__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN Red Hat Updated Kernel Packages for Enterprise Linux 3 [Red Hat Advisory RHSA-2004:188-14] May 14, 2004 21:00 GMT Number O-145 [REVISED 30 May 2006] ______________________________________________________________________________ PROBLEM: Red Hat has released the second regular kernel update to Enterprise Linux version 3 that has security fixes for the following: - /proc/tty/driver/serial reveals the exact nuumber of characters - information leakages in the strncpy function and two real time clock drivers - a R128 DRI Limits Checking vulnerability - a buffer overflow in the ncp_lookup function PLATFORM: Enterprise Linux AS, ES, and WS (all v.3) Debian GNU/Linux 3.0 alias woody DAMAGE: Sensitive information can be obtained by unauthorized persons. Local users may gain elevated privileges. SOLUTION: Apply the appropriate patches. ______________________________________________________________________________ VULNERABILITY The risk is MEDIUM. The most damaging vulnerability may allow a ASSESSMENT: local user to gain root privileges. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/o-145.shtml ORIGINAL BULLETIN: https://rhn.redhat.com/errata/RHSA-2004-188.html ADDITIONAL LINK: Debian Security Advisory DSA-1082-1 http://www.debian.org/security/2006/dsa-1082 CVE/CAN: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CAN-2003-0461 CAN-2003-0465 CAN-2003-0984 CAN-2004-0003 CAN-2004-0010 ______________________________________________________________________________ REVISION HISTORY: 05/30/2006 - added a link to Debian Security Advisory DSA-1082-1 for Debian GNU/Linux 3.0 alias woody. [***** Start Red Hat Advisory RHSA-2004:188-14 *****] Updated kernel packages available for Red Hat Enterprise Linux 3 Update 2 Advisory: RHSA-2004:188-14 Last updated on: 2004-05-11 Affected Products: Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux WS (v. 3) CVEs (cve.mitre.org): CAN-2003-0461 CAN-2003-0465 CAN-2003-0984 CAN-2004-0003 CAN-2004-0010 Security Advisory Details: Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the second regular update. The Linux kernel handles the basic functions of the operating system. This is the second regular kernel update to Red Hat Enterprise Linux version 3. It contains several minor security fixes, many bug fixes, device driver updates, new hardware support, and the introduction of Linux Syscall Auditing support. There were bug fixes in many different parts of the kernel, the bulk of which addressed unusual situations such as error handling, race conditions, and resource starvation. The combined effect of the approximately 140 fixes is a strong improvement in the reliability and durability of Red Hat Enterprise Linux. Some of the key areas affected are disk drivers, network drivers, USB support, x86_64 and ppc64 platform support, ia64 32-bit emulation layer enablers, and the VM, NFS, IPv6, and SCSI subsystems. A significant change in the SCSI subsystem (the disabling of the scsi-affine-queue patch) should significantly improve SCSI disk driver performance in many scenarios. There were 10 Bugzillas against SCSI performance problems addressed by this change. The following drivers have been upgraded to new versions: bonding ---- 2.4.1 cciss ------ 2.4.50.RH1 e1000 ------ 5.2.30.1-k1 fusion ----- 2.05.11.03 ipr -------- 1.0.3 ips -------- 6.11.07 megaraid2 -- 2.10.1.1 qla2x00 ---- 6.07.02-RH1 tg3 -------- 3.1 z90crypt --- 1.1.4 This update introduces support for the new Intel EM64T processor. A new "ia32e" architecture has been created to support booting on platforms based on either the original AMD Opteron CPU or the new Intel EM64T CPU. The existing "x86_64" architecture has remained optimized for Opteron systems. Kernels for both types of systems are built from the same x86_64-architecture sources and share a common kernel source RPM (kernel-source-2.4.21-15.EL.x86_64.rpm). Other highlights in this update include a major upgrade to the SATA infrastructure, addition of IBM JS20 Power Blade support, and creation of an optional IBM eServer zSeries On-Demand Timer facility for reducing idle CPU overhead. The following security issues were addressed in this update: A minor flaw was found where /proc/tty/driver/serial reveals the exact character counts for serial links. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0461 to this issue. The kernel strncpy() function in Linux 2.4 and 2.5 does not pad the target buffer with null bytes on architectures other than x86, as opposed to the expected libc behavior, which could lead to information leaks. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0465 to this issue. A minor data leak was found in two real time clock drivers (for /dev/rtc). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0984 to this issue. A flaw in the R128 Direct Render Infrastructure (dri) driver could allow local privilege escalation. This driver is part of the kernel-unsupported package. The Common Vulnera- bilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0003 to this issue. A flaw in ncp_lookup() in ncpfs could allow local privilege escalation. The ncpfs module allows a system to mount volumes of NetWare servers or print to NetWare printers and is in the kernel-unsupported package. The Common Vulnera- bilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0010 to this issue. (Note that the kernel-unsupported package contains drivers and other modules that are unsupported and therefore might contain security problems that have not been addressed.) All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. Updated packages: Red Hat Enterprise Linux AS (v. 3) -------------------------------------------------------------------------------- AMD64: kernel-2.4.21-15.EL.x86_64.rpm 3b4b32cbaf79bbb8347a46a55e3f567b kernel-doc-2.4.21-15.EL.x86_64.rpm 7e23eb4b2dae89277af9158f4d060d15 kernel-smp-2.4.21-15.EL.x86_64.rpm 6c2bef2ec68fc88fb4e41ab365b892d6 kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm 918aa8fe2dddd5b0e39fdda928d1ac11 kernel-source-2.4.21-15.EL.x86_64.rpm a5eed15aec5410d0fe7969cf6822cf8d kernel-unsupported-2.4.21-15.EL.x86_64.rpm d94b403c362b2a4c3f6f1b4cdb3eb6f5 EM64T: kernel-2.4.21-15.EL.ia32e.rpm 7e0980daf431587d541d42ce7e9ed1aa kernel-unsupported-2.4.21-15.EL.ia32e.rpm e5ed73b33fec640983b6291d5563e72e SRPMS: kernel-2.4.21-15.EL.src.rpm b698c83996f9e178a2328a6819ac5351 athlon: kernel-2.4.21-15.EL.athlon.rpm ccad3e4dbb561cca63badec7b6317163 kernel-smp-2.4.21-15.EL.athlon.rpm 2edfe3398e83c4dbb5ac47a9514a253f kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm f6ff7ea30964f4960bb85e17cda3085e kernel-unsupported-2.4.21-15.EL.athlon.rpm 2740555623bc674229d0336ac9e10a84 i386: kernel-BOOT-2.4.21-15.EL.i386.rpm 4292218598ef0d169b10a5b9c248b121 kernel-doc-2.4.21-15.EL.i386.rpm 496f073081daeb065744999269ebe0ff kernel-source-2.4.21-15.EL.i386.rpm 003856a5f02c9e33124b6f8cba7eee3c i686: kernel-2.4.21-15.EL.i686.rpm f1cdb8023f0074a870c02e238feacd48 kernel-hugemem-2.4.21-15.EL.i686.rpm 47246b48fcda4741cd7c74a16cef1f1e kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm 1980c6ef8defadedbb591c1fb91cb710 kernel-smp-2.4.21-15.EL.i686.rpm 01a1577e4a501ce6db3879d3cc5134de kernel-smp-unsupported-2.4.21-15.EL.i686.rpm aa7535be656bf89f60c8a01bf347b12c kernel-unsupported-2.4.21-15.EL.i686.rpm 53da49b7178bdcba6d849aa2da30037d ia64: kernel-2.4.21-15.EL.ia64.rpm 