Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Titlekernel security update
Informations
NameRHSA-2007:0993First vendor Publication2007-11-29
VendorRedHatLast vendor Modification2007-11-29
Severity (Vendor) ImportantRevision01

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C)
Cvss Base Score7.1Attack RangeNetwork
Cvss Impact Score6.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated kernel packages that fix various security issues in the Red Hat Enterprise Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

A memory leak was found in the Red Hat Content Accelerator kernel patch. A local user could use this flaw to cause a denial of service (memory exhaustion). (CVE-2007-5494, Important)

A flaw was found in the handling of IEEE 802.11 frames affecting several wireless LAN modules. In certain circumstances, a remote attacker could trigger this flaw by sending a malicious packet over a wireless network and cause a denial of service (kernel crash). (CVE-2007-4997, Important).

A flaw was found in the Advanced Linux Sound Architecture (ALSA). A local user who had the ability to read the /proc/driver/snd-page-alloc file could see portions of kernel memory. (CVE-2007-4571, Moderate).

In addition to the security issues described above, several bug fixes preventing possible memory corruption, system crashes, SCSI I/O fails, networking drivers performance regression and journaling block device layer issue were also included.

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages, which contain backported patches to resolve these issues.

Red Hat would like to credit Vasily Averin, Chris Evans, and Neil Kettle for reporting the security issues corrected by this update.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

288961 - CVE-2007-4571 ALSA memory disclosure flaw 305011 - [RHEL 5.1.z]: Tick divider bugs on x86_64 315051 - CVE-2007-5494 open(O_ATOMICLOOKUP) leaks dentry 345141 - [PATCH] jbd: wait for already submitted t_sync_datalist buffer to complete (Possibility of in-place data destruction) 345151 - LSPP: audit rule causes kernel 'out of memory' condition and auditd failure 345161 - [EL5][BUG] Unexpected SIGILL on NFS/Montecito(ia64) 345171 - task->mm or slab corruption with CIFS 346341 - CVE-2007-4997 kernel ieee80211 off-by-two integer underflow 381001 - LSPP: audit enable not picking up all processes 381021 - [Broadcom 5.1.z bug] Performance regression on 5705 TG3 NICs 381101 - LTC35628-kexec/kdump kernel hung on Power5+ and Power6 based systems 381121 - LTC38135-vSCSI client reports 'Device sdX not ready' after deactive/active device on vSCSI server 381131 - forcedeth driver mishandles MSI interrupts under high load

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2007-0993.html

CWE : Common Weakness Enumeration

idName
CWE-399Resource Management Errors
CWE-189Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:9053
 
Oval ID: oval:org.mitre.oval:def:9053
Title: The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
Description: The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
Family: unix Class: vulnerability
Reference(s): CVE-2007-4571
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7957
 
Oval ID: oval:org.mitre.oval:def:7957
Title: DSA-1505 alsa-driver -- kernel memory leak
Description: Takashi Iwai supplied a fix for a memory leak in the snd_page_alloc module. Local users could exploit this issue to obtain sensitive information from the kernel (CVE-2007-4571).
Family: unix Class: patch
Reference(s): DSA-1505
CVE-2007-4571
Version: 5
Platform(s): Debian GNU/Linux 4.0
Debian GNU/Linux 3.1
Product(s): alsa-driver
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18435
 
Oval ID: oval:org.mitre.oval:def:18435
Title: DSA-1505-1 alsa-driver alsa-modules-i386 - kernel memory leak
Description: Takashi Iwai supplied a fix for a memory leak in the snd_page_alloc module. Local users could exploit this issue to obtain sensitive information from the kernel (<a href="http://security-tracker.debian.org/tracker/CVE-2007-4571">CVE-2007-4571</a>).
Family: unix Class: patch
Reference(s): DSA-1505-1
CVE-2007-4571
Version: 7
Platform(s): Debian GNU/Linux 4.0
Product(s): alsa-driver
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10596
 
Oval ID: oval:org.mitre.oval:def:10596
Title: Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."
Description: Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."
Family: unix Class: vulnerability
Reference(s): CVE-2007-4997
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10884
 
Oval ID: oval:org.mitre.oval:def:10884
Title: Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
Description: Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
Family: unix Class: vulnerability
Reference(s): CVE-2007-5494
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21806
 
Oval ID: oval:org.mitre.oval:def:21806
Title: ELSA-2007:0993: kernel security update (Important)
Description: Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
Family: unix Class: patch
Reference(s): ELSA-2007:0993-01
CVE-2007-4571
CVE-2007-4997
CVE-2007-5494
Version: 17
Platform(s): Oracle Linux 5
Product(s): kernel
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os1
Os2

ExploitDB Exploits

idDescription
2007-09-21Linux Kernel 2.6.x ALSA snd-page-alloc Local Proc File Information Disclosure...

