Jump to content
Compatible Support Forums
Sign in to follow this  
news

[RHSA-2008:0612-01] Important: kernel security and bug fix update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Important: kernel security and bug fix update

Advisory ID: RHSA-2008:0612-01

Product: Red Hat Enterprise Linux

Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0612.html

Issue date: 2008-08-04

CVE Names: CVE-2008-2136 CVE-2008-1294 CVE-2008-2812

=====================================================================

 

1. Summary:

 

Updated kernel packages that fix various security issues and several bugs

are now available for Red Hat Enterprise Linux 5.

 

This update has been rated as having important security impact by the Red

Hat Security Response Team.

 

2. Relevant releases/architectures:

 

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64

 

3. Description:

 

The kernel packages contain the Linux kernel, the core of any Linux

operating system.

 

These updated packages fix the following security issues:

 

* a possible kernel memory leak was found in the Linux kernel Simple

Internet Transition (SIT) INET6 implementation. This could allow a local

unprivileged user to cause a denial of service. (CVE-2008-2136, Important)

 

* a flaw was found in the Linux kernel setrlimit system call, when setting

RLIMIT_CPU to a certain value. This could allow a local unprivileged user

to bypass the CPU time limit. (CVE-2008-1294, Moderate)

 

* multiple NULL pointer dereferences were found in various Linux kernel

network drivers. These drivers were missing checks for terminal validity,

which could allow privilege escalation. (CVE-2008-2812, Moderate)

 

These updated packages fix the following bugs:

 

* the GNU libc stub resolver is a minimal resolver that works with Domain

Name System (DNS) servers to satisfy requests from applications for names.

The GNU libc stub resolver did not specify a source UDP port, and therefore

used predictable port numbers. This could have made DNS spoofing attacks

easier.

 

The Linux kernel has been updated to implement random UDP source ports

where none are specified by an application. This allows applications, such

as those using the GNU libc stub resolver, to use random UDP source ports,

helping to make DNS spoofing attacks harder.

 

* when using certain hardware, a bug in UART_BUG_TXEN may have caused

incorrect hardware detection, causing data flow to "/dev/ttyS1" to hang.

 

* a 50-75% drop in NFS server rewrite performance, compared to Red Hat

Enterprise Linux 4.6, has been resolved.

 

* due a bug in the fast userspace mutex code, while one thread fetched a

pointer, another thread may have removed it, causing the first thread to

fetch the wrong pointer, possibly causing a system crash.

 

* on certain Hitachi hardware, removing the "uhci_hcd" module caused a

kernel oops, and the following error:

 

BUG: warning at arch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()

 

Even after the "uhci_hcd" module was reloaded, there was no access to USB

devices. As well, on systems that have legacy interrupts,

"acpi_unregister_gsi" incorrectly called "iosapci_unregister_intr()",

causing warning messages to be logged.

 

* when a page was mapped with mmap(), and "PROT_WRITE" was the only

"prot" argument, the first read of that page caused a segmentation fault.

If the page was read after it was written to, no fault occurred. This was

incompatible with the Red Hat Enterprise Linux 4 behavior.

 

* due to a NULL pointer dereference in powernowk8_init(), a panic may

have occurred.

 

* certain error conditions handled by the bonding sysfs interface could

have left rtnl_lock() unbalanced, either by locking and returning without

unlocking, or by unlocking when it did not lock, possibly causing a

"kernel: RTNL: assertion failed at net/core/fib_rules.c" error.

 

* the kernel currently expects a maximum of six Machine Check Exception

(MCE) banks to be exposed by a CPU. Certain CPUs have 7 or more, which may

have caused the MCE to be incorrectly reported.

 

* a race condition in UNIX domain sockets may have caused recv() to return

zero. For clusters, this may have caused unexpected failovers.

 

* msgrcv() frequently returned an incorrect "ERESTARTNOHAND (514)" error

number.

 

* on certain Intel Itanium-based systems, when kdump was configured to halt

the system after a dump operation, after the "System halted." output, the

kernel continued to output endless "soft lockup" messages.

 

Red Hat Enterprise Linux 5 users are advised to upgrade to these updated

packages, which contain backported patches to resolve these issues.

 

4. Solution:

 

Before applying this update, make sure that all previously-released

errata relevant to your system have been applied.

