Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2004:044-06
Type: Security Advisory
Severity: Moderate
Issued on: 2004-02-03
Last updated on: 2004-02-03
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
CVEs (cve.mitre.org): CVE-2002-1574
CVE-2003-0700
CVE-2004-0003

Details

Updated kernel packages are now available that fix a few security issues,
an NFS performance issue, and an e1000 driver loading issue introduced in
Update 3.

The Linux kernel handles the basic functions of the operating system.

Alan Cox found issues in the R128 Direct Render Infrastructure that
could allow local privilege escalation. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0003 to
this issue.

The C-Media PCI sound driver in Linux before 2.4.22 does not use the
get_user function to access userspace in certain conditions, which crosses
security boundaries. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0700 to this issue.

An overflow was found in the ixj telephony card driver in Linux kernels
prior to 2.4.20. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2002-1574 to this issue.

All users are advised to upgrade to these errata packages, which contain
backported security patches that corrects these issues. These packages
also contain a fix to enhance NFS performance, which was degraded in the
last kernel update as part of Update 3.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
kernel-2.4.9-e.37.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1ea5a1908a6562967b0595e06bd4bd93
 
IA-32:
kernel-2.4.9-e.37.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 030f252f56b1914712a10882637a791c
kernel-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: cfc5e061933e32ece12333502e97bb22
kernel-BOOT-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 07204ea9a97d0650ae17607b39e3c410
kernel-debug-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: c3c3578babc860faa895bf6256052140
kernel-doc-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 08f7567fe94f61c7e59072a016757906
kernel-enterprise-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 2d4959d95a723cb67fa5d3ebe905cee2
kernel-headers-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 6c76c386fbc5afc0aba21774905845e3
kernel-smp-2.4.9-e.37.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1d819b13b87cf66ee7bdae9c4ca0ec77
kernel-smp-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 0d26a9639bdad7a9e84387ea731156bc
kernel-source-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 0c49a0f4868c814b15e1fd60c1adaa78
kernel-summit-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: cc565e3f28776f37809536f7dd39f573
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
kernel-2.4.9-e.37.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1ea5a1908a6562967b0595e06bd4bd93
 
IA-32:
kernel-2.4.9-e.37.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 030f252f56b1914712a10882637a791c
kernel-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: cfc5e061933e32ece12333502e97bb22
kernel-BOOT-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 07204ea9a97d0650ae17607b39e3c410
kernel-debug-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: c3c3578babc860faa895bf6256052140
kernel-doc-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 08f7567fe94f61c7e59072a016757906
kernel-headers-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 6c76c386fbc5afc0aba21774905845e3
kernel-smp-2.4.9-e.37.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1d819b13b87cf66ee7bdae9c4ca0ec77
kernel-smp-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 0d26a9639bdad7a9e84387ea731156bc
kernel-source-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 0c49a0f4868c814b15e1fd60c1adaa78
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
kernel-2.4.9-e.37.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1ea5a1908a6562967b0595e06bd4bd93
 
IA-32:
kernel-2.4.9-e.37.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 030f252f56b1914712a10882637a791c
kernel-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: cfc5e061933e32ece12333502e97bb22
kernel-BOOT-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 07204ea9a97d0650ae17607b39e3c410
kernel-debug-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: c3c3578babc860faa895bf6256052140
kernel-doc-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 08f7567fe94f61c7e59072a016757906
kernel-enterprise-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 2d4959d95a723cb67fa5d3ebe905cee2
kernel-headers-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 6c76c386fbc5afc0aba21774905845e3
kernel-smp-2.4.9-e.37.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1d819b13b87cf66ee7bdae9c4ca0ec77
kernel-smp-2.4.9-e.37.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 0d26a9639bdad7a9e84387ea731156bc
kernel-source-2.4.9-e.37.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 0c49a0f4868c814b15e1fd60c1adaa78
 

Bugs fixed (see bugzilla for more information)

112766 - e.34 kernel breaks UDP NFS badly
112914 - After upgraded the latest kenerl e.34 or e.35, the Intel Pro/100 module did not load during the reboot.
113300 - CAN-2002-1574 ixj telephony card driver overflow
113305 - CAN-2003-0700 CMedia additional get_user issues
113498 - modules.dep points to the wrong driver
113602 - CAN-2004-0003 r128 DRI


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/