|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:188-01 (kernel)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:188-01] Updated kernel packages available for Red Hat Enterprise Linux 3 Update 2
Date:  Wed, 12 May 2004 03:46 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 2 Advisory ID: RHSA-2004:188-01 Issue date: 2004-05-11 Updated on: 2004-05-11 Product: Red Hat Enterprise Linux Keywords: taroon kernel update Cross references: Obsoletes: RHSA-2004:017 RHSA-2004:183 CVE Names: CAN-2003-0461 CAN-2003-0465 CAN-2003-0984 CAN-2004-0003 CAN-2004-0010 - --------------------------------------------------------------------- 1. Topic: Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the second regular update. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - athlon, i386, i686, ia32e, ia64, ppc64, ppc64iseries, ppc64pseries, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - athlon, i386, i686 Red Hat Enterprise Linux WS version 3 - athlon, i386, i686, ia32e, ia64, x86_64 3. Problem description: The Linux kernel handles the basic functions of the operating system. This is the second regular kernel update to Red Hat Enterprise Linux version 3. It contains several minor security fixes, many bug fixes, device driver updates, new hardware support, and the introduction of Linux Syscall Auditing support. There were bug fixes in many different parts of the kernel, the bulk of which addressed unusual situations such as error handling, race conditions, and resource starvation. The combined effect of the approximately 140 fixes is a strong improvement in the reliability and durability of Red Hat Enterprise Linux. Some of the key areas affected are disk drivers, network drivers, USB support, x86_64 and ppc64 platform support, ia64 32-bit emulation layer enablers, and the VM, NFS, IPv6, and SCSI subsystems. A significant change in the SCSI subsystem (the disabling of the scsi-affine-queue patch) should significantly improve SCSI disk driver performance in many scenarios. There were 10 Bugzillas against SCSI performance problems addressed by this change. The following drivers have been upgraded to new versions: bonding ---- 2.4.1 cciss ------ 2.4.50.RH1 e1000 ------ 5.2.30.1-k1 fusion ----- 2.05.11.03 ipr -------- 1.0.3 ips -------- 6.11.07 megaraid2 -- 2.10.1.1 qla2x00 ---- 6.07.02-RH1 tg3 -------- 3.1 z90crypt --- 1.1.4 This update introduces support for the new Intel EM64T processor. A new "ia32e" architecture has been created to support booting on platforms based on either the original AMD Opteron CPU or the new Intel EM64T CPU. The existing "x86_64" architecture has remained optimized for Opteron systems. Kernels for both types of systems are built from the same x86_64-architecture sources and share a common kernel source RPM (kernel-source-2.4.21-15.EL.x86_64.rpm). Other highlights in this update include a major upgrade to the SATA infrastructure, addition of IBM JS20 Power Blade support, and creation of an optional IBM eServer zSeries On-Demand Timer facility for reducing idle CPU overhead. The following security issues were addressed in this update: A minor flaw was found where /proc/tty/driver/serial reveals the exact character counts for serial links. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0461 to this issue. The kernel strncpy() function in Linux 2.4 and 2.5 does not pad the target buffer with null bytes on architectures other than x86, as opposed to the expected libc behavior, which could lead to information leaks. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0465 to this issue. A minor data leak was found in two real time clock drivers (for /dev/rtc). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0984 to this issue. A flaw in the R128 Direct Render Infrastructure (dri) driver could allow local privilege escalation. This driver is part of the kernel-unsupported package. The Common Vulnera- bilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0003 to this issue. A flaw in ncp_lookup() in ncpfs could allow local privilege escalation. The ncpfs module allows a system to mount volumes of NetWare servers or print to NetWare printers and is in the kernel-unsupported package. The Common Vulnera- bilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0010 to this issue. (Note that the kernel-unsupported package contains drivers and other modules that are unsupported and therefore might contain security problems that have not been addressed.) All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 102194 - Disk READ performance worse compared with 2.4.20-18.9smp 103706 - Some numerical values in /proc/partitions file becomes an unusual value. 104084 - ctc interface unexpectedly dies 104444 - RHEL3 U2: Syscall Auditing Support 104633 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1. 104634 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1. 104636 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1. 106111 - RHEL 3 U2: Only one CPU is initialized in a Hypthreading enabled Intel ICH5 platform. 106219 - raid level 1 disk failures 106334 - RHEL 3 - U2 -Qlogic FAStT Fibre driver 6.05 or later 106396 - Hardware crypto support 106402 - LTC4736 - PTS: Kernel Panic during mutex contention test. 106503 - ia64 kernel stops allocating memory too early when overcommit_memory set to strict 106584 - 'cp -p' returns error when destination is an nfs directory 106870 - RHEL 3 AS/IPF/QU1: Qlogic qla2300 6.06.50 106890 - RHEL 3 U2: preserve_argv0 patch missing - IPF x86 compat. 106894 - RHEL 3, U2: IA32 feat: new microcode update format sup. (Prescott/Nocona) 106969 - Random stall during boot-up 107330 - NC6770 adapter fails to regain connection after lost link 107331 - (tg3) Jumbo Frames w/bonding fails on NC7771 and Red Hat EL 3 RC1 respin 107744 - RHEL3 Update1: ia32 on ia64 syscall table 107864 - Data corruption in iozone benchmark 107915 - binfmt_misc.o is a part of kernel-unsupported - x86 compat on IPF 108958 - MINSIGSTKSZ mismatch between ia32 and ia64 109242 - LTC5267 - Network degradation as runs progress in specweb99 109618 - 3ware raid extremely low throughput 109660 - op_time no samples files found 109843 - Typo in module parameter of scsi_mod module 109914 - PATCH: LTC5351-Large external array causes SIGILL in 32-bit 110170 - [PATCH] LTC5381- rhel 3 will need to pick up the cyclone-lpj-fix patch 110633 - iptables ipt_limit module fails on ppc (iserie) RS64-IV RHEL3 110716 - RHEL 3 - U2 - JS30 Blade - kernel enablement 110849 - zcrypt update to 06-11 and up 110872 - System Hangs after 5-10 minutes with USB attached 110999 - clock is running to fast on IBM x445 111250 - tg3 driver fails to autonegotiate correctly 111264 - ada compiler crashes on even hello-world 111287 - [PATCH] alternate signal stack bug corrupts RNaT bits 111403 - [PATCH] LTC3766 - pthreads/NPTL problems with large memory processes 111446 - hang in RHEL 3 pthreads library 111629 - ACL over NFS problem 111673 - RHEL 3 U2 - ServeRAID update for IA64 fixes 111681 - Invalid ICMP type 11 messages echo'd to console 111768 - /proc/pid/statm can return negative values 111774 - [PATCH] HP cciss driver bug fix 111853 - [PATCH] cciss hba pointer may be null when trying to release I/O memory 111854 - [PATCH] need to enable prefetch on HP 64xx controllers 111855 - [PATCH] problems hot plugging older cciss controllers 111856 - [PATCH] cciss driver may panic system when sharing IRQ's 111858 - [PATCH] cciss may display #blocks as a negative value 111903 - [PATCH] oops in IUCV code 111911 - avoid hang during initialization on I/O errors 111968 - Allow async read/write to propagate down to transports that support async 112006 - [PATCH] BUG() from __remove_inode_page 112025 - SMP kernels parsing of AICP tables limited - breaks hyperthreading 112039 - RHEL 3 U2: Qlogic qla2300 driver version 6.07.++ 112040 - RHEL 3 U2: Update cciss driver to 2.4.50 112057 - RHEL3 U2: update megaraid2 to version 2.10.x 112103 - RHEL3 U2: IA32 core dump support on IPF 112111 - RHEL 3 U2: ICH6 PATA support 112139 - RHEL 3 U2: update cciss driver (new funct/bug fixes) to 2.4.50 112163 - RHEL 3 U2 - Update e1000 112190 - Duplicate get_partition_list bug to track Bugzilla 111342 in Taroon - 112288 - [PATCH] ICMPv6 error message contains incorrect original packet's data. 112359 - RHEL 3.0 using v6.06.00b11 driver attached to McData switch doesn't log in or scan devices successfully. 112363 - NC7722 when using the TG3 driver has no active link Th established 112449 - (TG3) driver doesn't work properly with bcm5700 nic 112584 - reservation error code, corrupts request queue 112607 - aironet driver fixes 112646 - defunct processes whose parent process is 'init' are created. 112724 - kernel hang when unmap a hugetlb vma 112764 - RHEL3 kernel not preventing or recovering from fork bomb when ulimit used 112826 - LTC5732 - MMIO alignment error when inserting the olympic TR module. 113034 - RHEL 3 U2: Merge IBM IPR driver into main kernel RPM 113051 - [PATCH] LTC5757 - RHEL3 update 2 RAS patches - rtas syscall and os-term 113052 - [PATCH] LTC5758 - /proc/ppc64/lparcfg file missing in RHEL 3 113071 - [PATCH] RHEL3 ia64: 32 bit applications don't dump core properly 113072 - [PATCH] RHEL3/ia64: strace -f on multithreaded 32 bit applications doesn't work 113099 - CAN-2003-0461 /proc reveals char count 113100 - CAN-2003-0465 kernel strncpy padding 113103 - CAN-2003-0984 minor /dev/rtc leak 113105 - Al-Viro kmod local DoS 113171 - lousy read performance on megaraid with 2.4.21-4.0.2.EL 113213 - kernel crashes when unmap_kvec() is called in interrupt context 113328 - RHEL 3 - U2 ACPI support for multiple IDE devices (x455) 113341 - netdump - various race conditions that lead to hangs in panic()/die() 113413 - too many ipv6 aliases cause kernel oops 113561 - Patch for BLIST_SPARSELUN in scsi_scan.c 113604 - CAN-2004-0003 r128 DRI 113737 - [PATCH] sym53c8xx.c - odd byte tape fix 113738 - [PATCH] updated megaraid2 driver (2.10.1) 113739 - [PATCH] updated mptfusion driver (2.05.11) 113809 - depmod is not run for kernel-2.4.21-9.EL from Quaterly Update #1 113890 - [PATCH] Excutable compiled on x86 can cause kernel seg fault on x86_64 114052 - Raw device performance poor under WS 3 Dreamworks IT#29689 114135 - LSI Megaraid(2) performance subpar in RHEL3, using RHEL3 kernel 114137 - RHEL3 U2: patch for sym53c8xx.c to address odd byte tape fix 114356 - USB keyboard/mouse don\'t work on upcoming Dell servers 114529 - RHEL3: [PATCH] Inclusion of Handspring Treo patch into next kernel release 114553 - Bad performance with Q1 update kernel (-9EL) 114560 - zfcp updates for RHEL3 U2 114588 - [PATCH] don't serialize NFS direct writes 114773 - Panic in elf_core_copy_regs() core dumping ia32 binary 114869 - date returns future year of 586562 114873 - RHEL3 U2: softirq interrupt deferral patch 114874 - RHEL 2.1 U4 and RHEL 3 U2 - e1000 fix for SOL 114940 - RHEL 3.0 default QLogic driver v6.06.00b11 spews sg_low_free and QUEUE FULL messages at load time. 114942 - Running I/O on RHEL 3.0 and using the v6.06.00b11 driver, the driver ran out of memory and began arbitrarily killing processes. 115072 - Lack of file close processing for O_DIRECT unsupported filesystem in dentry_open() 115231 - RHEL 3_U2 Adds new processor support 115273 - bad disk I/O performance with the 2.4.21-4.ELsmp kernel 115334 - Suspected VM problem causes gradual Tux performance degradation 115390 - Kernel panic and/or EXT3-fs corruption running sysreport on rx7620 115438 - strange load - kswapd/IO ? 115439 - LTC5321-Cannot enable quota on RHEL 3 for ppc64 115823 - CAN-2004-0010 ncpfs hole (unsupported) 116261 - RHEL3 kernel specfile for s390* should require minimum version of s390utils 116916 - tg3 driver doesn't support bonding driver's ALB mode 117454 - /proc/cpuinfo has bad info on ia32e 117741 - P4 2.8ghz HT, Using RHEL WS 3.0 Update 1, latest SMP Kernel, see only 1 CPU 117914 - RHEL3 U3: Handspring Treo ID 117941 - frequent kernel panics 118109 - System hangs while running stress tests with hugetlbfs on hugemem kernel 118397 - system needlessly thrashing swap partition 118494 - updates to scsi_scan.c (RHEL3 U2 alpha) 118556 - MTRRs not initialized correctly 118647 - kswapd in state R and D load constant at 1+ 118882 - Machine doesn't boot SMP Kernel after installation 118885 - [PATCH] kernel panics when removing expired IPsec SAs 118974 - stack overflows during ACPI initialization 118980 - option \'acpi=off\' not working correctly 119009 - Kernel panic occurs when trying to install RHEL 3 U2 B2 for AMD64 119174 - /proc/cpuinfo vendor_id is wrong. shows $ 119234 - RHEL3 U2 beta1 hard locks on Celcius 810v 119545 - kernel module binfmt_misc missing 119638 - Can't set speed/duplex on tg3 fiber interfaces 119903 - nfs peformance very bad on EL3 120232 - [x86_64] Crash on install disc boot without newly-required noapictimers 120341 - Runaway processes with USB console on Blade Center 121856 - LTC7932-Kernel Panic with TCE allocation failure w/ Qlogic queue depth issue 122077 - servers freeze (only respond to ping and sysrq) periodically 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-15.EL.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-15.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.i686.rpm ia32e: Available from Red Hat Network: kernel-2.4.21-15.EL.ia32e.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ia32e.rpm ia64: Available from Red Hat Network: kernel-2.4.21-15.EL.ia64.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.ia64.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.ia64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ia64.rpm ppc64: Available from Red Hat Network: kernel-doc-2.4.21-15.EL.ppc64.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.ppc64.rpm ppc64iseries: Available from Red Hat Network: kernel-2.4.21-15.EL.ppc64iseries.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ppc64iseries.rpm ppc64pseries: Available from Red Hat Network: kernel-2.4.21-15.EL.ppc64pseries.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ppc64pseries.rpm s390: Available from Red Hat Network: kernel-2.4.21-15.EL.s390.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.s390.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.s390.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.s390.rpm s390x: Available from Red Hat Network: kernel-2.4.21-15.EL.s390x.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.s390x.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.s390x.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.s390x.rpm x86_64: Available from Red Hat Network: kernel-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-15.EL.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-15.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.i686.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-15.EL.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-15.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.i686.rpm ia32e: Available from Red Hat Network: kernel-2.4.21-15.EL.ia32e.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ia32e.rpm ia64: Available from Red Hat Network: kernel-2.4.21-15.EL.ia64.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.ia64.