 

This update is available via Red Hat Network. Details on how to use

the Red Hat Network to apply this update are available at

http://kbase.redhat.com/faq/FAQ_58_10188

 

5. Bugs fixed (http://bugzilla.redhat.com/):

 

437114 - CVE-2008-1294 kernel: setrlimit(RLIMIT_CPUINFO) with zero value doesn't inherit properly across children

437121 - CVE-2008-1294 kernel: setrlimit(RLIMIT_CPUINFO) with zero value doesn't inherit properly across children [rhel-5.2.z]

443071 - [stratus 5.2.z][1/2] ttyS1 lost interrupt and it stops transmitting [rhel-5.2.z]

446031 - CVE-2008-2136 kernel: sit memory leak

446038 - CVE-2008-2136 kernel: sit: exploitable remote memory leak [rhel-5.2.z]

448685 - 50-75 % drop in nfs-server rewrite performance compared to rhel 4.6+ [rhel-5.2.z]

450336 - Kernel crash on futex [rhel-5.2.z]

450337 - [RHEL5] BUG: warning at arch/ia64/kernel/iosapic.c:1001/iosapic_unregiste

450758 - mmap() with PROT_WRITE on RHEL5 incompatible with RHEL4.

450866 - RHEL 5.3 NULL pointer dereferenced in powernowk8_init

451939 - bonding driver can leave rtnl_lock unbalanced

451941 - RHEL 5.3 extend MCE banks support for Dunnington, Nehalem, and beyond

452231 - [RHEL5.1] In unix domain sockets, recv() may incorrectly return zero

452482 - CVE-2008-2826 kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow [rhel-5.2.z]

453419 - CVE-2008-2812 kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code

453425 - CVE-2008-2812 kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code [rhel-5.2.z]

454566 - kernel: randomize udp port allocation

454571 - kernel: randomize udp port allocation [rhel-5.2.z]

455256 - [stratus 5.2.z][2/2] ttyS1 lost interrupt and it stops transmitting

455278 - The msgrcv() syscall fails with error number 514 (ERESTARTNOHAND).

456117 - [REG][5.3] Soft lockup is detected

 

6. Package List:

 

Red Hat Enterprise Linux Desktop (v. 5 client):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-92.1.10.el5.src.rpm

 

i386:

kernel-2.6.18-92.1.10.el5.i686.rpm

kernel-PAE-2.6.18-92.1.10.el5.i686.rpm

kernel-PAE-debuginfo-2.6.18-92.1.10.el5.i686.rpm

kernel-PAE-devel-2.6.18-92.1.10.el5.i686.rpm

kernel-debug-2.6.18-92.1.10.el5.i686.rpm

kernel-debug-debuginfo-2.6.18-92.1.10.el5.i686.rpm

kernel-debug-devel-2.6.18-92.1.10.el5.i686.rpm

kernel-debuginfo-2.6.18-92.1.10.el5.i686.rpm

kernel-debuginfo-common-2.6.18-92.1.10.el5.i686.rpm

kernel-devel-2.6.18-92.1.10.el5.i686.rpm

kernel-headers-2.6.18-92.1.10.el5.i386.rpm

kernel-xen-2.6.18-92.1.10.el5.i686.rpm

kernel-xen-debuginfo-2.6.18-92.1.10.el5.i686.rpm

kernel-xen-devel-2.6.18-92.1.10.el5.i686.rpm

 

noarch:

kernel-doc-2.6.18-92.1.10.el5.noarch.rpm

 

x86_64:

kernel-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debug-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debug-debuginfo-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debug-devel-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debuginfo-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debuginfo-common-2.6.18-92.1.10.el5.x86_64.rpm

kernel-devel-2.6.18-92.1.10.el5.x86_64.rpm

kernel-headers-2.6.18-92.1.10.el5.x86_64.rpm

kernel-xen-2.6.18-92.1.10.el5.x86_64.rpm

kernel-xen-debuginfo-2.6.18-92.1.10.el5.x86_64.rpm

kernel-xen-devel-2.6.18-92.1.10.el5.x86_64.rpm

 

Red Hat Enterprise Linux (v. 5 server):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-92.1.10.el5.src.rpm

 

i386:

kernel-2.6.18-92.1.10.el5.i686.rpm

kernel-PAE-2.6.18-92.1.10.el5.i686.rpm

kernel-PAE-debuginfo-2.6.18-92.1.10.el5.i686.rpm

kernel-PAE-devel-2.6.18-92.1.10.el5.i686.rpm

kernel-debug-2.6.18-92.1.10.el5.i686.rpm

kernel-debug-debuginfo-2.6.18-92.1.10.el5.i686.rpm

kernel-debug-devel-2.6.18-92.1.10.el5.i686.rpm

kernel-debuginfo-2.6.18-92.1.10.el5.i686.rpm

kernel-debuginfo-common-2.6.18-92.1.10.el5.i686.rpm

kernel-devel-2.6.18-92.1.10.el5.i686.rpm

kernel-headers-2.6.18-92.1.10.el5.i386.rpm

kernel-xen-2.6.18-92.1.10.el5.i686.rpm

kernel-xen-debuginfo-2.6.18-92.1.10.el5.i686.rpm

kernel-xen-devel-2.6.18-92.1.10.el5.i686.rpm

 

