[ESA-20040105-001] 'kernel' bug and security fixes.

From: EnGarde Secure Linux (security_at_guardiandigital.com)
Date: 01/05/04

  • Next message: Paul Starzetz: "Linux kernel mremap vulnerability"
    Date: Mon, 5 Jan 2004 09:19:34 -0500 (EST)
    To: engarde-security@guardiandigital.com, bugtraq@securityfocus.com
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    +------------------------------------------------------------------------+
    | Guardian Digital Security Advisory January 05, 2003 |
    | http://www.guardiandigital.com ESA-20040105-001 |
    | |
    | Package: kernel |
    | Summary: bug and security fixes. |
    +------------------------------------------------------------------------+

      EnGarde Secure Linux is an enterprise class Linux platform engineered
      to enable corporations to quickly and cost-effectively build a complete
      and secure Internet presence while preventing Internet threats.

    OVERVIEW
    - --------
      This update fixes two security issues and one critical bug in the Linux
      Kernel shipped with EnGarde Secure Linux.

      A summary of the bugs fixed:

        * An EnGarde-specific memory leak in the LIDS code has been fixed.
          This memory leak could cause a machine, over time, to freeze up.

        * A security vulnerability in the mremap(2) system call was recently
          discovered by Paul Starzetz. The incorrect bounds checking done
          in this system call could be exploited by a local user to gain root
          privileges.

          The Common Vulnerabilities and Exposures project (cve.mitre.org) has
          assigned the name CAN-2003-0985 to this issue.

        * A somewhat less critical vulnerability has been found in the Linux
          RTC code. This vulnerability may leak small bits of arbitrary
          kernel memory to user land.

          The Common Vulnerabilities and Exposures project (cve.mitre.org) has
          assigned the name CAN-2003-0984 to this issue.

      Guardian Digital products affected by this issue include:

        EnGarde Secure Community 2
        EnGarde Secure Professional v1.5

      It is recommended that all users apply this update as soon as possible.

    SOLUTION
    - --------
      Guardian Digital Secure Network subscribers may automatically update
      affected systems by accessing their account from within the Guardian
      Digital WebTool.

      To modify your GDSN account and contact preferences, please go to:

        https://www.guardiandigital.com/account/

    REFERENCES
    - ----------
      Guardian Digital's public key:
        http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

      Official Web Site of the Linux Kernel:
        http://www.kernel.org/

      Guardian Digital Advisories:
        http://infocenter.guardiandigital.com/advisories/

      Security Contact: security@guardiandigital.com

    - --------------------------------------------------------------------------
    Author: Ryan W. Maple <ryan@guardiandigital.com>
    Copyright 2004, Guardian Digital, Inc.

    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.2 (GNU/Linux)

    iD8DBQE/+XJ8HD5cqd57fu0RAletAKCLtCixF4Qvs9hes1S+9UiTZY/tNQCdFjm1
    o6kgmRCVXNU+thpSaxg7zm0=
    =MU9t
    -----END PGP SIGNATURE-----


  • Next message: Paul Starzetz: "Linux kernel mremap vulnerability"

    Relevant Pages