- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1
Advisory ID:       RHSA-2005:420-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2005:420.html
Issue date:        2005-06-08
Updated on:        2005-06-08
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0136 CAN-2005-1264
- ---------------------------------------------------------------------1. Summary:

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4.  This is the
first regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the first regular kernel update to Red Hat Enterprise Linux 4.

A flaw affecting the auditing code was discovered.  On Itanium
architectures a local user could use this flaw to cause a denial of service
(crash).  This issue is rated as having important security impact
(CAN-2005-0136). 

A flaw was discovered in the servicing of a raw device ioctl.  A local user
who has access to raw devices could use this flaw to write to kernel memory
and cause a denial of service or potentially gain privileges.  This issue
is rated as having moderate security impact (CAN-2005-1264). 

New features introduced by this update include:
- - Fixed TCP BIC congestion handling.
- - Diskdump support for more controllers (megaraid, SATA)
- - Device mapper multipath support
- - AMD64 dual core support.
- - Intel ICH7 hardware support.

There were many bug fixes in various parts of the kernel.  The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.

The following device drivers have been upgraded to new versions:
 ata_piix -------- 1.03
 bonding --------- 2.6.1
 e1000 ----------- 5.6.10.1-k2-NAPI
 e100 ------------ 3.3.6-k2-NAPI
 ibmveth --------- 1.03
 libata ---------- 1.02 to 1.10
 lpfc ------------ 0:8.0.16 to 0:8.0.16.6_x2
 megaraid_mbox --- 2.20.4.0 to 2.20.4.5
 megaraid_mm ----- 2.20.2.0-rh1 to 2.20.2.5
 sata_nv --------- 0.03 to 0.6
 sata_promise ---- 1.00 to 1.01
 sata_sil -------- 0.8
 sata_sis -------- 0.5
 sata_svw -------- 1.05
 sata_sx4 -------- 0.7
 sata_via -------- 1.0
 sata_vsc -------- 1.0
 tg3 ------------- 3.22-rh
 ipw2100 --------- 1.0.3
 ipw2200 --------- 1.0.0

All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

133590 - PTRACE_ATTACH race with real parent's wait calls can produced bogus wait returns
134338 - Intolerable Disk I/O Performance under 64-bit VM: fix I/O buffers
137154 - "waitid(POSIX Interface)" cannot run properly.
138563 - [PATCH] RHEL4 U1: EFI GPT: reduce alternate header probing
140083 - lx-choptp19 crashed running 2.4.21-20.EL.BZ131027.hotfixhugemem
140383 - BLKFLSBUF ioctl can cause other reads
140472 - x86, x86_64 and IA64 scsi inquiry command hangs in wait_for_completion
141983 - RHEL4 U2: DBS: quiet warning messages from cpufreq.c
142167 - [RHEL4][Diskdump] smp_call_function issue
142464 - [PATCH] "RPC: garbage, exit EIO" when using NFSv3 with Kerberos 5
143073 - traced process cannot be killed
143472 - hugetlb mmap failed in compatibility mode in em64t
143907 - ext2 and device dm-0 byond 2Terabyte causes /var/log/messages file size to crash system
144741 - RHEL4 U1: ICH7 Support patch
145424 - problems with ipsec from rhel3 to rhel4
146067 - [PATCH] Channel bonding driver configured in 802.3 ad mode causes kernel panic when shutdwon
146089 - 20050115 ptrace/kill and ptrace/dump race fixes
146703 - NLM (NFSv3) problems when mounting with "sec=krb5"
146797 - SCTP memory consumption and system freezes
146911 - Thread suspension via async signal fails on rhel4-rc2
147832 - oom-killer triggered during Red Hat Cert
150110 - chipset identifier for zx2
150151 - Lockd callbacks to NFS clients fail completely
151284 - mmap of file over NFS corrupts data
152101 - host panics when mounting nfs4 volumes
152102 - host loses connection to nfs server when the server is solaris
152557 - 20050117 Oopsable NFS locking
154221 - Thread exits siliently via __RESTORE_ALL exeception for iret
154639 - kernel thread current->mm dereference in grab_swap_token causes oops
154972 - unexplained SIGSEGV death in SIGSEGV signal handler
155283 - CAN-2005-0136 ptrace corner cases on ia64
155765 - oops on 2.6.9-5.0.5.ELsmp
156875 - libata - master supports lba48 but slave does not
157450 - CAN-2005-1263 Linux kernel ELF core dump privilege elevation


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

ppc:
8dcdc040cbd00928243a20775d5123d6  kernel-2.6.9-11.EL.ppc64.rpm
a0e9ca3943927b5cff3b6f238d4ff5d0  kernel-2.6.9-11.EL.ppc64iseries.rpm
1cf5c458b3ecc950277ea59d8f0400c9  kernel-devel-2.6.9-11.EL.ppc64.rpm
e92a1ba8d256a695153d87e9e8ba0ad6  kernel-devel-2.6.9-11.EL.ppc64iseries.rpm

s390:
c91ca50ecb980e3abbead7c520e9569d  kernel-2.6.9-11.EL.s390.rpm
c3520b5d55fa1102c2100d56173aecc5  kernel-devel-2.6.9-11.EL.s390.rpm

s390x:
ecf96ac8781675ec8678a73423e3dab9  kernel-2.6.9-11.EL.s390x.rpm
1ca331b341899002794c77de16f17104  kernel-devel-2.6.9-11.EL.s390x.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1264

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

RedHat: Updated kernel packages available for Red Hat

Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 4

Summary



Summary

The Linux kernel handles the basic functions of the operating system. This is the first regular kernel update to Red Hat Enterprise Linux 4. A flaw affecting the auditing code was discovered. On Itanium architectures a local user could use this flaw to cause a denial of service (crash). This issue is rated as having important security impact (CAN-2005-0136). A flaw was discovered in the servicing of a raw device ioctl. A local user who has access to raw devices could use this flaw to write to kernel memory and cause a denial of service or potentially gain privileges. This issue is rated as having moderate security impact (CAN-2005-1264). New features introduced by this update include: - - Fixed TCP BIC congestion handling. - - Diskdump support for more controllers (megaraid, SATA) - - Device mapper multipath support - - AMD64 dual core support. - - Intel ICH7 hardware support. There were many bug fixes in various parts of the kernel. The ongoing effort to resolve these problems has resulted in a marked improvement in the reliability and scalability of Red Hat Enterprise Linux 4. The following device drivers have been upgraded to new versions: ata_piix -------- 1.03 bonding --------- 2.6.1 e1000 ----------- 5.6.10.1-k2-NAPI e100 ------------ 3.3.6-k2-NAPI ibmveth --------- 1.03 libata ---------- 1.02 to 1.10 lpfc ------------ 0:8.0.16 to 0:8.0.16.6_x2 megaraid_mbox --- 2.20.4.0 to 2.20.4.5 megaraid_mm ----- 2.20.2.0-rh1 to 2.20.2.5 sata_nv --------- 0.03 to 0.6 sata_promise ---- 1.00 to 1.01 sata_sil -------- 0.8 sata_sis -------- 0.5 sata_svw -------- 1.05 sata_sx4 -------- 0.7 sata_via -------- 1.0 sata_vsc -------- 1.0 tg3 ------------- 3.22-rh ipw2100 --------- 1.0.3 ipw2200 --------- 1.0.0 All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
133590 - PTRACE_ATTACH race with real parent's wait calls can produced bogus wait returns 134338 - Intolerable Disk I/O Performance under 64-bit VM: fix I/O buffers 137154 - "waitid(POSIX Interface)" cannot run properly. 138563 - [PATCH] RHEL4 U1: EFI GPT: reduce alternate header probing 140083 - lx-choptp19 crashed running 2.4.21-20.EL.BZ131027.hotfixhugemem 140383 - BLKFLSBUF ioctl can cause other reads 140472 - x86, x86_64 and IA64 scsi inquiry command hangs in wait_for_completion 141983 - RHEL4 U2: DBS: quiet warning messages from cpufreq.c 142167 - [RHEL4][Diskdump] smp_call_function issue 142464 - [PATCH] "RPC: garbage, exit EIO" when using NFSv3 with Kerberos 5 143073 - traced process cannot be killed 143472 - hugetlb mmap failed in compatibility mode in em64t 143907 - ext2 and device dm-0 byond 2Terabyte causes /var/log/messages file size to crash system 144741 - RHEL4 U1: ICH7 Support patch 145424 - problems with ipsec from rhel3 to rhel4 146067 - [PATCH] Channel bonding driver configured in 802.3 ad mode causes kernel panic when shutdwon 146089 - 20050115 ptrace/kill and ptrace/dump race fixes 146703 - NLM (NFSv3) problems when mounting with "sec=krb5" 146797 - SCTP memory consumption and system freezes 146911 - Thread suspension via async signal fails on rhel4-rc2 147832 - oom-killer triggered during Red Hat Cert 150110 - chipset identifier for zx2 150151 - Lockd callbacks to NFS clients fail completely 151284 - mmap of file over NFS corrupts data 152101 - host panics when mounting nfs4 volumes 152102 - host loses connection to nfs server when the server is solaris 152557 - 20050117 Oopsable NFS locking 154221 - Thread exits siliently via __RESTORE_ALL exeception for iret 154639 - kernel thread current->mm dereference in grab_swap_token causes oops 154972 - unexplained SIGSEGV death in SIGSEGV signal handler 155283 - CAN-2005-0136 ptrace corner cases on ia64 155765 - oops on 2.6.9-5.0.5.ELsmp 156875 - libata - master supports lba48 but slave does not 157450 - CAN-2005-1263 Linux kernel ELF core dump privilege elevation