ia64:

kernel-2.6.18-92.1.10.el5.ia64.rpm

kernel-debug-2.6.18-92.1.10.el5.ia64.rpm

kernel-debug-debuginfo-2.6.18-92.1.10.el5.ia64.rpm

kernel-debug-devel-2.6.18-92.1.10.el5.ia64.rpm

kernel-debuginfo-2.6.18-92.1.10.el5.ia64.rpm

kernel-debuginfo-common-2.6.18-92.1.10.el5.ia64.rpm

kernel-devel-2.6.18-92.1.10.el5.ia64.rpm

kernel-headers-2.6.18-92.1.10.el5.ia64.rpm

kernel-xen-2.6.18-92.1.10.el5.ia64.rpm

kernel-xen-debuginfo-2.6.18-92.1.10.el5.ia64.rpm

kernel-xen-devel-2.6.18-92.1.10.el5.ia64.rpm

 

noarch:

kernel-doc-2.6.18-92.1.10.el5.noarch.rpm

 

ppc:

kernel-2.6.18-92.1.10.el5.ppc64.rpm

kernel-debug-2.6.18-92.1.10.el5.ppc64.rpm

kernel-debug-debuginfo-2.6.18-92.1.10.el5.ppc64.rpm

kernel-debug-devel-2.6.18-92.1.10.el5.ppc64.rpm

kernel-debuginfo-2.6.18-92.1.10.el5.ppc64.rpm

kernel-debuginfo-common-2.6.18-92.1.10.el5.ppc64.rpm

kernel-devel-2.6.18-92.1.10.el5.ppc64.rpm

kernel-headers-2.6.18-92.1.10.el5.ppc.rpm

kernel-headers-2.6.18-92.1.10.el5.ppc64.rpm

kernel-kdump-2.6.18-92.1.10.el5.ppc64.rpm

kernel-kdump-debuginfo-2.6.18-92.1.10.el5.ppc64.rpm

kernel-kdump-devel-2.6.18-92.1.10.el5.ppc64.rpm

 

s390x:

kernel-2.6.18-92.1.10.el5.s390x.rpm

kernel-debug-2.6.18-92.1.10.el5.s390x.rpm

kernel-debug-debuginfo-2.6.18-92.1.10.el5.s390x.rpm

kernel-debug-devel-2.6.18-92.1.10.el5.s390x.rpm

kernel-debuginfo-2.6.18-92.1.10.el5.s390x.rpm

kernel-debuginfo-common-2.6.18-92.1.10.el5.s390x.rpm

kernel-devel-2.6.18-92.1.10.el5.s390x.rpm

kernel-headers-2.6.18-92.1.10.el5.s390x.rpm

kernel-kdump-2.6.18-92.1.10.el5.s390x.rpm

kernel-kdump-debuginfo-2.6.18-92.1.10.el5.s390x.rpm

kernel-kdump-devel-2.6.18-92.1.10.el5.s390x.rpm

 

x86_64:

kernel-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debug-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debug-debuginfo-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debug-devel-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debuginfo-2.6.18-92.1.10.el5.x86_64.rpm

kernel-debuginfo-common-2.6.18-92.1.10.el5.x86_64.rpm

kernel-devel-2.6.18-92.1.10.el5.x86_64.rpm

kernel-headers-2.6.18-92.1.10.el5.x86_64.rpm

kernel-xen-2.6.18-92.1.10.el5.x86_64.rpm

kernel-xen-debuginfo-2.6.18-92.1.10.el5.x86_64.rpm

kernel-xen-devel-2.6.18-92.1.10.el5.x86_64.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://www.redhat.com/security/team/key/#package

 

7. References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2136

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1294

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812

http://www.redhat.com/security/updates/classification/#important

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://www.redhat.com/security/team/contact/

 

Copyright 2008 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.4 (GNU/Linux)

 

iD8DBQFIl0acXlSAg2UNWIIRAmx7AJ9EqbxKVtyHNB6hgSwnNPJtlN/2TACeOrhL

s93hx8mgC+E8SOSj99TwQKM=

=hgzc

-----END PGP SIGNATURE-----

 

 

--

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×