Red Hat: kernel Denial of service vulnerability
Summary
Summary
The Linux kernel handles the basic functions of the operatingsystem.This is the fifth regular kernel update to Red Hat Enterprise Linux version2.1. It contains one minor security fix, many bug fixes, and updates anumber of device drivers.A bug in the SoundBlaster 16 code which did not properly handle certainsample sizes has been fixed. This flaw could be used by local users tocrash a system. The Common Vulnerabilities and Exposures project(cve.mitre.org) has assigned the name CAN-2004-0178 to this issue. The following drivers have also been updated:* cciss v2.4.52* e1000 v5252k1* e100 v2.3.43-k1* fusion v2.05.16* ips v7.00.15* aacraid v1.1.5* megaraid2 v2.10.6All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernelsto the packages associated with their machine architectures andconfigurations as listed in this erratum.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:
https://access.redhat.com
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
117902 - kswapd consumes a large amount of CPU for an extended period of time
117460 - SSH fails in various contexts with ENOBUFS error
121046 - CAN-2004-0178 Soundblaster 16 local DoS
114960 - nfs layer livelocks after after using up all of the kmap space
97868 - RFE: Via VT8233A chipset support
102749 - Kernel 2.4.9-e.25 does not support AMD VIPER 7441 ide chipset
109881 - RHEL2.1 U5: BLKSSZGET ioctl support for raw devices.
125281 - Cluster manager detects false failures under heavy system load
124716 - [PATCH] NFS Uncached IO logic error when mouting with noac and not specifying the rsize/wsize
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm
athlon:
187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm
i386:
e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm
i686:
9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm
4aebb75ad8fb467539d395c576c49e05 kernel-enterprise-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm
03f4fd713ad46842a45a8d7c1d6a008f kernel-summit-2.4.9-e.49.i686.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm
athlon:
187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm
i386:
e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm
i686:
9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
90e81ad53fbd763b08744fb10d1b7a09 kernel-2.4.9-e.49.src.rpm
athlon:
187da57ef1034930bd18d7110a2aa522 kernel-2.4.9-e.49.athlon.rpm
a24ef35b3182cc2c903576256da09b66 kernel-smp-2.4.9-e.49.athlon.rpm
i386:
e4c51c2881cae114319771b44ba46875 kernel-BOOT-2.4.9-e.49.i386.rpm
19f6d4d07036ef6cd2a0ec48309d8b58 kernel-doc-2.4.9-e.49.i386.rpm
c850508fb6b7839f029b8e814322d0f1 kernel-headers-2.4.9-e.49.i386.rpm
4d9f52af152f2dc3c54513f789abe7b2 kernel-source-2.4.9-e.49.i386.rpm
i686:
9af120eae67eeff866368168a38ff809 kernel-2.4.9-e.49.i686.rpm
416e2f3f933bf0b210362d4592854d65 kernel-debug-2.4.9-e.49.i686.rpm
4aebb75ad8fb467539d395c576c49e05 kernel-enterprise-2.4.9-e.49.i686.rpm
d32ee8bfdd1f34cc4c391e809199855e kernel-smp-2.4.9-e.49.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
References
Package List
Topic
Updated kernel packages are now available as part of ongoingsupport and maintenance of Red Hat Enterprise Linux version2.1. This is the fifth regular update.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux ES version 2.1 - athlon, i386, i686
Red Hat Enterprise Linux WS version 2.1 - athlon, i386, i686
Bugs Fixed