|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:418-01 (kernel)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:418-01] Updated kernel packages fix security issues
Date:  Tue, 3 Aug 2004 17:51 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated kernel packages fix security issues Advisory ID: RHSA-2004:418-01 Issue date: 2004-08-03 Updated on: 2004-08-03 Product: Red Hat Enterprise Linux Obsoletes: RHSA-2004:354 CVE Names: CAN-2004-0415 CAN-2004-0535 CAN-2004-0587 - --------------------------------------------------------------------- 1. Summary: Updated kernel packages that fix potential information leaks and a incorrect driver permission for Red Hat Enterprise Linux 2.1 are now available. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686 Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686 Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686 3. Problem description: The Linux kernel handles the basic functions of the operating system. Paul Starzetz discovered flaws in the Linux kernel when handling file offset pointers. These consist of invalid conversions of 64 to 32-bit file offset pointers and possible race conditions. A local unprivileged user could make use of these flaws to access large portions of kernel memory. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0415 to this issue. These packages contain a patch written by Al Viro to correct these flaws. Red Hat would like to thank iSEC Security Research for disclosing this issue and a number of vendor-sec participants for reviewing and working on the patch to this issue. In addition, these packages correct two minor issues: An bug in the e1000 network driver. This bug could be used by local users to leak small amounts of kernel memory (CAN-2004-0535). Inappropriate permissions on /proc/scsi/qla2300/HbaApiNode (CAN-2004-0587). All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels to these erratum packages which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info): 125170 - CAN-2004-0535 e100e1000 kernel memory leak (x86) 126400 - CAN-2004-0587 Bad permissions on qla* drivers 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/k[...] 4d90231c550b10a94c3e612fc86bfac4 kernel-2.4.9-e.48.src.rpm athlon: 32482bbacba7aed44aea420da0ef1418 kernel-2.4.9-e.48.athlon.rpm 675a499b8c0225f35660ef9f0a72ec3d kernel-smp-2.4.9-e.48.athlon.rpm i386: e1b4abb4e387ef87f2ba6428783973f5 kernel-BOOT-2.4.9-e.48.i386.rpm 8c7745b52ed0732e3347a1beb3365cce kernel-doc-2.4.9-e.48.i386.rpm 1b3c3dab9a7a935c731fd38401ec2a2f kernel-headers-2.4.9-e.48.i386.rpm 34961632e9384621acd93e6a66d3731a kernel-source-2.4.9-e.48.i386.rpm i686: a3e6271399611b981291df8bcd992717 kernel-2.4.9-e.48.i686.rpm 3383e7a871f2ca6bf291efc571c9f159 kernel-debug-2.4.9-e.48.i686.rpm 5d08fb530d37c1e4bec8222fc6e8430b kernel-enterprise-2.4.9-e.48.i686.rpm 71a58c709571f8ae8d313cf89d800c03 kernel-smp-2.4.9-e.48.i686.rpm aa870614772046934a1872fc89908a4b kernel-summit-2.4.9-e.48.i686.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/k[...] 4d90231c550b10a94c3e612fc86bfac4 kernel-2.4.9-e.48.src.rpm athlon: 32482bbacba7aed44aea420da0ef1418 kernel-2.4.9-e.48.athlon.rpm 675a499b8c0225f35660ef9f0a72ec3d kernel-smp-2.4.9-e.48.athlon.rpm i386: e1b4abb4e387ef87f2ba6428783973f5 kernel-BOOT-2.4.9-e.48.i386.rpm 8c7745b52ed0732e3347a1beb3365cce kernel-doc-2.4.9-e.48.i386.rpm 1b3c3dab9a7a935c731fd38401ec2a2f kernel-headers-2.4.9-e.48.i386.rpm 34961632e9384621acd93e6a66d3731a kernel-source-2.4.9-e.48.i386.rpm i686: a3e6271399611b981291df8bcd992717 kernel-2.4.9-e.48.i686.rpm 3383e7a871f2ca6bf291efc571c9f159 kernel-debug-2.4.9-e.48.i686.rpm 71a58c709571f8ae8d313cf89d800c03 kernel-smp-2.4.9-e.48.i686.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/k[...] 4d90231c550b10a94c3e612fc86bfac4 kernel-2.4.9-e.48.src.rpm athlon: 32482bbacba7aed44aea420da0ef1418 kernel-2.4.9-e.48.athlon.rpm 675a499b8c0225f35660ef9f0a72ec3d kernel-smp-2.4.9-e.48.athlon.rpm i386: e1b4abb4e387ef87f2ba6428783973f5 kernel-BOOT-2.4.9-e.48.i386.rpm 8c7745b52ed0732e3347a1beb3365cce kernel-doc-2.4.9-e.48.i386.rpm 1b3c3dab9a7a935c731fd38401ec2a2f kernel-headers-2.4.9-e.48.i386.rpm 34961632e9384621acd93e6a66d3731a kernel-source-2.4.9-e.48.i386.rpm i686: a3e6271399611b981291df8bcd992717 kernel-2.4.9-e.48.i686.rpm 3383e7a871f2ca6bf291efc571c9f159 kernel-debug-2.4.9-e.48.i686.rpm 5d08fb530d37c1e4bec8222fc6e8430b kernel-enterprise-2.4.9-e.48.i686.rpm 71a58c709571f8ae8d313cf89d800c03 kernel-smp-2.4.9-e.48.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0415 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0535 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0587 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact.html Copyright 2004 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFBEAizXlSAg2UNWIIRAlyjAKCeXPS5K2ZegECyN21VgVDoqhz4bwCgsWL0 wOToQ66JFcgSHgUN25e/T70= =td70 -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watc[...]


(Log in to post comments)


Copyright © 2024, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds