Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2003:239-13
Type: Security Advisory
Severity: Important
Issued on: 2003-08-21
Last updated on: 2003-08-21
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
CVEs (cve.mitre.org): CVE-2003-0462
CVE-2003-0501
CVE-2003-0550
CVE-2003-0551
CVE-2003-0552
CVE-2003-0619
CVE-2003-0699

Details

Updated kernel packages that address various security vulnerabilities are
now available for Red Hat Enterprise Linux.

The Linux kernel handles the basic functions of the operating system.

Security issues have been found that affect the versions of the Linux
kernel shipped with Red Hat Enterprise Linux:

CAN-2003-0462: Paul Starzetz discovered a file read race condition existing
in the execve() system call, which could cause a local crash.

CAN-2003-0501: The /proc filesystem in Linux allows local users to obtain
sensitive information by opening various entries in /proc/self before
executing a setuid program. This causes the program to fail to change the
ownership and permissions of already opened entries.

CAN-2003-0550: The STP protocol is known to have no security, which could
allow attackers to alter the bridge topology. STP is now turned off by
default.

CAN-2003-0551: STP input processing was lax in its length checking, which
could lead to a denial of service (DoS).

CAN-2003-0552: Jerry Kreuscher discovered that the Forwarding table could
be spoofed by sending forged packets with bogus source addresses the same
as the local host.

CAN-2003-0619: An integer signedness error in the decode_fh function of
nfs3xdr.c allows remote attackers to cause a denial of service (kernel
panic) via a negative size value within XDR data of an NFSv3 procedure call.

CAN-2003-0699: The C-Media PCI sound driver in Linux kernel versions prior
to 2.4.21 accesses userspace without using the get_user function, which is
a potential security hole.

All users are advised to upgrade to these erratum packages, which contain
backported security patches correcting these vulnerabilities.


Solution

Release notes, driver notes, and driver disks for this update are available
at the following URL:

http://www.redhat.com/support/errata/rhel/

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

The procedure for upgrading the kernel manually is documented at:

http://www.redhat.com/support/docs/howto/kernel-upgrade/

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
kernel-2.4.9-e.27.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 973c3e760fed61273c7bef02631a2418
kernel-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a635940d7d12592ad2643aae345d7b62
kernel-BOOT-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9e3b0c8830ca8045e616f397aa192298
kernel-debug-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: f6ab5e5b5e9674a1aecde90613190a32
kernel-doc-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8a76e78cc8abf3af63a5a22c0bb4d308
kernel-enterprise-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: c002342c02589aa4e9592315a285829b
kernel-headers-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 83e9a5ed31f61faea20d69ca7d2b6b20
kernel-smp-2.4.9-e.27.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3e269b2912a3b1441cfceea1d8af7924
kernel-smp-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9bee6104f515e90e7ab94e2da933be4a
kernel-source-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: bd50e9ebf920ad91c5ad68e31962c213
kernel-summit-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9beb1e4281986c4c2f337a796e1b5d4a
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
kernel-2.4.9-e.27.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 973c3e760fed61273c7bef02631a2418
kernel-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a635940d7d12592ad2643aae345d7b62
kernel-BOOT-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9e3b0c8830ca8045e616f397aa192298
kernel-debug-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: f6ab5e5b5e9674a1aecde90613190a32
kernel-doc-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8a76e78cc8abf3af63a5a22c0bb4d308
kernel-headers-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 83e9a5ed31f61faea20d69ca7d2b6b20
kernel-smp-2.4.9-e.27.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3e269b2912a3b1441cfceea1d8af7924
kernel-smp-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9bee6104f515e90e7ab94e2da933be4a
kernel-source-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: bd50e9ebf920ad91c5ad68e31962c213
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
kernel-2.4.9-e.27.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 973c3e760fed61273c7bef02631a2418
kernel-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a635940d7d12592ad2643aae345d7b62
kernel-BOOT-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9e3b0c8830ca8045e616f397aa192298
kernel-debug-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: f6ab5e5b5e9674a1aecde90613190a32
kernel-doc-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8a76e78cc8abf3af63a5a22c0bb4d308
kernel-enterprise-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: c002342c02589aa4e9592315a285829b
kernel-headers-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 83e9a5ed31f61faea20d69ca7d2b6b20
kernel-smp-2.4.9-e.27.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3e269b2912a3b1441cfceea1d8af7924
kernel-smp-2.4.9-e.27.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9bee6104f515e90e7ab94e2da933be4a
kernel-source-2.4.9-e.27.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: bd50e9ebf920ad91c5ad68e31962c213
 

Bugs fixed (see bugzilla for more information)

99514 - Various kernel security issues affect Enterprise Linux kernel


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/