OpenVAS Exploits

DateDescription
2009-10-10Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5020541.nasl
2009-04-09Name : Mandriva Update for kernel MDKSA-2007:226 (kernel)
File : nvt/gb_mandriva_MDKSA_2007_226.nasl
2009-04-09Name : Mandriva Update for kernel MDKSA-2007:232 (kernel)
File : nvt/gb_mandriva_MDKSA_2007_232.nasl
2009-04-09Name : Mandriva Update for kernel MDVSA-2008:105 (kernel)
File : nvt/gb_mandriva_MDVSA_2008_105.nasl
2009-03-23Name : Ubuntu Update for linux-source-2.6.17/20/22 vulnerabilities USN-558-1
File : nvt/gb_ubuntu_USN_558_1.nasl
2009-03-23Name : Ubuntu Update for linux-source-2.6.17/20/22 vulnerabilities USN-574-1
File : nvt/gb_ubuntu_USN_574_1.nasl
2009-03-23Name : Ubuntu Update for linux-source-2.6.15 vulnerabilities USN-578-1
File : nvt/gb_ubuntu_USN_578_1.nasl
2009-03-23Name : Ubuntu Update for linux-source-2.6.15/20/22 vulnerabilities USN-618-1
File : nvt/gb_ubuntu_USN_618_1.nasl
2009-03-06Name : RedHat Update for kernel RHSA-2007:0993-01
File : nvt/gb_RHSA-2007_0993-01_kernel.nasl
2009-03-06Name : RedHat Update for kernel RHSA-2007:1104-01
File : nvt/gb_RHSA-2007_1104-01_kernel.nasl
2009-02-27Name : Fedora Update for kernel FEDORA-2007-2349
File : nvt/gb_fedora_2007_2349_kernel_fc7.nasl
2009-02-27Name : CentOS Update for kernel CESA-2007:1104 centos4 i386
File : nvt/gb_CESA-2007_1104_kernel_centos4_i386.nasl
2009-02-27Name : CentOS Update for kernel CESA-2007:1104 centos4 x86_64
File : nvt/gb_CESA-2007_1104_kernel_centos4_x86_64.nasl
2009-02-27Name : Fedora Update for kernel FEDORA-2007-714
File : nvt/gb_fedora_2007_714_kernel_fc6.nasl
2009-01-28Name : SuSE Update for kernel SUSE-SA:2007:053
File : nvt/gb_suse_2007_053.nasl
2009-01-28Name : SuSE Update for kernel SUSE-SA:2007:059
File : nvt/gb_suse_2007_059.nasl
2009-01-28Name : SuSE Update for kernel SUSE-SA:2007:064
File : nvt/gb_suse_2007_064.nasl
2008-02-28Name : Debian Security Advisory DSA 1505-1 (alsa-driver)
File : nvt/deb_1505_1.nasl
2008-01-31Name : Debian Security Advisory DSA 1428-1 (linux-2.6)
File : nvt/deb_1428_1.nasl
2008-01-17Name : Debian Security Advisory DSA 1428-2 (linux-2.6)
File : nvt/deb_1428_2.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
44153Red Hat Content Accelerator Patch for Linux Kernel O_ATOMICLOOKUP Request Sat...
39236Linux Kernel net/ieee80211/ieee80211_rx.c ieee80211_rx() Function Remote DoS
39234Linux Kernel ALSA sound/core/memalloc.c snd_mem_proc_read() Function Arbitrar...

Nessus® Vulnerability Scanner

DateDescription
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2007-0939.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2007-0993.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2007-1104.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20071101_kernel_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20071129_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20071219_kernel_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-05-17Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-4472.nasl - Type : ACT_GATHER_INFO
2012-05-17Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-4745.nasl - Type : ACT_GATHER_INFO
2009-04-23Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2007-232.nasl - Type : ACT_GATHER_INFO
2009-04-23Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2007-0939.nasl - Type : ACT_GATHER_INFO
2009-04-23Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2008-105.nasl - Type : ACT_GATHER_INFO
2008-06-24Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-618-1.nasl - Type : ACT_GATHER_INFO
2008-02-25Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1505.nasl - Type : ACT_GATHER_INFO
2008-02-14Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-578-1.nasl - Type : ACT_GATHER_INFO
2008-02-05Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-574-1.nasl - Type : ACT_GATHER_INFO
2008-02-01Name : The remote openSUSE host is missing a security update.
File : suse_kernel-4929.nasl - Type : ACT_GATHER_INFO
2008-01-30Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1479.nasl - Type : ACT_GATHER_INFO
2008-01-08Name : The remote openSUSE host is missing a security update.
File : suse_kernel-4752.nasl - Type : ACT_GATHER_INFO
2007-12-24Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2007-1104.nasl - Type : ACT_GATHER_INFO
2007-12-24Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2007-1104.nasl - Type : ACT_GATHER_INFO
2007-12-19Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-558-1.nasl - Type : ACT_GATHER_INFO
2007-12-13Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-4471.nasl - Type : ACT_GATHER_INFO
2007-12-13Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-4741.nasl - Type : ACT_GATHER_INFO
2007-12-11Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1428.nasl - Type : ACT_GATHER_INFO
2007-11-30Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2007-0993.nasl - Type : ACT_GATHER_INFO
2007-11-12Name : The remote openSUSE host is missing a security update.
File : suse_kernel-4641.nasl - Type : ACT_GATHER_INFO
2007-11-06Name : The remote Fedora host is missing a security update.
File : fedora_2007-2349.nasl - Type : ACT_GATHER_INFO
2007-11-02Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2007-0939.nasl - Type : ACT_GATHER_INFO
2007-10-17Name : The remote openSUSE host is missing a security update.
File : suse_kernel-4473.nasl - Type : ACT_GATHER_INFO
2007-10-17Name : The remote openSUSE host is missing a security update.
File : suse_kernel-4487.nasl - Type : ACT_GATHER_INFO
2007-10-17Name : The remote openSUSE host is missing a security update.
File : suse_kernel-4503.nasl - Type : ACT_GATHER_INFO
2007-10-09Name : The remote Fedora Core host is missing a security update.
File : fedora_2007-714.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 11:51:08
  • Multiple Updates