeb7 7.1/en/os/i686/kernel-smp-2.4.20-19.7.i686.rpm 698d00bb8d014e20e717b554aa582bf5 7.2/en/os/SRPMS/kernel-2.4.20-19.7.src.rpm 41a8c2599df485a6299bcde0a25ae284 7.2/en/os/athlon/kernel-2.4.20-19.7.athlon.rpm dc872a77835fc0fd81d54905ba979183 7.2/en/os/athlon/kernel-smp-2.4.20-19.7.athlon.rpm 41e4f2992c6beaf0a4d3fdbb631c5e9d 7.2/en/os/i386/kernel-2.4.20-19.7.i386.rpm 64894543c12748599d6abb945d0c03c9 7.2/en/os/i386/kernel-BOOT-2.4.20-19.7.i386.rpm 02634a9fdecc9a9b8c028187b9c0dccc 7.2/en/os/i386/kernel-doc-2.4.20-19.7.i386.rpm 537f69c51f85b04130082d06a6497946 7.2/en/os/i386/kernel-source-2.4.20-19.7.i386.rpm 7e6672a3758853a9fe482dd1840b570c 7.2/en/os/i586/kernel-2.4.20-19.7.i586.rpm a17f6e2e1ec4cd10fa34377092bfb075 7.2/en/os/i586/kernel-smp-2.4.20-19.7.i586.rpm a7a968d159074b0d7d9bf570e0d4453b 7.2/en/os/i686/kernel-2.4.20-19.7.i686.rpm 50e7098370f3184b9f8170883a63af4c 7.2/en/os/i686/kernel-bigmem-2.4.20-19.7.i686.rpm 5e28ba6b0d2e8562f572de0b0724eeb7 7.2/en/os/i686/kernel-smp-2.4.20-19.7.i686.rpm 698d00bb8d014e20e717b554aa582bf5 7.3/en/os/SRPMS/kernel-2.4.20-19.7.src.rpm 41a8c2599df485a6299bcde0a25ae284 7.3/en/os/athlon/kernel-2.4.20-19.7.athlon.rpm dc872a77835fc0fd81d54905ba979183 7.3/en/os/athlon/kernel-smp-2.4.20-19.7.athlon.rpm 41e4f2992c6beaf0a4d3fdbb631c5e9d 7.3/en/os/i386/kernel-2.4.20-19.7.i386.rpm 64894543c12748599d6abb945d0c03c9 7.3/en/os/i386/kernel-BOOT-2.4.20-19.7.i386.rpm 02634a9fdecc9a9b8c028187b9c0dccc 7.3/en/os/i386/kernel-doc-2.4.20-19.7.i386.rpm 537f69c51f85b04130082d06a6497946 7.3/en/os/i386/kernel-source-2.4.20-19.7.i386.rpm 7e6672a3758853a9fe482dd1840b570c 7.3/en/os/i586/kernel-2.4.20-19.7.i586.rpm a17f6e2e1ec4cd10fa34377092bfb075 7.3/en/os/i586/kernel-smp-2.4.20-19.7.i586.rpm a7a968d159074b0d7d9bf570e0d4453b 7.3/en/os/i686/kernel-2.4.20-19.7.i686.rpm 50e7098370f3184b9f8170883a63af4c 7.3/en/os/i686/kernel-bigmem-2.4.20-19.7.i686.rpm 5e28ba6b0d2e8562f572de0b0724eeb7 7.3/en/os/i686/kernel-smp-2.4.20-19.7.i686.rpm cf43c708a8c9b92a273aad9782ebe3fc 8.0/en/os/SRPMS/kernel-2.4.20-19.8.src.rpm 8fc7f90b8e8d557c41d6cf2547952c1d 8.0/en/os/athlon/kernel-2.4.20-19.8.athlon.rpm 52b18ab6ae28422e518642517644da35 8.0/en/os/athlon/kernel-smp-2.4.20-19.8.athlon.rpm fbfff1b36f17e26e6a1ce479ef49e365 8.0/en/os/i386/kernel-2.4.20-19.8.i386.rpm 4d8350dd66be36060bf0551f36a9eb6f 8.0/en/os/i386/kernel-BOOT-2.4.20-19.8.i386.rpm af87de700f6b2568e6b7d5ed4ef75df1 8.0/en/os/i386/kernel-doc-2.4.20-19.8.i386.rpm b5e079c96b00226951564afcc2d4d5af 8.0/en/os/i386/kernel-source-2.4.20-19.8.i386.rpm 8cc317a6f56dbdc0c1464a7e96ee37b8 8.0/en/os/i586/kernel-2.4.20-19.8.i586.rpm a552754aad9099019c18cdc8d5cb1f41 8.0/en/os/i586/kernel-smp-2.4.20-19.8.i586.rpm 9f0d0622b37dc199e8cb79acfc426d74 8.0/en/os/i686/kernel-2.4.20-19.8.i686.rpm f91b6e385290e82075c2b321247f8ada 8.0/en/os/i686/kernel-bigmem-2.4.20-19.8.i686.rpm 9856cb68f2f32410ae5ffc7a9789bccb 8.0/en/os/i686/kernel-smp-2.4.20-19.8.i686.rpm 6ca9ea03ece1c3a40d0c1acb5bb5d2f2 9/en/os/SRPMS/kernel-2.4.20-19.9.src.rpm 2e1ecff32d8c91126f96032576afbe7b 9/en/os/athlon/kernel-2.4.20-19.9.athlon.rpm a22c6fc30dc64d1394361f93890fc23e 9/en/os/athlon/kernel-smp-2.4.20-19.9.athlon.rpm 030ed2ec0324b58a1e80e8c7ee54effe 9/en/os/i386/kernel-2.4.20-19.9.i386.rpm f97f319353b32eeb2f96a0311135c856 9/en/os/i386/kernel-BOOT-2.4.20-19.9.i386.rpm d31fe42a6b1269362dd70ee361bdc94d 9/en/os/i386/kernel-doc-2.4.20-19.9.i386.rpm 0daf50da25ade8cce42e7445dfe0d24c 9/en/os/i386/kernel-source-2.4.20-19.9.i386.rpm bd471aa92a83aa40c6fc4ee06e5f2f0e 9/en/os/i586/kernel-2.4.20-19.9.i586.rpm cafec48037739216070833def01a3832 9/en/os/i586/kernel-smp-2.4.20-19.9.i586.rpm e940c18ed58ca525ba0545be23ce43b4 9/en/os/i686/kernel-2.4.20-19.9.i686.rpm b2216f3ac6697ca319ed8547a1edb320 9/en/os/i686/kernel-bigmem-2.4.20-19.9.i686.rpm bb8b49b539bf16b8bce329d80dfafaca 9/en/os/i686/kernel-smp-2.4.20-19.9.i686.rpm These packages are GPG signed by Red Hat for security. Our key is available from http://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0461 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0462 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0476 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0501 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0550 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0551 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0552 8. Contact: The Red Hat security contact is . More contact details at http://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE/HAkuXlSAg2UNWIIRAsz6AKCknjao8gejYDstoUdX3cOd+GQ1WgCgjGyn A7P+z9B6vegwVVNgIWdEGBY= =6vJH -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html