Red Hat alert: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 1

Posted by dave on Jan 16, 2004 9:40 AM EDT
Mailing list
Mail this story
Print this story

Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the first regular update.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------- Red Hat Security Advisory

Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 1 Advisory ID: RHSA-2004:017-01 Issue date: 2004-01-13 Updated on: 2004-01-13 Product: Red Hat Enterprise Linux Keywords: taroon kernel update Cross references: Obsoletes: RHBA-2003:308 RHSA-2003:416 CVE Names: CAN-2004-0001 - ---------------------------------------------------------------------

1. Topic:

Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the first regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - athlon, i386, i686, ia64, ppc64, ppc64iseries, ppc64pseries, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - athlon, i386, i686 Red Hat Enterprise Linux WS version 3 - athlon, i386, i686, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the first regular kernel update for Red Hat Enterprise Linux version 3. It contains a new critical security fix, many other bug fixes, several device driver updates, and numerous performance and scalability enhancements.

On AMD64 systems, a fix was made to the eflags checking in 32-bit ptrace emulation that could have allowed local users to elevate their privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0001 to this issue.

Other bug fixes were made in the following kernel areas: VM, NPTL, IPC, kernel timer, ext3, NFS, netdump, SCSI, ACPI, several device drivers, and machine-dependent support for the x86_64, ppc64, and s390 architectures.

The VM subsystem was improved to better handle extreme loads and resource contention (such as might occur during heavy database application usage). This has resulted in a significantly reduced possibility of hangs, OOM kills, and low-mem exhaustion.

Several NPTL fixes were made to resolve POSIX compliance issues concerning process IDs and thread IDs. A section in the Release Notes elaborates on a related issue with file record locking in multi-threaded applications.

AMD64 kernels are now configured with NUMA support, S390 kernels now have CONFIG_BLK_STATS enabled, and DMA capability was restored in the IA64 agpgart driver.

The following drivers have been upgraded to new versions:

cmpci ------ 6.36 e100 ------- 2.3.30-k1 e1000 ------ 5.2.20-k1 ips -------- 6.10.52 megaraid --- v1.18k megaraid2 -- v2.00.9

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.

Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

71514 - Infinite recursion in SCSI mid layer 77839 - Assert failure in transaction.c:1224: "!jh->b_committed_data 85974 - IDE tape generates errors when execute mt command 90204 - Downgrade assert failure at revoke.c:329 to a warning 90207 - RHEL AS2.1 IPF: Linux scheduler interaction - threads all running on one processor 97065 - Updated cciss driver does not clean up properly after load failiure 98132 - (NET E1000) Taroon Alpha4 e1000 driver does not detect currently being tested NIC/LOM's 99251 - aic7xxx/79xx causes PCI PARITY ERROR on PE4600 101938 - C write fails for records gt 2 GB 102258 - [ibmsis] LTC3905 - RHEL_3 scsi midlayer hang 102400 - LTC3932 - kill10 hangs with RHEL 3 kernel 102535 - hang in ptrace for gdb traceback 103245 - LTC4138 - Vmstat not printing irqs/second 103304 - x86_64 oprofile.o driver misidentifies processor 103491 - NPTL-related invalid uses of thread ID 103671 - More informative memory error reporting on AMD64 104116 - [x86_64] Crash/CPU lockup running lmbench 104172 - GCC testsuite crashing .421 and .411 kernels 104260 - LTC4351 - kernel panic after rmmod'ing and then insmod'ing the olympic token ring module. 104313 - LTC4357 - viocons making > 4k writes 104338 - missing critical HP agp related patches 104520 - SMP Kernel hang on shutdown with Intel SRCZCR Raid Controller 104651 - RHEL 3 U1: Ability to blackl



  Nav
» Read more about: Story Type: Security; Groups: HP, Intel, Red Hat

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.