--------------------------------------------------------------------- Fedora Legacy Test Update Notification FEDORALEGACY-2005-152532 Bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532 2005-05-02 --------------------------------------------------------------------- Name : kernel Versions : rh7.3: kernel-2.4.20-43.7.legacy Versions : rh9: kernel-2.4.20-43.9.legacy Versions : fc1: kernel-2.4.22-1.2199.5.legacy Summary : The Linux kernel (the core of the Linux operating system). Description : The kernel package contains the Linux kernel (vmlinuz), the core of the Red Hat Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. --------------------------------------------------------------------- Update Information: Updated kernel packages that fix several security issues are now available. The Linux kernel handles the basic functions of the operating system. This update includes fixes for several security issues: A race condition was discovered. Local users could use this flaw to read the environment variables of another process that is still spawning via /proc/.../cmdline. (CAN-2004-1058) An integer overflow was discovered in the vc_resize function. A local user could cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow. (CAN-2004-1333) A flaw was discovered in the Linux PPP driver. On systems allowing remote users to connect to a server using ppp, a remote client could cause a denial of service (system crash). (CAN-2005-0384) A flaw was discovered in ext2 filesystem support. When a new directory is created, the ext2 block written to disk is not initialized, leading to an information leak. (CAN-2005-0400) A flaw in fragment queuing was discovered affecting the netfilter subsystem. On systems configured to filter or process network packets (for example those configured to do firewalling), a remote attacker could send a carefully crafted set of fragmented packets to a machine and cause a denial of service (system crash). In order to sucessfully exploit this flaw, the attacker would need to know (or guess) some aspects of the firewall ruleset in place on the target system to be able to craft the right fragmented packets. (CAN-2005-0449) The moxa char driver was missing a CAP_SYS_RAWIO check which could allow a local user the ability to do things like replace the firmware. (CAN-2005-0504) A flaw when freeing a pointer in load_elf_library was discovered. A local user could potentially use this flaw to cause a denial of service (system crash). (CAN-2005-0749) A flaw was discovered in the bluetooth driver system. On system where the bluetooth modules are loaded, a local user could use this flaw to gain elevated (root) privileges. (CAN-2005-0750) Michal Zalewski discovered some flaws in the iso9660 filesystem. These flaws could allow a malicious iso filesystem to cause a DoS or potentially execute arbitrary code if mounted/examined. (CAN-2005-0815) All users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. Please note that the fix for CAN-2005-0449 required changing the external symbol linkages (kernel module ABI) for the ip_defrag() and ip_ct_gather_frags() functions. Any third-party module using either of these would also need to be fixed. --------------------------------------------------------------------- Changelogs rh73: * Mon Apr 25 2005 Marc Deslauriers <marcdeslauriers@xxxxxxxxxxxx> 2.4.20-43.7.legacy - Added patch for CAN-2004-1058 proc_pid_cmdline race based on part of the linux-2.4.18-smallpatches.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2004-1333 vtresize based on vtresize from kernel-source-2.4.20.SuSE-133.src.rpm - Added patch for CAN-2005-0384 based on linux-2.4.21-netfixes.patch in kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0400 (ext2 mkdir leak) from bitkeeper (see patch header) - Added patch for CAN-2005-0449 (ipfrag flush) from rediffed linux-2.4.21-ipfrag-flush.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0504 moxy CAP_SYS_RAWIO from Bitkeeper (see patch header) - Added patch for CAN-2005-0749 load_elf_library DoS based on linux-2.4.21-binfmt-elf.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0750 bluetooth security issue based on linux-2.4.21-netfixes.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0815 (isofs range checking flaw) from bitkeeper (see patch header) rh9: * Mon Apr 25 2005 Marc Deslauriers <marcdeslauriers@xxxxxxxxxxxx> 2.4.20-43.7.legacy - Added patch for CAN-2004-1058 proc_pid_cmdline race based on part of the linux-2.4.18-smallpatches.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2004-1333 vtresize based on vtresize from kernel-source-2.4.20.SuSE-133.src.rpm - Added patch for CAN-2005-0384 based on linux-2.4.21-netfixes.patch in kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0400 (ext2 mkdir leak) from bitkeeper (see patch header) - Added patch for CAN-2005-0449 (ipfrag flush) from rediffed linux-2.4.21-ipfrag-flush.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0504 moxy CAP_SYS_RAWIO from Bitkeeper (see patch header) - Added patch for CAN-2005-0749 load_elf_library DoS based on linux-2.4.21-binfmt-elf.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0750 bluetooth security issue based on linux-2.4.21-netfixes.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0815 (isofs range checking flaw) from bitkeeper (see patch header) fc1: * Tue Apr 26 2005 Marc Deslauriers <marcdeslauriers@xxxxxxxxxxxx> 2.4.22-1.2199.5.legacy.nptl - Added patch for CAN-2004-1058 proc_pid_cmdline race based on part of the linux-2.4.18-smallpatches.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2004-1333 vtresize based on vtresize from kernel-source-2.4.20.SuSE-133.src.rpm - Added patch for CAN-2005-0384 based on linux-2.4.21-netfixes.patch in kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0400 (ext2 mkdir leak) from bitkeeper (see patch header) - Added patch for CAN-2005-0449 (ipfrag flush) from rediffed linux-2.4.21-ipfrag-flush.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0749 load_elf_library DoS based on linux-2.4.21-binfmt-elf.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0750 bluetooth security issue based on linux-2.4.21-netfixes.patch from kernel-2.4.21-27.0.4.EL.src.rpm - Added patch for CAN-2005-0815 (isofs range checking flaw) from bitkeeper (see patch header) --------------------------------------------------------------------- This update can be downloaded from: http://download.fedoralegacy.org/ (sha1sums) rh7.3: 33794472a5fa20539f29eb7cc4a1d2e6ce769b06 redhat/7.3/updates-testing/i386/kernel-2.4.20-43.7.legacy.athlon.rpm 230a9443c30eb7d9733c16568a4d937ea2276bd4 redhat/7.3/updates-testing/i386/kernel-2.4.20-43.7.legacy.i386.rpm 17d0026c8cf717ed74be70b25b13da6063ec7e30 redhat/7.3/updates-testing/i386/kernel-2.4.20-43.7.legacy.i586.rpm 5dc8f0385fd068bd2274337989faebc7c6ec1726 redhat/7.3/updates-testing/i386/kernel-2.4.20-43.7.legacy.i686.rpm f286d3c08cf28c9c4a20c950d2eb795c5b5737ff redhat/7.3/updates-testing/i386/kernel-bigmem-2.4.20-43.7.legacy.i686.rpm ddb00a518b2426230fe5e1da5e115691e39f09c8 