-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Begin forwarded message:

Date: Sat, 16 Nov 2002 16:37:07 -0500
From: Red Hat Network Alert <[EMAIL PROTECTED]>
To: thadphole <[EMAIL PROTECTED]>
Subject: RHN Errata Alert: New kernel fixes local denial of service
issue



Red Hat Network has determined that the following advisory is applicable
to
one or more of the systems you have registered:

Complete information about this errata can be found at the following
location:
     https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1309

Security Advisory - RHSA-2002:262-07
- -----------------------------------------------------------------------
- -------
Summary:
New kernel fixes local denial of service issue

The kernel in Red Hat Linux 7.1, 7.1K, 7.2, 7.3, and 8.0 are vulnerable
to a local denial of service attack.  Updated packages are available
which address this vulnerability, as well as bugs in several drivers.

Description:
The Linux kernel handles the basic functions of the operating system.
A vulnerability in the Linux kernel has been discovered in which a
non-root user can cause the machine to freeze. This kernel addresses the
vulnerability.  

Note: This bug is specific to the x86 architecture kernels only, and
does not affect ia64 or other architectures.

In addition, a bug in the maestro3 soundcard driver has been fixed as
well as a bug in the xircom pcmcia driver network driver and the tg3
network driver for Broadcom gigabit ethernet chips.

All users of Red Hat Linux 7.1, 7.1K, 7.2, 7.3, and 8.0 should upgrade
to these errata packages, which are not vulnerable to this issue.

Thanks go to Christopher Devine for reporting the vulnerability on
bugtraq, and Petr Vandrovec for being the first to supply a fix to the
community.

References:
http://online.securityfocus.com/archive/1/299687/2002-11-11/2002-11-17/0
- -----------------------------------------------------------------------
- -------

- -------------
Taking Action
- -------------
You may address the issues outlined in this advisory in two ways:

     - select your server name by clicking on its name from the list
       available at the following location, and then schedule an
       errata update for it:
           https://rhn.redhat.com/network/systemlist/system_list.pxt

     - run the Update Agent on each affected server.


- ---------------------------------
Changing Notification Preferences
- ---------------------------------
To enable/disable your Errata Alert preferences globally please log in
to RHN and navigate from "Your RHN" / "Your Account" to the
"Preferences" tab.

        URL: https://rhn.redhat.com/network/my_account/my_prefs.pxt

You can also enable/disable notification on a per system basis by
selecting an
individual system from the "Systems List". From the individual system
view
click the "Details" tab.


- ----------------
Affected Systems
- ----------------
According to our records, this errata may apply to one or more of the 
systems that you've profiled with Red Hat Network.  To see precisely
which systems are affected, please go to:
    https://rhn.redhat.com/network/errata/systems_affected.pxt?eid=1309



The Red Hat Network Team

This message is being sent by Red Hat Network Alert to:
    RHN user login:        thadphole
    Email address on file: <[EMAIL PROTECTED]>

If you lost your RHN password, you can use the information above to
retrieve it by email from the following address:
    https://rhn.redhat.com/forgot_password.pxt

To cancel these notices, go to:
    https://rhn.redhat.com/oo.pxt?uid=703886&oid=1052072
    




- -->neal;0)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE91vilV3liqjD7b74RAphSAJ4gGiuh08uWWvE5ue/77YHbTVuEKwCfaaDx
Ty1tqv8vsqBBeUPO3ztzEdg=
=8v0A
-----END PGP SIGNATURE-----
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

Fully Searchable Archives With Friendly Web Interface at http://marc.free.net.ph

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to