Red Hat 8867 Published by

Updated kernel packages are available for Red Hat Enterprise Linux 3

----------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5
Advisory ID: RHSA-2005:294-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-294.html
Issue date: 2005-05-18
Updated on: 2005-05-18
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2005:293
CVE Names: CAN-2005-0757
----------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the fifth regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64



3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the fifth regular kernel update to Red Hat Enterprise Linux 3.

New features introduced by this update include:

- support for 2-TB partitions on block devices
- support for new disk, network, and USB devices
- support for clustered APIC mode on AMD64 NUMA systems
- netdump support on AMD64, Intel EM64T, Itanium, and ppc64 systems
- diskdump support on sym53c8xx and SATA piix/promise adapters
- NMI switch support on AMD64 and Intel EM64T systems

There were many bug fixes in various parts of the kernel. The ongoing effort to resolve these problems has resulted in a marked improvement in the reliability and scalability of Red Hat Enterprise Linux 3.

Some key areas affected by these fixes include the kernel's networking, SATA, TTY, and USB subsystems, as well as the architecture-dependent handling under the ia64, ppc64, and x86_64 directories. Scalability improvements were made primarily in the memory management and file system areas.

A flaw in offset handling in the xattr file system code backported to Red Hat Enterprise Linux 3 was fixed. On 64-bit systems, a user who can access an ext3 extended-attribute-enabled file system could cause a denial of service (system crash). This issue is rated as having a
moderate security impact (CAN-2005-0757).

The following device drivers have been upgraded to new versions:

3c59x ------ LK1.1.18
3w-9xxx ---- 2.24.00.011fw (new in Update 5)
3w-xxxx ---- 1.02.00.037
8139too ---- (upstream 2.4.29)
b44 -------- 0.95
cciss ------ v2.4.54.RH1
e100 ------- 3.3.6-k2
e1000 ------ 5.6.10.1-k2
lpfcdfc ---- 1.0.13 (new in Update 5)
tg3 -------- 3.22RH

Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
d5420415832273a5518afd0b5e3d7a47 kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455 kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799 kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11 kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1 kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75 kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57 kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99 kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33 kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565 kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9 kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da kernel-unsupported-2.4.21-32.EL.ia64.rpm

ppc:
58bf58e0cea36b6bbe06b41bd1c09153 kernel-2.4.21-32.EL.ppc64iseries.rpm
41e8d849240559fa694a636bd826537a kernel-2.4.21-32.EL.ppc64pseries.rpm
8397f50f3ec6f1e889090895e7eb66fb kernel-doc-2.4.21-32.EL.ppc64.rpm
9444e6fd23671724e861b06bc555bae5 kernel-source-2.4.21-32.EL.ppc64.rpm
6590395e036ae1832f1b55790d8d0821 kernel-unsupported-2.4.21-32.EL.ppc64iseries.rpm
07417ced420144cdb932ec66125a0b57 kernel-unsupported-2.4.21-32.EL.ppc64pseries.rpm

s390:
d06b1ae5b6556386c443e8c94b6fc4c8 kernel-2.4.21-32.EL.s390.rpm
53da0a3fe4e89213f9e26fb97b016ea6 kernel-doc-2.4.21-32.EL.s390.rpm
0fe7cf2c4c26154847d210a4a6667793 kernel-source-2.4.21-32.EL.s390.rpm
e6aee965886f221e431b40c846bb4bbe kernel-unsupported-2.4.21-32.EL.s390.rpm

s390x:
4a3f013bae04963eafc67c6a7d26919d kernel-2.4.21-32.EL.s390x.rpm
c5d899ad8ca24d2bcba1fd529c612754 kernel-doc-2.4.21-32.EL.s390x.rpm
c4b13e1642a7f61e02b9ca587fc1752a kernel-source-2.4.21-32.EL.s390x.rpm
9075beed557f713bacc0711eb59f7d31 kernel-unsupported-2.4.21-32.EL.s390x.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4 kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859 kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3 kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82 kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4 kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2 kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
d5420415832273a5518afd0b5e3d7a47 kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455 kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799 kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11 kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1 kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75 kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57 kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99 kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33 kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565 kernel-unsupported-2.4.21-32.EL.i686.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4 kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859 kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3 kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82 kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4 kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2 kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
d5420415832273a5518afd0b5e3d7a47 kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455 kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799 kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11 kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1 kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75 kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57 kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99 kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33 kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565 kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9 kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da kernel-unsupported-2.4.21-32.EL.ia64.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4 kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859 kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3 kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82 kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4 kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2 kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
d5420415832273a5518afd0b5e3d7a47 kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455 kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799 kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11 kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1 kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75 kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57 kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99 kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33 kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565 kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9 kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da kernel-unsupported-2.4.21-32.EL.ia64.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4 kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859 kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3 kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82 kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4 kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2 kernel-unsupported-2.4.21-32.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

6. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0757

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.