Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2004:183-03
Type: Security Advisory
Severity: Important
Issued on: 2004-04-22
Last updated on: 2004-04-22
Affected Products: Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2004-0109
CVE-2004-0424

Details

Updated kernel packages that fix two privilege escalation vulnerabilities
are now available.

The Linux kernel handles the basic functions of the operating system.

iSEC Security Research discovered a flaw in the ip_setsockopt() function
code of the Linux kernel versions 2.4.22 to 2.4.25 inclusive. This flaw
also affects the 2.4.21 kernel in Red Hat Enterprise Linux 3 which
contained a backported version of the affected code. A local user could
use this flaw to gain root privileges. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0424 to
this issue.

iDefense reported a buffer overflow flaw in the ISO9660 filesystem code.
An attacker could create a malicious filesystem in such a way that root
privileges may be obtained if the filesystem is mounted. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0109 to this issue.

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Red Hat Enterprise Linux AS (v. 3)

SRPMS:
kernel-2.4.21-9.0.3.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 75e184e496f05cd18eea12a94a45d992
 
IA-32:
kernel-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 747381f00d4483d2b680d81a79ee87d0
kernel-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0f0d28e815672056c265bc5d95a26b04
kernel-BOOT-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9d44d75032a22e1bafe070cbf83abea3
kernel-doc-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 090afc63ecd3b2dd68e76c25c428c0c3
kernel-hugemem-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 15edf9ad36ad8ab7655025be9c68149b
kernel-hugemem-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: be46b5651aea10e71f8ce5cd403e5597
kernel-smp-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4419e2bc38199f6e108c87c34c29c77f
kernel-smp-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 58ef6536346d05530dea4d6553f22403
kernel-smp-unsupported-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c40f0b228e80bd863eeba517a05909c8
kernel-smp-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8803be23264421aaa299d55b8e534e9e
kernel-source-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 52678a51fc609431df2d2c7ec3d66396
kernel-unsupported-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5fef3bbf1605baaea07bd77ff96fff79
kernel-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: d678cc5434f16bb05af6ca66cafdea05
 
IA-64:
kernel-2.4.21-9.0.3.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cb457e3e0a0460153b3bfbe5c39ef260
kernel-doc-2.4.21-9.0.3.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: e5325b4988f0e75f185c1208749d1c62
kernel-source-2.4.21-9.0.3.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 977e74c136ab7e8cb2de0af714478544
kernel-unsupported-2.4.21-9.0.3.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b852fe340ebf22869bb1e02ce589aa0d
 
PPC:
kernel-2.4.21-9.0.3.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 97c5ecb52204e12156f7895edac7e064
kernel-2.4.21-9.0.3.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: c823973a230c40ac9edd411897b7113d
kernel-doc-2.4.21-9.0.3.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 528032788bee51dae3dcd354d2f8b73a
kernel-source-2.4.21-9.0.3.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7c2229ba9d9eafacb71bcc6e752f3a19
kernel-unsupported-2.4.21-9.0.3.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 83307f0d8628593d4f82e2d73c0056fc
kernel-unsupported-2.4.21-9.0.3.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 65c97716b999af8eab0e1f8e24b209d8
 
s390:
kernel-2.4.21-9.0.3.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: ae7e0719db784bb53d78caadb9a28f46
kernel-doc-2.4.21-9.0.3.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1642932547b2719d36eca9b51d4825d6
kernel-source-2.4.21-9.0.3.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: ae2f9d3424d123c7b3e0ba43d0031d81
kernel-unsupported-2.4.21-9.0.3.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: d334ddf760fce749557602fb71b20fe7
 
s390x:
kernel-2.4.21-9.0.3.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2e08a2aa7c25dc023f31f7028daf1dbb
kernel-doc-2.4.21-9.0.3.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: f2d16837ef21af8e303a7694cfc50e73
kernel-source-2.4.21-9.0.3.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7383745e47cdd0e97d21d203df9a953e
kernel-unsupported-2.4.21-9.0.3.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: abb43640b44870450af1f3b61a2d4b1e
 
x86_64:
kernel-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4153e7472cbc9e57331d8bd6ab963374
kernel-doc-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b069533b3d6f1fc3aeba858a28dcfa1f
kernel-smp-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 970369d2dfd7c9ea04d8073b7a8c9f3b
kernel-smp-unsupported-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 07628c9fe1be29deeabd2192dfeffcfb
kernel-source-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: dc4d55f0619c476d947f39a6760dca10
kernel-unsupported-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b8d738cb4bc5240bb089b59622da1ff4
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
kernel-2.4.21-9.0.3.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 75e184e496f05cd18eea12a94a45d992
 
IA-32:
kernel-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 747381f00d4483d2b680d81a79ee87d0
kernel-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0f0d28e815672056c265bc5d95a26b04
kernel-BOOT-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9d44d75032a22e1bafe070cbf83abea3
kernel-doc-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 090afc63ecd3b2dd68e76c25c428c0c3
kernel-hugemem-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 15edf9ad36ad8ab7655025be9c68149b
kernel-hugemem-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: be46b5651aea10e71f8ce5cd403e5597
kernel-smp-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4419e2bc38199f6e108c87c34c29c77f
kernel-smp-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 58ef6536346d05530dea4d6553f22403
kernel-smp-unsupported-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c40f0b228e80bd863eeba517a05909c8
kernel-smp-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8803be23264421aaa299d55b8e534e9e
kernel-source-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 52678a51fc609431df2d2c7ec3d66396
kernel-unsupported-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5fef3bbf1605baaea07bd77ff96fff79
kernel-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: d678cc5434f16bb05af6ca66cafdea05
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
kernel-2.4.21-9.0.3.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 75e184e496f05cd18eea12a94a45d992
 
IA-32:
kernel-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 747381f00d4483d2b680d81a79ee87d0
kernel-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0f0d28e815672056c265bc5d95a26b04
kernel-BOOT-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9d44d75032a22e1bafe070cbf83abea3
kernel-doc-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 090afc63ecd3b2dd68e76c25c428c0c3
kernel-hugemem-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 15edf9ad36ad8ab7655025be9c68149b
kernel-hugemem-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: be46b5651aea10e71f8ce5cd403e5597
kernel-smp-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4419e2bc38199f6e108c87c34c29c77f
kernel-smp-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 58ef6536346d05530dea4d6553f22403
kernel-smp-unsupported-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c40f0b228e80bd863eeba517a05909c8
kernel-smp-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8803be23264421aaa299d55b8e534e9e
kernel-source-2.4.21-9.0.3.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 52678a51fc609431df2d2c7ec3d66396
kernel-unsupported-2.4.21-9.0.3.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5fef3bbf1605baaea07bd77ff96fff79
kernel-unsupported-2.4.21-9.0.3.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: d678cc5434f16bb05af6ca66cafdea05
 
IA-64:
kernel-2.4.21-9.0.3.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cb457e3e0a0460153b3bfbe5c39ef260
kernel-doc-2.4.21-9.0.3.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: e5325b4988f0e75f185c1208749d1c62
kernel-source-2.4.21-9.0.3.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 977e74c136ab7e8cb2de0af714478544
kernel-unsupported-2.4.21-9.0.3.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b852fe340ebf22869bb1e02ce589aa0d
 
x86_64:
kernel-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4153e7472cbc9e57331d8bd6ab963374
kernel-doc-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b069533b3d6f1fc3aeba858a28dcfa1f
kernel-smp-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 970369d2dfd7c9ea04d8073b7a8c9f3b
kernel-smp-unsupported-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 07628c9fe1be29deeabd2192dfeffcfb
kernel-source-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: dc4d55f0619c476d947f39a6760dca10
kernel-unsupported-2.4.21-9.0.3.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: b8d738cb4bc5240bb089b59622da1ff4
 

Bugs fixed (see bugzilla for more information)

120028 - CAN-2004-0109 kernel iso9660 buffer overflow
121314 - Linux kernel setsockopt MCAST_MSFILTER integer overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/