66352bf4f48daf50de4727f515a6c59c kernel-doc-2.4.21-15.EL.ia64.rpm 8b00b405e53a2de14167ddf7826d3c2c kernel-source-2.4.21-15.EL.ia64.rpm 93733a4a47b8303a6e34c50f31a840d3 kernel-unsupported-2.4.21-15.EL.ia64.rpm c5d55c5fb6ac3642fe3ddf1110e84b20 ppc64: kernel-doc-2.4.21-15.EL.ppc64.rpm 607f87500495009130794a917a1507d4 kernel-source-2.4.21-15.EL.ppc64.rpm 78311de9005374db527efd58a741ebf0 ppc64iseries: kernel-2.4.21-15.EL.ppc64iseries.rpm b62cbd1cebb476be2c7959e9711c3974 kernel-unsupported-2.4.21-15.EL.ppc64iseries.rpm 91b27b98335b877dc9691592967654d1 ppc64pseries: kernel-2.4.21-15.EL.ppc64pseries.rpm ac1ac2f389cdfd6fdd6c1a5ccb5b4b66 kernel-unsupported-2.4.21-15.EL.ppc64pseries.rpm 7c8fce1f061daa0cda1bd35bd163bcca s390: kernel-2.4.21-15.EL.s390.rpm 30ca5c26882e9580b3d5e9796b0c4450 kernel-doc-2.4.21-15.EL.s390.rpm eb5aebe1ad8aeea59142d0522b778d15 kernel-source-2.4.21-15.EL.s390.rpm 29868c0ee56a5c52986e4879d2d8317a kernel-unsupported-2.4.21-15.EL.s390.rpm dd9e29bcc2bfdd2ddeeb5c3026f677cd s390x: kernel-2.4.21-15.EL.s390x.rpm 0eda90f574a83b83904bc6a34677e0d5 kernel-doc-2.4.21-15.EL.s390x.rpm 9809a3354afbebb5d72093ec57543936 kernel-source-2.4.21-15.EL.s390x.rpm 5166eac7154184ed337eb5f3743ee449 kernel-unsupported-2.4.21-15.EL.s390x.rpm 1e107ae79f89952f5c62495253867458 Red Hat Enterprise Linux ES (v. 3) -------------------------------------------------------------------------------- SRPMS: kernel-2.4.21-15.EL.src.rpm b698c83996f9e178a2328a6819ac5351 athlon: kernel-2.4.21-15.EL.athlon.rpm ccad3e4dbb561cca63badec7b6317163 kernel-smp-2.4.21-15.EL.athlon.rpm 2edfe3398e83c4dbb5ac47a9514a253f kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm f6ff7ea30964f4960bb85e17cda3085e kernel-unsupported-2.4.21-15.EL.athlon.rpm 2740555623bc674229d0336ac9e10a84 i386: kernel-BOOT-2.4.21-15.EL.i386.rpm 4292218598ef0d169b10a5b9c248b121 kernel-doc-2.4.21-15.EL.i386.rpm 496f073081daeb065744999269ebe0ff kernel-source-2.4.21-15.EL.i386.rpm 003856a5f02c9e33124b6f8cba7eee3c i686: kernel-2.4.21-15.EL.i686.rpm f1cdb8023f0074a870c02e238feacd48 kernel-hugemem-2.4.21-15.EL.i686.rpm 47246b48fcda4741cd7c74a16cef1f1e kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm 1980c6ef8defadedbb591c1fb91cb710 kernel-smp-2.4.21-15.EL.i686.rpm 01a1577e4a501ce6db3879d3cc5134de kernel-smp-unsupported-2.4.21-15.EL.i686.rpm aa7535be656bf89f60c8a01bf347b12c kernel-unsupported-2.4.21-15.EL.i686.rpm 53da49b7178bdcba6d849aa2da30037d Red Hat Enterprise Linux WS (v. 3) -------------------------------------------------------------------------------- AMD64: kernel-2.4.21-15.EL.x86_64.rpm 3b4b32cbaf79bbb8347a46a55e3f567b kernel-doc-2.4.21-15.EL.x86_64.rpm 7e23eb4b2dae89277af9158f4d060d15 kernel-smp-2.4.21-15.EL.x86_64.rpm 6c2bef2ec68fc88fb4e41ab365b892d6 kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm 918aa8fe2dddd5b0e39fdda928d1ac11 kernel-source-2.4.21-15.EL.x86_64.rpm a5eed15aec5410d0fe7969cf6822cf8d kernel-unsupported-2.4.21-15.EL.x86_64.rpm d94b403c362b2a4c3f6f1b4cdb3eb6f5 EM64T: kernel-2.4.21-15.EL.ia32e.rpm 7e0980daf431587d541d42ce7e9ed1aa kernel-unsupported-2.4.21-15.EL.ia32e.rpm e5ed73b33fec640983b6291d5563e72e SRPMS: kernel-2.4.21-15.EL.src.rpm b698c83996f9e178a2328a6819ac5351 athlon: kernel-2.4.21-15.EL.athlon.rpm ccad3e4dbb561cca63badec7b6317163 kernel-smp-2.4.21-15.EL.athlon.rpm 2edfe3398e83c4dbb5ac47a9514a253f kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm f6ff7ea30964f4960bb85e17cda3085e kernel-unsupported-2.4.21-15.EL.athlon.rpm 2740555623bc674229d0336ac9e10a84 i386: kernel-BOOT-2.4.21-15.EL.i386.rpm 4292218598ef0d169b10a5b9c248b121 kernel-doc-2.4.21-15.EL.i386.rpm 496f073081daeb065744999269ebe0ff kernel-source-2.4.21-15.EL.i386.rpm 003856a5f02c9e33124b6f8cba7eee3c i686: kernel-2.4.21-15.EL.i686.rpm f1cdb8023f0074a870c02e238feacd48 kernel-hugemem-2.4.21-15.EL.i686.rpm 47246b48fcda4741cd7c74a16cef1f1e kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm 1980c6ef8defadedbb591c1fb91cb710 kernel-smp-2.4.21-15.EL.i686.rpm 01a1577e4a501ce6db3879d3cc5134de kernel-smp-unsupported-2.4.21-15.EL.i686.rpm aa7535be656bf89f60c8a01bf347b12c kernel-unsupported-2.4.21-15.EL.i686.rpm 53da49b7178bdcba6d849aa2da30037d ia64: kernel-2.4.21-15.EL.ia64.rpm 66352bf4f48daf50de4727f515a6c59c kernel-doc-2.4.21-15.EL.ia64.rpm 8b00b405e53a2de14167ddf7826d3c2c kernel-source-2.4.21-15.EL.ia64.rpm 93733a4a47b8303a6e34c50f31a840d3 kernel-unsupported-2.4.21-15.EL.ia64.rpm c5d55c5fb6ac3642fe3ddf1110e84b20 (The unlinked packages above are only available from the Red Hat Network) Solution Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt Bugs fixed: (see bugzilla for more information) 102194 - Disk READ performance worse compared with 2.4.20-18.9smp 103706 - Some numerical values in /proc/partitions file becomes an unusual value. 104084 - ctc interface unexpectedly dies 104444 - RHEL3 U2: Syscall Auditing Support 104633 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1. 104634 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1. 104636 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1. 106111 - RHEL 3 U2: Only one CPU is initialized in a Hypthreading enabled Intel ICH5 platform. 106219 - raid level 1 disk failures 106334 - RHEL 3 - U2 -Qlogic FAStT Fibre driver 6.05 or later 106396 - Hardware crypto support 106402 - LTC4736 - PTS: Kernel Panic during mutex contention test. 106503 - ia64 kernel stops allocating memory too early when overcommit_memory set to strict 106584 - 'cp -p' returns error when destination is an nfs directory 106870 - RHEL 3 AS/IPF/QU1: Qlogic qla2300 6.06.50 106890 - RHEL 3 U2: preserve_argv0 patch missing - IPF x86 compat. 106894 - RHEL 3, U2: IA32 feat: new microcode update format sup. (Prescott/Nocona) 106969 - Random stall during boot-up 107330 - NC6770 adapter fails to regain connection after lost link 107331 - (tg3) Jumbo Frames w/bonding fails on NC7771 and Red Hat EL 3 RC1 respin 107744 - RHEL3 Update1: ia32 on ia64 syscall table 107864 - Data corruption in iozone benchmark 107915 - binfmt_misc.o is a part of kernel-unsupported - x86 compat on IPF 108958 - MINSIGSTKSZ mismatch between ia32 and ia64 109242 - LTC5267 - Network degradation as runs progress in specweb99 109618 - 3ware raid extremely low throughput 109660 - op_time no samples files found 109843 - Typo in module parameter of scsi_mod module 109914 - PATCH: LTC5351-Large external array causes SIGILL in 32-bit 110170 - [PATCH] LTC5381- rhel 3 will need to pick up the cyclone-lpj-fix patch 110633 - iptables ipt_limit module fails on ppc (iserie) RS64-IV RHEL3 110716 - RHEL 3 - U2 - JS30 Blade - kernel enablement 110849 - zcrypt update to 06-11 and up 110872 - System Hangs after 5-10 minutes with USB attached 110999 - clock is running to fast on IBM x445 111250 - tg3 driver fails to autonegotiate correctly 111264 - ada compiler crashes on even hello-world 111287 - [PATCH] alternate signal stack bug corrupts RNaT bits 111403 - [PATCH] LTC3766 - pthreads/NPTL problems with large memory processes 111446 - hang in RHEL 3 pthreads library 111629 - ACL over NFS problem 111673 - RHEL 3 U2 - ServeRAID update for IA64 fixes 111681 - Invalid ICMP type 11 messages echo'd to console 111768 - /proc/pid/statm can return negative values 111774 - [PATCH] HP cciss driver bug fix 111853 - [PATCH] cciss hba pointer may be null when trying to release I/O memory 111854 - [PATCH] need to enable prefetch on HP 64xx controllers 111855 - [PATCH] problems hot plugging older cciss controllers 111856 - [PATCH] cciss driver may panic system when sharing IRQ's 111858 - [PATCH] cciss may display #blocks as a negative value 111903 - [PATCH] oops in IUCV code 111911 - avoid hang during initialization on I/O errors 111968 - Allow async read/write to propagate down to transports that support async 112006 - [PATCH] BUG() from __remove_inode_page 112025 - SMP kernels parsing of AICP tables limited - breaks hyperthreading 112039 - RHEL 3 U2: Qlogic qla2300 driver version 6.07.++ 112040 - RHEL 3 U2: Update cciss driver to 2.4.50 112057 - RHEL3 U2: update megaraid2 to version 2.10.x 112103 - RHEL3 U2: IA32 core dump support on IPF 112111 - RHEL 3 U2: ICH6 PATA support 112139 - RHEL 3 U2: update cciss driver (new funct/bug fixes) to 2.4.50 112163 - RHEL 3 U2 - Update e1000 112190 - Duplicate get_partition_list bug to track Bugzilla 111342 in Taroon - 112288 - [PATCH] ICMPv6 error message contains incorrect original packet's data. 112359 - RHEL 3.0 using v6.06.00b11 driver attached to McData switch doesn't log in or scan devices successfully. 112363 - NC7722 when using the TG3 driver has no active link Th established 112449 - (TG3) driver doesn't work properly with bcm5700 nic 112584 - reservation error code, corrupts request queue 112607 - aironet driver fixes 112646 - defunct processes whose parent process is 'init' are created. 112724 - kernel hang when unmap a hugetlb vma 112764 - RHEL3 kernel not preventing or recovering from fork bomb when ulimit used 112826 - LTC5732 - MMIO alignment error when inserting the olympic TR module. 113034 - RHEL 3 U2: Merge IBM IPR driver into main kernel RPM 113051 - [PATCH] LTC5757 - RHEL3 update 2 RAS patches - rtas syscall and os-term 113052 - [PATCH] LTC5758 - /proc/ppc64/lparcfg file missing in RHEL 3 113071 - [PATCH] RHEL3 ia64: 32 bit applications don't dump core properly 113072 - [PATCH] RHEL3/ia64: strace -f on multithreaded 32 bit applications doesn't work 113099 - CAN-2003-0461 /proc reveals char count 113100 - CAN-2003-0465 kernel strncpy padding 113103 - CAN-2003-0984 minor /dev/rtc leak 113105 - Al-Viro kmod local DoS 113171 - lousy read performance on megaraid with 2.4.21-4.0.2.EL 113213 - kernel crashes when unmap_kvec() is called in interrupt context 113328 - RHEL 3 - U2 ACPI support for multiple IDE devices (x455) 113341 - netdump - various race conditions that lead to hangs in panic()/die() 113413 - too many ipv6 aliases cause kernel oops 113561 - Patch for BLIST_SPARSELUN in scsi_scan.c 113604 - CAN-2004-0003 r128 DRI 113737 - [PATCH] sym53c8xx.c - odd byte tape fix 113738 - [PATCH] updated megaraid2 driver (2.10.1) 113739 - [PATCH] updated mptfusion driver (2.05.11) 113809 - depmod is not run for kernel-2.4.21-9.EL from Quaterly Update #1 113890 - [PATCH] Excutable compiled on x86 can cause kernel seg fault on x86_64 114052 - Raw device performance poor under WS 3 Dreamworks IT#29689 114135 - LSI Megaraid(2) performance subpar in RHEL3, using RHEL3 kernel 114137 - RHEL3 U2: patch for sym53c8xx.c to address odd byte tape fix 114356 - USB keyboard/mouse don\'t work on upcoming Dell servers 114529 - RHEL3: [PATCH] Inclusion of Handspring Treo patch into next kernel release 114553 - Bad performance with Q1 update kernel (-9EL) 114560 - zfcp updates for RHEL3 U2 114588 - [PATCH] don't serialize NFS direct writes 114773 - Panic in elf_core_copy_regs() core dumping ia32 binary 114869 - date returns future year of 586562 114873 - RHEL3 U2: softirq interrupt deferral patch 114874 - RHEL 2.1 U4 and RHEL 3 U2 - e1000 fix for SOL 114940 - RHEL 3.0 default QLogic driver v6.06.00b11 spews sg_low_free and QUEUE FULL messages at load time. 114942 - Running I/O on RHEL 3.0 and using the v6.06.00b11 driver, the driver ran out of memory and began arbitrarily killing processes. 