LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Updated kernel packages available for Red Hat Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the fifth regular update.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5
Advisory ID:       RHSA-2005:294-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-294.html
Issue date:        2005-05-18
Updated on:        2005-05-18
Product:           Red Hat Enterprise Linux
Obsoletes:         RHSA-2005:293
CVE Names:         CAN-2005-0757
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 3.  This is the
fifth regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the fifth regular kernel update to Red Hat Enterprise Linux 3.

New features introduced by this update include:

  - support for 2-TB partitions on block devices
  - support for new disk, network, and USB devices
  - support for clustered APIC mode on AMD64 NUMA systems
  - netdump support on AMD64, Intel EM64T, Itanium, and ppc64 systems
  - diskdump support on sym53c8xx and SATA piix/promise adapters
  - NMI switch support on AMD64 and Intel EM64T systems

There were many bug fixes in various parts of the kernel.  The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 3.

Some key areas affected by these fixes include the kernel's networking,
SATA, TTY, and USB subsystems, as well as the architecture-dependent
handling under the ia64, ppc64, and x86_64 directories.  Scalability
improvements were made primarily in the memory management and file
system areas.

A flaw in offset handling in the xattr file system code backported to
Red Hat Enterprise Linux 3 was fixed.  On 64-bit systems, a user who
can access an ext3 extended-attribute-enabled file system could cause
a denial of service (system crash).  This issue is rated as having a
moderate security impact (CAN-2005-0757).

The following device drivers have been upgraded to new versions:

  3c59x ------ LK1.1.18
  3w-9xxx ---- 2.24.00.011fw (new in Update 5)
  3w-xxxx ---- 1.02.00.037
  8139too ---- (upstream 2.4.29)
  b44 -------- 0.95
  cciss ------ v2.4.54.RH1
  e100 ------- 3.3.6-k2
  e1000 ------ 5.6.10.1-k2
  lpfcdfc ---- 1.0.13 (new in Update 5)
  tg3 -------- 3.22RH

Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm

ppc:
58bf58e0cea36b6bbe06b41bd1c09153  kernel-2.4.21-32.EL.ppc64iseries.rpm
41e8d849240559fa694a636bd826537a  kernel-2.4.21-32.EL.ppc64pseries.rpm
8397f50f3ec6f1e889090895e7eb66fb  kernel-doc-2.4.21-32.EL.ppc64.rpm
9444e6fd23671724e861b06bc555bae5  kernel-source-2.4.21-32.EL.ppc64.rpm
6590395e036ae1832f1b55790d8d0821  kernel-unsupported-2.4.21-32.EL.ppc64iseries.rpm
07417ced420144cdb932ec66125a0b57  kernel-unsupported-2.4.21-32.EL.ppc64pseries.rpm

s390:
d06b1ae5b6556386c443e8c94b6fc4c8  kernel-2.4.21-32.EL.s390.rpm
53da0a3fe4e89213f9e26fb97b016ea6  kernel-doc-2.4.21-32.EL.s390.rpm
0fe7cf2c4c26154847d210a4a6667793  kernel-source-2.4.21-32.EL.s390.rpm
e6aee965886f221e431b40c846bb4bbe  kernel-unsupported-2.4.21-32.EL.s390.rpm

s390x:
4a3f013bae04963eafc67c6a7d26919d  kernel-2.4.21-32.EL.s390x.rpm
c5d899ad8ca24d2bcba1fd529c612754  kernel-doc-2.4.21-32.EL.s390x.rpm
c4b13e1642a7f61e02b9ca587fc1752a  kernel-source-2.4.21-32.EL.s390x.rpm
9075beed557f713bacc0711eb59f7d31  kernel-unsupported-2.4.21-32.EL.s390x.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

6. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0757

7. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Ottawa Linux Symposium: May get by with a little help from its friends
Black Hat 2014: How to crack just about everything
NSA Playset, 911 hacked and war cats: A wild ride at DEF CON 22
More Details of Onion/Critroni Crypto Ransomware Emerge
Is there Another NSA Leaker? Updated
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.