|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:069-01 (kernel)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:069-01] Updated kernel packages fix security vulnerability
Date:  Wed, 18 Feb 2004 13:20 -0500

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated kernel packages fix security vulnerability Advisory ID: RHSA-2004:069-01 Issue date: 2004-02-18 Updated on: 2004-02-18 Product: Red Hat Enterprise Linux Keywords: kernel update Cross references: Obsoletes: RHSA-2004:044 CVE Names: CAN-2004-0010 CAN-2004-0077 - --------------------------------------------------------------------- 1. Topic: Updated kernel packages that fix a security vulnerability which may allow local users to gain root privileges are now available. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686 Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686 Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686 3. Problem description: The Linux kernel handles the basic functions of the operating system. Paul Starzetz discovered a flaw in return value checking in mremap() in the Linux kernel versions 2.4.24 and previous that may allow a local attacker to gain root privileges. No exploit is currently available; however this issue is exploitable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0077 to this issue. Arjan van de Ven discovered a flaw in ncp_lookup() in ncpfs that could allow local privilege escalation. ncpfs is only used to allow a system to mount volumes of NetWare servers or print to NetWare printers. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0010 to this issue. All users are advised to upgrade to these errata packages, which contain backported security patches that correct these issues. Red Hat would like to thank Paul Starzetz from ISEC for reporting this issue CAN-2004-0077. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 115818 - CAN-2004-0077 Linux kernel do_mremap VMA limit local privilege escalation 115821 - CAN-2004-0010 ncpfs hole 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.9-e.38.src.rpm athlon: Available from Red Hat Network: kernel-2.4.9-e.38.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.38.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.38.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.38.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.38.i386.rpm i686: Available from Red Hat Network: kernel-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-enterprise-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-summit-2.4.9-e.38.i686.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kernel-2.4.9-e.38.src.rpm athlon: Available from Red Hat Network: kernel-2.4.9-e.38.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.38.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.38.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.38.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.38.i386.rpm i686: Available from Red Hat Network: kernel-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.38.i686.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kernel-2.4.9-e.38.src.rpm athlon: Available from Red Hat Network: kernel-2.4.9-e.38.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.38.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.9-e.38.i386.rpm Available from Red Hat Network: kernel-doc-2.4.9-e.38.i386.rpm Available from Red Hat Network: kernel-source-2.4.9-e.38.i386.rpm i686: Available from Red Hat Network: kernel-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-debug-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-enterprise-2.4.9-e.38.i686.rpm Available from Red Hat Network: kernel-smp-2.4.9-e.38.i686.rpm 7. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- bf08e551ec7d6d5494fc954ea4c25821 2.1AS/en/os/SRPMS/kernel-2.4.9-e.38.src.rpm 7d2613b6be59f6373caa28942fa0a701 2.1AS/en/os/athlon/kernel-2.4.9-e.38.athlon.rpm f6a94c5daf096e28d889adb1c11e0f0b 2.1AS/en/os/athlon/kernel-smp-2.4.9-e.38.athlon.rpm caaf7ebe7ffb964c45a54323b50808db 2.1AS/en/os/i386/kernel-BOOT-2.4.9-e.38.i386.rpm 706b15af88797d32cc92853fe69c30ef 2.1AS/en/os/i386/kernel-doc-2.4.9-e.38.i386.rpm df50cc0f011f3cc0d4c96a8489ad9877 2.1AS/en/os/i386/kernel-source-2.4.9-e.38.i386.rpm ddab05c5bdcfada0eeba724900a05cec 2.1AS/en/os/i686/kernel-2.4.9-e.38.i686.rpm 9f3a4bbc6bd6474472ce5675e755938c 2.1AS/en/os/i686/kernel-debug-2.4.9-e.38.i686.rpm 62eed58d9943efe07237d6fc2f860433 2.1AS/en/os/i686/kernel-enterprise-2.4.9-e.38.i686.rpm 71608b82e3eefc0f6c7d50185620031c 2.1AS/en/os/i686/kernel-smp-2.4.9-e.38.i686.rpm 5d27201d69a7b9cfd7b9cecb7f86a5e6 2.1AS/en/os/i686/kernel-summit-2.4.9-e.38.i686.rpm bf08e551ec7d6d5494fc954ea4c25821 2.1ES/en/os/SRPMS/kernel-2.4.9-e.38.src.rpm 7d2613b6be59f6373caa28942fa0a701 2.1ES/en/os/athlon/kernel-2.4.9-e.38.athlon.rpm f6a94c5daf096e28d889adb1c11e0f0b 2.1ES/en/os/athlon/kernel-smp-2.4.9-e.38.athlon.rpm caaf7ebe7ffb964c45a54323b50808db 2.1ES/en/os/i386/kernel-BOOT-2.4.9-e.38.i386.rpm 706b15af88797d32cc92853fe69c30ef 2.1ES/en/os/i386/kernel-doc-2.4.9-e.38.i386.rpm df50cc0f011f3cc0d4c96a8489ad9877 2.1ES/en/os/i386/kernel-source-2.4.9-e.38.i386.rpm ddab05c5bdcfada0eeba724900a05cec 2.1ES/en/os/i686/kernel-2.4.9-e.38.i686.rpm 9f3a4bbc6bd6474472ce5675e755938c 2.1ES/en/os/i686/kernel-debug-2.4.9-e.38.i686.rpm 71608b82e3eefc0f6c7d50185620031c 2.1ES/en/os/i686/kernel-smp-2.4.9-e.38.i686.rpm bf08e551ec7d6d5494fc954ea4c25821 2.1WS/en/os/SRPMS/kernel-2.4.9-e.38.src.rpm 7d2613b6be59f6373caa28942fa0a701 2.1WS/en/os/athlon/kernel-2.4.9-e.38.athlon.rpm f6a94c5daf096e28d889adb1c11e0f0b 2.1WS/en/os/athlon/kernel-smp-2.4.9-e.38.athlon.rpm caaf7ebe7ffb964c45a54323b50808db 2.1WS/en/os/i386/kernel-BOOT-2.4.9-e.38.i386.rpm 706b15af88797d32cc92853fe69c30ef 2.1WS/en/os/i386/kernel-doc-2.4.9-e.38.i386.rpm df50cc0f011f3cc0d4c96a8489ad9877 2.1WS/en/os/i386/kernel-source-2.4.9-e.38.i386.rpm ddab05c5bdcfada0eeba724900a05cec 2.1WS/en/os/i686/kernel-2.4.9-e.38.i686.rpm 9f3a4bbc6bd6474472ce5675e755938c 2.1WS/en/os/i686/kernel-debug-2.4.9-e.38.i686.rpm 62eed58d9943efe07237d6fc2f860433 2.1WS/en/os/i686/kernel-enterprise-2.4.9-e.38.i686.rpm 71608b82e3eefc0f6c7d50185620031c 2.1WS/en/os/i686/kernel-smp-2.4.9-e.38.i686.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0010 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0077 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFAM6zhXlSAg2UNWIIRAuqHAKCQ7/NDA3exK5IEtwDsKanZ6Emg+wCgqYYb /12PMLWiidVTWeVl5dCJDQQ= =Cw1l -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds