RHSA-2004:437-01: Updated kernel packages fix security vulnerability
Posted on: 08/18/2004 03:39 PM

Updated Kernel packages are available for Red Hat Enterprise Linux 2.1

----------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated kernel packages fix security vulnerability
Advisory ID: RHSA-2004:437-01
Issue date: 2004-08-18
Updated on: 2004-08-18
Product: Red Hat Enterprise Linux
Keywords: kernel update
Obsoletes: RHSA-2004:044
CVE Names: CAN-2004-0178
----------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 2.1. This is the fifth regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the fifth regular kernel update to Red Hat Enterprise Linux version 2.1. It contains one minor security fix, many bug fixes, and updates a number of device drivers.

A bug in the SoundBlaster 16 code which did not properly handle certain sample sizes has been fixed. This flaw could be used by local users to crash a system. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0178 to this issue.

The following drivers have also been updated:

* cciss v2.4.52
* e1000 v5252k1
* e100 v2.3.43-k1
* fusion v2.05.16
* ips v7.00.15
* aacraid v1.1.5
* megaraid2 v2.10.6

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.

Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

117902 - kswapd consumes a large amount of CPU for an extended period of time
117460 - SSH fails in various contexts with ENOBUFS error
121046 - CAN-2004-0178 Soundblaster 16 local DoS
114960 - nfs layer livelocks after after using up all of the kmap space
97868 - RFE: Via VT8233A chipset support
102749 - Kernel 2.4.9-e.25 does not support AMD VIPER 7441 ide chipset
109881 - RHEL2.1 U5: BLKSSZGET ioctl support for raw devices.
125281 - Cluster manager detects false failures under heavy system load
124716 - [PATCH] NFS Uncached IO logic error when mouting with noac and not specifying the rsize/wsize

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.9-e.49.src.rpm
90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm

athlon:
187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm

i386:
e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm

i686:
9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm
4aebb75ad8fb467539d395c576c49e05 kernel-enterprise-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm
03f4fd713ad46842a45a8d7c1d6a008f kernel-summit-2.4.9-e.49.i686.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kernel-2.4.9-e.49.src.rpm
90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm

athlon:
187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm

i386:
e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm

i686:
9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kernel-2.4.9-e.49.src.rpm
90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm

athlon:
187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm

i386:
e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm

i686:
9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm
4aebb75ad8fb467539d395c576c49e05 kernel-enterprise-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0178

8. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.


Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/rhsa_2004437_01_updated_kernel_packages_fix_security_vulnerability.html)