Red Hat alert: New kernel 2.2 packages are available

Posted by dave on Oct 18, 2001 2:43 PM EDT
Mailing list
Mail this story
Print this story

A vulnerability has been found in the ptrace code of the kernel (ptrace is the part that allows program debuggers to run) that could be abused by local users to gain root privileges.

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          New kernel 2.2 packages are available
Advisory ID:       RHSA-2001:130-04
Issue date:        2001-10-09
Updated on:        2001-10-16
Product:           Red Hat Linux
Keywords:          ptrace local root kernel
Cross references:  
Obsoletes:         
---------------------------------------------------------------------

1. Topic:

A vulnerability has been found in the ptrace code of the kernel (ptrace is
the part that allows program debuggers to run) that could be abused by
local users to gain root privileges.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, i586, i686, sparc, sparc64

Red Hat Linux 6.2EE - alpha, i386, i586, i686, sparc, sparc64

Red Hat Linux 6.2J - alpha, i386, i586, i686, sparc, sparc64

Red Hat Linux 7.0 - alpha, i386, i586, i686

Red Hat Linux 7.0J - alpha, i386, i586, i686

Red Hat Linux 7.0tc - alpha, i386, i586, i686

3. Problem description:



4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied. 

The procedure for upgrading the kernel is documented at:

http://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network.  Many
people find this to be an easier way to apply updates.  To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):



6. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/kernel-2.2.19-6.2.10.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-enterprise-2.2.19-6.2.10.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-smp-2.2.19-6.2.10.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-2.2.19-6.2.10.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-BOOT-2.2.19-6.2.10.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-utils-2.2.19-6.2.10.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-doc-2.2.19-6.2.10.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-headers-2.2.19-6.2.10.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-source-2.2.19-6.2.10.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/kernel-jensen-2.2.19-6.2.10.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/kernel-smp-2.2.19-6.2.10.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-2.2.19-6.2.10.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-BOOT-2.2.19-6.2.10.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-ibcs-2.2.19-6.2.10.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-utils-2.2.19-6.2.10.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-pcmcia-cs-2.2.19-6.2.10.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-doc-2.2.19-6.2.10.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-headers-2.2.19-6.2.10.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-source-2.2.19-6.2.10.i386.rpm

i586:
ftp://updates.redhat.com/6.2/en/os/i586/kernel-smp-2.2.19-6.2.10.i586.rpm
ftp://updates.redhat.com/6.2/en/os/i586/kernel-2.2.19-6.2.10.i586.rpm

i686:
ftp://updates.redhat.com/6.2/en/os/i686/kernel-enterprise-2.2.19-6.2.10.i686.rpm
ftp://updates.redhat.com/6.2/en/os/i686/kernel-smp-2.2.19-6.2.10.i686.rpm
ftp://updates.redhat.com/6.2/en/os/i686/kernel-2.2.19-6.2.10.i686.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/kernel-enterprise-2.2.19-6.2.10.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/kernel-smp-2.2.19-6.2.10.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/kernel-2.2.19-6.2.10.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/kernel-BOOT-2.2.19-6.2.10.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/kernel-utils-2.2.19-6.2.10.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/kernel-doc-2.2.19-6.2.10.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/kernel-headers-2.2.19-6.2.10.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/kernel-source-2.2.19-6.2.10.sparc.rpm

sparc64:
ftp://updates.redhat.com/6.2/en/os/sparc64/kernel-enterprise-2.2.19-6.2.10.sparc64.rpm
ftp://updates.redhat.com/6.2/en/os/sparc64/kernel-smp-2.2.19-6.2.10.sparc64.rpm
ftp://updates.redhat.com/6.2/en/os/sparc64/kernel-2.2.19-6.2.10.sparc64.rpm
ftp://updates.redhat.com/6.2/en/os/sparc64/kernel-BOOT-2.2.19-6.2.10.sparc64.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/kernel-2.2.19-7.0.10.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-enterprise-2.2.19-7.0.10.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-smp-2.2.19-7.0.10.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-2.2.19-7.0.10.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-BOOT-2.2.19-7.0.10.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-utils-2.2.19-7.0.10.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-doc-2.2.19-7.0.10.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-source-2.2.19-7.0.10.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/kernel-jensen-2.2.19-7.0.10.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/kernel-smp-2.2.19-7.0.10.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-2.2.19-7.0.10.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-BOOT-2.2.19-7.0.10.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-ibcs-2.2.19-7.0.10.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-utils-2.2.19-7.0.10.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-pcmcia-cs-2.2.19-7.0.10.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-doc-2.2.19-7.0.10.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-source-2.2.19-7.0.10.i386.rpm

i586:
ftp://updates.redhat.com/7.0/en/os/i586/kernel-smp-2.2.19-7.0.10.i586.rpm
ftp://updates.redhat.com/7.0/en/os/i586/kernel-2.2.19-7.0.10.i586.rpm

i686:
ftp://updates.redhat.com/7.0/en/os/i686/kernel-enterprise-2.2.19-7.0.10.i686.rpm
ftp://updates.redhat.com/7.0/en/os/i686/kernel-smp-2.2.19-7.0.10.i686.rpm
ftp://updates.redhat.com/7.0/en/os/i686/kernel-2.2.19-7.0.10.i686.rpm



7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
63125f5e93dffb30ca6e21ff078f012f 6.2/en/os/SRPMS/kernel-2.2.19-6.2.10.src.rpm
a6ab1e6283c127b4fb376a86d43bba66 6.2/en/os/alpha/kernel-2.2.19-6.2.10.alpha.rpm
25bcb3529e1f95d8214ed24d98e7ec10 6.2/en/os/alpha/kernel-BOOT-2.2.19-6.2.10.alpha.rpm
bf090fe106346a7773c5ae644d961151 6.2/en/os/alpha/kernel-doc-2.2.19-6.2.10.alpha.rpm
8e3ba208b0ec4784434aebfea72e524e 6.2/en/os/alpha/kernel-enterprise-2.2.19-6.2.10.alpha.rpm
747ae57cba62d4a2b6f2d0c845b19c02 6.2/en/os/alpha/kernel-headers-2.2.19-6.2.10.alpha.rpm
91dea7dcb10acb20dfbcaa405b63a2e5 6.2/en/os/alpha/kernel-jensen-2.2.19-6.2.10.alpha.rpm
49302da352a27c8e36c2ef06adf912bb 6.2/en/os/alpha/kernel-smp-2.2.19-6.2.10.alpha.rpm
a5f4e5ac48ef52a979564c8f79dd9d76 6.2/en/os/alpha/kernel-source-2.2.19-6.2.10.alpha.rpm
21d5a2b0e75371f6edafdee9c219a040 6.2/en/os/alpha/kernel-utils-2.2.19-6.2.10.alpha.rpm
cf3b019093864d0555381438f9d6b29e 6.2/en/os/i386/kernel-2.2.19-6.2.10.i386.rpm
b3d154885a547cf1a08d00a64c3d3c5a 6.2/en/os/i386/kernel-BOOT-2.2.19-6.2.10.i386.rpm
9e14b84ff5613d3d4b273b8c0ed098b4 6.2/en/os/i386/kernel-doc-2.2.19-6.2.10.i386.rpm
6ef5857ce323f74d17ce4e048843ae6d 6.2/en/os/i386/kernel-headers-2.2.19-6.2.10.i386.rpm
5c743313e4c30f1ced3414b274448fd8 6.2/en/os/i386/kernel-ibcs-2.2.19-6.2.10.i386.rpm
d5e2b9e7ce85a7ea01f0237ec4fe5011 6.2/en/os/i386/kernel-pcmcia-cs-2.2.19-6.2.10.i386.rpm
6dde5dfb26bb978aa83faf58ffeadb75 6.2/en/os/i386/kernel-smp-2.2.19-6.2.10.i386.rpm
841f72430ff8c0e190e31b32bae88b1f 6.2/en/os/i386/kernel-source-2.2.19-6.2.10.i386.rpm
824e7df6b13cee385f850c79d74f4a9f 6.2/en/os/i386/kernel-utils-2.2.19-6.2.10.i386.rpm
7894b756e85e69a0782bbc8b678507de 6.2/en/os/i586/kernel-2.2.19-6.2.10.i586.rpm
12e30543537661aab6f75760ed306155 6.2/en/os/i586/kernel-smp-2.2.19-6.2.10.i586.rpm
ce225599444ef757b32e545b25264c59 6.2/en/os/i686/kernel-2.2.19-6.2.10.i686.rpm
c76cbbfb12776f2ebb10210c62d48ed8 6.2/en/os/i686/kernel-enterprise-2.2.19-6.2.10.i686.rpm
bad5e78fd03feb89d6ba60ce33f5d8fc 6.2/en/os/i686/kernel-smp-2.2.19-6.2.10.i686.rpm
e67cf0ad363e4f5d466ba3537beb6db9 6.2/en/os/sparc/kernel-2.2.19-6.2.10.sparc.rpm
087d3302f8478d59a382a8e700d50734 6.2/en/os/sparc/kernel-BOOT-2.2.19-6.2.10.sparc.rpm
77f9620a108860746807c6e6fe0ee3f1 6.2/en/os/sparc/kernel-doc-2.2.19-6.2.10.sparc.rpm
9d3dd53969d1db0be530cdf18df95fee 6.2/en/os/sparc/kernel-enterprise-2.2.19-6.2.10.sparc.rpm
760394d8e171c9008c5bfdba6b59cc62 6.2/en/os/sparc/kernel-headers-2.2.19-6.2.10.sparc.rpm
519a4af3bee7e6c8372a42a3f4bea08e 6.2/en/os/sparc/kernel-smp-2.2.19-6.2.10.sparc.rpm
044f9706d17c4111164241140bcf7125 6.2/en/os/sparc/kernel-source-2.2.19-6.2.10.sparc.rpm
e0e30c5eb952ee5ab8cbbd19a43cb0a0 6.2/en/os/sparc/kernel-utils-2.2.19-6.2.10.sparc.rpm
f7d632859dcdc11010da16fc16283a59 6.2/en/os/sparc64/kernel-2.2.19-6.2.10.sparc64.rpm
6acd71da21f1d23796e3f4fe82113c92 6.2/en/os/sparc64/kernel-BOOT-2.2.19-6.2.10.sparc64.rpm
5d4d76f3d0e0b5c5f94ce5f6e8460d17 6.2/en/os/sparc64/kernel-enterprise-2.2.19-6.2.10.sparc64.rpm
47ecc6b5db383ca6c4b49ea57759e375 6.2/en/os/sparc64/kernel-smp-2.2.19-6.2.10.sparc64.rpm
5acba11cf43278e189ebda05e2e0f226 7.0/en/os/SRPMS/kernel-2.2.19-7.0.10.src.rpm
b148f165843536afa5cd3d964f92e3e2 7.0/en/os/alpha/kernel-2.2.19-7.0.10.alpha.rpm
249cf6c97a5bd5fa63c875be847c8e67 7.0/en/os/alpha/kernel-BOOT-2.2.19-7.0.10.alpha.rpm
056b951dd379e9fcf882e10a970581c1 7.0/en/os/alpha/kernel-doc-2.2.19-7.0.10.alpha.rpm
ada6089cc32884f8bf0d5ebe12748020 7.0/en/os/alpha/kernel-enterprise-2.2.19-7.0.10.alpha.rpm
d5f6682d0aa1e9463000eb435f7a202f 7.0/en/os/alpha/kernel-jensen-2.2.19-7.0.10.alpha.rpm
6979677e3f62e32c3729c96b0bda46e9 7.0/en/os/alpha/kernel-smp-2.2.19-7.0.10.alpha.rpm
2b49ca6b72bfcfe506fc4d4f69ffa2aa 7.0/en/os/alpha/kernel-source-2.2.19-7.0.10.alpha.rpm
e442cc87398d84d9769d1e65c819380a 7.0/en/os/alpha/kernel-utils-2.2.19-7.0.10.alpha.rpm
09fa1f34a7c7a0ba34c8ff5dc627b0a1 7.0/en/os/i386/kernel-2.2.19-7.0.10.i386.rpm
bf9f3d289633a1be1785dfb7a477143c 7.0/en/os/i386/kernel-BOOT-2.2.19-7.0.10.i386.rpm
0cea7e331d89d0ca45dae7ba56420dcc 7.0/en/os/i386/kernel-doc-2.2.19-7.0.10.i386.rpm
f9fc84d9acb01227eee3c7a31ff06193 7.0/en/os/i386/kernel-ibcs-2.2.19-7.0.10.i386.rpm
09c7f189b5b2df9d6ef2e8155cea0536 7.0/en/os/i386/kernel-pcmcia-cs-2.2.19-7.0.10.i386.rpm
a98a1761b5d847f52f999423c6fa0f52 7.0/en/os/i386/kernel-smp-2.2.19-7.0.10.i386.rpm
bb417abcaf0546c211d56934cadd6357 7.0/en/os/i386/kernel-source-2.2.19-7.0.10.i386.rpm
d67eb72ae401e15a9778ff2988b96928 7.0/en/os/i386/kernel-utils-2.2.19-7.0.10.i386.rpm
d1f2042fcc70eee2bd7be3f8508b3ee7 7.0/en/os/i586/kernel-2.2.19-7.0.10.i586.rpm
62448fbc203309d4dab15cf517731925 7.0/en/os/i586/kernel-smp-2.2.19-7.0.10.i586.rpm
31bf315f17026a86d3bd7b532955f6c4 7.0/en/os/i686/kernel-2.2.19-7.0.10.i686.rpm
b28069b79f5d7a1cd6caa34f446652df 7.0/en/os/i686/kernel-enterprise-2.2.19-7.0.10.i686.rpm
02c1f81c96962e54f0315fd42c6cad7a 7.0/en/os/i686/kernel-smp-2.2.19-7.0.10.i686.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:




Copyright(c) 2000, 2001 Red Hat, Inc.

  Nav
» Read more about: Story Type: Security; Groups: Red Hat

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.