RHEL 3 : kernel (RHSA-2005:043)

medium Nessus Plugin ID 16211

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated kernel packages that fix several security issues in Red Hat Enterprise Linux 3 are now available.

The Linux kernel handles the basic functions of the operating system.

This advisory includes fixes for several security issues :

iSEC Security Research discovered a VMA handling flaw in the uselib(2) system call of the Linux kernel. A local user could make use of this flaw to gain elevated (root) privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1235 to this issue.

A flaw was discovered where an executable could cause a VMA overlap leading to a crash. A local user could trigger this flaw by creating a carefully crafted a.out binary on 32-bit systems or a carefully crafted ELF binary on Itanium systems. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0003 to this issue.

iSEC Security Research discovered a flaw in the page fault handler code that could lead to local users gaining elevated (root) privileges on multiprocessor machines. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0001 to this issue. A patch that coincidentally fixed this issue was committed to the Update 4 kernel release in December 2004. Therefore Red Hat Enterprise Linux 3 kernels provided by RHBA-2004:550 and subsequent updates are not vulnerable to this issue.

A flaw in the system call filtering code in the audit subsystem included in Red Hat Enterprise Linux 3 allowed a local user to cause a crash when auditing was enabled. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1237 to this issue.

Olaf Kirch discovered that the recent security fixes for cmsg_len handling (CVE-2004-1016) broke 32-bit compatibility on 64-bit platforms such as AMD64 and Intel EM64T. A patch to correct this issue is included.

A recent Internet Draft by Fernando Gont recommended that ICMP Source Quench messages be ignored by hosts. A patch to ignore these messages is included.

Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2004-0791

https://access.redhat.com/security/cve/cve-2004-1074

https://access.redhat.com/security/cve/cve-2004-1235

https://access.redhat.com/security/cve/cve-2004-1237

https://access.redhat.com/security/cve/cve-2005-0003

https://marc.info/?m=109503896031720

https://isec.pl/en/vulnerabilities/isec-0021-uselib.txt

https://isec.pl/en/vulnerabilities/isec-0022-pagefault.txt

https://access.redhat.com/errata/RHSA-2005:043

Plugin Details

Severity: Medium

ID: 16211

File Name: redhat-RHSA-2005-043.nasl

Version: 1.35

Type: local

Agent: unix

Published: 1/19/2005

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 6

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:3, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-doc, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem, p-cpe:/a:redhat:enterprise_linux:kernel-smp, p-cpe:/a:redhat:enterprise_linux:kernel-boot, p-cpe:/a:redhat:enterprise_linux:kernel-source, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported, p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported, p-cpe:/a:redhat:enterprise_linux:kernel-unsupported

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/18/2005

Vulnerability Publication Date: 1/10/2005

Reference Information

CVE: CVE-2004-0791, CVE-2004-1074, CVE-2004-1235, CVE-2004-1237, CVE-2005-0001, CVE-2005-0003

BID: 13124

RHSA: 2005:043