User: Password:
|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2005:420-01 (kernel)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2005:420-01] Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1
Date:  Wed, 8 Jun 2005 11:38 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1 Advisory ID: RHSA-2005:420-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-420.html Issue date: 2005-06-08 Updated on: 2005-06-08 Product: Red Hat Enterprise Linux CVE Names: CAN-2005-0136 CAN-2005-1264 - --------------------------------------------------------------------- 1. Summary: Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 4. This is the first regular update. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64 3. Problem description: The Linux kernel handles the basic functions of the operating system. This is the first regular kernel update to Red Hat Enterprise Linux 4. A flaw affecting the auditing code was discovered. On Itanium architectures a local user could use this flaw to cause a denial of service (crash). This issue is rated as having important security impact (CAN-2005-0136). A flaw was discovered in the servicing of a raw device ioctl. A local user who has access to raw devices could use this flaw to write to kernel memory and cause a denial of service or potentially gain privileges. This issue is rated as having moderate security impact (CAN-2005-1264). New features introduced by this update include: - - Fixed TCP BIC congestion handling. - - Diskdump support for more controllers (megaraid, SATA) - - Device mapper multipath support - - AMD64 dual core support. - - Intel ICH7 hardware support. There were many bug fixes in various parts of the kernel. The ongoing effort to resolve these problems has resulted in a marked improvement in the reliability and scalability of Red Hat Enterprise Linux 4. The following device drivers have been upgraded to new versions: ata_piix -------- 1.03 bonding --------- 2.6.1 e1000 ----------- 5.6.10.1-k2-NAPI e100 ------------ 3.3.6-k2-NAPI ibmveth --------- 1.03 libata ---------- 1.02 to 1.10 lpfc ------------ 0:8.0.16 to 0:8.0.16.6_x2 megaraid_mbox --- 2.20.4.0 to 2.20.4.5 megaraid_mm ----- 2.20.2.0-rh1 to 2.20.2.5 sata_nv --------- 0.03 to 0.6 sata_promise ---- 1.00 to 1.01 sata_sil -------- 0.8 sata_sis -------- 0.5 sata_svw -------- 1.05 sata_sx4 -------- 0.7 sata_via -------- 1.0 sata_vsc -------- 1.0 tg3 ------------- 3.22-rh ipw2100 --------- 1.0.3 ipw2200 --------- 1.0.0 All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 133590 - PTRACE_ATTACH race with real parent's wait calls can produced bogus wait returns 134338 - Intolerable Disk I/O Performance under 64-bit VM: fix I/O buffers 137154 - "waitid(POSIX Interface)" cannot run properly. 138563 - [PATCH] RHEL4 U1: EFI GPT: reduce alternate header probing 140083 - lx-choptp19 crashed running 2.4.21-20.EL.BZ131027.hotfixhugemem 140383 - BLKFLSBUF ioctl can cause other reads 140472 - x86, x86_64 and IA64 scsi inquiry command hangs in wait_for_completion 141983 - RHEL4 U2: DBS: quiet warning messages from cpufreq.c 142167 - [RHEL4][Diskdump] smp_call_function issue 142464 - [PATCH] "RPC: garbage, exit EIO" when using NFSv3 with Kerberos 5 143073 - traced process cannot be killed 143472 - hugetlb mmap failed in compatibility mode in em64t 143907 - ext2 and device dm-0 byond 2Terabyte causes /var/log/messages file size to crash system 144741 - RHEL4 U1: ICH7 Support patch 145424 - problems with ipsec from rhel3 to rhel4 146067 - [PATCH] Channel bonding driver configured in 802.3 ad mode causes kernel panic when shutdwon 146089 - 20050115 ptrace/kill and ptrace/dump race fixes 146703 - NLM (NFSv3) problems when mounting with "sec=krb5" 146797 - SCTP memory consumption and system freezes 146911 - Thread suspension via async signal fails on rhel4-rc2 147832 - oom-killer triggered during Red Hat Cert 150110 - chipset identifier for zx2 150151 - Lockd callbacks to NFS clients fail completely 151284 - mmap of file over NFS corrupts data 152101 - host panics when mounting nfs4 volumes 152102 - host loses connection to nfs server when the server is solaris 152557 - 20050117 Oopsable NFS locking 154221 - Thread exits siliently via __RESTORE_ALL exeception for iret 154639 - kernel thread current->mm dereference in grab_swap_token causes oops 154972 - unexplained SIGSEGV death in SIGSEGV signal handler 155283 - CAN-2005-0136 ptrace corner cases on ia64 155765 - oops on 2.6.9-5.0.5.ELsmp 156875 - libata - master supports lba48 but slave does not 157450 - CAN-2005-1263 Linux kernel ELF core dump privilege elevation 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kerne... 708e5239dd9d9a9a425d0f5d77489806 kernel-2.6.9-11.EL.src.rpm i386: 8cd6de3e57442035516b60f12911e067 kernel-2.6.9-11.EL.i686.rpm ecc10b63ecd7c909e0272eb86f2d21c0 kernel-devel-2.6.9-11.EL.i686.rpm 0a3ca2d16911ce2f882b16d00b459683 kernel-hugemem-2.6.9-11.EL.i686.rpm 2938d82720a88684d78735307c154d7b kernel-hugemem-devel-2.6.9-11.EL.i686.rpm 84082bb98ce1d8131e67622e9584d209 kernel-smp-2.6.9-11.EL.i686.rpm 23a494cfcc0161ab8504e3200a3ee5a0 kernel-smp-devel-2.6.9-11.EL.i686.rpm ia64: 2892022024e23e29b1c1da1100c0ef8b kernel-2.6.9-11.EL.ia64.rpm a51565dfad63ff5ff980e9ceb30e51cd kernel-devel-2.6.9-11.EL.ia64.rpm noarch: bda3f275715e889b1b1111cd5b372873 kernel-doc-2.6.9-11.EL.noarch.rpm ppc: 8dcdc040cbd00928243a20775d5123d6 kernel-2.6.9-11.EL.ppc64.rpm a0e9ca3943927b5cff3b6f238d4ff5d0 kernel-2.6.9-11.EL.ppc64iseries.rpm 1cf5c458b3ecc950277ea59d8f0400c9 kernel-devel-2.6.9-11.EL.ppc64.rpm e92a1ba8d256a695153d87e9e8ba0ad6 kernel-devel-2.6.9-11.EL.ppc64iseries.rpm s390: c91ca50ecb980e3abbead7c520e9569d kernel-2.6.9-11.EL.s390.rpm c3520b5d55fa1102c2100d56173aecc5 kernel-devel-2.6.9-11.EL.s390.rpm s390x: ecf96ac8781675ec8678a73423e3dab9 kernel-2.6.9-11.EL.s390x.rpm 1ca331b341899002794c77de16f17104 kernel-devel-2.6.9-11.EL.s390x.rpm x86_64: 160141d384ecd5b072a0476b6dd07973 kernel-2.6.9-11.EL.x86_64.rpm 805b6de472bbe54f74028c823fd82d78 kernel-devel-2.6.9-11.EL.x86_64.rpm eedc9ef7106687b1177a688371c004c2 kernel-smp-2.6.9-11.EL.x86_64.rpm 35606ad7ab97e97d6f1a88776b6d389c kernel-smp-devel-2.6.9-11.EL.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/... 708e5239dd9d9a9a425d0f5d77489806 kernel-2.6.9-11.EL.src.rpm i386: 8cd6de3e57442035516b60f12911e067 kernel-2.6.9-11.EL.i686.rpm ecc10b63ecd7c909e0272eb86f2d21c0 kernel-devel-2.6.9-11.EL.i686.rpm 0a3ca2d16911ce2f882b16d00b459683 kernel-hugemem-2.6.9-11.EL.i686.rpm 2938d82720a88684d78735307c154d7b kernel-hugemem-devel-2.6.9-11.EL.i686.rpm 84082bb98ce1d8131e67622e9584d209 kernel-smp-2.6.9-11.EL.i686.rpm 23a494cfcc0161ab8504e3200a3ee5a0 kernel-smp-devel-2.6.9-11.EL.i686.rpm noarch: bda3f275715e889b1b1111cd5b372873 kernel-doc-2.6.9-11.EL.noarch.rpm x86_64: 160141d384ecd5b072a0476b6dd07973 kernel-2.6.9-11.EL.x86_64.rpm 805b6de472bbe54f74028c823fd82d78 kernel-devel-2.6.9-11.EL.x86_64.rpm eedc9ef7106687b1177a688371c004c2 kernel-smp-2.6.9-11.EL.x86_64.rpm 35606ad7ab97e97d6f1a88776b6d389c kernel-smp-devel-2.6.9-11.EL.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kerne... 708e5239dd9d9a9a425d0f5d77489806 kernel-2.6.9-11.EL.src.rpm i386: 8cd6de3e57442035516b60f12911e067 kernel-2.6.9-11.EL.i686.rpm ecc10b63ecd7c909e0272eb86f2d21c0 kernel-devel-2.6.9-11.EL.i686.rpm 0a3ca2d16911ce2f882b16d00b459683 kernel-hugemem-2.6.9-11.EL.i686.rpm 2938d82720a88684d78735307c154d7b kernel-hugemem-devel-2.6.9-11.EL.i686.rpm 84082bb98ce1d8131e67622e9584d209 kernel-smp-2.6.9-11.EL.i686.rpm 23a494cfcc0161ab8504e3200a3ee5a0 kernel-smp-devel-2.6.9-11.EL.i686.rpm ia64: 2892022024e23e29b1c1da1100c0ef8b kernel-2.6.9-11.EL.ia64.rpm a51565dfad63ff5ff980e9ceb30e51cd kernel-devel-2.6.9-11.EL.ia64.rpm noarch: bda3f275715e889b1b1111cd5b372873 kernel-doc-2.6.9-11.EL.noarch.rpm x86_64: 160141d384ecd5b072a0476b6dd07973 kernel-2.6.9-11.EL.x86_64.rpm 805b6de472bbe54f74028c823fd82d78 kernel-devel-2.6.9-11.EL.x86_64.rpm eedc9ef7106687b1177a688371c004c2 kernel-smp-2.6.9-11.EL.x86_64.rpm 35606ad7ab97e97d6f1a88776b6d389c kernel-smp-devel-2.6.9-11.EL.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kerne... 708e5239dd9d9a9a425d0f5d77489806 kernel-2.6.9-11.EL.src.rpm i386: 8cd6de3e57442035516b60f12911e067 kernel-2.6.9-11.EL.i686.rpm ecc10b63ecd7c909e0272eb86f2d21c0 kernel-devel-2.6.9-11.EL.i686.rpm 0a3ca2d16911ce2f882b16d00b459683 kernel-hugemem-2.6.9-11.EL.i686.rpm 2938d82720a88684d78735307c154d7b kernel-hugemem-devel-2.6.9-11.EL.i686.rpm 84082bb98ce1d8131e67622e9584d209 kernel-smp-2.6.9-11.EL.i686.rpm 23a494cfcc0161ab8504e3200a3ee5a0 kernel-smp-devel-2.6.9-11.EL.i686.rpm ia64: 2892022024e23e29b1c1da1100c0ef8b kernel-2.6.9-11.EL.ia64.rpm a51565dfad63ff5ff980e9ceb30e51cd kernel-devel-2.6.9-11.EL.ia64.rpm noarch: bda3f275715e889b1b1111cd5b372873 kernel-doc-2.6.9-11.EL.noarch.rpm x86_64: 160141d384ecd5b072a0476b6dd07973 kernel-2.6.9-11.EL.x86_64.rpm 805b6de472bbe54f74028c823fd82d78 kernel-devel-2.6.9-11.EL.x86_64.rpm eedc9ef7106687b1177a688371c004c2 kernel-smp-2.6.9-11.EL.x86_64.rpm 35606ad7ab97e97d6f1a88776b6d389c kernel-smp-devel-2.6.9-11.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0136 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1264 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2005 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFCpxD/XlSAg2UNWIIRAvwxAKCdE29qtq6bNL3OaWRsOPn3k6wozwCfWnR9 nWmUWKsGF2xjSaFI0MntRac= =VtLM -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-...


(Log in to post comments)


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds