-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4 Advisory ID: RHSA-2006:0575-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0575.html Issue date: 2006-08-10 Updated on: 2006-08-10 Product: Red Hat Enterprise Linux Keywords: nahant kernel update Obsoletes: RHSA-2006:0574 CVE Names: CVE-2005-3055 CVE-2005-3623 CVE-2006-0038 CVE-2006-0456 CVE-2006-0457 CVE-2006-0742 CVE-2006-1052 CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-1857 CVE-2006-2275 CVE-2006-2446 CVE-2006-2448 CVE-2006-2934 - ---------------------------------------------------------------------
1. Summary:
Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 4.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The Linux kernel handles the basic functions of the operating system.
This is the fourth regular update to Red Hat Enterprise Linux 4.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64
3. Problem description:
New features introduced in this update include:
* Device Mapper mirroring support
* IDE diskdump support
* x86, AMD64 and Intel EM64T: Multi-core scheduler support enhancements
* Itanium: perfmon support for Montecito
* much improved support for IBM x460
* AMD PowerNow! patches to support Opteron Rev G
* Vmalloc support > 64MB
The following device drivers have been upgraded to new versions:
ipmi: 33.11 to 33.13 ib_mthca: 0.06 to 0.08 bnx2: 1.4.30 to 1.4.38 bonding: 2.6.1 to 2.6.3 e100: 3.4.8-k2-NAPI to 3.5.10-k2-NAPI e1000: 6.1.16-k3-NAPI to 7.0.33-k2-NAPI sky2: 0.13 to 1.1 tg3: 3.43-rh to 3.52-rh ipw2100: 1.1.0 to git-1.1.4 ipw2200: 1.0.0 to git-1.0.10 3w-9xxx: 2.26.02.001 to 2.26.04.010 ips: 7.10.18 to 7.12.02 iscsi_sfnet: 4:0.1.11-2 to 4:0.1.11-3 lpfc: 0:8.0.16.18 to 0:8.0.16.27 megaraid_sas: 00.00.02.00 to 00.00.02.03-RH1 qla2xxx: 8.01.02-d4 to 8.01.04-d7 qla6312: 8.01.02-d4 to 8.01.04-d7 sata_promise: 1.03 to 1.04 sata_vsc: 1.1 to 1.2 ibmvscsic: 1.5.5 to 1.5.6 ipr: 2.0.11.1 to 2.0.11.2
Added drivers:
dcdbas: 5.6.0-2 sata_mv: 0.6 sata_qstor: 0.05 sata_uli: 0.5 skge: 1.1 stex: 2.9.0.13 pdc_adma: 0.03
This update includes fixes for the security issues:
* a flaw in the USB devio handling of device removal that allowed a local user to cause a denial of service (crash) (CVE-2005-3055, moderate)
* a flaw in the ACL handling of nfsd that allowed a remote user to bypass ACLs for readonly mounted NFS file systems (CVE-2005-3623, moderate)
* a flaw in the netfilter handling that allowed a local user with CAP_NET_ADMIN rights to cause a buffer overflow (CVE-2006-0038, low)
* a flaw in the IBM S/390 and IBM zSeries strnlen_user() function that allowed a local user to cause a denial of service (crash) or to retrieve random kernel data (CVE-2006-0456, important)
* a flaw in the keyctl functions that allowed a local user to cause a denial of service (crash) or to read sensitive kernel memory (CVE-2006-0457, important)
* a flaw in unaligned accesses handling on Itanium processors that allowed a local user to cause a denial of service (crash) (CVE-2006-0742, important)
* a flaw in SELinux ptrace logic that allowed a local user with ptrace permissions to change the tracer SID to a SID of another process (CVE-2006-1052, moderate)
* an info leak on AMD-based x86 and x86_64 systems that allowed a local user to retrieve the floating point exception state of a process run by a different user (CVE-2006-1056, important)
* a flaw in IPv4 packet output handling that allowed a remote user to bypass the zero IP ID countermeasure on systems with a disabled firewall (CVE-2006-1242, low)
* a minor info leak in socket option handling in the network code (CVE-2006-1343, low)
* a flaw in the HB-ACK chunk handling of SCTP that allowed a remote user to cause a denial of service (crash) (CVE-2006-1857, moderate)
* a flaw in the SCTP implementation that allowed a remote user to cause a denial of service (deadlock) (CVE-2006-2275, moderate)
* a flaw in the socket buffer handling that allowed a remote user to cause a denial of service (panic) (CVE-2006-2446, important)
* a flaw in the signal handling access checking on PowerPC that allowed a local user to cause a denial of service (crash) or read arbitrary kernel memory on 64-bit systems (CVE-2006-2448, important)
* a flaw in the netfilter SCTP module when receiving a chunkless packet that allowed a remote user to cause a denial of service (crash) (CVE-2006-2934, important)
There were several bug fixes in various parts of the kernel. The ongoing effort to resolve these problems has resulted in a marked improvement in the reliability and scalability of Red Hat Enterprise Linux 4.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
141342 - install hangs on Dell PowerVault 745 with SATA drives (sata_vsc module) 149933 - fix missing wakeup in ipc/sem 151981 - udevd fails to create /dev files after misc_register 154984 - Sound Blaster Audigy 2 Value audio does not work 155926 - [RHEL4-U2][Diskdump] OS_INIT dump function is broken 156145 - kernel may oops if more than 4k worth of string data returned in /proc/devices 156663 - Can't install from SATA CD/DVD drive 157404 - Loss of SATA ICH device hangs RAID1 157902 - [PATCH] ata_piix fails on some ICH7 hardware 158989 - snd-nm256 module hangs Dell Latitude CSx 165113 - kernel build broken when 4KSTACKS disabled 165245 - EHCI Host driver violates USB2.0 Specification leading to device failures 166541 - mdadm --grow infinite resync 168285 - No (useful) logging of parameters to execve 169260 - CVE-2005-3055 async usb devio oops 169456 - COMM_LOST problem with SCTP stream socket 169600 - SMP kernel crash when use as LVS router 170143 - rm command hangs when removing a symlink on ext2 loop filesystem 170434 - Deadlock in fc_target_unblock while shutting down the system 171304 - sata_promise: missing PCI ID for SATA300 TX4 171645 - Oops kernel NULL pointer 171740 - ipw2100 modules crashes and restarts whenever in use 172199 - Spurious keyboard repeats and clock is fast 172696 - kernel panic after a few hours/days of operation with pulse 173193 - vmalloc limited to 64Mb 173489 - kernel panics when rebooting 173843 - Kernel panic with this comment: <4>VFS: Busy inodes after unmount. Self-destruct in 5 seconds. Have a nice day... 173895 - Kernel panic on install on 64BG EM64T 174019 - TG3 driver crashes with BCM4704C chipset with heavy traffic 174155 - Documentation mismatch 174470 - RFE: tg3 support for Broadcom 5751 PCIe 174639 - System hangs with kernel panic when using current 3ware drivers 174671 - [PATCH] bonding: don't drop non-VLAN traffic 175616 - [RHEL 4 U2] kernel panic on EM64T with long cmdline args 175763 - misleading overcommit_memory reference in Documentation/filesystems/proc.txt 175778 - Accessing automounted directories can cause a process to hang forever 175854 - [RHEL4-U3] Checking dump partition fails when a swap partition whose size is less than memory size is configured for diskdump. 176107 - sata-nv crashes on multiple SATA disks 176173 - The hash.h hash_long function, when used on a 64 bit machine, ignores many of the middle-order bits. 176361 - io_setup() fails for 32bit tasks in x86-64 176601 - Oprofile unsupported recent Pentium4 176612 - xw6400 System panic while installing RHEL4-U3 177439 - SELinux MLS compatibility 177509 - No i915 DRM module 178084 - Last AIO read of a file opened with O_DIRECT returns wrong length 178720 - O_DIRECT bug when reading last block of sparse file 178845 - RHEL4u4 FEAT: Provide support for Opteron Rev G and Power Now! clean-up 179206 - Please backport the sata_mv Marvell MV88SX5081 driver? 179334 - kernel boot can Oops in work queue code when console blanks 179752 - Request to update lpfc driver in RHEL 4 U4 180028 - deadlocks on ext2,sync mounted fs 180138 - kmir_mon worker thread doesn't exit 180195 - aic7xxx and aic79xx Drivers Don't Support 16-byte CDBs 180568 - typo in spinlock.h? line 407 180621 - ipv6 ready logo-P1 ND Test24 fails- RA Lifetime=5 not understood 180958 - [RHEL4] MCE arg parsing broken on x86-64 181457 - Console redirection on DRAC 3 results in repeated key strokes (P1) 181475 - lpfc driver: add managment ioctl module to kernel tree 181780 - Gettimeofday() timer related slowdown and scaling issue 181793 - add MCP51/ NVidia 430 IDE support 181869 - Error given when duplicate non-updateable key (eg: keyring) added 181870 - Key quota handling incorrect in allocation 181879 - CVE-2006-0457 Key syscalls use get length of strings before copying, and assume terminating NUL copied from userspace 181881 - CVE-2006-0456 s390/s390x strnlen_user() is broken 182137 - NFS lockd recovery is broken in U3 due to missing code. 182684 - [EMC/Oracle RHEL 4.4] ISCSI MODULE SHOWS MULTIPLE DEVICES FOR A SINGLE LUN IN RHEL 4.0 U2 182726 - Possible hang when ptracing and using hugepages 183392 - [RHEL4] [RFE] Add diskdump capability to IDE 183416 - DoS attack possible via nfsservctl 183463 - CVE-2006-0742 Bug in IA64 unaligned access handler causes kernel panic 183661 - ramfs: update dir mtime and ctime 183664 - dm: make sure don't give out the same minor number twice 184208 - Large LUNS can't be seen with Hitachi Open- SAN 184254 - PCI interrupts on ioapic pins 0-15 always get "legacy" IRQs. 184535 - [BETA RHEL4 U3] brokenness in cfq_dispatch_requests 184583 - Kernel should export number and state of local APICs 185043 - CVE-2005-3623 ACL setting on read-only fs 185289 - CVE-2006-1052 SELinux flaw 185431 - kernel dm: bad argument count check in dm-log.c 185444 - kernel dm: missing bdput 185445 - kernel dm: fix free_dev del_gendisk 185447 - kernel dm: flush queued bios if suspend is interrupted 185450 - kernel dm: log bitset fix BE find_next_zero_bit 185454 - kernel device-mapper mirroring: table output incorrect 185455 - kernel dm snapshots: replace siblings list 185456 - kernel dm mirroring: suspend operation is not well behaved 185459 - kernel dm snapshots: fix invalidation 185468 - kernel dm: striped access beyond end of device 185754 - [RHEL4 U3] kernel dm mirror: unrelated mirror devices stall if any log device fails 185782 - [RHEL4 U3] device-mapper mirror: Data corruption if the default mirror fails during recovery. 185785 - [RHEL4 U3] device-mapper mirror: Data corruption by temporal errors during recovery. 185991 - kernel dm: bio split bvec fix 186004 - [RHEL4 U3] device-mapper mirror: Write failure region becomes in-sync when suspension. 186057 - CVE-2006-1242 Linux zero IP ID vulnerability? 186066 - Connectathon tests fail against newer Irix server 186071 - NFSD fails SETCLIENTID_CONFIRM 186104 - kernel dm mirror: lvs Copy% overs 100% by lvreduce/lvresize. 186242 - CVE-2006-1343 Small information leak in SO_ORIGINAL_DST 186295 - CVE-2006-0038 netfilters do_replace() overflow 186316 - nvidia cache aliasing problem: change_page_attr drops GLOBAL bit from executable kernel pages 186564 - ACPI 2.0 systems with no XSDT fail to boot 186751 - kernel problem to deal with 3ware 9500SX-12 RAID cards 187249 - [RHEL4 U3] dm-mirror: read stalls if all mirrors failed 187494 - CVE-2006-2275 SCTP traffic probably never resumes 187498 - diskdump_sysfs_store() needs to check sscanf retval 187500 - diskdump_sysfs_store() should check partition number 187501 - device_to_gendisk() is lacking mntput(nd.mnt) on exit 187502 - diskdump - device_to_gendisk() is both racy 187910 - CVE-2006-1056 FPU Information leak on i386/x86-64 on AMD CPUs 187951 - Replication failover fails if the NFS permissions are incorrect on one of the servers... 188080 - kernel dm snapshots: Incorrect processing of incorrect chunk size 188141 - Kernel appears too conservative in memory use 188296 - tlb_clear_slave races with tlb_choose_channel 188912 - Update Qlogic qla2xxx driver in RHEL 4 U4 189127 - Trouble with recent module - one packet is seen more than one time 189198 - VLAN not working on initial startup 189279 - [Stratus RHEL4 U4 bug] unchecked error path in usb_alloc_dev can lead to an Oops. 189390 - RHEL4-U3: openipmi: startup race condition 189392 - Submit Promise RHEL4 driver in-box to RHEL4 CD 189393 - Submit Promise RHEL4 driver in-box to RHEL4 CD 189397 - Submit Promise RHEL4 driver in-box to RHEL4 CD 189797 - dm: Fix mapped device references 190576 - REGRESSION: kabi breakage on ia64_mv 191138 - CVE-2006-0742 Bug in IA64 unaligned access handler causes kernel panic 191139 - installer does not see SATA HDs attached to JMB360 chipset which in legacy mode 191141 - MCE arg parsing broken on x86-64 191723 - device-mapper mirror: Need proper notification of sync status chage on write failure 191847 - REGRESSION: kernel-2.6.9.36 does not boot on ALTIX systems 192098 - Fix problems with MSI-X on 64-bit platforms 192635 - CVE-2006-1857 SCTP HB-ACK chunk overflow 192779 - CVE-2006-2446 LTC20512-kernel BUG in __kfree_skb while running TCP+Kernel stress 193230 - RFE: add pci ids for atiixp 193696 - Not using all available system memory - swapping too aggressive - high load average (iowait) 193728 - A write to a cluster mirror volume not in sync will hang and also cause the sync to hang as well 193838 - gettimeofday goes backwards on IBM x460 merged servers 194215 - CVE-2006-2448 missing access_ok checks in powerpc signal*.c 194533 - veritas storage foundation 32bit apps crash in glibc during post-process installation 195002 - RHEL4 U4 i386 partner beta will not install on ES7000/one 195254 - HP xw9400 network card not getting seen 195502 - Regression: cluster mirror creation cmd hangs even though mirror gets created 196512 - VLANs, tg3 driver, and 2.6.9-34.EL kernel update 196712 - O=/objdir builds fail for out-of-tree builds with 2.6.9-39.4 197387 - CVE-2006-2934 SCTP netfilter DoS with chunkless packets 198321 - kernel freeze at "kernel BUG at kernel/timer.c:420!" 198892 - kernel deadlock on reading /proc/meminfo on 4 CPU's at the same time
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-42.EL.src.rpm 11a024e010dc8f2e3dbec9f816c8fec5 kernel-2.6.9-42.EL.src.rpm
i386: cba4519a04c6271eafa1ffd5df0708b8 kernel-2.6.9-42.EL.i686.rpm 86bfc2516a07531d321d5f3bf819a67e kernel-debuginfo-2.6.9-42.EL.i686.rpm 5a96a68e49041a8e142a047c7d52d744 kernel-devel-2.6.9-42.EL.i686.rpm 47517050f412936223b130719ae9c7b5 kernel-hugemem-2.6.9-42.EL.i686.rpm a77cef2d88c5df96f26812e9eb66ab95 kernel-hugemem-devel-2.6.9-42.EL.i686.rpm 95cc28bb2c8012a19e1ec8c1f8a1eb1d kernel-smp-2.6.9-42.EL.i686.rpm 896615edeb7d593bf330888da95b8315 kernel-smp-devel-2.6.9-42.EL.i686.rpm
ia64: 3315efa6779b1d00f227adb085a40e15 kernel-2.6.9-42.EL.ia64.rpm 6d49881cf7c5fc87abd1b224a53dd7c9 kernel-debuginfo-2.6.9-42.EL.ia64.rpm bb991f581fc4e61757717c64b7c54bf5 kernel-devel-2.6.9-42.EL.ia64.rpm 9638115a8925655c5f72499d4cf34adf kernel-largesmp-2.6.9-42.EL.ia64.rpm f0f98d3d2d789d3ed98219dcf7567de4 kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm
noarch: 35877d309fcc505f606398f10de3594c kernel-doc-2.6.9-42.EL.noarch.rpm
ppc: d7cb2ee73437c698a1f314f429e0da17 kernel-2.6.9-42.EL.ppc64.rpm 41d0dbfc97d8f31d9b331311fce2e501 kernel-2.6.9-42.EL.ppc64iseries.rpm 2cae20f796673bbd838e6d2d16833c93 kernel-debuginfo-2.6.9-42.EL.ppc64.rpm 5cb483bf9668209f65ca46c00f503cd6 kernel-debuginfo-2.6.9-42.EL.ppc64iseries.rpm 05ee813e788213f4284fa8314c53e255 kernel-devel-2.6.9-42.EL.ppc64.rpm b14cf9cd736dbff98fc96afa96bde9eb kernel-devel-2.6.9-42.EL.ppc64iseries.rpm afbaacfef8016ef3de821df78fb35c29 kernel-largesmp-2.6.9-42.EL.ppc64.rpm 7a49c313c8c49af72245ae539296310f kernel-largesmp-devel-2.6.9-42.EL.ppc64.rpm
s390: 3be376e40170c59099bcac60ae72b230 kernel-2.6.9-42.EL.s390.rpm a6cb721a60628aad7e1ebb84615e1f0a kernel-debuginfo-2.6.9-42.EL.s390.rpm d1b563a510c61c9831f6ad58770d3dc3 kernel-devel-2.6.9-42.EL.s390.rpm
s390x: 9a28d8c9f1c17c49971e530b12c2cf52 kernel-2.6.9-42.EL.s390x.rpm c3ce451e9ea457f9292b5f3c42a9e5cd kernel-debuginfo-2.6.9-42.EL.s390x.rpm f332531af396a8e88cd0365214098ab6 kernel-devel-2.6.9-42.EL.s390x.rpm
x86_64: d9c9139f0fc50387bc687c2ce91be404 kernel-2.6.9-42.EL.x86_64.rpm 0ea6b69c6ee7a24db7f45907bb9e2392 kernel-debuginfo-2.6.9-42.EL.x86_64.rpm ea60a89f3b08289381e8be6e6213f6a0 kernel-devel-2.6.9-42.EL.x86_64.rpm 76868583b4666bfdfd3187f4522be573 kernel-largesmp-2.6.9-42.EL.x86_64.rpm 1bc693d3e3e3f304507cab6c8a498a4d kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm ef31d24cf073aeda4a90094f60641bb6 kernel-smp-2.6.9-42.EL.x86_64.rpm b64aaf4baec4373bde909251bd7924c9 kernel-smp-devel-2.6.9-42.EL.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: kernel-2.6.9-42.EL.src.rpm 11a024e010dc8f2e3dbec9f816c8fec5 kernel-2.6.9-42.EL.src.rpm
i386: cba4519a04c6271eafa1ffd5df0708b8 kernel-2.6.9-42.EL.i686.rpm 86bfc2516a07531d321d5f3bf819a67e kernel-debuginfo-2.6.9-42.EL.i686.rpm 5a96a68e49041a8e142a047c7d52d744 kernel-devel-2.6.9-42.EL.i686.rpm 47517050f412936223b130719ae9c7b5 kernel-hugemem-2.6.9-42.EL.i686.rpm a77cef2d88c5df96f26812e9eb66ab95 kernel-hugemem-devel-2.6.9-42.EL.i686.rpm 95cc28bb2c8012a19e1ec8c1f8a1eb1d kernel-smp-2.6.9-42.EL.i686.rpm 896615edeb7d593bf330888da95b8315 kernel-smp-devel-2.6.9-42.EL.i686.rpm
noarch: 35877d309fcc505f606398f10de3594c kernel-doc-2.6.9-42.EL.noarch.rpm
x86_64: d9c9139f0fc50387bc687c2ce91be404 kernel-2.6.9-42.EL.x86_64.rpm 0ea6b69c6ee7a24db7f45907bb9e2392 kernel-debuginfo-2.6.9-42.EL.x86_64.rpm ea60a89f3b08289381e8be6e6213f6a0 kernel-devel-2.6.9-42.EL.x86_64.rpm 76868583b4666bfdfd3187f4522be573 kernel-largesmp-2.6.9-42.EL.x86_64.rpm 1bc693d3e3e3f304507cab6c8a498a4d kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm ef31d24cf073aeda4a90094f60641bb6 kernel-smp-2.6.9-42.EL.x86_64.rpm b64aaf4baec4373bde909251bd7924c9 kernel-smp-devel-2.6.9-42.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-42.EL.src.rpm 11a024e010dc8f2e3dbec9f816c8fec5 kernel-2.6.9-42.EL.src.rpm
i386: cba4519a04c6271eafa1ffd5df0708b8 kernel-2.6.9-42.EL.i686.rpm 86bfc2516a07531d321d5f3bf819a67e kernel-debuginfo-2.6.9-42.EL.i686.rpm 5a96a68e49041a8e142a047c7d52d744 kernel-devel-2.6.9-42.EL.i686.rpm 47517050f412936223b130719ae9c7b5 kernel-hugemem-2.6.9-42.EL.i686.rpm a77cef2d88c5df96f26812e9eb66ab95 kernel-hugemem-devel-2.6.9-42.EL.i686.rpm 95cc28bb2c8012a19e1ec8c1f8a1eb1d kernel-smp-2.6.9-42.EL.i686.rpm 896615edeb7d593bf330888da95b8315 kernel-smp-devel-2.6.9-42.EL.i686.rpm
ia64: 3315efa6779b1d00f227adb085a40e15 kernel-2.6.9-42.EL.ia64.rpm 6d49881cf7c5fc87abd1b224a53dd7c9 kernel-debuginfo-2.6.9-42.EL.ia64.rpm bb991f581fc4e61757717c64b7c54bf5 kernel-devel-2.6.9-42.EL.ia64.rpm 9638115a8925655c5f72499d4cf34adf kernel-largesmp-2.6.9-42.EL.ia64.rpm f0f98d3d2d789d3ed98219dcf7567de4 kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm
noarch: 35877d309fcc505f606398f10de3594c kernel-doc-2.6.9-42.EL.noarch.rpm
x86_64: d9c9139f0fc50387bc687c2ce91be404 kernel-2.6.9-42.EL.x86_64.rpm 0ea6b69c6ee7a24db7f45907bb9e2392 kernel-debuginfo-2.6.9-42.EL.x86_64.rpm ea60a89f3b08289381e8be6e6213f6a0 kernel-devel-2.6.9-42.EL.x86_64.rpm 76868583b4666bfdfd3187f4522be573 kernel-largesmp-2.6.9-42.EL.x86_64.rpm 1bc693d3e3e3f304507cab6c8a498a4d kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm ef31d24cf073aeda4a90094f60641bb6 kernel-smp-2.6.9-42.EL.x86_64.rpm b64aaf4baec4373bde909251bd7924c9 kernel-smp-devel-2.6.9-42.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-42.EL.src.rpm 11a024e010dc8f2e3dbec9f816c8fec5 kernel-2.6.9-42.EL.src.rpm
i386: cba4519a04c6271eafa1ffd5df0708b8 kernel-2.6.9-42.EL.i686.rpm 86bfc2516a07531d321d5f3bf819a67e kernel-debuginfo-2.6.9-42.EL.i686.rpm 5a96a68e49041a8e142a047c7d52d744 kernel-devel-2.6.9-42.EL.i686.rpm 47517050f412936223b130719ae9c7b5 kernel-hugemem-2.6.9-42.EL.i686.rpm a77cef2d88c5df96f26812e9eb66ab95 kernel-hugemem-devel-2.6.9-42.EL.i686.rpm 95cc28bb2c8012a19e1ec8c1f8a1eb1d kernel-smp-2.6.9-42.EL.i686.rpm 896615edeb7d593bf330888da95b8315 kernel-smp-devel-2.6.9-42.EL.i686.rpm
ia64: 3315efa6779b1d00f227adb085a40e15 kernel-2.6.9-42.EL.ia64.rpm 6d49881cf7c5fc87abd1b224a53dd7c9 kernel-debuginfo-2.6.9-42.EL.ia64.rpm bb991f581fc4e61757717c64b7c54bf5 kernel-devel-2.6.9-42.EL.ia64.rpm 9638115a8925655c5f72499d4cf34adf kernel-largesmp-2.6.9-42.EL.ia64.rpm f0f98d3d2d789d3ed98219dcf7567de4 kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm
noarch: 35877d309fcc505f606398f10de3594c kernel-doc-2.6.9-42.EL.noarch.rpm
x86_64: d9c9139f0fc50387bc687c2ce91be404 kernel-2.6.9-42.EL.x86_64.rpm 0ea6b69c6ee7a24db7f45907bb9e2392 kernel-debuginfo-2.6.9-42.EL.x86_64.rpm ea60a89f3b08289381e8be6e6213f6a0 kernel-devel-2.6.9-42.EL.x86_64.rpm 76868583b4666bfdfd3187f4522be573 kernel-largesmp-2.6.9-42.EL.x86_64.rpm 1bc693d3e3e3f304507cab6c8a498a4d kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm ef31d24cf073aeda4a90094f60641bb6 kernel-smp-2.6.9-42.EL.x86_64.rpm b64aaf4baec4373bde909251bd7924c9 kernel-smp-devel-2.6.9-42.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3623 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0038 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0456 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0742 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1052 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2446 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2448 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934 http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFE26aaXlSAg2UNWIIRAtE0AKDCLvYec0x51zafW1pyhXsrVDCjrgCgu6nQ 5hg6hgm2QMMDBkkmHO9xu6o= =8wvV -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|