Skip to navigation

Security Advisory Updated kernel packages available for Red Hat Enterprise Linux 3 Update 2

Advisory: RHSA-2004:188-14
Type: Security Advisory
Severity: Important
Issued on: 2004-05-11
Last updated on: 2004-05-11
Affected Products: Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2003-0461
CVE-2003-0465
CVE-2003-0984
CVE-2003-1040
CVE-2004-0003
CVE-2004-0010

Details

Updated kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version
3. This is the second regular update.

The Linux kernel handles the basic functions of the
operating system.

This is the second regular kernel update to Red Hat
Enterprise Linux version 3. It contains several minor
security fixes, many bug fixes, device driver updates,
new hardware support, and the introduction of Linux
Syscall Auditing support.

There were bug fixes in many different parts of the kernel,
the bulk of which addressed unusual situations such as error
handling, race conditions, and resource starvation. The
combined effect of the approximately 140 fixes is a strong
improvement in the reliability and durability of Red Hat
Enterprise Linux. Some of the key areas affected are disk
drivers, network drivers, USB support, x86_64 and ppc64
platform support, ia64 32-bit emulation layer enablers,
and the VM, NFS, IPv6, and SCSI subsystems.

A significant change in the SCSI subsystem (the disabling
of the scsi-affine-queue patch) should significantly improve
SCSI disk driver performance in many scenarios. There were
10 Bugzillas against SCSI performance problems addressed
by this change.

The following drivers have been upgraded to new versions:

bonding ---- 2.4.1
cciss ------ 2.4.50.RH1
e1000 ------ 5.2.30.1-k1
fusion ----- 2.05.11.03
ipr -------- 1.0.3
ips -------- 6.11.07
megaraid2 -- 2.10.1.1
qla2x00 ---- 6.07.02-RH1
tg3 -------- 3.1
z90crypt --- 1.1.4

This update introduces support for the new Intel EM64T
processor. A new "ia32e" architecture has been created to
support booting on platforms based on either the original
AMD Opteron CPU or the new Intel EM64T CPU. The existing
"x86_64" architecture has remained optimized for Opteron
systems. Kernels for both types of systems are built from
the same x86_64-architecture sources and share a common
kernel source RPM (kernel-source-2.4.21-15.EL.x86_64.rpm).

Other highlights in this update include a major upgrade to
the SATA infrastructure, addition of IBM JS20 Power Blade
support, and creation of an optional IBM eServer zSeries
On-Demand Timer facility for reducing idle CPU overhead.

The following security issues were addressed in this update:

A minor flaw was found where /proc/tty/driver/serial reveals
the exact character counts for serial links. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0461 to this issue.

The kernel strncpy() function in Linux 2.4 and 2.5 does not
pad the target buffer with null bytes on architectures other
than x86, as opposed to the expected libc behavior, which
could lead to information leaks. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0465 to this issue.

A minor data leak was found in two real time clock drivers
(for /dev/rtc). The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name
CAN-2003-0984 to this issue.

A flaw in the R128 Direct Render Infrastructure (dri) driver
could allow local privilege escalation. This driver is part
of the kernel-unsupported package. The Common Vulnera-
bilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0003 to this issue.

A flaw in ncp_lookup() in ncpfs could allow local privilege
escalation. The ncpfs module allows a system to mount
volumes of NetWare servers or print to NetWare printers and
is in the kernel-unsupported package. The Common Vulnera-
bilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0010 to this issue.

(Note that the kernel-unsupported package contains drivers
and other modules that are unsupported and therefore might
contain security problems that have not been addressed.)

All Red Hat Enterprise Linux 3 users are advised to upgrade
their kernels to the packages associated with their machine
architectures and configurations as listed in this erratum.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Red Hat Enterprise Linux AS (v. 3)

SRPMS:
kernel-2.4.21-15.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: b698c83996f9e178a2328a6819ac5351
 
IA-32:
kernel-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: ccad3e4dbb561cca63badec7b6317163
kernel-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: f1cdb8023f0074a870c02e238feacd48
kernel-BOOT-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4292218598ef0d169b10a5b9c248b121
kernel-doc-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 496f073081daeb065744999269ebe0ff
kernel-hugemem-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 47246b48fcda4741cd7c74a16cef1f1e
kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1980c6ef8defadedbb591c1fb91cb710
kernel-smp-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2edfe3398e83c4dbb5ac47a9514a253f
kernel-smp-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 01a1577e4a501ce6db3879d3cc5134de
kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: f6ff7ea30964f4960bb85e17cda3085e
kernel-smp-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: aa7535be656bf89f60c8a01bf347b12c
kernel-source-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 003856a5f02c9e33124b6f8cba7eee3c
kernel-unsupported-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2740555623bc674229d0336ac9e10a84
kernel-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 53da49b7178bdcba6d849aa2da30037d
 
IA-64:
kernel-2.4.21-15.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 66352bf4f48daf50de4727f515a6c59c
kernel-doc-2.4.21-15.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8b00b405e53a2de14167ddf7826d3c2c
kernel-source-2.4.21-15.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 93733a4a47b8303a6e34c50f31a840d3
kernel-unsupported-2.4.21-15.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: c5d55c5fb6ac3642fe3ddf1110e84b20
 
PPC:
kernel-2.4.21-15.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: b62cbd1cebb476be2c7959e9711c3974
kernel-2.4.21-15.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: ac1ac2f389cdfd6fdd6c1a5ccb5b4b66
kernel-doc-2.4.21-15.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 607f87500495009130794a917a1507d4
kernel-source-2.4.21-15.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 78311de9005374db527efd58a741ebf0
kernel-unsupported-2.4.21-15.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 91b27b98335b877dc9691592967654d1
kernel-unsupported-2.4.21-15.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7c8fce1f061daa0cda1bd35bd163bcca
 
s390:
kernel-2.4.21-15.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 30ca5c26882e9580b3d5e9796b0c4450
kernel-doc-2.4.21-15.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: eb5aebe1ad8aeea59142d0522b778d15
kernel-source-2.4.21-15.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29868c0ee56a5c52986e4879d2d8317a
kernel-unsupported-2.4.21-15.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: dd9e29bcc2bfdd2ddeeb5c3026f677cd
 
s390x:
kernel-2.4.21-15.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0eda90f574a83b83904bc6a34677e0d5
kernel-doc-2.4.21-15.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9809a3354afbebb5d72093ec57543936
kernel-source-2.4.21-15.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5166eac7154184ed337eb5f3743ee449
kernel-unsupported-2.4.21-15.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1e107ae79f89952f5c62495253867458
 
x86_64:
kernel-2.4.21-15.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7e0980daf431587d541d42ce7e9ed1aa
kernel-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3b4b32cbaf79bbb8347a46a55e3f567b
kernel-doc-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7e23eb4b2dae89277af9158f4d060d15
kernel-smp-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6c2bef2ec68fc88fb4e41ab365b892d6
kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 918aa8fe2dddd5b0e39fdda928d1ac11
kernel-source-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: a5eed15aec5410d0fe7969cf6822cf8d
kernel-unsupported-2.4.21-15.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: e5ed73b33fec640983b6291d5563e72e
kernel-unsupported-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: d94b403c362b2a4c3f6f1b4cdb3eb6f5
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
kernel-2.4.21-15.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: b698c83996f9e178a2328a6819ac5351
 
IA-32:
kernel-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: ccad3e4dbb561cca63badec7b6317163
kernel-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: f1cdb8023f0074a870c02e238feacd48
kernel-BOOT-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4292218598ef0d169b10a5b9c248b121
kernel-doc-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 496f073081daeb065744999269ebe0ff
kernel-hugemem-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 47246b48fcda4741cd7c74a16cef1f1e
kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1980c6ef8defadedbb591c1fb91cb710
kernel-smp-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2edfe3398e83c4dbb5ac47a9514a253f
kernel-smp-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 01a1577e4a501ce6db3879d3cc5134de
kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: f6ff7ea30964f4960bb85e17cda3085e
kernel-smp-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: aa7535be656bf89f60c8a01bf347b12c
kernel-source-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 003856a5f02c9e33124b6f8cba7eee3c
kernel-unsupported-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2740555623bc674229d0336ac9e10a84
kernel-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 53da49b7178bdcba6d849aa2da30037d
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
kernel-2.4.21-15.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: b698c83996f9e178a2328a6819ac5351
 
IA-32:
kernel-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: ccad3e4dbb561cca63badec7b6317163
kernel-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: f1cdb8023f0074a870c02e238feacd48
kernel-BOOT-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4292218598ef0d169b10a5b9c248b121
kernel-doc-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 496f073081daeb065744999269ebe0ff
kernel-hugemem-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 47246b48fcda4741cd7c74a16cef1f1e
kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1980c6ef8defadedbb591c1fb91cb710
kernel-smp-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2edfe3398e83c4dbb5ac47a9514a253f
kernel-smp-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 01a1577e4a501ce6db3879d3cc5134de
kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: f6ff7ea30964f4960bb85e17cda3085e
kernel-smp-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: aa7535be656bf89f60c8a01bf347b12c
kernel-source-2.4.21-15.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 003856a5f02c9e33124b6f8cba7eee3c
kernel-unsupported-2.4.21-15.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2740555623bc674229d0336ac9e10a84
kernel-unsupported-2.4.21-15.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 53da49b7178bdcba6d849aa2da30037d
 
IA-64:
kernel-2.4.21-15.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 66352bf4f48daf50de4727f515a6c59c
kernel-doc-2.4.21-15.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8b00b405e53a2de14167ddf7826d3c2c
kernel-source-2.4.21-15.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 93733a4a47b8303a6e34c50f31a840d3
kernel-unsupported-2.4.21-15.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: c5d55c5fb6ac3642fe3ddf1110e84b20
 
x86_64:
kernel-2.4.21-15.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7e0980daf431587d541d42ce7e9ed1aa
kernel-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3b4b32cbaf79bbb8347a46a55e3f567b
kernel-doc-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7e23eb4b2dae89277af9158f4d060d15
kernel-smp-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6c2bef2ec68fc88fb4e41ab365b892d6
kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 918aa8fe2dddd5b0e39fdda928d1ac11
kernel-source-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: a5eed15aec5410d0fe7969cf6822cf8d
kernel-unsupported-2.4.21-15.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: e5ed73b33fec640983b6291d5563e72e
kernel-unsupported-2.4.21-15.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: d94b403c362b2a4c3f6f1b4cdb3eb6f5
 

Bugs fixed (see bugzilla for more information)

102194 - Disk READ performance worse compared with 2.4.20-18.9smp
103706 - Some numerical values in /proc/partitions file becomes an unusual value.
104084 - ctc interface unexpectedly dies
104444 - RHEL3 U2: Syscall Auditing Support
104633 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1.
104634 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1.
104636 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1.
106111 - RHEL 3 U2: Only one CPU is initialized in a Hypthreading enabled Intel ICH5 platform.
106219 - raid level 1 disk failures
106334 - RHEL 3 - U2 -Qlogic FAStT Fibre driver 6.05 or later
106396 - Hardware crypto support
106402 - LTC4736 - PTS: Kernel Panic during mutex contention test.
106503 - ia64 kernel stops allocating memory too early when overcommit_memory set to strict
106584 - 'cp -p' returns error when destination is an nfs directory
106870 - RHEL 3 AS/IPF/QU1: Qlogic qla2300 6.06.50
106890 - RHEL 3 U2: preserve_argv0 patch missing - IPF x86 compat.
106894 - RHEL 3, U2: IA32 feat: new microcode update format sup. (Prescott/Nocona)
106969 - Random stall during boot-up
107330 - NC6770 adapter fails to regain connection after lost link
107331 - (tg3) Jumbo Frames w/bonding fails on NC7771 and Red Hat EL 3 RC1 respin
107744 - RHEL3 Update1: ia32 on ia64 syscall table
107864 - Data corruption in iozone benchmark
107915 - binfmt_misc.o is a part of kernel-unsupported - x86 compat on IPF
108958 - MINSIGSTKSZ mismatch between ia32 and ia64
109242 - LTC5267 - Network degradation as runs progress in specweb99
109618 - 3ware raid extremely low throughput
109660 - op_time no samples files found
109843 - Typo in module parameter of scsi_mod module
109914 - PATCH: LTC5351-Large external array causes SIGILL in 32-bit
110170 - [PATCH] LTC5381- rhel 3 will need to pick up the cyclone-lpj-fix patch
110633 - iptables ipt_limit module fails on ppc (iserie) RS64-IV RHEL3
110716 - RHEL 3 - U2 - JS30 Blade - kernel enablement
110849 - zcrypt update to 06-11 and up
110872 - System Hangs after 5-10 minutes with USB attached
110999 - clock is running to fast on IBM x445
111250 - tg3 driver fails to autonegotiate correctly
111264 - ada compiler crashes on even hello-world
111287 - [PATCH] alternate signal stack bug corrupts RNaT bits
111403 - [PATCH] LTC3766 - pthreads/NPTL problems with large memory processes
111446 - hang in RHEL 3 pthreads library
111629 - ACL over NFS problem
111673 - RHEL 3 U2 - ServeRAID update for IA64 fixes
111681 - Invalid ICMP type 11 messages echo'd to console
111768 - /proc/pid/statm can return negative values
111774 - [PATCH] HP cciss driver bug fix
111853 - [PATCH] cciss hba pointer may be null when trying to release I/O memory
111854 - [PATCH] need to enable prefetch on HP 64xx controllers
111855 - [PATCH] problems hot plugging older cciss controllers
111856 - [PATCH] cciss driver may panic system when sharing IRQ's
111858 - [PATCH] cciss may display #blocks as a negative value
111903 - [PATCH] oops in IUCV code
111911 - avoid hang during initialization on I/O errors
111968 - Allow async read/write to propagate down to transports that support async
112006 - [PATCH] BUG() from __remove_inode_page
112025 - SMP kernels parsing of AICP tables limited - breaks hyperthreading
112039 - RHEL 3 U2: Qlogic qla2300 driver version 6.07.++
112040 - RHEL 3 U2: Update cciss driver to 2.4.50
112057 - RHEL3 U2: update megaraid2 to version 2.10.x
112103 - RHEL3 U2: IA32 core dump support on IPF
112111 - RHEL 3 U2: ICH6 PATA support
112139 - RHEL 3 U2: update cciss driver (new funct/bug fixes) to 2.4.50
112163 - RHEL 3 U2 - Update e1000
112190 - Duplicate get_partition_list bug to track Bugzilla 111342 in Taroon -
112288 - [PATCH] ICMPv6 error message contains incorrect original packet's data.
112359 - RHEL 3.0 using v6.06.00b11 driver attached to McData switch doesn't log in or scan devices successfully.
112363 - NC7722 when using the TG3 driver has no active link Th established
112449 - (TG3) driver doesn't work properly with bcm5700 nic
112584 - reservation error code, corrupts request queue
112607 - aironet driver fixes
112646 - defunct processes whose parent process is 'init' are created.
112724 - kernel hang when unmap a hugetlb vma
112764 - RHEL3 kernel not preventing or recovering from fork bomb when ulimit used
112826 - LTC5732 - MMIO alignment error when inserting the olympic TR module.
113034 - RHEL 3 U2: Merge IBM IPR driver into main kernel RPM
113051 - [PATCH] LTC5757 - RHEL3 update 2 RAS patches - rtas syscall and os-term
113052 - [PATCH] LTC5758 - /proc/ppc64/lparcfg file missing in RHEL 3
113071 - [PATCH] RHEL3 ia64: 32 bit applications don't dump core properly
113072 - [PATCH] RHEL3/ia64: strace -f on multithreaded 32 bit applications doesn't work
113099 - CAN-2003-0461 /proc reveals char count
113100 - CAN-2003-0465 kernel strncpy padding
113103 - CAN-2003-0984 minor /dev/rtc leak
113105 - Al-Viro kmod local DoS
113171 - lousy read performance on megaraid with 2.4.21-4.0.2.EL
113213 - kernel crashes when unmap_kvec() is called in interrupt context
113328 - RHEL 3 - U2 ACPI support for multiple IDE devices (x455)
113341 - netdump - various race conditions that lead to hangs in panic()/die()
113413 - too many ipv6 aliases cause kernel oops
113561 - Patch for BLIST_SPARSELUN in scsi_scan.c
113604 - CAN-2004-0003 r128 DRI
113737 - [PATCH] sym53c8xx.c - odd byte tape fix
113738 - [PATCH] updated megaraid2 driver (2.10.1)
113739 - [PATCH] updated mptfusion driver (2.05.11)
113809 - depmod is not run for kernel-2.4.21-9.EL from Quaterly Update #1
113890 - [PATCH] Excutable compiled on x86 can cause kernel seg fault on x86_64
114052 - Raw device performance poor under WS 3 Dreamworks IT#29689
114135 - LSI Megaraid(2) performance subpar in RHEL3, using RHEL3 kernel
114137 - RHEL3 U2: patch for sym53c8xx.c to address odd byte tape fix
114356 - USB keyboard/mouse don\'t work on upcoming Dell servers
114529 - RHEL3: [PATCH] Inclusion of Handspring Treo patch into next kernel release
114553 - Bad performance with Q1 update kernel (-9EL)
114560 - zfcp updates for RHEL3 U2
114588 - [PATCH] don't serialize NFS direct writes
114773 - Panic in elf_core_copy_regs() core dumping ia32 binary
114869 - date returns future year of 586562
114873 - RHEL3 U2: softirq interrupt deferral patch
114874 - RHEL 2.1 U4 and RHEL 3 U2 - e1000 fix for SOL
114940 - RHEL 3.0 default QLogic driver v6.06.00b11 spews sg_low_free and QUEUE FULL messages at load time.
114942 - Running I/O on RHEL 3.0 and using the v6.06.00b11 driver, the driver ran out of memory and began arbitrarily killing processes.
115072 - Lack of file close processing for O_DIRECT unsupported filesystem in dentry_open()
115231 - RHEL 3_U2 Adds new processor support
115273 - bad disk I/O performance with the 2.4.21-4.ELsmp kernel
115334 - Suspected VM problem causes gradual Tux performance degradation
115390 - Kernel panic and/or EXT3-fs corruption running sysreport on rx7620
115438 - strange load - kswapd/IO ?
115439 - LTC5321-Cannot enable quota on RHEL 3 for ppc64
115823 - CAN-2004-0010 ncpfs hole (unsupported)
116261 - RHEL3 kernel specfile for s390* should require minimum version of s390utils
116916 - tg3 driver doesn't support bonding driver's ALB mode
117454 - /proc/cpuinfo has bad info on ia32e
117741 - P4 2.8ghz HT, Using RHEL WS 3.0 Update 1, latest SMP Kernel, see only 1 CPU
117914 - RHEL3 U3: Handspring Treo ID
117941 - frequent kernel panics
118109 - System hangs while running stress tests with hugetlbfs on hugemem kernel
118397 - system needlessly thrashing swap partition
118494 - updates to scsi_scan.c (RHEL3 U2 alpha)
118556 - MTRRs not initialized correctly
118647 - kswapd in state R and D load constant at 1+
118882 - Machine doesn't boot SMP Kernel after installation
118885 - [PATCH] kernel panics when removing expired IPsec SAs
118974 - stack overflows during ACPI initialization
118980 - option \'acpi=off\' not working correctly
119009 - Kernel panic occurs when trying to install RHEL 3 U2 B2 for AMD64
119174 - /proc/cpuinfo vendor_id is wrong. shows $
119234 - RHEL3 U2 beta1 hard locks on Celcius 810v
119545 - kernel module binfmt_misc missing
119638 - Can't set speed/duplex on tg3 fiber interfaces
119903 - nfs peformance very bad on EL3
120232 - [x86_64] Crash on install disc boot without newly-required noapictimers
120341 - Runaway processes with USB console on Blade Center
121856 - LTC7932-Kernel Panic with TCE allocation failure w/ Qlogic queue depth issue
122077 - servers freeze (only respond to ping and sysrq) periodically


References


Keywords

kernel, taroon, update


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/