English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2003-41
   http://www.turbolinux.co.jp/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date : 01 Jul 2003
 Last revised           : 06 Oct 2003

 Package : kernel

 Summary : Multiple vulnerabilities in kernel

 More information :
    - The ioperm system call in Linux kernel does not properly restrict privileges,
      which allows local users to gain read or write access to certain I/O ports.
    - Vulnerability in the TTY layer of the Linux kernel allows
      attackers to cause a denial of service.
    - The TCP/IP fragment reassembly handling in the Linux kernel allows
      remote attackers to cause a denial of service (CPU consumption)
      via certain packets that cause a large number of hash table collisions

 Impact :
    Local users may be able to gain read or write access to certain I/O ports.
    Attackers may be able to cause a denial of service .

 Affected Products :
    - Turbolinux 8 Server
    - Turbolinux 8 Workstation
    - Turbolinux 7 Server
    - Turbolinux 7 Workstation

 Solution :
    Please use turbopkg tool to apply the update.


 <Turbolinux 8 Server>

   Source Packages
   Size : MD5

   kernel-2.4.18-13.src.rpm
     41763074 aab153739201b43b4b79ff25cda3f259

   Binary Packages
   Size : MD5

   kernel-2.4.18-13.i586.rpm
     13710124 a004d9a59fbef2cac0d4037654309da6
   kernel-BOOT-2.4.18-13.i586.rpm
      6746747 0cb82b6b9a0f49d258ec341ad8ffb95d
   kernel-doc-2.4.18-13.i586.rpm
      1461701 810d84832bd2627a1083f1468a75fded
   kernel-headers-2.4.18-13.i586.rpm
      1821016 f14bc98b8a0dfcb430d8257515ab8966
   kernel-pcmcia-cs-2.4.18-13.i586.rpm
       328753 ad410b9ae24e2e5f8b54d1c33806d4d8
   kernel-smp-2.4.18-13.i586.rpm
     14261909 c6680852d178cbebc1da19a9e60bb3cc
   kernel-smp64G-2.4.18-13.i586.rpm
     14219781 508aa912cd9760307195c41673f78875
   kernel-source-2.4.18-13.i586.rpm
     26611310 8d541f8dc0bf13a8a06056e57ebc6cf0

 <Turbolinux 8 Workstation>

   Source Packages
   Size : MD5

   kernel-2.4.18-13.src.rpm
     41763074 aab153739201b43b4b79ff25cda3f259

   Binary Packages
   Size : MD5

   kernel-2.4.18-13.i586.rpm
     13710124 a004d9a59fbef2cac0d4037654309da6
   kernel-BOOT-2.4.18-13.i586.rpm
      6746747 0cb82b6b9a0f49d258ec341ad8ffb95d
   kernel-doc-2.4.18-13.i586.rpm
      1461701 810d84832bd2627a1083f1468a75fded
   kernel-headers-2.4.18-13.i586.rpm
      1821016 f14bc98b8a0dfcb430d8257515ab8966
   kernel-pcmcia-cs-2.4.18-13.i586.rpm
       328753 ad410b9ae24e2e5f8b54d1c33806d4d8
   kernel-smp-2.4.18-13.i586.rpm
     14261909 c6680852d178cbebc1da19a9e60bb3cc
   kernel-smp64G-2.4.18-13.i586.rpm
     14219781 508aa912cd9760307195c41673f78875
   kernel-source-2.4.18-13.i586.rpm
     26611310 8d541f8dc0bf13a8a06056e57ebc6cf0

 <Turbolinux 7 Server>

   Source Packages
   Size : MD5

   kernel-2.4.18-13.src.rpm
     41763074 aab153739201b43b4b79ff25cda3f259

   Binary Packages
   Size : MD5

   kernel-2.4.18-13.i586.rpm
     13710124 a004d9a59fbef2cac0d4037654309da6
   kernel-BOOT-2.4.18-13.i586.rpm
      6746747 0cb82b6b9a0f49d258ec341ad8ffb95d
   kernel-doc-2.4.18-13.i586.rpm
      1461701 810d84832bd2627a1083f1468a75fded
   kernel-headers-2.4.18-13.i586.rpm
      1821016 f14bc98b8a0dfcb430d8257515ab8966
   kernel-pcmcia-cs-2.4.18-13.i586.rpm
       328753 ad410b9ae24e2e5f8b54d1c33806d4d8
   kernel-smp-2.4.18-13.i586.rpm
     14261909 c6680852d178cbebc1da19a9e60bb3cc
   kernel-smp64G-2.4.18-13.i586.rpm
     14219781 508aa912cd9760307195c41673f78875
   kernel-source-2.4.18-13.i586.rpm
     26611310 8d541f8dc0bf13a8a06056e57ebc6cf0

 <Turbolinux 7 Workstation>

   Source Packages
   Size : MD5

   kernel-2.4.18-13.src.rpm
     41763074 aab153739201b43b4b79ff25cda3f259

   Binary Packages
   Size : MD5

   kernel-2.4.18-13.i586.rpm
     13710124 a004d9a59fbef2cac0d4037654309da6
   kernel-BOOT-2.4.18-13.i586.rpm
      6746747 0cb82b6b9a0f49d258ec341ad8ffb95d
   kernel-doc-2.4.18-13.i586.rpm
      1461701 810d84832bd2627a1083f1468a75fded
   kernel-headers-2.4.18-13.i586.rpm
      1821016 f14bc98b8a0dfcb430d8257515ab8966
   kernel-pcmcia-cs-2.4.18-13.i586.rpm
       328753 ad410b9ae24e2e5f8b54d1c33806d4d8
   kernel-smp-2.4.18-13.i586.rpm
     14261909 c6680852d178cbebc1da19a9e60bb3cc
   kernel-smp64G-2.4.18-13.i586.rpm
     14219781 508aa912cd9760307195c41673f78875
   kernel-source-2.4.18-13.i586.rpm
     26611310 8d541f8dc0bf13a8a06056e57ebc6cf0


 Notice :
   [CAN-2003-0248] was fixed by kernel-2.4.18-7.
   You have to reboot your system after this update is finished.
 
 Enhancements :
    - aacraid-1.1.2, new supoort adptec SATA RAIDs
    - mptscsi-2.05.05+, new supoort 1035
    - aic7xxx-6.2.33 and aic79xx-1.3.8
    - bcm5700-6.2.2, support new ID of 5705 and 5705M/5782/5788
    - sk98lin-6.10 3COM 3c940  3com 1000M Nic
    - Intel 852/855/865/875 IDE agp sound Nic support

 References :

 CVE
   [CAN-2003-0246]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0246
   [CAN-2003-0247]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0247
   [CAN-2003-0248]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0248
   [CAN-2003-0364]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0364
   [CAN-2003-0244]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0244


 --------------------------------------------------------------------------
 Revision History
    01 Jul 2003 Initial release
    06 Oct 2003 added References : [CAN-2003-0244]
 --------------------------------------------------------------------------

 Copyright(C) 2003 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/gOP8K0LzjOqIJMwRAuo4AKCkg9zREcvynfmFoMnJMr7Rq3Z1lQCfdD9X
1tmGyHB1m+hsONsm6A/btJs=
=G5EL
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.