Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » EnGarde ESA-20030515-017: Kernel multiple vulnerabilities

EnGarde ESA-20030515-017: Kernel multiple vulnerabilities

by Nikola Strahija on May 17th, 2003 Several vulnerabilities have been found in Linux Kernel which, if exploited, could allow remote attackers to issue a denial of service attack or raise their privileges.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+------------------------------------------------------------------------+
| Guardian Digital Security Advisory May 15, 2003 |
| http://www.guardiandigital.com ESA-20030515-017 |
| |
| Package: kernel |
| Summary: several bug and security-related fixes. |
+------------------------------------------------------------------------+

EnGarde Secure Linux is an enterprise class Linux platform engineered
to enable corporations to quickly and cost-effectively build a complete
and secure Internet presence while preventing Internet threats.

OVERVIEW
- --------
This kernel update fixes several bugs and vulnerabilities. A summary
of the changes from the last kernel update are below.

* Systems with more then one swap partition defined could OOPS when
"swapoff -a" was run.

* This update improves the kernel module loader vulnerability fix
(CAN-2003-0127) initially fixed in ESA-20030318-009.

* Using specially selected forged source addresses, a remote attacker
can cause a very large number of collisions in the kernel's
networking hash tables, resulting in a denial of service attack.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0244 to this issue.

* The "ioperm" system call does not properly restrict privileges,
potentially allowing an unprivileged local user access to the I/O
ports on the system.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0246 to this issue.

Guardian Digital products affected by these issues include:

EnGarde Secure Community 2
EnGarde Secure Professional v1.5

It is recommended that all users apply this update as soon as possible.

SOLUTION
- --------
Guardian Digital Secure Network subscribers may automatically update
affected systems by accessing their account from within the Guardian
Digital WebTool.

To modify your GDSN account and contact preferences, please go to:

https://www.guardiandigital.com/account/

REFERENCES
- ----------
Guardian Digital's public key:
http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

Official Web Site of the Linux Kernel:
http://www.kernel.org/

Guardian Digital Advisories:
http://infocenter.guardiandigital.com/advisories/

Security Contact: [email protected]

- --------------------------------------------------------------------------
Author: Ryan W. Maple
Copyright 2003, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+wyHLHD5cqd57fu0RAj8yAJ9056JJPFkcl5IdC/4SJVe03dAZnwCggIfr
P9AqUjNPRhvE2XPzuWB8RnI=
=D6px
-----END PGP SIGNATURE-----


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »