Red Hat Security Advisory

Synopsis:          Updated kernel packages fix security vulnerability
Advisory ID:       RHSA-2004:105-01
Issue date:        2004-04-21
Updated on:        2004-04-21
Product:           Red Hat Enterprise Linux
Keywords:          kernel update
Cross references:  
Obsoletes:         RHSA-2004:044
CVE Names:         CAN-2004-0109
- ---------------------------------------------------------------------

1. Topic:

Updated kernel packages that fix a security vulnerability which may allow
local users to gain root privileges are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating
system.

This kernel updates several drivers and fixes a number of bugs, including a
potential security vulnerability.

iDefense reported a buffer overflow flaw in the ISO9660 filesystem code.
An attacker could create a malicious filesystem in such a way that root
privileges may be obtained if the filesystem is mounted. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0109 to this issue.

The following drivers were updated:

LSI megaraid2 v2.10.1.1
IBM Serveraid v. 6.11.07
MPT Fusion v.2.05.11.03

All users are advised to upgrade to these errata packages, which contain
a backported security patch that corrects this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://access.redhat.com

5. Bug IDs fixed  (  for more info):

119303 - oops when using the ipt_redirect module
118496 - updates to scsi_scan.c in RH EL 2.1 Update 4
112177 - blkdev_varyio is exported as a GPL only on RHEL 2.1 U4
90209 - only 2 processors of 4 seen on SE7505VB2
70607 - Oops in get_filesystem_info due to lack of locking
115061 - [PATCH] rhel 2.1 will need to pick up the cyclone-lpj-fix
112006 - [PATCH] BUG() from __remove_inode_page
101738 - mprotect areas not cleaned up
106448 - GRUB failing to install on recent HP DL servers with cciss RAID controllers111680 - fix /proc/$PID/cmdline issue
114053 - [PATCH] file append not working when nfs mounted with nfs_uncached_io
77839 - Assert failure in transaction.c:1224: "!jh->b_committed_data
111342 - get_parition_list can loose disks
101365 - Additions to drivers/scsi/scsi_scan.c
112722 - ethtool crashes with segmentation fault for tg3 driver
111250 - tg3 driver fails to autonegotiate correctly
112021 - {PATCH] cciss driver change: SCSI prefetch
112108 - I/O mem bug fix
112130 - RHEL 2.1 U4:  update cciss driver
113900 - RHEL 2.1 U4:  Update mptfusion (LSI U320) driver to 2.05.10 or newest.
111672 - RHEL 2.1 U4 - Need latest Adaptec ServeRAID fix for IA64 for IBM only.
113738 - [PATCH] updated megaraid2 driver (2.10.1)
112057 - RHEL 3 U2: update megaraid2 to version 2.10.x
102692 - Crash with bigpages and ssh shared mem usage
120029 - CAN-2004-0109 kernel iso9660 buffer overflow

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 


athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-summit-2.4.9-e.40.i686.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: 


athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 


athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm



7. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------

f66df0375d216b86e07fb71763ff9899 2.1AS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1AS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1AS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1AS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1AS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1AS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1AS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1AS/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1AS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
3e38c77ad44b39326d21acddc8c74410 2.1AS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1AS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm
a1116040cc09a8e9204d1fe6e44b91e4 2.1AS/en/os/i686/kernel-summit-2.4.9-e.40.i686.rpm
f66df0375d216b86e07fb71763ff9899 2.1ES/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1ES/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1ES/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1ES/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1ES/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1ES/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1ES/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1ES/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1ES/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1ES/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm
f66df0375d216b86e07fb71763ff9899 2.1WS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1WS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1WS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1WS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1WS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1WS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1WS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1WS/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1WS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
3e38c77ad44b39326d21acddc8c74410 2.1WS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1WS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm

These packages are GPG signed by Red Hat for security.  Our key is
available from  

You can verify each package with the following command:
    
    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum 


8. References:
 
CVE -CVE-2004-0109

9. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at  

Copyright 2004 Red Hat, Inc.

Red Hat: kernel Buffer overflow vulnerability

Updated kernel packages that fix a security vulnerability which may allowlocal users to gain root privileges are now available.

Summary



Summary

The Linux kernel handles the basic functions of the operatingsystem.This kernel updates several drivers and fixes a number of bugs, including apotential security vulnerability.iDefense reported a buffer overflow flaw in the ISO9660 filesystem code.An attacker could create a malicious filesystem in such a way that rootprivileges may be obtained if the filesystem is mounted. The CommonVulnerabilities and Exposures project (cve.mitre.org) has assigned the nameCAN-2004-0109 to this issue.The following drivers were updated:LSI megaraid2 v2.10.1.1IBM Serveraid v. 6.11.07MPT Fusion v.2.05.11.03All users are advised to upgrade to these errata packages, which containa backported security patch that corrects this issue.


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.
Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website:
https://access.redhat.com
5. Bug IDs fixed ( for more info):
119303 - oops when using the ipt_redirect module 118496 - updates to scsi_scan.c in RH EL 2.1 Update 4 112177 - blkdev_varyio is exported as a GPL only on RHEL 2.1 U4 90209 - only 2 processors of 4 seen on SE7505VB2 70607 - Oops in get_filesystem_info due to lack of locking 115061 - [PATCH] rhel 2.1 will need to pick up the cyclone-lpj-fix 112006 - [PATCH] BUG() from __remove_inode_page 101738 - mprotect areas not cleaned up 106448 - GRUB failing to install on recent HP DL servers with cciss RAID controllers111680 - fix /proc/$PID/cmdline issue 114053 - [PATCH] file append not working when nfs mounted with nfs_uncached_io 77839 - Assert failure in transaction.c:1224: "!jh->b_committed_data 111342 - get_parition_list can loose disks 101365 - Additions to drivers/scsi/scsi_scan.c 112722 - ethtool crashes with segmentation fault for tg3 driver 111250 - tg3 driver fails to autonegotiate correctly 112021 - {PATCH] cciss driver change: SCSI prefetch 112108 - I/O mem bug fix 112130 - RHEL 2.1 U4: update cciss driver 113900 - RHEL 2.1 U4: Update mptfusion (LSI U320) driver to 2.05.10 or newest. 111672 - RHEL 2.1 U4 - Need latest Adaptec ServeRAID fix for IA64 for IBM only. 113738 - [PATCH] updated megaraid2 driver (2.10.1) 112057 - RHEL 3 U2: update megaraid2 to version 2.10.x 102692 - Crash with bigpages and ssh shared mem usage 120029 - CAN-2004-0109 kernel iso9660 buffer overflow
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:

athlon: Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm
i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm
i686: Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-summit-2.4.9-e.40.i686.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:

athlon: Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm
i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm
i686: Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:

athlon: Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm
i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm
i686: Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm


7. Verification:
MD5 sum Package Name
f66df0375d216b86e07fb71763ff9899 2.1AS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm 452507f7e9ac8079c19e0640b74ae3d1 2.1AS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm 70fe436720e2bb799598fc74d6623d7f 2.1AS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm 8e7674dd40856fdd9e7d3dd6d57dad5c 2.1AS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm 9aa43e91e82c97bb7c18081cf7037018 2.1AS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm 7b862da2e3947c6791012e058d517f2d 2.1AS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1AS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm e7673832f7763e14138c6bc3519cd981 2.1AS/en/os/i686/kernel-2.4.9-e.40.i686.rpm 4d5225bfb895029bb69f50cbcb87af31 2.1AS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm 3e38c77ad44b39326d21acddc8c74410 2.1AS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm 4bbbdb628c4e0efb74c14b97f841a81f 2.1AS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm a1116040cc09a8e9204d1fe6e44b91e4 2.1AS/en/os/i686/kernel-summit-2.4.9-e.40.i686.rpm f66df0375d216b86e07fb71763ff9899 2.1ES/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm 452507f7e9ac8079c19e0640b74ae3d1 2.1ES/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm 70fe436720e2bb799598fc74d6623d7f 2.1ES/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm 8e7674dd40856fdd9e7d3dd6d57dad5c 2.1ES/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm 9aa43e91e82c97bb7c18081cf7037018 2.1ES/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm 7b862da2e3947c6791012e058d517f2d 2.1ES/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1ES/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm e7673832f7763e14138c6bc3519cd981 2.1ES/en/os/i686/kernel-2.4.9-e.40.i686.rpm 4d5225bfb895029bb69f50cbcb87af31 2.1ES/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm 4bbbdb628c4e0efb74c14b97f841a81f 2.1ES/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm f66df0375d216b86e07fb71763ff9899 2.1WS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm 452507f7e9ac8079c19e0640b74ae3d1 2.1WS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm 70fe436720e2bb799598fc74d6623d7f 2.1WS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm 8e7674dd40856fdd9e7d3dd6d57dad5c 2.1WS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm 9aa43e91e82c97bb7c18081cf7037018 2.1WS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm 7b862da2e3947c6791012e058d517f2d 2.1WS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1WS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm e7673832f7763e14138c6bc3519cd981 2.1WS/en/os/i686/kernel-2.4.9-e.40.i686.rpm 4d5225bfb895029bb69f50cbcb87af31 2.1WS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm 3e38c77ad44b39326d21acddc8c74410 2.1WS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm 4bbbdb628c4e0efb74c14b97f841a81f 2.1WS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm
These packages are GPG signed by Red Hat for security. Our key is available from
You can verify each package with the following command:
rpm --checksig -v
If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
md5sum

References

Package List


Severity
Advisory ID: RHSA-2004:105-01
Issued Date: : 2004-04-21
Updated on: 2004-04-21
Product: Red Hat Enterprise Linux
Keywords: kernel update
Cross references:
Obsoletes: RHSA-2004:044
CVE Names: CAN-2004-0109

Topic


Topic

Updated kernel packages that fix a security vulnerability which may allow

local users to gain root privileges are now available.


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686

Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686

Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686


Bugs Fixed


Related News