__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN Updated Linux Kernel Packages [Red Hat Security Advisory RHSA-2005:043-13] January 19, 2005 18:00 GMT Number P-101 [REVISED 21 Jan 2005] [REVISED 24 Jan 2005] [REVISED 22 Feb 2005] [REVISED 30 May 2006] ______________________________________________________________________________ PROBLEM: Updated kernel packages that address several security issues have been released. PLATFORM: Red Hat Desktop (v.3) & (v. 4) Red Hat Enterprise Linux AS, ES, WS (v. 2.1 and 3) & (v. 4) Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor Debian GNU/Linux 3.0 alias woody DAMAGE: A flaw in VMA handling flaw allow a local user to gain root access. Also, a local attacker could craft a binary that would cause a VMA overlap and lead to a crash. A flaw in the page code handler could lead to a local user gaining root privileges on multiprocessor machines. A patch that fixes a flaw in the system call filtering code in the audit subsystem is released. Also, a patch for cmsg_len handling is included to fix the 32-bit compatibility on 64-bit platforms. SOLUTION: Install the updated packages. ______________________________________________________________________________ VULNERABILITY The risk is MEDIUM. Exploiting this vulnerability may result in ASSESSMENT: elevated privileges or a denial of service. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/p-101.shtml ORIGINAL BULLETIN: https://rhn.redhat.com/errata/RHSA-2005-043.html ADDITIONAL LINKS: Red Hat Security Advisory RHSA-2005-016 https://rhn.redhat.com/errata/RHSA-2005-016.html Red Hat Security Advisory RHSA-2005-017 https://rhn.redhat.com/errata/RHSA-2005-017.html Secunia Advisory SA13972 http://secunia.com/advisories/13972/ Red Hat Security Advisory RHSA-2005-092-14 https://rhn.redhat.com/errata/RHSA-2005-092.html Debian Security Advisory DSA-1082-1 http://www.debian.org/security/2006/dsa-1082 CVE/CAN: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CAN-2004-1235, CAN-2004-1237, CAN-2005-0003 ______________________________________________________________________________ REVISION HISTORY: 01/21/2005 - added link to Red Hat Advisories RHSA-2005:016 and 2005:017 that provide updated kernel packages for Enterprise Linux AS, ES, WS (v.2.1) and Linux Advanced Workstation 2.1 for the Itanium Processor. In addition to the vulnerabilities noted in the original bulletin, these bulletins provide fixes for CAN#2005-0003, 2004-1057, and 2004-1335. 01/24/2005 - added a link to Secunia Advisory SA13972. 02/22/2005 - added a link to Red Hat Security Advisory RHSA-2005:092-14 for Red Hat Desktop (v. 4) and Red Hat Enterprise Linux AS, ES, WS (v. 4). 05/30/2006 - added a link to Debian Security Advisory DSA-1082-1 for Debian GNU/Linux 3.0 alias woody. [***** Start Red Hat Security Advisory RHSA-2005:043-13 *****] Updated kernel packages fix security vulnerabilities Advisory: RHSA-2005:043-13 Last updated on: 2005-01-18 Affected Products: Red Hat Desktop (v. 3) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux WS (v. 3) CVEs (cve.mitre.org): CAN-2004-1235 CAN-2004-1237 CAN-2005-0003 back Security Advisory Security Advisory Details: Updated kernel packages that fix several security issues in Red Hat Enterprise Linux 3 are now available. The Linux kernel handles the basic functions of the operating system. This advisory includes fixes for several security issues: iSEC Security Research discovered a VMA handling flaw in the uselib(2) system call of the Linux kernel. A local user could make use of this flaw to gain elevated (root) privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to this issue. A flaw was discovered where an executable could cause a VMA overlap leading to a crash. A local user could trigger this flaw by creating a carefully crafted a.out binary on 32-bit systems or a carefully crafted ELF binary on Itanium systems. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0003 to this issue. iSEC Security Research discovered a flaw in the page fault handler code that could lead to local users gaining elevated (root) privileges on multiprocessor machines. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0001 to this issue. A patch that coincidentally fixed this issue was committed to the Update 4 kernel release in December 2004. Therefore Red Hat Enterprise Linux 3 kernels provided by RHBA-2004:550 and subsequent updates are not vulnerable to this issue. A flaw in the system call filtering code in the audit subsystem included in Red Hat Enterprise Linux 3 allowed a local user to cause a crash when auditing was enabled. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1237 to this issue. Olaf Kirch discovered that the recent security fixes for cmsg_len handling (CAN-2004-1016) broke 32-bit compatibility on 64-bit platforms such as AMD64 and Intel EM64T. A patch to correct this issue is included. A recent Internet Draft by Fernando Gont recommended that ICMP Source Quench messages be ignored by hosts. A patch to ignore these messages is included. Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed. All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. Updated packages: Red Hat Desktop (v. 3) SRPMS: kernel-2.4.21-27.0.2.EL.src.rpm 09585d63de4e3997fbc784fb5c33de4e IA-32: kernel-2.4.21-27.0.2.EL.athlon.rpm 8d10a00490ab122236ab19b7c37c2b84 kernel-2.4.21-27.0.2.EL.i686.rpm 79ecf6ed92f8cd2433b80271ba861c7f kernel-BOOT-2.4.21-27.0.2.EL.i386.rpm f6507cfbab30fd73803836fb887c0c8d kernel-doc-2.4.21-27.0.2.EL.i386.rpm 12bc56400d22021e85a70bdb69b84334 kernel-hugemem-2.4.21-27.0.2.EL.i686.rpm b93d7d1dd1083a6f5d88081d3ba56397 kernel-hugemem-unsupported-2.4.21-27.0.2.EL.i686.rpm 1f98bad60e389265196988187709fb92 kernel-smp-2.4.21-27.0.2.EL.athlon.rpm ea13d1cd096d82f86ac94954666ba4e7 kernel-smp-2.4.21-27.0.2.EL.i686.rpm 0e01092ec850666c0d48b7d9647da582 kernel-smp-unsupported-2.4.21-27.0.2.EL.athlon.rpm fb2768b0daea74a8e281a0379da9acec kernel-smp-unsupported-2.4.21-27.0.2.EL.i686.rpm 9d31f976f9c3fe393c712d3a54b6dbb3 kernel-source-2.4.21-27.0.2.EL.i386.rpm 3f29e37a16ce9ef35fbf683ecc8b20b6 kernel-unsupported-2.4.21-27.0.2.EL.athlon.rpm 030e4934b0f5b2a3468a75c997026e0d kernel-unsupported-2.4.21-27.0.2.EL.i686.rpm 95ebdba782c14a84a0596140d5d1ef92 x86_64: kernel-2.4.21-27.0.2.EL.ia32e.rpm edcfd82ced3f308f042ec9f8b40009e2 kernel-2.4.21-27.0.2.EL.x86_64.rpm dac6f69766a22574e1d5978af5075032 kernel-doc-2.4.21-27.0.2.EL.x86_64.rpm da18bda83431346943105d70cfbc2e5e kernel-smp-2.4.21-27.0.2.EL.x86_64.rpm 6d06481fbc319fc03aeb01bf737b718d kernel-smp-unsupported-2.4.21-27.0.2.EL.x86_64.rpm 08a9f455342bc96538f77c89b5963cb6 kernel-source-2.4.21-27.0.2.EL.x86_64.rpm 6bd8380a40e4adef8e23021856837d9b kernel-unsupported-2.4.21-27.0.2.EL.ia32e.rpm 90ccef47d359bf5476e4c08dbd1d6b0d kernel-unsupported-2.4.21-27.0.2.EL.x86_64.rpm 0d9930eac68e305502be14e97c26b4b7 Red Hat Enterprise Linux AS (v. 3) SRPMS: kernel-2.4.21-27.0.2.EL.src.rpm 09585d63de4e3997fbc784fb5c33de4e IA-32: kernel-2.4.21-27.0.2.EL.athlon.rpm 8d10a00490ab122236ab19b7c37c2b84 kernel-2.4.21-27.0.2.EL.i686.rpm 79ecf6ed92f8cd2433b80271ba861c7f kernel-BOOT-2.4.21-27.0.2.EL.i386.rpm f6507cfbab30fd73803836fb887c0c8d kernel-doc-2.4.21-27.0.2.EL.i386.rpm 12bc56400d22021e85a70bdb69b84334 kernel-hugemem-2.4.21-27.0.2.EL.i686.rpm b93d7d1dd1083a6f5d88081d3ba56397 kernel-hugemem-unsupported-2.4.21-27.0.2.EL.i686.rpm 1f98bad60e389265196988187709fb92 kernel-smp-2.4.21-27.0.2.EL.athlon.rpm ea13d1cd096d82f86ac94954666ba4e7 kernel-smp-2.4.21-27.0.2.EL.i686.rpm 0e01092ec850666c0d48b7d9647da582 kernel-smp-unsupported-2.4.21-27.0.2.EL.athlon.rpm fb2768b0daea74a8e281a0379da9acec kernel-smp-unsupported-2.4.21-27.0.2.EL.i686.rpm 9d31f976f9c3fe393c712d3a54b6dbb3 kernel-source-2.4.21-27.0.2.EL.i386.rpm 3f29e37a16ce9ef35fbf683ecc8b20b6 kernel-unsupported-2.4.21-27.0.2.EL.athlon.rpm 030e4934b0f5b2a3468a75c997026e0d kernel-unsupported-2.4.21-27.0.2.EL.i686.rpm 95ebdba782c14a84a0596140d5d1ef92 IA-64: kernel-2.4.21-27.0.2.EL.ia64.rpm e221a4ac3760081e44613498be953467 kernel-doc-2.4.21-27.0.2.EL.ia64.rpm 5d11a56a9e01f16c1280e91f38783387 kernel-source-2.4.21-27.0.2.EL.ia64.rpm 852eae888c00bae5ef615841966ab3e8 kernel-unsupported-2.4.21-27.0.2.EL.ia64.rpm 63ff55a139e19648bd9e2d8b6dd48e4a PPC: kernel-2.4.21-27.0.2.EL.ppc64iseries.rpm 32860054d812bd958f7dd7067fd8d062 kernel-2.4.21-27.0.2.EL.ppc64pseries.rpm 78e15c97f0bd6775837a5d17667a0b0d kernel-doc-2.4.21-27.0.2.EL.ppc64.rpm ba9f26ba2b62b45c3b095ad27e788b36 kernel-source-2.4.21-27.0.2.EL.ppc64.rpm 4adf67ea243913ece424045c696fe88d kernel-unsupported-2.4.21-27.0.2.EL.ppc64iseries.rpm b806c052dfdec4fd298b041ea6ae1ddd kernel-unsupported-2.4.21-27.0.2.EL.ppc64pseries.rpm a1d9e58411aa72bac10782701579d9f4 s390: kernel-2.4.21-27.0.2.EL.s390.rpm 965050540cc98a2d020bf96fec166a9b kernel-doc-2.4.21-27.0.2.EL.s390.rpm dc258fbe8dfcdbe9991d83d5b9a2eaa6 kernel-source-2.4.21-27.0.2.EL.s390.rpm 879eea09a534959b7566d826b7f6178f kernel-unsupported-2.4.21-27.0.2.EL.s390.rpm 867a209a3c7d0321ac7a730bb76f66b7 s390x: kernel-2.4.21-27.0.2.EL.s390x.rpm 2f4704180201df5c9f4601d6388a2f1d kernel-doc-2.4.21-27.0.2.EL.s390x.rpm e94480cab994b4578f36d5b52cbe8a18 kernel-source-2.4.21-27.0.2.EL.s390x.rpm 82702da6b0a1f02ee75e35530d8cfa41 kernel-unsupported-2.4.21-27.0.2.EL.s390x.rpm b7d12fcf166bdc9918d14be2b9d7edae x86_64: kernel-2.4.21-27.0.2.EL.ia32e.rpm edcfd82ced3f308f042ec9f8b40009e2 kernel-2.4.21-27.0.2.EL.x86_64.rpm dac6f69766a22574e1d5978af5075032 kernel-doc-2.4.21-27.0.2.EL.x86_64.rpm da18bda83431346943105d70cfbc2e5e kernel-smp-2.4.21-27.0.2.EL.x86_64.rpm 6d06481fbc319fc03aeb01bf737b718d kernel-smp-unsupported-2.4.21-27.0.2.EL.x86_64.rpm 08a9f455342bc96538f77c89b5963cb6 kernel-source-2.4.21-27.0.2.EL.x86_64.rpm 6bd8380a40e4adef8e23021856837d9b kernel-unsupported-2.4.21-27.0.2.EL.ia32e.rpm 90ccef47d359bf5476e4c08dbd1d6b0d kernel-unsupported-2.4.21-27.0.2.EL.x86_64.rpm 0d9930eac68e305502be14e97c26b4b7 Red Hat Enterprise Linux ES (v. 3) SRPMS: kernel-2.4.21-27.0.2.EL.src.rpm 09585d63de4e3997fbc784fb5c33de4e IA-32: kernel-2.4.21-27.0.2.EL.athlon.rpm 8d10a00490ab122236ab19b7c37c2b84 kernel-2.4.21-27.0.2.EL.i686.rpm 79ecf6ed92f8cd2433b80271ba861c7f kernel-BOOT-2.4.21-27.0.2.EL.i386.rpm f6507cfbab30fd73803836fb887c0c8d kernel-doc-2.4.21-27.0.2.EL.i386.rpm 12bc56400d22021e85a70bdb69b84334 kernel-hugemem-2.4.21-27.0.2.EL.i686.rpm b93d7d1dd1083a6f5d88081d3ba56397 kernel-hugemem-unsupported-2.4.21-27.0.2.EL.i686.rpm 1f98bad60e389265196988187709fb92 kernel-smp-2.4.21-27.0.2.EL.athlon.rpm ea13d1cd096d82f86ac94954666ba4e7 kernel-smp-2.4.21-27.0.2.EL.i686.rpm 0e01092ec850666c0d48b7d9647da582 kernel-smp-unsupported-2.4.21-27.0.2.EL.athlon.rpm fb2768b0daea74a8e281a0379da9acec kernel-smp-unsupported-2.4.21-27.0.2.EL.i686.rpm 9d31f976f9c3fe393c712d3a54b6dbb3 kernel-source-2.4.21-27.0.2.EL.i386.rpm 3f29e37a16ce9ef35fbf683ecc8b20b6 kernel-unsupported-2.4.21-27.0.2.EL.athlon.rpm 030e4934b0f5b2a3468a75c997026e0d kernel-unsupported-2.4.21-27.0.2.EL.i686.rpm 95ebdba782c14a84a0596140d5d1ef92 IA-64: kernel-2.4.21-27.0.2.EL.ia64.rpm e221a4ac3760081e44613498be953467 kernel-doc-2.4.21-27.0.2.EL.ia64.rpm 5d11a56a9e01f16c1280e91f38783387 kernel-source-2.4.21-27.0.2.EL.ia64.rpm 852eae888c00bae5ef615841966ab3e8 kernel-unsupported-2.4.21-27.0.2.EL.ia64.rpm 63ff55a139e19648bd9e2d8b6dd48e4a x86_64: kernel-2.4.21-27.0.2.EL.ia32e.rpm edcfd82ced3f308f042ec9f8b40009e2 kernel-2.4.21-27.0.2.EL.x86_64.rpm dac6f69766a22574e1d5978af5075032 kernel-doc-2.4.21-27.0.2.EL.x86_64.rpm da18bda83431346943105d70cfbc2e5e kernel-smp-2.4.21-27.0.2.EL.x86_64.rpm 6d06481fbc319fc03aeb01bf737b718d kernel-smp-unsupported-2.4.21-27.0.2.EL.x86_64.rpm 08a9f455342bc96538f77c89b5963cb6 kernel-source-2.4.21-27.0.2.EL.x86_64.rpm 6bd8380a40e4adef8e23021856837d9b kernel-unsupported-2.4.21-27.0.2.EL.ia32e.rpm 90ccef47d359bf5476e4c08dbd1d6b0d kernel-unsupported-2.4.21-27.0.2.EL.x86_64.rpm 0d9930eac68e305502be14e97c26b4b7 Red Hat Enterprise Linux WS (v. 3) SRPMS: kernel-2.4.21-27.0.2.EL.src.rpm 09585d63de4e3997fbc784fb5c33de4e IA-32: kernel-2.4.21-27.0.2.EL.athlon.rpm 8d10a00490ab122236ab19b7c37c2b84 kernel-2.4.21-27.0.2.EL.i686.rpm 79ecf6ed92f8cd2433b80271ba861c7f kernel-BOOT-2.4.21-27.0.2.EL.i386.rpm f6507cfbab30fd73803836fb887c0c8d kernel-doc-2.4.21-27.0.2.EL.i386.rpm 12bc56400d22021e85a70bdb69b84334 kernel-hugemem-2.4.21-27.0.2.EL.i686.rpm b93d7d1dd1083a6f5d88081d3ba56397 kernel-hugemem-unsupported-2.4.21-27.0.2.EL.i686.rpm 1f98bad60e389265196988187709fb92 kernel-smp-2.4.21-27.0.2.EL.athlon.rpm ea13d1cd096d82f86ac94954666ba4e7 kernel-smp-2.4.21-27.0.2.EL.i686.rpm 0e01092ec850666c0d48b7d9647da582 kernel-smp-unsupported-2.4.21-27.0.2.EL.athlon.rpm fb2768b0daea74a8e281a0379da9acec kernel-smp-unsupported-2.4.21-27.0.2.EL.i686.rpm 9d31f976f9c3fe393c712d3a54b6dbb3 kernel-source-2.4.21-27.0.2.EL.i386.rpm 3f29e37a16ce9ef35fbf683ecc8b20b6 kernel-unsupported-2.4.21-27.0.2.EL.athlon.rpm 030e4934b0f5b2a3468a75c997026e0d kernel-unsupported-2.4.21-27.0.2.EL.i686.rpm 95ebdba782c14a84a0596140d5d1ef92 IA-64: kernel-2.4.21-27.0.2.EL.ia64.rpm e221a4ac3760081e44613498be953467 kernel-doc-2.4.21-27.0.2.EL.ia64.rpm 5d11a56a9e01f16c1280e91f38783387 kernel-source-2.4.21-27.0.2.EL.ia64.rpm 852eae888c00bae5ef615841966ab3e8 kernel-unsupported-2.4.21-27.0.2.EL.ia64.rpm 63ff55a139e19648bd9e2d8b6dd48e4a x86_64: kernel-2.4.21-27.0.2.EL.ia32e.rpm edcfd82ced3f308f042ec9f8b40009e2 kernel-2.4.21-27.0.2.EL.x86_64.rpm dac6f69766a22574e1d5978af5075032 kernel-doc-2.4.21-27.0.2.EL.x86_64.rpm da18bda83431346943105d70cfbc2e5e kernel-smp-2.4.21-27.0.2.EL.x86_64.rpm 6d06481fbc319fc03aeb01bf737b718d kernel-smp-unsupported-2.4.21-27.0.2.EL.x86_64.rpm 08a9f455342bc96538f77c89b5963cb6 kernel-source-2.4.21-27.0.2.EL.x86_64.rpm 6bd8380a40e4adef8e23021856837d9b kernel-unsupported-2.4.21-27.0.2.EL.ia32e.rpm 90ccef47d359bf5476e4c08dbd1d6b0d kernel-unsupported-2.4.21-27.0.2.EL.x86_64.rpm 0d9930eac68e305502be14e97c26b4b7 (The unlinked packages above are only available from the Red Hat Network) Solution Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ Bugs fixed: (see bugzilla for more information) 132245 - CAN-2004-1237 Kernel panic when stopping Lotus Domino 6.52 141996 - CAN-2004-1237 instant kernel panic from one line perl program - BAD 142091 - CAN-2004-1237 kernel oops captured, system hangs 142442 - CAN-2004-1237 kernel panic ( __audit_get_target) 143866 - CAN-2004-1237 kernel panic caused by auditd 144029 - LTC13264-Kernel errata from Dec 23 results in a DB2 shutdown. 144048 - CAN-2004-1237 kernel panic when Oracle agentctl is run 144134 - CAN-2004-1235 isec.pl uselib() privilege escalation 144784 - CAN-2005-0003 huge vma-in-executable bug References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1235 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1237 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0003 http://marc.theaimsgroup.com/?m=109503896031720 http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt Keywords: errata, kernel, security, taroon The listed packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/solutions/security/news/publickey/#key You can verify each package and see who signed it with the following command: rpm --checksig -v filename If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum filename The Red Hat security contact is security@redhat.com. More contact details at http://www.redhat.com/solutions/security/news/contact.html [***** End Red Hat Security Advisory RHSA-2005:043-13 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Red Hat for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) P-091: 'tiff' Unsanitized Input Vulnerability P-092: kdelibs -- Unsanitised Input P-093: HTML Help ActiveX Control Cross Domain Vulnerability P-094: Microsoft Vulnerability in Cursor and Icon Format Handling P-095: Microsoft Vulnerability in the Indexing Service P-096: Sun SMC Default Configuration GUI Creates User Accounts with Blank Password Instead of Locked Accounts P-097: Debian Exim Buffer Overflow P-098: Updated Mozilla Packages Fix a Buffer Overflow P-099: Apple iTunes Buffer Overflow P-100: Oracle Critical Patch Update