Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2004:106-10
Type: Security Advisory
Severity: Important
Issued on: 2004-04-21
Last updated on: 2004-04-21
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2002-1574
CVE-2003-1040
CVE-2004-0003
CVE-2004-0010
CVE-2004-0077
CVE-2004-0109

Details

Updated IA64 kernel packages are now available that fix a security
vulnerability which may allow local users to gain root privileges and other
vulnerabilities.

The Linux kernel handles the basic functions of the operating system.

This kernel updates several important drivers and fixes a number of bugs
including potential security vulnerabilities.

iDefense reported a buffer overflow flaw in the ISO9660 filesystem code.
An attacker could create a malicious filesystem in such a way that root
privileges may be obtained if the filesystem is mounted. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0109 to this issue.

A flaw in return value checking in mremap() in the Linux kernel versions
2.4.24 and previous that may allow a local attacker to gain root
privileges. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0077 to this issue.

A flaw in ncp_lookup() in ncpfs could allow local privilege escalation.
The ncpfs module allows a system to mount volumes of NetWare servers or
print to NetWare printers. This is part of the kernel-unsupported package.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0010 to this issue.

A flaw in the R128 Direct Render Infrastructure could allow local privilege
escalation. This driver is part of the kernel-unsupported package. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0003 to this issue.

An overflow was found in the ixj telephony card driver in Linux kernels
prior to 2.4.20. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2002-1574 to this issue.

The following drivers were updated:

IBM Serveraid 6.11.07
MPT fusion v. 2.05.11.03
Qlogic v. 6.07.02-RH1

All users are advised to upgrade to these errata packages, which contain
backported security patches that correct these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-64:
kernel-2.4.18-e.43.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: cd0def4ab36e03cc26bae0efeae67d0c
kernel-doc-2.4.18-e.43.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 2add5f6cb65a21bd0bd2ccda8034f1e2
kernel-smp-2.4.18-e.43.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: b2fb8c5402aa4b6ffae52fae14ebf3cb
kernel-source-2.4.18-e.43.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: b60e9de2e3cd59fddb2531a8b97a809f
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
kernel-2.4.18-e.43.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: cd0def4ab36e03cc26bae0efeae67d0c
kernel-doc-2.4.18-e.43.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 2add5f6cb65a21bd0bd2ccda8034f1e2
kernel-smp-2.4.18-e.43.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: b2fb8c5402aa4b6ffae52fae14ebf3cb
kernel-source-2.4.18-e.43.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: b60e9de2e3cd59fddb2531a8b97a809f
 

Bugs fixed (see bugzilla for more information)

113603 - CAN-2004-0003 r128 DRI ipf
115819 - CAN-2004-0077 Linux kernel do_mremap VMA limit local privilege escalation


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/