First published: Wed Oct 05 2005(Updated: )
The Linux kernel handles the basic functions of the operating system.<br>This is the second regular kernel update to Red Hat Enterprise Linux 4.<br>New features introduced in this update include:<br><li> Audit support </li> <li> systemtap - kprobes, relayfs </li> <li> Keyring support </li> <li> iSCSI Initiator - iscsi_sfnet 4:0.1.11-1 </li> <li> Device mapper multipath support </li> <li> Intel dual core support </li> <li> esb2 chipset support </li> <li> Increased exec-shield coverage </li> <li> Dirty page tracking for HA systems </li> <li> Diskdump -- allow partial diskdumps and directing to swap </li> There were several bug fixes in various parts of the kernel. The ongoing<br>effort to resolve these problems has resulted in a marked improvement<br>in the reliability and scalability of Red Hat Enterprise Linux 4. <br>The following security bugs were fixed in this update, detailed below with<br>corresponding CAN names available from the Common Vulnerabilities and<br>Exposures project (cve.mitre.org):<br><li> flaws in ptrace() syscall handling on 64-bit systems that allowed a local </li> user to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,<br>CAN-2005-1762, CAN-2005-1763)<br><li> flaws in IPSEC network handling that allowed a local user to cause a </li> denial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)<br><li> a flaw in sendmsg() syscall handling on 64-bit systems that allowed a </li> local user to cause a denial of service or potentially gain privileges<br>(CAN-2005-2490)<br><li> a flaw in sendmsg() syscall handling that allowed a local user to cause a </li> denial of service by altering hardware state (CAN-2005-2492)<br><li> a flaw that prevented the topdown allocator from allocating mmap areas </li> all the way down to address zero (CAN-2005-1265)<br><li> flaws dealing with keyrings that could cause a local denial of service </li> (CAN-2005-2098, CAN-2005-2099)<br><li> a flaw in the 4GB split patch that could allow a local denial of service </li> (CAN-2005-2100)<br><li> a xattr sharing bug in the ext2 and ext3 file systems that could cause </li> default ACLs to disappear (CAN-2005-2801)<br><li> a flaw in the ipt_recent module on 64-bit architectures which could allow </li> a remote denial of service (CAN-2005-2872)<br>The following device drivers have been upgraded to new versions:<br>qla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2<br>qla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2<br>qla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2<br>qla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2<br>qla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2<br>qla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2<br>megaraid_mbox --- 2.20.4.5 to 2.20.4.6<br>megaraid_mm ----- 2.20.2.5 to 2.20.2.6 <br>lpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17<br>cciss ----------- 2.6.4 to 2.6.6<br>ipw2100 --------- 1.0.3 to 1.1.0<br>tg3 ------------- 3.22-rh to 3.27-rh<br>e100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI<br>e1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI<br>3c59x ----------- LK1.1.19<br>mptbase --------- 3.01.16 to 3.02.18<br>ixgb ------------ 1.0.66 to 1.0.95-k2-NAPI<br>libata ---------- 1.10 to 1.11<br>sata_via -------- 1.0 to 1.1<br>sata_ahci ------- 1.00 to 1.01<br>sata_qstor ------ 0.04<br>sata_sil -------- 0.8 to 0.9<br>sata_svw -------- 1.05 to 1.06<br>s390: crypto ---- 1.31 to 1.57<br>s390: zfcp ------ <br>s390: CTC-MPC ---<br>s390: dasd -------<br>s390: cio -------<br>s390: qeth ------<br>All Red Hat Enterprise Linux 4 users are advised to upgrade their<br>kernels to the packages associated with their machine architectures<br>and configurations as listed in this erratum.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.