115072 - Lack of file close processing for O_DIRECT unsupported filesystem in dentry_open() 115231 - RHEL 3_U2 Adds new processor support 115273 - bad disk I/O performance with the 2.4.21-4.ELsmp kernel 115334 - Suspected VM problem causes gradual Tux performance degradation 115390 - Kernel panic and/or EXT3-fs corruption running sysreport on rx7620 115438 - strange load - kswapd/IO ? 115439 - LTC5321-Cannot enable quota on RHEL 3 for ppc64 115823 - CAN-2004-0010 ncpfs hole (unsupported) 116261 - RHEL3 kernel specfile for s390* should require minimum version of s390utils 116916 - tg3 driver doesn't support bonding driver's ALB mode 117454 - /proc/cpuinfo has bad info on ia32e 117741 - P4 2.8ghz HT, Using RHEL WS 3.0 Update 1, latest SMP Kernel, see only 1 CPU 117914 - RHEL3 U3: Handspring Treo ID 117941 - frequent kernel panics 118109 - System hangs while running stress tests with hugetlbfs on hugemem kernel 118397 - system needlessly thrashing swap partition 118494 - updates to scsi_scan.c (RHEL3 U2 alpha) 118556 - MTRRs not initialized correctly 118647 - kswapd in state R and D load constant at 1+ 118882 - Machine doesn't boot SMP Kernel after installation 118885 - [PATCH] kernel panics when removing expired IPsec SAs 118974 - stack overflows during ACPI initialization 118980 - option \'acpi=off\' not working correctly 119009 - Kernel panic occurs when trying to install RHEL 3 U2 B2 for AMD64 119174 - /proc/cpuinfo vendor_id is wrong. shows $ 119234 - RHEL3 U2 beta1 hard locks on Celcius 810v 119545 - kernel module binfmt_misc missing 119638 - Can't set speed/duplex on tg3 fiber interfaces 119903 - nfs peformance very bad on EL3 120232 - [x86_64] Crash on install disc boot without newly-required noapictimers 120341 - Runaway processes with USB console on Blade Center 121856 - LTC7932-Kernel Panic with TCE allocation failure w/ Qlogic queue depth issue 122077 - servers freeze (only respond to ping and sysrq) periodically References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0461 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0465 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0984 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0003 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0010 Keywords: kernel, taroon, update -------------------------------------------------------------------------------- The listed packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/solutions/security/news/publickey/#key You can verify each package and see who signed it with the following command: rpm --checksig -v filename If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum filename The Red Hat security contact is security@redhat.com. More contact details at http://www.redhat.com/solutions/security/news/contact.html Copyright © 2002 Red Hat, Inc. All rights reserved. Search by Google [***** End Red Hat Advisory RHSA-2004:188-14 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Red Hat, Inc. for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) O-135: Apple QuickTime Integer Overflow O-136: HP Web JetAdmin Vulnerabilities O-137: SGI IRIX Networking Security Vulnerabilities O-138: Mac OS X Jaguar and Panther Security Vulnerabilities O-139: Apple Mac OS X AppleFileServer Authentication Vulnerability O-140: Microsoft HCP Protocol URL Validation Vulnerability O-141: Symantec Client Firewall Remote Access Vulnerabilities O-142: Hewlett Packaged HP-UX dtlogin Vulnerability O-143: Gnome Toolkit (GTK+) Support Libraries Vulnerability O-144: Sun ypserv and ypxfrd Vulnerabilities