Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2003:416-09
Type: Security Advisory
Severity: Important
Issued on: 2004-01-07
Last updated on: 2004-01-07
Affected Products: Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2003-0985

Details

Updated kernel packages are now available that fix a security
vulnerability which may allow local users to gain root privileges.

The Linux kernel handles the basic functions of the operating system.

Paul Starzetz discovered a flaw in bounds checking in mremap() in the Linux
kernel versions 2.4.23 and previous which may allow a local attacker to
gain root privileges. No exploit is currently available; however, it is
believed that this issue is exploitable (although not trivially.) The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0985 to this issue.

All users of Red Hat Enterprise Linux 3 are advised to upgrade to these
errata packages, which contain a backported security patch that corrects
this issue.

Red Hat would like to thank Paul Starzetz from ISEC for disclosing this
issue as well as Andrea Arcangeli and Solar Designer for working on the patch.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Red Hat Enterprise Linux AS (v. 3)

SRPMS:
kernel-2.4.21-4.0.2.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: e68bea556b93a1dee6cfdf696e98df3e
 
IA-32:
kernel-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 41fb4bb8e4ba45d8b2b19e3dfcfde4e6
kernel-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 33b1b20f7f79fb0adfb5d780a18752a0
kernel-BOOT-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 56df9a3d95055d94d5833a29028305f0
kernel-doc-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: ef478996fd7b952ed0551201be5f7d72
kernel-hugemem-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 76c8d7b95b87f63c2f196efc3eb17c51
kernel-hugemem-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: ba3f2981a3fda22a625d23ebd121e5cb
kernel-smp-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 144e99e35664aac1bf65de05fde4a885
kernel-smp-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 56415916941470e1f40c05220a4275e7
kernel-smp-unsupported-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: d13845f63a1b66784f1abeba84d44a67
kernel-smp-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29edba5852840280f3a7a18180b7e872
kernel-source-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: bf805946cb7c7e23c2ed4acf87b5811a
kernel-unsupported-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 398c29e648fef9215b39c0d2bddb588e
kernel-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0dc85279a34f3b206a9fa7e3702e2e7
 
IA-64:
kernel-2.4.21-4.0.2.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9811e72722783f1d9659b1c6bd2419be
kernel-doc-2.4.21-4.0.2.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3e18f6675b4fab8ed30a5e93c82eae62
kernel-source-2.4.21-4.0.2.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 30401921243af755c9a7ed8291985fff
kernel-unsupported-2.4.21-4.0.2.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 90de7bc1cbfe908acf098d8eaec286ef
 
PPC:
kernel-2.4.21-4.0.2.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0e780cab029860054aa73e24372cd26f
kernel-2.4.21-4.0.2.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: a6123afb92a3c9c5a023a18614cd2651
kernel-doc-2.4.21-4.0.2.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 34845a73c9cfc1620f9bbf730fccaa5e
kernel-source-2.4.21-4.0.2.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9913c5eee42d2a492d25b53f2fe90edb
kernel-unsupported-2.4.21-4.0.2.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: c3bf7be0358e61d4554b3f95b6d9cab3
kernel-unsupported-2.4.21-4.0.2.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: a16f8aede1694a39561d1c0a07f9ff13
 
s390:
kernel-2.4.21-4.0.2.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: aa4192922b9ce43c56c08913359442db
kernel-doc-2.4.21-4.0.2.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: fa3d522e34fcf13d72993fd42c9447be
kernel-source-2.4.21-4.0.2.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: c3910135c60819846b68ca205703be92
kernel-unsupported-2.4.21-4.0.2.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2a878416a38619246df3858212f230c7
 
s390x:
kernel-2.4.21-4.0.2.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 89f2dcd6d35697fa538b661475ff4c21
kernel-doc-2.4.21-4.0.2.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6ff3ebc245239cb7dc401eea959038fb
kernel-source-2.4.21-4.0.2.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 37c923447314318206a9e1f175ae93a2
kernel-unsupported-2.4.21-4.0.2.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: db3cffb82a31b83cfd8ef0b07b51605d
 
x86_64:
kernel-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1b5679e1bce5ea11a4dc325dc91ba61f
kernel-doc-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 67f4a0e9ec799f37376c137e1c4d1833
kernel-smp-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: a9501a1eae36511af2a5f027e436470e
kernel-smp-unsupported-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2e105db7ae7cf18ebea1e49874433163
kernel-source-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5ec993c7c2a379c3ceaaf86ce0741191
kernel-unsupported-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 78362b04ade1ce1e6541c93caab8028c
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
kernel-2.4.21-4.0.2.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: e68bea556b93a1dee6cfdf696e98df3e
 
IA-32:
kernel-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 41fb4bb8e4ba45d8b2b19e3dfcfde4e6
kernel-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 33b1b20f7f79fb0adfb5d780a18752a0
kernel-BOOT-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 56df9a3d95055d94d5833a29028305f0
kernel-doc-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: ef478996fd7b952ed0551201be5f7d72
kernel-hugemem-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 76c8d7b95b87f63c2f196efc3eb17c51
kernel-hugemem-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: ba3f2981a3fda22a625d23ebd121e5cb
kernel-smp-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 144e99e35664aac1bf65de05fde4a885
kernel-smp-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 56415916941470e1f40c05220a4275e7
kernel-smp-unsupported-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: d13845f63a1b66784f1abeba84d44a67
kernel-smp-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29edba5852840280f3a7a18180b7e872
kernel-source-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: bf805946cb7c7e23c2ed4acf87b5811a
kernel-unsupported-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 398c29e648fef9215b39c0d2bddb588e
kernel-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0dc85279a34f3b206a9fa7e3702e2e7
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
kernel-2.4.21-4.0.2.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: e68bea556b93a1dee6cfdf696e98df3e
 
IA-32:
kernel-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 41fb4bb8e4ba45d8b2b19e3dfcfde4e6
kernel-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 33b1b20f7f79fb0adfb5d780a18752a0
kernel-BOOT-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 56df9a3d95055d94d5833a29028305f0
kernel-doc-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: ef478996fd7b952ed0551201be5f7d72
kernel-hugemem-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 76c8d7b95b87f63c2f196efc3eb17c51
kernel-hugemem-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: ba3f2981a3fda22a625d23ebd121e5cb
kernel-smp-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 144e99e35664aac1bf65de05fde4a885
kernel-smp-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 56415916941470e1f40c05220a4275e7
kernel-smp-unsupported-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: d13845f63a1b66784f1abeba84d44a67
kernel-smp-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29edba5852840280f3a7a18180b7e872
kernel-source-2.4.21-4.0.2.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: bf805946cb7c7e23c2ed4acf87b5811a
kernel-unsupported-2.4.21-4.0.2.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 398c29e648fef9215b39c0d2bddb588e
kernel-unsupported-2.4.21-4.0.2.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0dc85279a34f3b206a9fa7e3702e2e7
 
IA-64:
kernel-2.4.21-4.0.2.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9811e72722783f1d9659b1c6bd2419be
kernel-doc-2.4.21-4.0.2.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3e18f6675b4fab8ed30a5e93c82eae62
kernel-source-2.4.21-4.0.2.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 30401921243af755c9a7ed8291985fff
kernel-unsupported-2.4.21-4.0.2.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 90de7bc1cbfe908acf098d8eaec286ef
 
x86_64:
kernel-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1b5679e1bce5ea11a4dc325dc91ba61f
kernel-doc-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 67f4a0e9ec799f37376c137e1c4d1833
kernel-smp-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: a9501a1eae36511af2a5f027e436470e
kernel-smp-unsupported-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2e105db7ae7cf18ebea1e49874433163
kernel-source-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5ec993c7c2a379c3ceaaf86ce0741191
kernel-unsupported-2.4.21-4.0.2.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 78362b04ade1ce1e6541c93caab8028c
 

References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/