"Updated kernel packages are now available that fix a few security issues,
an NFS performance issue, and an e1000 driver loading issue introduced in
Update 3."
|
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated kernel packages resolve minor security vulnerabilities
Advisory ID: RHSA-2004:044-01
Issue date: 2004-02-03
Updated on: 2004-02-03
Product: Red Hat Enterprise Linux
Keywords:
Cross references:
Obsoletes: RHSA-2003:408
CVE Names: CAN-2002-1574 CAN-2003-0700 CAN-2004-0003
- ---------------------------------------------------------------------
1. Topic:
Updated kernel packages are now available that fix a few security issues,
an NFS performance issue, and an e1000 driver loading issue introduced in
Update 3.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686
3. Problem description:
The Linux kernel handles the basic functions of the operating system.
Alan Cox found issues in the R128 Direct Render Infrastructure that
could allow local privilege escalation. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0003 to
this issue.
The C-Media PCI sound driver in Linux before 2.4.22 does not use the
get_user function to access userspace in certain conditions, which crosses
security boundaries. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0700 to this issue.
An overflow was found in the ixj telephony card driver in Linux kernels
prior to 2.4.20. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2002-1574 to this issue.
All users are advised to upgrade to these errata packages, which contain
backported security patches that corrects these issues. These packages
also contain a fix to enhance NFS performance, which was degraded in the
last kernel update as part of Update 3.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:
https://rhn.redhat.com/help/latest-up2date.pxt
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
112766 - e.34 kernel breaks UDP NFS badly
113602 - CAN-2004-0003 r128 DRI
113305 - CAN-2003-0700 CMedia additional get_user issues
113300 - CAN-2002-1574 ixj telephony card driver overflow
112914 - After upgraded the latest kenerl e.34 or e.35, the Intel Pro/100 module did not load during the reboot.
113498 - modules.dep points to the wrong driver
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.9-e.37.src.rpm
athlon:
Available from Red Hat Network: kernel-2.4.9-e.37.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.37.athlon.rpm
i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.37.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.37.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.37.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.37.i386.rpm
i686:
Available from Red Hat Network: kernel-2.4.9-e.37.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.37.i686.rpm
Available from Red Hat Network: kernel-enterprise-2.4.9-e.37.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.37.i686.rpm
Available from Red Hat Network: kernel-summit-2.4.9-e.37.i686.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kernel-2.4.9-e.37.src.rpm
athlon:
Available from Red Hat Network: kernel-2.4.9-e.37.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.37.athlon.rpm
i386:
Available from Red Hat Network: kernel-BOOT-2.4.9-e.37.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.9-e.37.i386.rpm
Available from Red Hat Network: kernel-headers-2.4.9-e.37.i386.rpm
Available from Red Hat Network: kernel-source-2.4.9-e.37.i386.rpm
i686:
Available from Red Hat Network: kernel-2.4.9-e.37.i686.rpm
Available from Red Hat Network: kernel-debug-2.4.9-e.37.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.9-e.37.i686.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kernel-2.4.9-e.37.src.rpm
athlon:
Available from Red Hat Network: kernel-2.4.9-e.37.athlon.rpm
Available from Red Hat Network: ke
|