|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:105-01 (kernel)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:105-01] Updated kernel packages fix security vulnerability
Date:  Thu, 22 Apr 2004 04:52 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated kernel packages fix security vulnerability Advisory ID: RHSA-2004:105-01 Issue date: 2004-04-21 Updated on: 2004-04-21 Product: Red Hat Enterprise Linux Keywords: kernel update Cross references: Obsoletes: RHSA-2004:044 CVE Names: CAN-2004-0109 - --------------------------------------------------------------------- 1. Topic: Updated kernel packages that fix a security vulnerability which may allow local users to gain root privileges are now available. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686 Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686 Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686 3. Problem description: The Linux kernel handles the basic functions of the operating system. This kernel updates several drivers and fixes a number of bugs, including a potential security vulnerability. iDefense reported a buffer overflow flaw in the ISO9660 filesystem code. An attacker could create a malicious filesystem in such a way that root privileges may be obtained if the filesystem is mounted. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0109 to this issue. The following drivers were updated: LSI megaraid2 v2.10.1.1 IBM Serveraid v. 6.11.07 MPT Fusion v.2.05.11.03 All users are advised to upgrade to these errata packages, which contain a backported security patch that corrects this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 119303 - oops when using the ipt_redirect module 118496 - updates to scsi_scan.c in RH EL 2.1 Update 4 112177 - blkdev_varyio is exported as a GPL only on RHEL 2.1 U4 90209 - only 2 processors of 4 seen on SE7505VB2 70607 - Oops in get_filesystem_info due to lack of locking 115061 - [PATCH] rhel 2.1 will need to pick up the cyclone-lpj-fix 112006 - [PATCH] BUG() from __remove_inode_page 101738 - mprotect areas not cleaned up 106448 - GRUB failing to install on recent HP DL servers with cciss RAID controllers 111680 - fix /proc/$PID/cmdline issue 114053 - [PATCH] file append not working when nfs mounted with nfs_uncached_io 77839 - Assert failure in transaction.c:1224: "!jh->b_committed_data 111342 - get_parition_list can loose disks 101365 - Additions to drivers/scsi/scsi_scan.c 112722 - ethtool crashes with segmentation fault for tg3 driver 111250 - tg3 driver fails to autonegotiate correctly 112021 - {PATCH] cciss driver change: SCSI prefetch 112108 - I/O mem bug fix 112130 - RHEL 2.1 U4: update cciss driver 113900 - RHEL 2.1 U4: Update mptfusion (LSI U320) driver to 2.05.10 or newest. 111672 - RHEL 2.1 U4 - Need latest Adaptec ServeRAID fix for IA64 for IBM only. 113738 - [PATCH] updated megaraid2 driver (2.10.1) 112057 - RHEL 3 U2: update megaraid2 to version 2.10.x 102692 - Crash with bigpages and ssh shared mem usage 120029 - CAN-2004-0109 kernel iso9660 buffer overflow 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm athlon: Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm i686: Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-summit-2.4.9-e.40.i686.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm athlon: Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm i686: Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm athlon: Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm i686: Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm 7. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- f66df0375d216b86e07fb71763ff9899 2.1AS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm 452507f7e9ac8079c19e0640b74ae3d1 2.1AS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm 70fe436720e2bb799598fc74d6623d7f 2.1AS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm 8e7674dd40856fdd9e7d3dd6d57dad5c 2.1AS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm 9aa43e91e82c97bb7c18081cf7037018 2.1AS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm 7b862da2e3947c6791012e058d517f2d 2.1AS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1AS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm e7673832f7763e14138c6bc3519cd981 2.1AS/en/os/i686/kernel-2.4.9-e.40.i686.rpm 4d5225bfb895029bb69f50cbcb87af31 2.1AS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm 3e38c77ad44b39326d21acddc8c74410 2.1AS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm 4bbbdb628c4e0efb74c14b97f841a81f 2.1AS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm a1116040cc09a8e9204d1fe6e44b91e4 2.1AS/en/os/i686/kernel-summit-2.4.9-e.40.i686.rpm f66df0375d216b86e07fb71763ff9899 2.1ES/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm 452507f7e9ac8079c19e0640b74ae3d1 2.1ES/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm 70fe436720e2bb799598fc74d6623d7f 2.1ES/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm 8e7674dd40856fdd9e7d3dd6d57dad5c 2.1ES/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm 9aa43e91e82c97bb7c18081cf7037018 2.1ES/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm 7b862da2e3947c6791012e058d517f2d 2.1ES/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1ES/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm e7673832f7763e14138c6bc3519cd981 2.1ES/en/os/i686/kernel-2.4.9-e.40.i686.rpm 4d5225bfb895029bb69f50cbcb87af31 2.1ES/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm 4bbbdb628c4e0efb74c14b97f841a81f 2.1ES/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm f66df0375d216b86e07fb71763ff9899 2.1WS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm 452507f7e9ac8079c19e0640b74ae3d1 2.1WS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm 70fe436720e2bb799598fc74d6623d7f 2.1WS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm 8e7674dd40856fdd9e7d3dd6d57dad5c 2.1WS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm 9aa43e91e82c97bb7c18081cf7037018 2.1WS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm 7b862da2e3947c6791012e058d517f2d 2.1WS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1WS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm e7673832f7763e14138c6bc3519cd981 2.1WS/en/os/i686/kernel-2.4.9-e.40.i686.rpm 4d5225bfb895029bb69f50cbcb87af31 2.1WS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm 3e38c77ad44b39326d21acddc8c74410 2.1WS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm 4bbbdb628c4e0efb74c14b97f841a81f 2.1WS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/team/key.html You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0109 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact.html Copyright 2004 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFAh4egXlSAg2UNWIIRAnqWAJ0XxAt/M7+xhgWLUFGqlTs7mAtwuQCgoWo2 qOxXU3ZvraliPtrrTZBW3Z4= =mpwB -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list


(Log in to post comments)


Copyright © 2024, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds