LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: tg3 driver deadlock vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now available that fix a deadlock with the tg3 driver on certain revisions of the Broadcom 570x gigabit ethernet series.

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          Updated 2.4 kernel fixes tg3 driver hang
Advisory ID:       RHBA-2003:069-12
Issue date:        2003-01-24
Updated on:        2003-02-28
Product:           Red Hat Linux
Keywords:          tg3 broadcom gigabit
Cross references:  
Obsoletes:         RHSA-2003:025
---------------------------------------------------------------------

1. Topic:

Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now
available that fix a deadlock with the tg3 driver on certain revisions of
the Broadcom 570x gigabit ethernet series

2. Relevant releases/architectures:

Red Hat Linux 7.1 - athlon, i386, i586, i686
Red Hat Linux 7.2 - athlon, i386, i586, i686
Red Hat Linux 7.3 - athlon, i386, i586, i686
Red Hat Linux 8.0 - athlon, i386, i586, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating system. 
This advisory deals with updates to Red Hat Linux 7.1, 7.2, 7.3, and 8.0.  

Only users of Red Hat Linux 7.1, 7.2, 7.3, and 8.0 that have a Broadcom
gigabit ethernet card might need to upgrade to these packages; there are
no other new features present.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied, especially the additional
packages from RHSA-2002:205 and RHSA-2002:206 respectively.

The procedure for upgrading the kernel manually is documented at:
 
http://www.Red Hat.com/support/docs/howto/kernel-upgrade/

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. Bug IDs fixed  (http://bugzilla.Red Hat.com/bugzilla for more info):

76159 - Errata kernel 2.4.18-17.8.0 fails PCI resource allocation

6. RPMs required:

Red Hat Linux 7.1:

SRPMS: 
ftp://updates.Red Hat.com/7.1/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm 
ftp://updates.Red Hat.com/7.1/en/os/SRPMS/kudzu-0.99.42.2.72-1.src.rpm

athlon: 
ftp://updates.Red Hat.com/7.1/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm 
ftp://updates.Red Hat.com/7.1/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm

i386: 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kudzu-0.99.42.2.72-1.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kudzu-devel-0.99.42.2.72-1.i386.rpm

i586: 
ftp://updates.Red Hat.com/7.1/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm

i686: 
ftp://updates.Red Hat.com/7.1/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm

Red Hat Linux 7.2:

SRPMS: 
ftp://updates.Red Hat.com/7.2/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm 
ftp://updates.Red Hat.com/7.2/en/os/SRPMS/kudzu-0.99.42.2.72-1.src.rpm

athlon: 
ftp://updates.Red Hat.com/7.2/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm 
ftp://updates.Red Hat.com/7.2/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm

i386: 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kudzu-0.99.42.2.72-1.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kudzu-devel-0.99.42.2.72-1.i386.rpm

i586: 
ftp://updates.Red Hat.com/7.2/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm

i686: 
ftp://updates.Red Hat.com/7.2/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm

Red Hat Linux 7.3:

SRPMS: 
ftp://updates.Red Hat.com/7.3/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm

athlon: 
ftp://updates.Red Hat.com/7.3/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm 
ftp://updates.Red Hat.com/7.3/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm

i386: 
ftp://updates.Red Hat.com/7.3/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm

i586: 
ftp://updates.Red Hat.com/7.3/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm

i686: 
ftp://updates.Red Hat.com/7.3/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm

Red Hat Linux 8.0:

SRPMS: 
ftp://updates.Red Hat.com/8.0/en/os/SRPMS/kernel-2.4.18-26.8.0.src.rpm

athlon: 
ftp://updates.Red Hat.com/8.0/en/os/athlon/kernel-2.4.18-26.8.0.athlon.rpm 
ftp://updates.Red Hat.com/8.0/en/os/athlon/kernel-smp-2.4.18-26.8.0.athlon.rpm

i386: 
ftp://updates.Red Hat.com/8.0/en/os/i386/kernel-2.4.18-26.8.0.i386.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i386/kernel-source-2.4.18-26.8.0.i386.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i386/kernel-doc-2.4.18-26.8.0.i386.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i386/kernel-BOOT-2.4.18-26.8.0.i386.rpm

i586: 
ftp://updates.Red Hat.com/8.0/en/os/i586/kernel-2.4.18-26.8.0.i586.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i586/kernel-smp-2.4.18-26.8.0.i586.rpm

i686: 
ftp://updates.Red Hat.com/8.0/en/os/i686/kernel-2.4.18-26.8.0.i686.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i686/kernel-smp-2.4.18-26.8.0.i686.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i686/kernel-bigmem-2.4.18-26.8.0.i686.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i686/kernel-debug-2.4.18-26.8.0.i686.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
a4bf4dcdfd8be2cb723bd5572a704cde 7.1/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm
697eba84022e58fed4501203b6febea9 7.1/en/os/SRPMS/kudzu-0.99.42.2.72-1.src.rpm
1b1fead014d5df103038565f89b0684c 7.1/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
901727f00300f28cf536910e49ac6436 7.1/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm
87730f56e51b747653f52870b5dd0eac 7.1/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
e98b3379e79e71e20a6fae5470a8843b 7.1/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm
2d8bbd94e5a63a277082c43c653d7f8b 7.1/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
eb4111cbbf19648a1146d2d184b7b23b 7.1/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
a2675be58b025860ffa81ca5bf586e07 7.1/en/os/i386/kudzu-0.99.42.2.72-1.i386.rpm
7d249abd93019469809b7dfcdd1dfa0e 7.1/en/os/i386/kudzu-devel-0.99.42.2.72-1.i386.rpm
d053a4c252b7e2392fa9e89f892e08b3 7.1/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
7eafe585c4ca21b0d5074703db5b9b50 7.1/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm
d85e2d8e7c1d36a20eb3d4e0f88a98e4 7.1/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
c17b2a32c19a7a05ef6da033174c0557 7.1/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
1dbf3001c4b807c9dfcd9c0be55ddae8 7.1/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm
f1929429de7d66e7bf44dbc3074d5ca5 7.1/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
a4bf4dcdfd8be2cb723bd5572a704cde 7.2/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm
697eba84022e58fed4501203b6febea9 7.2/en/os/SRPMS/kudzu-0.99.42.2.72-1.src.rpm
1b1fead014d5df103038565f89b0684c 7.2/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
901727f00300f28cf536910e49ac6436 7.2/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm
87730f56e51b747653f52870b5dd0eac 7.2/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
e98b3379e79e71e20a6fae5470a8843b 7.2/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm
2d8bbd94e5a63a277082c43c653d7f8b 7.2/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
eb4111cbbf19648a1146d2d184b7b23b 7.2/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
a2675be58b025860ffa81ca5bf586e07 7.2/en/os/i386/kudzu-0.99.42.2.72-1.i386.rpm
7d249abd93019469809b7dfcdd1dfa0e 7.2/en/os/i386/kudzu-devel-0.99.42.2.72-1.i386.rpm
d053a4c252b7e2392fa9e89f892e08b3 7.2/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
7eafe585c4ca21b0d5074703db5b9b50 7.2/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm
d85e2d8e7c1d36a20eb3d4e0f88a98e4 7.2/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
c17b2a32c19a7a05ef6da033174c0557 7.2/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
1dbf3001c4b807c9dfcd9c0be55ddae8 7.2/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm
f1929429de7d66e7bf44dbc3074d5ca5 7.2/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
a4bf4dcdfd8be2cb723bd5572a704cde 7.3/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm
1b1fead014d5df103038565f89b0684c 7.3/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
901727f00300f28cf536910e49ac6436 7.3/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm
87730f56e51b747653f52870b5dd0eac 7.3/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
e98b3379e79e71e20a6fae5470a8843b 7.3/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm
2d8bbd94e5a63a277082c43c653d7f8b 7.3/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
eb4111cbbf19648a1146d2d184b7b23b 7.3/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
d053a4c252b7e2392fa9e89f892e08b3 7.3/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
7eafe585c4ca21b0d5074703db5b9b50 7.3/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm
d85e2d8e7c1d36a20eb3d4e0f88a98e4 7.3/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
c17b2a32c19a7a05ef6da033174c0557 7.3/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
1dbf3001c4b807c9dfcd9c0be55ddae8 7.3/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm
f1929429de7d66e7bf44dbc3074d5ca5 7.3/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
2f9f5125bd283a30b58fc09ba2617199 8.0/en/os/SRPMS/kernel-2.4.18-26.8.0.src.rpm
806137856db0137b84a01681bbd7baa9 8.0/en/os/athlon/kernel-2.4.18-26.8.0.athlon.rpm
30606acc3f571a793bbddd362ae786a1 8.0/en/os/athlon/kernel-smp-2.4.18-26.8.0.athlon.rpm
d39f740929c4837bd46692082f01f078 8.0/en/os/i386/kernel-2.4.18-26.8.0.i386.rpm
22f251ea64680484815cd45c23af361b 8.0/en/os/i386/kernel-BOOT-2.4.18-26.8.0.i386.rpm
02c83b6c0ce35d6c6f4a50fbce1e11ab 8.0/en/os/i386/kernel-doc-2.4.18-26.8.0.i386.rpm
685afb53b2f9c5620eb962280f69aab1 8.0/en/os/i386/kernel-source-2.4.18-26.8.0.i386.rpm
f0d573d7132082166e1f9b74f2cd7b1a 8.0/en/os/i586/kernel-2.4.18-26.8.0.i586.rpm
0a76b2d8345c2e8ec6dc2cc6fb5ea7fe 8.0/en/os/i586/kernel-smp-2.4.18-26.8.0.i586.rpm
52fe12f03e137c8f1ed49b454d47cfb5 8.0/en/os/i686/kernel-2.4.18-26.8.0.i686.rpm
3a2024d645bffb40af8ab588a99aeb2d 8.0/en/os/i686/kernel-bigmem-2.4.18-26.8.0.i686.rpm
d0df581064a08d2d5272d176a557b15e 8.0/en/os/i686/kernel-debug-2.4.18-26.8.0.i686.rpm
1035e625be0caac09d8ee8c3e3a1adb0 8.0/en/os/i686/kernel-smp-2.4.18-26.8.0.i686.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at  http://www.Red Hat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    
    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum 

8. Contact:

The Red Hat security contact is <security@Red Hat.com>.  More contact
details at  http://www.Red Hat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.



_______________________________________________
Red Hat-watch-list mailing list
To unsubscribe, visit: https://listman.Red Hat.com/mailman/listinfo/Red Hat-watch-list


 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
USB is now UEC (use with extreme caution)
iPhone Encryption and the Return of the Crypto Wars
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.