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.ia64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ia64.rpm x86_64: Available from Red Hat Network: kernel-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-doc-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-source-2.4.21-15.EL.x86_64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.x86_64.rpm 7. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- ccad3e4dbb561cca63badec7b6317163 kernel-2.4.21-15.EL.athlon.rpm f1cdb8023f0074a870c02e238feacd48 kernel-2.4.21-15.EL.i686.rpm 7e0980daf431587d541d42ce7e9ed1aa kernel-2.4.21-15.EL.ia32e.rpm 66352bf4f48daf50de4727f515a6c59c kernel-2.4.21-15.EL.ia64.rpm b62cbd1cebb476be2c7959e9711c3974 kernel-2.4.21-15.EL.ppc64iseries.rpm ac1ac2f389cdfd6fdd6c1a5ccb5b4b66 kernel-2.4.21-15.EL.ppc64pseries.rpm 30ca5c26882e9580b3d5e9796b0c4450 kernel-2.4.21-15.EL.s390.rpm 0eda90f574a83b83904bc6a34677e0d5 kernel-2.4.21-15.EL.s390x.rpm b698c83996f9e178a2328a6819ac5351 kernel-2.4.21-15.EL.src.rpm 3b4b32cbaf79bbb8347a46a55e3f567b kernel-2.4.21-15.EL.x86_64.rpm 4292218598ef0d169b10a5b9c248b121 kernel-BOOT-2.4.21-15.EL.i386.rpm 496f073081daeb065744999269ebe0ff kernel-doc-2.4.21-15.EL.i386.rpm 8b00b405e53a2de14167ddf7826d3c2c kernel-doc-2.4.21-15.EL.ia64.rpm 607f87500495009130794a917a1507d4 kernel-doc-2.4.21-15.EL.ppc64.rpm eb5aebe1ad8aeea59142d0522b778d15 kernel-doc-2.4.21-15.EL.s390.rpm 9809a3354afbebb5d72093ec57543936 kernel-doc-2.4.21-15.EL.s390x.rpm 7e23eb4b2dae89277af9158f4d060d15 kernel-doc-2.4.21-15.EL.x86_64.rpm 47246b48fcda4741cd7c74a16cef1f1e kernel-hugemem-2.4.21-15.EL.i686.rpm 1980c6ef8defadedbb591c1fb91cb710 kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm 2edfe3398e83c4dbb5ac47a9514a253f kernel-smp-2.4.21-15.EL.athlon.rpm 01a1577e4a501ce6db3879d3cc5134de kernel-smp-2.4.21-15.EL.i686.rpm 6c2bef2ec68fc88fb4e41ab365b892d6 kernel-smp-2.4.21-15.EL.x86_64.rpm f6ff7ea30964f4960bb85e17cda3085e kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm aa7535be656bf89f60c8a01bf347b12c kernel-smp-unsupported-2.4.21-15.EL.i686.rpm 918aa8fe2dddd5b0e39fdda928d1ac11 kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm 003856a5f02c9e33124b6f8cba7eee3c kernel-source-2.4.21-15.EL.i386.rpm 93733a4a47b8303a6e34c50f31a840d3 kernel-source-2.4.21-15.EL.ia64.rpm 78311de9005374db527efd58a741ebf0 kernel-source-2.4.21-15.EL.ppc64.rpm 29868c0ee56a5c52986e4879d2d8317a kernel-source-2.4.21-15.EL.s390.rpm 5166eac7154184ed337eb5f3743ee449 kernel-source-2.4.21-15.EL.s390x.rpm a5eed15aec5410d0fe7969cf6822cf8d kernel-source-2.4.21-15.EL.x86_64.rpm 2740555623bc674229d0336ac9e10a84 kernel-unsupported-2.4.21-15.EL.athlon.rpm 53da49b7178bdcba6d849aa2da30037d kernel-unsupported-2.4.21-15.EL.i686.rpm e5ed73b33fec640983b6291d5563e72e kernel-unsupported-2.4.21-15.EL.ia32e.rpm c5d55c5fb6ac3642fe3ddf1110e84b20 kernel-unsupported-2.4.21-15.EL.ia64.rpm 91b27b98335b877dc9691592967654d1 kernel-unsupported-2.4.21-15.EL.ppc64iseries.rpm 7c8fce1f061daa0cda1bd35bd163bcca kernel-unsupported-2.4.21-15.EL.ppc64pseries.rpm dd9e29bcc2bfdd2ddeeb5c3026f677cd kernel-unsupported-2.4.21-15.EL.s390.rpm 1e107ae79f89952f5c62495253867458 kernel-unsupported-2.4.21-15.EL.s390x.rpm d94b403c362b2a4c3f6f1b4cdb3eb6f5 kernel-unsupported-2.4.21-15.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/team/key.html You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0461 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0465 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0984 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0003 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0010 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact.html Copyright 2004 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFAodYyXlSAg2UNWIIRAiHLAJ98fGegpNNiXXKWF2zWLABgMVgcZwCguZWi 6h8ZzgkTJt98hnMoHP4IJ1Y= =MPFx -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds