|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:437-01 (kernel)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:437-01] Updated kernel packages fix security vulnerability
Date:  Wed, 18 Aug 2004 11:40 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated kernel packages fix security vulnerability Advisory ID: RHSA-2004:437-01 Issue date: 2004-08-18 Updated on: 2004-08-18 Product: Red Hat Enterprise Linux Keywords: kernel update Obsoletes: RHSA-2004:044 CVE Names: CAN-2004-0178 - --------------------------------------------------------------------- 1. Summary: Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 2.1. This is the fifth regular update. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686 Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686 Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686 3. Problem description: The Linux kernel handles the basic functions of the operating system. This is the fifth regular kernel update to Red Hat Enterprise Linux version 2.1. It contains one minor security fix, many bug fixes, and updates a number of device drivers. A bug in the SoundBlaster 16 code which did not properly handle certain sample sizes has been fixed. This flaw could be used by local users to crash a system. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0178 to this issue. The following drivers have also been updated: * cciss v2.4.52 * e1000 v5252k1 * e100 v2.3.43-k1 * fusion v2.05.16 * ips v7.00.15 * aacraid v1.1.5 * megaraid2 v2.10.6 All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info): 117902 - kswapd consumes a large amount of CPU for an extended period of time 117460 - SSH fails in various contexts with ENOBUFS error 121046 - CAN-2004-0178 Soundblaster 16 local DoS 114960 - nfs layer livelocks after after using up all of the kmap space 97868 - RFE: Via VT8233A chipset support 102749 - Kernel 2.4.9-e.25 does not support AMD VIPER 7441 ide chipset 109881 - RHEL2.1 U5: BLKSSZGET ioctl support for raw devices. 125281 - Cluster manager detects false failures under heavy system load 124716 - [PATCH] NFS Uncached IO logic error when mouting with noac and not specifying the rsize/wsize 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ker... 90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm athlon: 187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm i386: e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm 19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm 4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm i686: 9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm 416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm 4aebb75ad8fb467539d395c576c49e05 kernel-enterprise-2.4.9-e.49.i686.rpm d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm 03f4fd713ad46842a45a8d7c1d6a008f kernel-summit-2.4.9-e.49.i686.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ker... 90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm athlon: 187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm i386: e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm 19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm 4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm i686: 9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm 416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ker... 90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm athlon: 187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm i386: e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm 19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm 4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm i686: 9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm 416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm 4aebb75ad8fb467539d395c576c49e05 kernel-enterprise-2.4.9-e.49.i686.rpm d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0178 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact.html Copyright 2004 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFBI3hsXlSAg2UNWIIRAuF2AJ0U0CFFY1czT5AHDVXYt4XRiQbE5ACfYobV vVwu64F/jPBodUWkCXDqkjE= =Z3kc -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-...


(Log in to post comments)


Copyright © 2024, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds