RHSA-2002_128

Vulnerability from csaf_redhat - Published: 2002-07-16 15:57 - Updated: 2024-11-21 22:24
Summary
Red Hat Security Advisory: Updated kernel with information security fixes, bug fixes, and updated drivers

Notes

Topic
This kernel update is available for Red Hat Linux Advanced Server 2.1. It includes a fix for an information security bug, various kernel bug fixes, and updated device drivers. [2002-07-29] This release is a rebuild for adding exported symbols for Veritas.
Details
This kernel fixes an information security bug. When running enterprise kernels previous to version 2.4.9-e.8, information in the Intel SSE XMM registers could "leak" between processes under certain circumstances. This update also includes fixes for the following bugs: - Creation of an Oracle SGA greater than 8 GB on 16 GB or greater machine when using bigpages and shmfs - Sendmail running out of flocks - Unreliable rebooting with the "reboot=bios" boot option - Potential memory corruption on systems with more than 4 GB - An AIO write deadlock - IOAPIC warnings on one platform - Potentially miscompiled code in xor.h (though kernel engineering research does not indicate that our compiler miscompiles this code) This kernel also has extra exported symbols removed. This new kernel also includes several updated device drivers. The aic7xxx_mod driver has been updated to a new version, fixing several bugs, the tg3 driver has also been updated to a new version to fix various bugs, and the qla2300 driver has some small bug fixes and has been updated to work with the QLogic 2340 HBA and PowerVault 660F arrays. Additions to the SCSI LUNs "white list" have also been made to support more fibre channel arrays. [2002-07-29] This new kernel is a rebuild for adding exported symbols for Veritas.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "This kernel update is available for Red Hat Linux Advanced Server 2.1.\n\nIt includes a fix for an information security bug, various kernel bug\nfixes, and updated device drivers.\n\n[2002-07-29] This release is a rebuild for adding exported symbols for Veritas.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This kernel fixes an information security bug. When running enterprise\nkernels previous to version 2.4.9-e.8, information in the Intel SSE XMM\nregisters could \"leak\" between processes under certain circumstances.\n\nThis update also includes fixes for the following bugs:\n\n- Creation of an Oracle SGA greater than 8 GB on 16 GB or greater machine\n  when using bigpages and shmfs \n- Sendmail running out of flocks\n- Unreliable rebooting with the \"reboot=bios\" boot option\n- Potential memory corruption on systems with more than 4 GB \n- An AIO write deadlock \n- IOAPIC warnings on one platform \n- Potentially miscompiled code in xor.h (though kernel engineering\n  research does not indicate that our compiler miscompiles this code)\n\nThis kernel also has extra exported symbols removed.\n\nThis new kernel also includes several updated device drivers. The\naic7xxx_mod driver has been updated to a new version, fixing several\nbugs, the tg3 driver has also been updated to a new version to fix various\nbugs, and the qla2300 driver has some small bug fixes and has been updated\nto work with the QLogic 2340 HBA and PowerVault 660F arrays.  Additions to\nthe SCSI LUNs \"white list\" have also been made to support more fibre\nchannel arrays.\n\n[2002-07-29] This new kernel is a rebuild for adding exported symbols for\nVeritas.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2002:128",
        "url": "https://access.redhat.com/errata/RHSA-2002:128"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "59894",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=59894"
      },
      {
        "category": "external",
        "summary": "60903",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=60903"
      },
      {
        "category": "external",
        "summary": "60944",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=60944"
      },
      {
        "category": "external",
        "summary": "61579",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=61579"
      },
      {
        "category": "external",
        "summary": "64394",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=64394"
      },
      {
        "category": "external",
        "summary": "66535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=66535"
      },
      {
        "category": "external",
        "summary": "66966",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=66966"
      },
      {
        "category": "external",
        "summary": "67167",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=67167"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2002/rhsa-2002_128.json"
      }
    ],
    "title": "Red Hat Security Advisory: Updated kernel with information security fixes, bug fixes, and updated drivers",
    "tracking": {
      "current_release_date": "2024-11-21T22:24:30+00:00",
      "generator": {
        "date": "2024-11-21T22:24:30+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2002:128",
      "initial_release_date": "2002-07-16T15:57:00+00:00",
      "revision_history": [
        {
          "date": "2002-07-16T15:57:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2002-06-25T00:00:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-21T22:24:30+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
                "product": {
                  "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
                  "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Advanced Server"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2002-1571",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1616925"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The linux 2.4 kernel before 2.4.19 assumes that the fninit instruction clears all registers, which could lead to an information leak on processors that do not clear all relevant SSE registers.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 "
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2002-1571"
        },
        {
          "category": "external",
          "summary": "RHBZ#1616925",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616925"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1571",
          "url": "https://www.cve.org/CVERecord?id=CVE-2002-1571"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1571",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1571"
        }
      ],
      "release_date": "2002-04-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2002-07-16T15:57:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is available via Red Hat Network.  To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 "
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2002:128"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…