[RHSA-2004:437-01] Updated kernel packages fix security vulnerability

bugzilla at redhat.com bugzilla at redhat.com
Wed Aug 18 15:40:00 UTC 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated kernel packages fix security vulnerability
Advisory ID:       RHSA-2004:437-01
Issue date:        2004-08-18
Updated on:        2004-08-18
Product:           Red Hat Enterprise Linux
Keywords:          kernel update
Obsoletes:         RHSA-2004:044
CVE Names:         CAN-2004-0178
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version
2.1. This is the fifth regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating
system.

This is the fifth regular kernel update to Red Hat Enterprise Linux version
2.1. It contains one minor security fix, many bug fixes, and updates a
number of device drivers.

A bug in the SoundBlaster 16 code which did not properly handle certain
sample sizes has been fixed. This flaw could be used by local users to
crash a system.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0178 to this issue. 

The following drivers have also been updated:

* cciss v2.4.52
* e1000 v5252k1
* e100 v2.3.43-k1
* fusion v2.05.16
* ips v7.00.15
* aacraid v1.1.5
* megaraid2 v2.10.6

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

117902 - kswapd consumes a large amount of CPU for an extended period of time
117460 - SSH fails in various contexts with ENOBUFS error
121046 - CAN-2004-0178 Soundblaster 16 local DoS
114960 - nfs layer livelocks after after using up all of the kmap space
97868 - RFE: Via VT8233A chipset support
102749 - Kernel 2.4.9-e.25 does not support AMD VIPER 7441 ide chipset
109881 - RHEL2.1 U5: BLKSSZGET ioctl support for raw devices.
125281 - Cluster manager detects false failures under heavy system load
124716 - [PATCH] NFS Uncached IO logic error when mouting with noac and not specifying the rsize/wsize

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.9-e.49.src.rpm
90e81ad53fbd763b08744fb10d1b7a09  kernel-2.4.9-e.49.src.rpm

athlon:
187da57ef1034930bd18d7110a2aa522  kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66  kernel-smp-2.4.9-e.49.athlon.rpm

i386:
e4c51c2881cae114319771b44ba46875  kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58  kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1  kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2  kernel-source-2.4.9-e.49.i386.rpm

i686:
9af120eae67eeff866368168a38ff809  kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65  kernel-debug-2.4.9-e.49.i686.rpm
4aebb75ad8fb467539d395c576c49e05  kernel-enterprise-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e  kernel-smp-2.4.9-e.49.i686.rpm
03f4fd713ad46842a45a8d7c1d6a008f  kernel-summit-2.4.9-e.49.i686.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kernel-2.4.9-e.49.src.rpm
90e81ad53fbd763b08744fb10d1b7a09  kernel-2.4.9-e.49.src.rpm

athlon:
187da57ef1034930bd18d7110a2aa522  kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66  kernel-smp-2.4.9-e.49.athlon.rpm

i386:
e4c51c2881cae114319771b44ba46875  kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58  kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1  kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2  kernel-source-2.4.9-e.49.i386.rpm

i686:
9af120eae67eeff866368168a38ff809  kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65  kernel-debug-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e  kernel-smp-2.4.9-e.49.i686.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kernel-2.4.9-e.49.src.rpm
90e81ad53fbd763b08744fb10d1b7a09  kernel-2.4.9-e.49.src.rpm

athlon:
187da57ef1034930bd18d7110a2aa522  kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66  kernel-smp-2.4.9-e.49.athlon.rpm

i386:
e4c51c2881cae114319771b44ba46875  kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58  kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1  kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2  kernel-source-2.4.9-e.49.i386.rpm

i686:
9af120eae67eeff866368168a38ff809  kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65  kernel-debug-2.4.9-e.49.i686.rpm
4aebb75ad8fb467539d395c576c49e05  kernel-enterprise-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e  kernel-smp-2.4.9-e.49.i686.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0178

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBI3hsXlSAg2UNWIIRAuF2AJ0U0CFFY1czT5AHDVXYt4XRiQbE5ACfYobV
vVwu64F/jPBodUWkCXDqkjE=
=Z3kc
-----END PGP SIGNATURE-----





More information about the Enterprise-watch-list mailing list