Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2003:389-07
Type: Security Advisory
Severity: Important
Issued on: 2003-12-01
Last updated on: 2003-12-01
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
CVEs (cve.mitre.org): CVE-2003-0961

Details

Updated kernel packages are now available that fix a security
vulnerability allowing local users to gain root privileges.

The Linux kernel handles the basic functions of the operating system.

A flaw in bounds checking in the do_brk() function in the Linux kernel
versions 2.4.22 and previous can allow a local attacker to gain root
privileges. This issue is known to be exploitable; an exploit has been
seen in the wild that takes advantage of this vulnerability. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0961 to this issue.

All users of Red Hat Enterprise Linux 2.1 are advised to upgrade to these
errata packages, which contain a backported security patch that corrects
this vulnerability.

Users of Red Hat Enterprise Linux 3 should upgrade to the kernel packages
provided by RHBA-2003:308 (released on 30 October 2003), which already
contained a patch correcting this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To use Red Hat Network to upgrade the kernel, launch the Red Hat Update
Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the
kernel explicitly if you are using the default configuration of up2date.

To install kernel packages manually, use "rpm -ivh <package>" and
modify system settings to boot the kernel you have installed. To
do this, edit /boot/grub/grub.conf and change the default entry to
"default=0" (or, if you have chosen to use LILO as your boot loader,
edit /etc/lilo.conf and run lilo)

Do not use "rpm -Uvh" as that will remove your running kernel binaries
from your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
kernel-2.4.9-e.30.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: c6542ef9f02de56de1d1220422c35909
kernel-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 218f9542d5c7f8893e4275038f02c55a
kernel-BOOT-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: dc5ec3f444c8876b523b09f5d6ee1779
kernel-debug-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 986ebc83a1dfe1353981c77295a289b3
kernel-doc-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 28906601062f7c01fd8d5ec453aac847
kernel-enterprise-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 7bf0c126d4a331fd1f0f5312631d0802
kernel-headers-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 41888a0d8aea1efce885c04ad748f78e
kernel-smp-2.4.9-e.30.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9285eb5b7d956f6a5e764df0fe36c64a
kernel-smp-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 67b7a9d0ef037afb55a71258d85b476a
kernel-source-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: fd87169b0aa4f1f148ffe33850e514bc
kernel-summit-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: b9d7aec22835535ebbc39215f0a46480
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
kernel-2.4.9-e.30.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: c6542ef9f02de56de1d1220422c35909
kernel-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 218f9542d5c7f8893e4275038f02c55a
kernel-BOOT-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: dc5ec3f444c8876b523b09f5d6ee1779
kernel-debug-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 986ebc83a1dfe1353981c77295a289b3
kernel-doc-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 28906601062f7c01fd8d5ec453aac847
kernel-headers-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 41888a0d8aea1efce885c04ad748f78e
kernel-smp-2.4.9-e.30.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9285eb5b7d956f6a5e764df0fe36c64a
kernel-smp-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 67b7a9d0ef037afb55a71258d85b476a
kernel-source-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: fd87169b0aa4f1f148ffe33850e514bc
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
kernel-2.4.9-e.30.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: c6542ef9f02de56de1d1220422c35909
kernel-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 218f9542d5c7f8893e4275038f02c55a
kernel-BOOT-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: dc5ec3f444c8876b523b09f5d6ee1779
kernel-debug-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 986ebc83a1dfe1353981c77295a289b3
kernel-doc-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 28906601062f7c01fd8d5ec453aac847
kernel-enterprise-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 7bf0c126d4a331fd1f0f5312631d0802
kernel-headers-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 41888a0d8aea1efce885c04ad748f78e
kernel-smp-2.4.9-e.30.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 9285eb5b7d956f6a5e764df0fe36c64a
kernel-smp-2.4.9-e.30.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 67b7a9d0ef037afb55a71258d85b476a
kernel-source-2.4.9-e.30.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: fd87169b0aa4f1f148ffe33850e514bc
 

Bugs fixed (see bugzilla for more information)

111240 - CAN-2003-0961 local privilege escalation via do_brk()


References


Keywords

privesc


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/