[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2004:105-01] Updated kernel packages fix security vulnerability



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated kernel packages fix security vulnerability
Advisory ID:       RHSA-2004:105-01
Issue date:        2004-04-21
Updated on:        2004-04-21
Product:           Red Hat Enterprise Linux
Keywords:          kernel update
Cross references:  
Obsoletes:         RHSA-2004:044
CVE Names:         CAN-2004-0109
- ---------------------------------------------------------------------

1. Topic:

Updated kernel packages that fix a security vulnerability which may allow
local users to gain root privileges are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating
system.

This kernel updates several drivers and fixes a number of bugs, including a
potential security vulnerability.

iDefense reported a buffer overflow flaw in the ISO9660 filesystem code.
An attacker could create a malicious filesystem in such a way that root
privileges may be obtained if the filesystem is mounted. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0109 to this issue.

The following drivers were updated:

LSI megaraid2 v2.10.1.1
IBM Serveraid v. 6.11.07
MPT Fusion v.2.05.11.03

All users are advised to upgrade to these errata packages, which contain
a backported security patch that corrects this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

119303 - oops when using the ipt_redirect module
118496 - updates to scsi_scan.c in RH EL 2.1 Update 4
112177 - blkdev_varyio is exported as a GPL only on RHEL 2.1 U4
90209 - only 2 processors of 4 seen on SE7505VB2
70607 - Oops in get_filesystem_info due to lack of locking
115061 - [PATCH] rhel 2.1 will need to pick up the cyclone-lpj-fix
112006 - [PATCH] BUG() from __remove_inode_page
101738 - mprotect areas not cleaned up
106448 - GRUB failing to install on recent HP DL servers with cciss RAID controllers
111680 - fix /proc/$PID/cmdline issue
114053 - [PATCH] file append not working when nfs mounted with nfs_uncached_io
77839 - Assert failure in transaction.c:1224: "!jh->b_committed_data
111342 - get_parition_list can loose disks
101365 - Additions to drivers/scsi/scsi_scan.c
112722 - ethtool crashes with segmentation fault for tg3 driver
111250 - tg3 driver fails to autonegotiate correctly
112021 - {PATCH] cciss driver change: SCSI prefetch
112108 - I/O mem bug fix
112130 - RHEL 2.1 U4:  update cciss driver
113900 - RHEL 2.1 U4:  Update mptfusion (LSI U320) driver to 2.05.10 or newest.
111672 - RHEL 2.1 U4 - Need latest Adaptec ServeRAID fix for IA64 for IBM only.
113738 - [PATCH] updated megaraid2 driver (2.10.1)
112057 - RHEL 3 U2: update megaraid2 to version 2.10.x
102692 - Crash with bigpages and ssh shared mem usage
120029 - CAN-2004-0109 kernel iso9660 buffer overflow

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm

athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-summit-2.4.9-e.40.i686.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm

athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm

athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm



7. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------

f66df0375d216b86e07fb71763ff9899 2.1AS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1AS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1AS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1AS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1AS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1AS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1AS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1AS/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1AS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
3e38c77ad44b39326d21acddc8c74410 2.1AS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1AS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm
a1116040cc09a8e9204d1fe6e44b91e4 2.1AS/en/os/i686/kernel-summit-2.4.9-e.40.i686.rpm
f66df0375d216b86e07fb71763ff9899 2.1ES/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1ES/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1ES/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1ES/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1ES/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1ES/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1ES/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1ES/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1ES/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1ES/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm
f66df0375d216b86e07fb71763ff9899 2.1WS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1WS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1WS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1WS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1WS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1WS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1WS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1WS/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1WS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
3e38c77ad44b39326d21acddc8c74410 2.1WS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1WS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm

These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/team/key.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0109

9. Contact:

The Red Hat security contact is <secalert redhat com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAh4egXlSAg2UNWIIRAnqWAJ0XxAt/M7+xhgWLUFGqlTs7mAtwuQCgoWo2
qOxXU3ZvraliPtrrTZBW3Z4=
=mpwB
-----END PGP SIGNATURE-----



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]