RHEL 2.1 : kernel (RHSA-2002:227)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

This kernel update for Red Hat Linux Advanced Server 2.1 addresses
some security issues and provides minor bug fixes.

The Linux kernel handles the basic functions of the operating system.
A number of vulnerabilities were found in the Red Hat Linux Advanced
Server kernel. These vulnerabilities could allow a local user to
obtain elevated (root) privileges.

The vulnerabilities existed in a number of drivers, including stradis,
rio500, se401, apm, usbserial, and usbvideo.

Additionally, a number of bugs have been fixed, and some small feature
enhancements have been added.

- Failed READA requests could be interpreted as I/O errors
under high load on SMP
this has been fixed.

- In rare cases, TLB entries could be corrupted on SMP
Pentium IV systems
this potential for corruption has
been fixed. Third-party modules will need to be
recompiled to take advantage of these fixes.

- The latest tg3 driver fixes have been included
the tg3
driver now supports more hardware.

- A mechanism is provided to specify the location of core
files and to set the name pattern to include the UID,
program, hostname, and PID of the process that caused
the core dump.

A number of SCSI fixes have also been included :

- Configure sparse LUNs in the qla2200 driver - Clean up
erroneous accounting data as seen by /proc/partitions
and iostat - Allow up to 128 scsi disks - Do not start
logical units that require manual intervention, avoiding
unnecessary startup delays - Improve SCSI layer
throughput by properly clustering DMA requests

All users of Red Hat Linux Advanced Server are advised to upgrade to
the errata packages.

See also :

https://www.redhat.com/security/data/cve/CVE-2002-1572.html
https://www.redhat.com/security/data/cve/CVE-2002-1573.html
http://rhn.redhat.com/errata/RHSA-2002-227.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12330 ()

Bugtraq ID:

CVE ID: CVE-2002-1572
CVE-2002-1573