[RHSA-2005:420-01] Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1

bugzilla at redhat.com bugzilla at redhat.com
Wed Jun 8 15:38:00 UTC 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1
Advisory ID:       RHSA-2005:420-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-420.html
Issue date:        2005-06-08
Updated on:        2005-06-08
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0136 CAN-2005-1264
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4.  This is the
first regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the first regular kernel update to Red Hat Enterprise Linux 4.

A flaw affecting the auditing code was discovered.  On Itanium
architectures a local user could use this flaw to cause a denial of service
(crash).  This issue is rated as having important security impact
(CAN-2005-0136). 

A flaw was discovered in the servicing of a raw device ioctl.  A local user
who has access to raw devices could use this flaw to write to kernel memory
and cause a denial of service or potentially gain privileges.  This issue
is rated as having moderate security impact (CAN-2005-1264). 

New features introduced by this update include:
- - Fixed TCP BIC congestion handling.
- - Diskdump support for more controllers (megaraid, SATA)
- - Device mapper multipath support
- - AMD64 dual core support.
- - Intel ICH7 hardware support.

There were many bug fixes in various parts of the kernel.  The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.

The following device drivers have been upgraded to new versions:
 ata_piix -------- 1.03
 bonding --------- 2.6.1
 e1000 ----------- 5.6.10.1-k2-NAPI
 e100 ------------ 3.3.6-k2-NAPI
 ibmveth --------- 1.03
 libata ---------- 1.02 to 1.10
 lpfc ------------ 0:8.0.16 to 0:8.0.16.6_x2
 megaraid_mbox --- 2.20.4.0 to 2.20.4.5
 megaraid_mm ----- 2.20.2.0-rh1 to 2.20.2.5
 sata_nv --------- 0.03 to 0.6
 sata_promise ---- 1.00 to 1.01
 sata_sil -------- 0.8
 sata_sis -------- 0.5
 sata_svw -------- 1.05
 sata_sx4 -------- 0.7
 sata_via -------- 1.0
 sata_vsc -------- 1.0
 tg3 ------------- 3.22-rh
 ipw2100 --------- 1.0.3
 ipw2200 --------- 1.0.0

All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

133590 - PTRACE_ATTACH race with real parent's wait calls can produced bogus wait returns
134338 - Intolerable Disk I/O Performance under 64-bit VM: fix I/O buffers
137154 - "waitid(POSIX Interface)" cannot run properly.
138563 - [PATCH] RHEL4 U1: EFI GPT: reduce alternate header probing
140083 - lx-choptp19 crashed running 2.4.21-20.EL.BZ131027.hotfixhugemem
140383 - BLKFLSBUF ioctl can cause other reads
140472 - x86, x86_64 and IA64 scsi inquiry command hangs in wait_for_completion
141983 - RHEL4 U2: DBS: quiet warning messages from cpufreq.c
142167 - [RHEL4][Diskdump] smp_call_function issue
142464 - [PATCH] "RPC: garbage, exit EIO" when using NFSv3 with Kerberos 5
143073 - traced process cannot be killed
143472 - hugetlb mmap failed in compatibility mode in em64t
143907 - ext2 and device dm-0 byond 2Terabyte causes /var/log/messages file size to crash system
144741 - RHEL4 U1: ICH7 Support patch
145424 - problems with ipsec from rhel3 to rhel4
146067 - [PATCH] Channel bonding driver configured in 802.3 ad mode causes kernel panic when shutdwon
146089 - 20050115 ptrace/kill and ptrace/dump race fixes
146703 - NLM (NFSv3) problems when mounting with "sec=krb5"
146797 - SCTP memory consumption and system freezes
146911 - Thread suspension via async signal fails on rhel4-rc2
147832 - oom-killer triggered during Red Hat Cert
150110 - chipset identifier for zx2
150151 - Lockd callbacks to NFS clients fail completely
151284 - mmap of file over NFS corrupts data
152101 - host panics when mounting nfs4 volumes
152102 - host loses connection to nfs server when the server is solaris
152557 - 20050117 Oopsable NFS locking
154221 - Thread exits siliently via __RESTORE_ALL exeception for iret
154639 - kernel thread current->mm dereference in grab_swap_token causes oops
154972 - unexplained SIGSEGV death in SIGSEGV signal handler
155283 - CAN-2005-0136 ptrace corner cases on ia64
155765 - oops on 2.6.9-5.0.5.ELsmp
156875 - libata - master supports lba48 but slave does not
157450 - CAN-2005-1263 Linux kernel ELF core dump privilege elevation


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-11.EL.src.rpm
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

ppc:
8dcdc040cbd00928243a20775d5123d6  kernel-2.6.9-11.EL.ppc64.rpm
a0e9ca3943927b5cff3b6f238d4ff5d0  kernel-2.6.9-11.EL.ppc64iseries.rpm
1cf5c458b3ecc950277ea59d8f0400c9  kernel-devel-2.6.9-11.EL.ppc64.rpm
e92a1ba8d256a695153d87e9e8ba0ad6  kernel-devel-2.6.9-11.EL.ppc64iseries.rpm

s390:
c91ca50ecb980e3abbead7c520e9569d  kernel-2.6.9-11.EL.s390.rpm
c3520b5d55fa1102c2100d56173aecc5  kernel-devel-2.6.9-11.EL.s390.rpm

s390x:
ecf96ac8781675ec8678a73423e3dab9  kernel-2.6.9-11.EL.s390x.rpm
1ca331b341899002794c77de16f17104  kernel-devel-2.6.9-11.EL.s390x.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-11.EL.src.rpm
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-11.EL.src.rpm
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-11.EL.src.rpm
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1264

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCpxD/XlSAg2UNWIIRAvwxAKCdE29qtq6bNL3OaWRsOPn3k6wozwCfWnR9
nWmUWKsGF2xjSaFI0MntRac=
=VtLM
-----END PGP SIGNATURE-----





More information about the Enterprise-watch-list mailing list