Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2004:418-05
Type: Security Advisory
Severity: Important
Issued on: 2004-08-03
Last updated on: 2004-08-03
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
CVEs (cve.mitre.org): CVE-2004-0415
CVE-2004-0535
CVE-2004-0587

Details

Updated kernel packages that fix potential information leaks and a
incorrect driver permission for Red Hat Enterprise Linux 2.1 are now available.

The Linux kernel handles the basic functions of the operating system.

Paul Starzetz discovered flaws in the Linux kernel when handling file
offset pointers. These consist of invalid conversions of 64 to 32-bit file
offset pointers and possible race conditions. A local unprivileged user
could make use of these flaws to access large portions of kernel memory.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0415 to this issue.

These packages contain a patch written by Al Viro to correct these flaws.
Red Hat would like to thank iSEC Security Research for disclosing this
issue and a number of vendor-sec participants for reviewing and working on
the patch to this issue.

In addition, these packages correct two minor issues:

An bug in the e1000 network driver. This bug could be used by local users
to leak small amounts of kernel memory (CAN-2004-0535).

Inappropriate permissions on /proc/scsi/qla2300/HbaApiNode (CAN-2004-0587).

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to these erratum packages which contain backported patches to correct these
issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
kernel-2.4.9-e.48.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 32482bbacba7aed44aea420da0ef1418
kernel-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a3e6271399611b981291df8bcd992717
kernel-BOOT-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: e1b4abb4e387ef87f2ba6428783973f5
kernel-debug-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3383e7a871f2ca6bf291efc571c9f159
kernel-doc-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8c7745b52ed0732e3347a1beb3365cce
kernel-enterprise-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 5d08fb530d37c1e4bec8222fc6e8430b
kernel-headers-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1b3c3dab9a7a935c731fd38401ec2a2f
kernel-smp-2.4.9-e.48.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 675a499b8c0225f35660ef9f0a72ec3d
kernel-smp-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 71a58c709571f8ae8d313cf89d800c03
kernel-source-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 34961632e9384621acd93e6a66d3731a
kernel-summit-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: aa870614772046934a1872fc89908a4b
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
kernel-2.4.9-e.48.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 32482bbacba7aed44aea420da0ef1418
kernel-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a3e6271399611b981291df8bcd992717
kernel-BOOT-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: e1b4abb4e387ef87f2ba6428783973f5
kernel-debug-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3383e7a871f2ca6bf291efc571c9f159
kernel-doc-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8c7745b52ed0732e3347a1beb3365cce
kernel-headers-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1b3c3dab9a7a935c731fd38401ec2a2f
kernel-smp-2.4.9-e.48.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 675a499b8c0225f35660ef9f0a72ec3d
kernel-smp-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 71a58c709571f8ae8d313cf89d800c03
kernel-source-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 34961632e9384621acd93e6a66d3731a
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
kernel-2.4.9-e.48.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 32482bbacba7aed44aea420da0ef1418
kernel-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a3e6271399611b981291df8bcd992717
kernel-BOOT-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: e1b4abb4e387ef87f2ba6428783973f5
kernel-debug-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3383e7a871f2ca6bf291efc571c9f159
kernel-doc-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 8c7745b52ed0732e3347a1beb3365cce
kernel-enterprise-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 5d08fb530d37c1e4bec8222fc6e8430b
kernel-headers-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 1b3c3dab9a7a935c731fd38401ec2a2f
kernel-smp-2.4.9-e.48.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 675a499b8c0225f35660ef9f0a72ec3d
kernel-smp-2.4.9-e.48.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 71a58c709571f8ae8d313cf89d800c03
kernel-source-2.4.9-e.48.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 34961632e9384621acd93e6a66d3731a
 

Bugs fixed (see bugzilla for more information)

125170 - CAN-2004-0535 e100e1000 kernel memory leak (x86)
126400 - CAN-2004-0587 Bad permissions on qla* drivers


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/