errata kernel 2.4.18-19* fixes ext3 data-journaling data loss and tg3 hang

Matt_Domsch@Dell.com Matt_Domsch at Dell.com
Fri Dec 20 13:06:00 CST 2002


(I haven't tested this myself yet, but RH says it's fixed, so I'm letting
you know ASAP.  Use RHN to update.  Happy Holidays! -Matt)

New kernel fixes ext3 data-journaling data loss and tg3 hang

Advisory: RHBA-2002:292-05 
Last updated on: 2002-12-20 
Affected Products: Red Hat Linux 7.1
			 Red Hat Linux 7.2
			 Red Hat Linux 7.3
			 Red Hat Linux 8.0 

   Bug Fix Advisory 

Details:

Updated packages for Red Hat Linux 7.1, 7.1K, 7.2, 7.3, and 8.0 are now
available that fix a bug in the ext3 file system discovered in the previous
errata kernel. The bug has the potential to cause data loss if the file
system is used in a non-default way.

The Linux kernel handles the basic functions of the operating system.

A bug in the ext3 file system in the previous errata kernel for Red Hat
Linux 7.1, 7.1K, 7.2, 7.3, and 8.0 has been discovered. The bug has the
potential to cause data loss if the file system is used in the non-default
"full data journaling" mode.

The bug affects only filesystems mounted with the following option:

mount -o data=journal

If you have not set the above option then you are not vulnerable. If you do
not know if you have set that option or not then you are not vulnerable, as
no standard system software will set this option by default. You can check
what default options are in use for a particular file system by looking in
the system's /etc/fstab file.

The bug can only result in the loss of recent writes when a file system is
unmounted. Proper synchronization of the data on disk in the event of a
crash (the primary aim of a journaling file system such as ext3) is not
affected by this bug.

In addition, a lockup bug has been fixed in the tg3 gigabit Ethernet driver
that affects all multiprocessor systems using this controller.

All users of Red Hat Linux 7.1, 7.1K, 7.2, 7.3, and 8.0 should upgrade to
these errata packages which are not vulnerable to these issues.



Updated packages:

Red Hat Linux 7.1 

----------------------------------------------------------------------------
----
 
SRPMS: 
kernel-2.4.18-19.7.x.src.rpm     86327b416ffe5044e37224856b8539ba 
  
athlon: 
kernel-2.4.18-19.7.x.athlon.rpm     9d8fd331ddebbe0645d75346ac1491e9 
kernel-smp-2.4.18-19.7.x.athlon.rpm     44979c3375d4336fb910ee972e7e5fe8 
  
i386: 
kernel-2.4.18-19.7.x.i386.rpm     efe13b3bab5727184a7d964ec4738ab5 
kernel-BOOT-2.4.18-19.7.x.i386.rpm     3c30ff303b9d3bf37ca01f122ec31f90 
kernel-doc-2.4.18-19.7.x.i386.rpm     76e4201eb49a6aa649b95412cf5ad386 
kernel-source-2.4.18-19.7.x.i386.rpm     4d5d7ecb725cce5e584e06dbc1f47446 
  
i586: 
kernel-2.4.18-19.7.x.i586.rpm     52e49954d29b80088367803c07ffe691 
kernel-smp-2.4.18-19.7.x.i586.rpm     2d67a32f8751c2f0a566713713f0c017 
  
i686: 
kernel-2.4.18-19.7.x.i686.rpm     317c4f5d39e85212b3d5abe0e445adf3 
kernel-bigmem-2.4.18-19.7.x.i686.rpm     477b444a8b867180a232e193bf8bd65b 
kernel-debug-2.4.18-19.7.x.i686.rpm     67aeeae8544b2ea104d49e2acaeb9f52 
kernel-smp-2.4.18-19.7.x.i686.rpm     cb1a02fbd0f8ae460e26e978f6b80ddc 
  
Red Hat Linux 7.2 

----------------------------------------------------------------------------
----
 
SRPMS: 
kernel-2.4.18-19.7.x.src.rpm     86327b416ffe5044e37224856b8539ba 
  
athlon: 
kernel-2.4.18-19.7.x.athlon.rpm     9d8fd331ddebbe0645d75346ac1491e9 
kernel-smp-2.4.18-19.7.x.athlon.rpm     44979c3375d4336fb910ee972e7e5fe8 
  
i386: 
kernel-2.4.18-19.7.x.i386.rpm     efe13b3bab5727184a7d964ec4738ab5 
kernel-BOOT-2.4.18-19.7.x.i386.rpm     3c30ff303b9d3bf37ca01f122ec31f90 
kernel-doc-2.4.18-19.7.x.i386.rpm     76e4201eb49a6aa649b95412cf5ad386 
kernel-source-2.4.18-19.7.x.i386.rpm     4d5d7ecb725cce5e584e06dbc1f47446 
  
i586: 
kernel-2.4.18-19.7.x.i586.rpm     52e49954d29b80088367803c07ffe691 
kernel-smp-2.4.18-19.7.x.i586.rpm     2d67a32f8751c2f0a566713713f0c017 
  
i686: 
kernel-2.4.18-19.7.x.i686.rpm     317c4f5d39e85212b3d5abe0e445adf3 
kernel-bigmem-2.4.18-19.7.x.i686.rpm     477b444a8b867180a232e193bf8bd65b 
kernel-debug-2.4.18-19.7.x.i686.rpm     67aeeae8544b2ea104d49e2acaeb9f52 
kernel-smp-2.4.18-19.7.x.i686.rpm     cb1a02fbd0f8ae460e26e978f6b80ddc 
  