redhat/7.3/updates-testing/i386/kernel-BOOT-2.4.20-43.7.legacy.i386.rpm 904f2b51aaed8aa96583b7e2bd40365b75cb6faa redhat/7.3/updates-testing/i386/kernel-doc-2.4.20-43.7.legacy.i386.rpm b332b272d0a4854af3131693708c05f39797e9af redhat/7.3/updates-testing/i386/kernel-smp-2.4.20-43.7.legacy.athlon.rpm 933b9cb0ca14334c320c7458f61a700a8e002abd redhat/7.3/updates-testing/i386/kernel-smp-2.4.20-43.7.legacy.i586.rpm 95339a7d9b57381d6a967d7fa0c70675b1c2e34a redhat/7.3/updates-testing/i386/kernel-smp-2.4.20-43.7.legacy.i686.rpm c054c08870c77ce47030511ebfc35566fcd216f5 redhat/7.3/updates-testing/i386/kernel-source-2.4.20-43.7.legacy.i386.rpm c7b8495a1c84cdcf22bf99748e1346614777cdba redhat/7.3/updates-testing/SRPMS/kernel-2.4.20-43.7.legacy.src.rpm rh9: 06664b11750a20c552ef4f9f391976429335516e redhat/9/updates-testing/i386/kernel-2.4.20-43.9.legacy.athlon.rpm 523c7336e869cc3aac6356b838eb3e7458f7b471 redhat/9/updates-testing/i386/kernel-2.4.20-43.9.legacy.i386.rpm 66a5186361dcdb4cb4c8c1dccb63e56d11a14f58 redhat/9/updates-testing/i386/kernel-2.4.20-43.9.legacy.i586.rpm a138ce79569e85745c9cc2e352ec03c32d048de5 redhat/9/updates-testing/i386/kernel-2.4.20-43.9.legacy.i686.rpm e595403bc87b08c1dd4090de032bf7d9b4400a67 redhat/9/updates-testing/i386/kernel-bigmem-2.4.20-43.9.legacy.i686.rpm ec99c85958ab259128855cc1b0be74c83e6e3f0e redhat/9/updates-testing/i386/kernel-BOOT-2.4.20-43.9.legacy.i386.rpm 536fa79aa0a5f02e9f8b54c5c88e5a429dbdb114 redhat/9/updates-testing/i386/kernel-doc-2.4.20-43.9.legacy.i386.rpm b16cc40913f423d5c8adbcf755c07621d42b1df0 redhat/9/updates-testing/i386/kernel-smp-2.4.20-43.9.legacy.athlon.rpm 8db2f89803e02ee40af386e192813c3441d9ef12 redhat/9/updates-testing/i386/kernel-smp-2.4.20-43.9.legacy.i586.rpm 9665eda39738126699e2e999c5563e47826270c8 redhat/9/updates-testing/i386/kernel-smp-2.4.20-43.9.legacy.i686.rpm 6a61f8971a1ba0f51399956aed24789065ece2b4 redhat/9/updates-testing/i386/kernel-source-2.4.20-43.9.legacy.i386.rpm 35d0fc7714b2c0274b6af35996c26335ea8d3555 redhat/9/updates-testing/SRPMS/kernel-2.4.20-43.9.legacy.src.rpm fc1: e1dd5d1ee6ba69871dd06ce679734eadf5c4c9ed fedora/1/updates-testing/i386/kernel-2.4.22-1.2199.5.legacy.nptl.athlon.rpm 23a4afe07cd72f23b429730c32f88f5fe92e8f6f fedora/1/updates-testing/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i586.rpm 5da916582b12a4625e54eb0cfb3d200dbeb5360b fedora/1/updates-testing/i386/kernel-2.4.22-1.2199.5.legacy.nptl.i686.rpm fbdf463056180fd41abe4d8afc165d187163390d fedora/1/updates-testing/i386/kernel-BOOT-2.4.22-1.2199.5.legacy.nptl.i386.rpm 03298f9d3057661b2912fefa73cde94c42d2377e fedora/1/updates-testing/i386/kernel-doc-2.4.22-1.2199.5.legacy.nptl.i386.rpm 2419d19c66420c55a50ca82d0ef41aaab7992136 fedora/1/updates-testing/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.athlon.rpm 8dcd88461c7922a07b7c1bad054b480a997828ea fedora/1/updates-testing/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i586.rpm c95bddfc477c11c46d562c3bd28f407ebdcd8ae3 fedora/1/updates-testing/i386/kernel-smp-2.4.22-1.2199.5.legacy.nptl.i686.rpm 0fe3402917235049865cedc80ad5eb72c1984df2 fedora/1/updates-testing/i386/kernel-source-2.4.22-1.2199.5.legacy.nptl.i386.rpm cfb0d7b297116b99ef08a30d7d9fef0c9e24a490 fedora/1/updates-testing/SRPMS/kernel-2.4.22-1.2199.5.legacy.nptl.src.rpm --------------------------------------------------------------------- Please test and comment in bugzilla.
Attachment:
signature.asc
Description: OpenPGP digital signature
-- fedora-legacy-list@xxxxxxxxxx http://www.redhat.com/mailman/listinfo/fedora-legacy-list