RedHat: Updated kernel packages available for Red Hat

    Date18 May 2005
    CategoryRed Hat
    8605
    Posted ByJoe Shakespeare
    Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the fifth regular update.
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5
    Advisory ID:       RHSA-2005:294-01
    Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-294.html
    Issue date:        2005-05-18
    Updated on:        2005-05-18
    Product:           Red Hat Enterprise Linux
    Obsoletes:         RHSA-2005:293
    CVE Names:         CAN-2005-0757
    - ---------------------------------------------------------------------
    
    1. Summary:
    
    Updated kernel packages are now available as part of ongoing support
    and maintenance of Red Hat Enterprise Linux version 3.  This is the
    fifth regular update.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
    Red Hat Desktop version 3 - i386, x86_64
    Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
    Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
    
    3. Problem description:
    
    The Linux kernel handles the basic functions of the operating system.
    
    This is the fifth regular kernel update to Red Hat Enterprise Linux 3.
    
    New features introduced by this update include:
    
      - support for 2-TB partitions on block devices
      - support for new disk, network, and USB devices
      - support for clustered APIC mode on AMD64 NUMA systems
      - netdump support on AMD64, Intel EM64T, Itanium, and ppc64 systems
      - diskdump support on sym53c8xx and SATA piix/promise adapters
      - NMI switch support on AMD64 and Intel EM64T systems
    
    There were many bug fixes in various parts of the kernel.  The ongoing
    effort to resolve these problems has resulted in a marked improvement
    in the reliability and scalability of Red Hat Enterprise Linux 3.
    
    Some key areas affected by these fixes include the kernel's networking,
    SATA, TTY, and USB subsystems, as well as the architecture-dependent
    handling under the ia64, ppc64, and x86_64 directories.  Scalability
    improvements were made primarily in the memory management and file
    system areas.
    
    A flaw in offset handling in the xattr file system code backported to
    Red Hat Enterprise Linux 3 was fixed.  On 64-bit systems, a user who
    can access an ext3 extended-attribute-enabled file system could cause
    a denial of service (system crash).  This issue is rated as having a
    moderate security impact (CAN-2005-0757).
    
    The following device drivers have been upgraded to new versions:
    
      3c59x ------ LK1.1.18
      3w-9xxx ---- 2.24.00.011fw (new in Update 5)
      3w-xxxx ---- 1.02.00.037
      8139too ---- (upstream 2.4.29)
      b44 -------- 0.95
      cciss ------ v2.4.54.RH1
      e100 ------- 3.3.6-k2
      e1000 ------ 5.6.10.1-k2
      lpfcdfc ---- 1.0.13 (new in Update 5)
      tg3 -------- 3.22RH
    
    Note: The kernel-unsupported package contains various drivers and modules
    that are unsupported and therefore might contain security problems that
    have not been addressed.
    
    All Red Hat Enterprise Linux 3 users are advised to upgrade their
    kernels to the packages associated with their machine architectures
    and configurations as listed in this erratum.
    
    4. Solution:
    
    Before applying this update, make sure that all previously released
    errata relevant to your system have been applied.  Use Red Hat
    Network to download and update your packages.  To launch the Red Hat
    Update Agent, use the following command:
    
        up2date
    
    For information on how to install packages manually, refer to the
    following Web page for the System Administration or Customization
    guide specific to your system:
    
        http://www.redhat.com/docs/manuals/enterprise/
    
    5. RPMs required:
    
    Red Hat Enterprise Linux AS version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
    d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm
    
    i386:
    8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
    7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
    bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
    aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
    c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
    d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
    5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
    28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
    55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
    36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
    ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
    6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
    ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm
    
    ia64:
    b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
    25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
    5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
    a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm
    
    ppc:
    58bf58e0cea36b6bbe06b41bd1c09153  kernel-2.4.21-32.EL.ppc64iseries.rpm
    41e8d849240559fa694a636bd826537a  kernel-2.4.21-32.EL.ppc64pseries.rpm
    8397f50f3ec6f1e889090895e7eb66fb  kernel-doc-2.4.21-32.EL.ppc64.rpm
    9444e6fd23671724e861b06bc555bae5  kernel-source-2.4.21-32.EL.ppc64.rpm
    6590395e036ae1832f1b55790d8d0821  kernel-unsupported-2.4.21-32.EL.ppc64iseries.rpm
    07417ced420144cdb932ec66125a0b57  kernel-unsupported-2.4.21-32.EL.ppc64pseries.rpm
    
    s390:
    d06b1ae5b6556386c443e8c94b6fc4c8  kernel-2.4.21-32.EL.s390.rpm
    53da0a3fe4e89213f9e26fb97b016ea6  kernel-doc-2.4.21-32.EL.s390.rpm
    0fe7cf2c4c26154847d210a4a6667793  kernel-source-2.4.21-32.EL.s390.rpm
    e6aee965886f221e431b40c846bb4bbe  kernel-unsupported-2.4.21-32.EL.s390.rpm
    
    s390x:
    4a3f013bae04963eafc67c6a7d26919d  kernel-2.4.21-32.EL.s390x.rpm
    c5d899ad8ca24d2bcba1fd529c612754  kernel-doc-2.4.21-32.EL.s390x.rpm
    c4b13e1642a7f61e02b9ca587fc1752a  kernel-source-2.4.21-32.EL.s390x.rpm
    9075beed557f713bacc0711eb59f7d31  kernel-unsupported-2.4.21-32.EL.s390x.rpm
    
    x86_64:
    a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
    3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
    789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
    2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
    9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
    55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
    3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
    cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm
    
    Red Hat Desktop version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
    d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm
    
    i386:
    8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
    7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
    bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
    aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
    c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
    d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
    5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
    28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
    55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
    36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
    ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
    6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
    ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm
    
    x86_64:
    a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
    3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
    789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
    2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
    9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
    55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
    3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
    cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm
    
    Red Hat Enterprise Linux ES version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
    d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm
    
    i386:
    8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
    7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
    bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
    aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
    c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
    d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
    5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
    28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
    55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
    36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
    ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
    6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
    ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm
    
    ia64:
    b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
    25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
    5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
    a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm
    
    x86_64:
    a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
    3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
    789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
    2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
    9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
    55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
    3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
    cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm
    
    Red Hat Enterprise Linux WS version 3:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-32.EL.src.rpm
    d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm
    
    i386:
    8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
    7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
    bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
    aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
    c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
    d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
    5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
    28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
    55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
    36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
    ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
    6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
    ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm
    
    ia64:
    b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
    25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
    5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
    a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm
    
    x86_64:
    a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
    3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
    789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
    2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
    9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
    55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
    3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
    cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and 
    details on how to verify the signature are available from
    https://www.redhat.com/security/team/key/#package
    
    6. References:
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0757
    
    7. Contact:
    
    The Red Hat security contact is .  More contact
    details at https://www.redhat.com/security/team/contact/
    
    Copyright 2005 Red Hat, Inc.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.76,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":12.93,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.31,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.