Red Hat Linux 7.3 

----------------------------------------------------------------------------
----
 
SRPMS: 
kernel-2.4.18-19.7.x.src.rpm     86327b416ffe5044e37224856b8539ba 
  
athlon: 
kernel-2.4.18-19.7.x.athlon.rpm     9d8fd331ddebbe0645d75346ac1491e9 
kernel-smp-2.4.18-19.7.x.athlon.rpm     44979c3375d4336fb910ee972e7e5fe8 
  
i386: 
kernel-2.4.18-19.7.x.i386.rpm     efe13b3bab5727184a7d964ec4738ab5 
kernel-BOOT-2.4.18-19.7.x.i386.rpm     3c30ff303b9d3bf37ca01f122ec31f90 
kernel-doc-2.4.18-19.7.x.i386.rpm     76e4201eb49a6aa649b95412cf5ad386 
kernel-source-2.4.18-19.7.x.i386.rpm     4d5d7ecb725cce5e584e06dbc1f47446 
  
i586: 
kernel-2.4.18-19.7.x.i586.rpm     52e49954d29b80088367803c07ffe691 
kernel-smp-2.4.18-19.7.x.i586.rpm     2d67a32f8751c2f0a566713713f0c017 
  
i686: 
kernel-2.4.18-19.7.x.i686.rpm     317c4f5d39e85212b3d5abe0e445adf3 
kernel-bigmem-2.4.18-19.7.x.i686.rpm     477b444a8b867180a232e193bf8bd65b 
kernel-debug-2.4.18-19.7.x.i686.rpm     67aeeae8544b2ea104d49e2acaeb9f52 
kernel-smp-2.4.18-19.7.x.i686.rpm     cb1a02fbd0f8ae460e26e978f6b80ddc 
  
Red Hat Linux 8.0 

----------------------------------------------------------------------------
----
 
SRPMS: 
kernel-2.4.18-19.8.0.src.rpm     267b0b285a404f88b1077f74f3f8b087 
  
athlon: 
kernel-2.4.18-19.8.0.athlon.rpm     e3efdafbc4a878ca4930a027bba51191 
kernel-smp-2.4.18-19.8.0.athlon.rpm     50e04086cd86759a1a23d20353d9f3d1 
  
i386: 
kernel-2.4.18-19.8.0.i386.rpm     1f4116968e3d19beb3eef66f469a22c3 
kernel-BOOT-2.4.18-19.8.0.i386.rpm     25e5f7af21e8e61abcacdb0e8ac19887 
kernel-doc-2.4.18-19.8.0.i386.rpm     3ca236d30ee2cd0cb03b7f3aa632beb5 
kernel-source-2.4.18-19.8.0.i386.rpm     cd33fcc13c559e44a2d63ce0e8135e9c 
  
i586: 
kernel-2.4.18-19.8.0.i586.rpm     44ed0423f3fdd79ced915d84428bc309 
kernel-smp-2.4.18-19.8.0.i586.rpm     67c22541c0843c49fb08f8b5db0d9e33 
  
i686: 
kernel-2.4.18-19.8.0.i686.rpm     6c919d27d0cd32edc55817b985556e45 
kernel-bigmem-2.4.18-19.8.0.i686.rpm     d8877ee3f7e14e61945ae52a40a0bcb8 
kernel-debug-2.4.18-19.8.0.i686.rpm     0e2bf3556095dc331c64b1739c89447a 
kernel-smp-2.4.18-19.8.0.i686.rpm     7423a243cfc87edb45e16349118bdd7f 
kernel-uml-2.4.18-19.8.0.i686.rpm     a68edfb4f4f8ecede9d96c0a347bad13 
  

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied, especially the additional
packages from RHSA-2002:205 and RHSA-2002:206 respectively.

The procedure for upgrading the kernel manually is documented at:

http://www.redhat.com/support/docs/howto/kernel-upgrade/

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.



References:

http://news.com.com/2100-1001-976427.html?tag=fd_top 



Keywords:

data=journal, ext3, tg3 



----------------------------------------------------------------------------
----
The listed packages are GPG signed by Red Hat, Inc. for security. Our key is
available at:
http://www.redhat.com/solutions/security/news/publickey.html#key 
You can verify each package and see who signed it with the following
command:

rpm --checksig -v filename 
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:

md5sum filename 
Note that you need RPM >= 3.0 to check GnuPG keys. 

The Red Hat security contact is security at redhat.com. More contact details at
http://www.redhat.com/solutions/security/news/contact.html
 
 


  Copyright © 2002 Red Hat, Inc. All rights reserved. Search by Google
Careers at Red Hat : Legal statement : Privacy statement : Your Account :
Credits : Contact Red Hat


--
Matt Domsch
Sr. Software Engineer, Lead Engineer, Architect
Dell Linux Solutions www.dell.com/linux
Linux on Dell mailing lists @ http://lists.us.dell.com





More information about the Linux-PowerEdge mailing list