Red Hat: kernel Buffer overflow vulnerability
Summary
Summary
The Linux kernel handles the basic functions of the operatingsystem.This kernel updates several drivers and fixes a number of bugs, including apotential security vulnerability.iDefense reported a buffer overflow flaw in the ISO9660 filesystem code.An attacker could create a malicious filesystem in such a way that rootprivileges may be obtained if the filesystem is mounted. The CommonVulnerabilities and Exposures project (cve.mitre.org) has assigned the nameCAN-2004-0109 to this issue.The following drivers were updated:LSI megaraid2 v2.10.1.1IBM Serveraid v. 6.11.07MPT Fusion v.2.05.11.03All users are advised to upgrade to these errata packages, which containa backported security patch that corrects this issue.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:
https://access.redhat.com
5. Bug IDs fixed ( for more info):
119303 - oops when using the ipt_redirect module
118496 - updates to scsi_scan.c in RH EL 2.1 Update 4
112177 - blkdev_varyio is exported as a GPL only on RHEL 2.1 U4
90209 - only 2 processors of 4 seen on SE7505VB2
70607 - Oops in get_filesystem_info due to lack of locking
115061 - [PATCH] rhel 2.1 will need to pick up the cyclone-lpj-fix
112006 - [PATCH] BUG() from __remove_inode_page
101738 - mprotect areas not cleaned up
106448 - GRUB failing to install on recent HP DL servers with cciss RAID controllers111680 - fix /proc/$PID/cmdline issue
114053 - [PATCH] file append not working when nfs mounted with nfs_uncached_io
77839 - Assert failure in transaction.c:1224: "!jh->b_committed_data
111342 - get_parition_list can loose disks
101365 - Additions to drivers/scsi/scsi_scan.c
112722 - ethtool crashes with segmentation fault for tg3 driver
111250 - tg3 driver fails to autonegotiate correctly
112021 - {PATCH] cciss driver change: SCSI prefetch
112108 - I/O mem bug fix
112130 - RHEL 2.1 U4: update cciss driver
113900 - RHEL 2.1 U4: Update mptfusion (LSI U320) driver to 2.05.10 or newest.
111672 - RHEL 2.1 U4 - Need latest Adaptec ServeRAID fix for IA64 for IBM only.
113738 - [PATCH] updated megaraid2 driver (2.10.1)
112057 - RHEL 3 U2: update megaraid2 to version 2.10.x
102692 - Crash with bigpages and ssh shared mem usage
120029 - CAN-2004-0109 kernel iso9660 buffer overflow
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm
i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm
i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-summit-2.4.9-e.40.i686.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm
i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm
i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
athlon:
Available from Red Hat Network: kernel-2.4.9-e.40.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.athlon.rpm
i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.40.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.40.i386.rpm
i686:
Available from Red Hat Network: kernel-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-enterprise-2.4.9-e.40.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.40.i686.rpm
7. Verification:
MD5 sum Package Name
f66df0375d216b86e07fb71763ff9899 2.1AS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1AS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1AS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1AS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1AS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1AS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1AS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1AS/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1AS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
3e38c77ad44b39326d21acddc8c74410 2.1AS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1AS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm
a1116040cc09a8e9204d1fe6e44b91e4 2.1AS/en/os/i686/kernel-summit-2.4.9-e.40.i686.rpm
f66df0375d216b86e07fb71763ff9899 2.1ES/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1ES/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1ES/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1ES/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1ES/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1ES/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1ES/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1ES/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1ES/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1ES/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm
f66df0375d216b86e07fb71763ff9899 2.1WS/en/os/SRPMS/kernel-2.4.9-e.40.src.rpm
452507f7e9ac8079c19e0640b74ae3d1 2.1WS/en/os/athlon/kernel-2.4.9-e.40.athlon.rpm
70fe436720e2bb799598fc74d6623d7f 2.1WS/en/os/athlon/kernel-smp-2.4.9-e.40.athlon.rpm
8e7674dd40856fdd9e7d3dd6d57dad5c 2.1WS/en/os/i386/kernel-BOOT-2.4.9-e.40.i386.rpm
9aa43e91e82c97bb7c18081cf7037018 2.1WS/en/os/i386/kernel-doc-2.4.9-e.40.i386.rpm
7b862da2e3947c6791012e058d517f2d 2.1WS/en/os/i386/kernel-headers-2.4.9-e.40.i386.rpm
ad3bc6f5c81d6213f5eec5bc9b82cb86 2.1WS/en/os/i386/kernel-source-2.4.9-e.40.i386.rpm
e7673832f7763e14138c6bc3519cd981 2.1WS/en/os/i686/kernel-2.4.9-e.40.i686.rpm
4d5225bfb895029bb69f50cbcb87af31 2.1WS/en/os/i686/kernel-debug-2.4.9-e.40.i686.rpm
3e38c77ad44b39326d21acddc8c74410 2.1WS/en/os/i686/kernel-enterprise-2.4.9-e.40.i686.rpm
4bbbdb628c4e0efb74c14b97f841a81f 2.1WS/en/os/i686/kernel-smp-2.4.9-e.40.i686.rpm
These packages are GPG signed by Red Hat for security. Our key is
available from
You can verify each package with the following command:
rpm --checksig -v
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
md5sum
References
Package List
Topic
Topic
Updated kernel packages that fix a security vulnerability which may allow
local users to gain root privileges are now available.
Relevant Releases Architectures
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686
Bugs Fixed