Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2004:260-03
Type: Security Advisory
Severity: Important
Issued on: 2004-06-18
Last updated on: 2004-06-18
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
CVEs (cve.mitre.org): CVE-2004-0495
CVE-2004-0554

Details

Updated kernel packages for Red Hat Enterprise Linux 2.1 that fix security
vulnerabilities are now available.

The Linux kernel handles the basic functions of the operating system.

A flaw was found in Linux kernel versions 2.4 and 2.6 for x86 and x86_64
that allowed local users to cause a denial of service (system crash) by
triggering a signal handler with a certain sequence of fsave and frstor
instructions. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0554 to this issue.

Enhancements were committed to the 2.6 kernel by Al Viro which enabled the
Sparse source code checking tool to check for a certain class of kernel
bugs. A subset of these fixes also applies to various drivers in the 2.4
kernel. These flaws could lead to privilege escalation or access to kernel
memory. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2004-0495 to these issues.

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum. These packages contain
backported patches to correct these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
kernel-2.4.9-e.41.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3958537aa5fd88aebb95864351f824c8
 
IA-32:
kernel-2.4.9-e.41.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: e8a6f83bc24e92297315f751559a251a
kernel-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3e0d87495a7c6b7bef7e02f55ef6d24a
kernel-BOOT-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: fdf9aa6832ac6faeb301988d98e7a31b
kernel-debug-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8aa5eb290f69829b5284c90705b6061f
kernel-doc-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 4af5cd44eb2fa282c0d743927478738c
kernel-enterprise-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 703fec744138ab5ca5118e266e5b75f1
kernel-headers-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 55f2acc05244bf82043d85920aeab3e4
kernel-smp-2.4.9-e.41.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 04ab73b3bca23210c7643a74a7602b49
kernel-smp-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: b2186df6f7d6c688a30365a17dc9a4b4
kernel-source-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: e6b5c0f91e0808d6c1ba5de86b600c17
kernel-summit-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: e05538bec3d7e58542c34f222890facf
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
kernel-2.4.9-e.41.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3958537aa5fd88aebb95864351f824c8
 
IA-32:
kernel-2.4.9-e.41.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: e8a6f83bc24e92297315f751559a251a
kernel-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3e0d87495a7c6b7bef7e02f55ef6d24a
kernel-BOOT-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: fdf9aa6832ac6faeb301988d98e7a31b
kernel-debug-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8aa5eb290f69829b5284c90705b6061f
kernel-doc-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 4af5cd44eb2fa282c0d743927478738c
kernel-headers-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 55f2acc05244bf82043d85920aeab3e4
kernel-smp-2.4.9-e.41.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 04ab73b3bca23210c7643a74a7602b49
kernel-smp-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: b2186df6f7d6c688a30365a17dc9a4b4
kernel-source-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: e6b5c0f91e0808d6c1ba5de86b600c17
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
kernel-2.4.9-e.41.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3958537aa5fd88aebb95864351f824c8
 
IA-32:
kernel-2.4.9-e.41.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: e8a6f83bc24e92297315f751559a251a
kernel-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3e0d87495a7c6b7bef7e02f55ef6d24a
kernel-BOOT-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: fdf9aa6832ac6faeb301988d98e7a31b
kernel-debug-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8aa5eb290f69829b5284c90705b6061f
kernel-doc-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 4af5cd44eb2fa282c0d743927478738c
kernel-enterprise-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 703fec744138ab5ca5118e266e5b75f1
kernel-headers-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 55f2acc05244bf82043d85920aeab3e4
kernel-smp-2.4.9-e.41.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 04ab73b3bca23210c7643a74a7602b49
kernel-smp-2.4.9-e.41.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: b2186df6f7d6c688a30365a17dc9a4b4
kernel-source-2.4.9-e.41.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: e6b5c0f91e0808d6c1ba5de86b600c17
 

Bugs fixed (see bugzilla for more information)

126031 - CAN-2004-0554 local user can get the kernel to hang
126122 - CAN-2004-0495 Sparse security fixes backported for 2.4 kernel


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/