6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: 708e5239dd9d9a9a425d0f5d77489806 kernel-2.6.9-11.EL.src.rpm
i386: 8cd6de3e57442035516b60f12911e067 kernel-2.6.9-11.EL.i686.rpm ecc10b63ecd7c909e0272eb86f2d21c0 kernel-devel-2.6.9-11.EL.i686.rpm 0a3ca2d16911ce2f882b16d00b459683 kernel-hugemem-2.6.9-11.EL.i686.rpm 2938d82720a88684d78735307c154d7b kernel-hugemem-devel-2.6.9-11.EL.i686.rpm 84082bb98ce1d8131e67622e9584d209 kernel-smp-2.6.9-11.EL.i686.rpm 23a494cfcc0161ab8504e3200a3ee5a0 kernel-smp-devel-2.6.9-11.EL.i686.rpm
ia64: 2892022024e23e29b1c1da1100c0ef8b kernel-2.6.9-11.EL.ia64.rpm a51565dfad63ff5ff980e9ceb30e51cd kernel-devel-2.6.9-11.EL.ia64.rpm
noarch: bda3f275715e889b1b1111cd5b372873 kernel-doc-2.6.9-11.EL.noarch.rpm
ppc: 8dcdc040cbd00928243a20775d5123d6 kernel-2.6.9-11.EL.ppc64.rpm a0e9ca3943927b5cff3b6f238d4ff5d0 kernel-2.6.9-11.EL.ppc64iseries.rpm 1cf5c458b3ecc950277ea59d8f0400c9 kernel-devel-2.6.9-11.EL.ppc64.rpm e92a1ba8d256a695153d87e9e8ba0ad6 kernel-devel-2.6.9-11.EL.ppc64iseries.rpm
s390: c91ca50ecb980e3abbead7c520e9569d kernel-2.6.9-11.EL.s390.rpm c3520b5d55fa1102c2100d56173aecc5 kernel-devel-2.6.9-11.EL.s390.rpm
s390x: ecf96ac8781675ec8678a73423e3dab9 kernel-2.6.9-11.EL.s390x.rpm 1ca331b341899002794c77de16f17104 kernel-devel-2.6.9-11.EL.s390x.rpm
x86_64: 160141d384ecd5b072a0476b6dd07973 kernel-2.6.9-11.EL.x86_64.rpm 805b6de472bbe54f74028c823fd82d78 kernel-devel-2.6.9-11.EL.x86_64.rpm eedc9ef7106687b1177a688371c004c2 kernel-smp-2.6.9-11.EL.x86_64.rpm 35606ad7ab97e97d6f1a88776b6d389c kernel-smp-devel-2.6.9-11.EL.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: 708e5239dd9d9a9a425d0f5d77489806 kernel-2.6.9-11.EL.src.rpm
i386: 8cd6de3e57442035516b60f12911e067 kernel-2.6.9-11.EL.i686.rpm ecc10b63ecd7c909e0272eb86f2d21c0 kernel-devel-2.6.9-11.EL.i686.rpm 0a3ca2d16911ce2f882b16d00b459683 kernel-hugemem-2.6.9-11.EL.i686.rpm 2938d82720a88684d78735307c154d7b kernel-hugemem-devel-2.6.9-11.EL.i686.rpm 84082bb98ce1d8131e67622e9584d209 kernel-smp-2.6.9-11.EL.i686.rpm 23a494cfcc0161ab8504e3200a3ee5a0 kernel-smp-devel-2.6.9-11.EL.i686.rpm
noarch: bda3f275715e889b1b1111cd5b372873 kernel-doc-2.6.9-11.EL.noarch.rpm
x86_64: 160141d384ecd5b072a0476b6dd07973 kernel-2.6.9-11.EL.x86_64.rpm 805b6de472bbe54f74028c823fd82d78 kernel-devel-2.6.9-11.EL.x86_64.rpm eedc9ef7106687b1177a688371c004c2 kernel-smp-2.6.9-11.EL.x86_64.rpm 35606ad7ab97e97d6f1a88776b6d389c kernel-smp-devel-2.6.9-11.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: 708e5239dd9d9a9a425d0f5d77489806 kernel-2.6.9-11.EL.src.rpm
i386: 8cd6de3e57442035516b60f12911e067 kernel-2.6.9-11.EL.i686.rpm ecc10b63ecd7c909e0272eb86f2d21c0 kernel-devel-2.6.9-11.EL.i686.rpm 0a3ca2d16911ce2f882b16d00b459683 kernel-hugemem-2.6.9-11.EL.i686.rpm 2938d82720a88684d78735307c154d7b kernel-hugemem-devel-2.6.9-11.EL.i686.rpm 84082bb98ce1d8131e67622e9584d209 kernel-smp-2.6.9-11.EL.i686.rpm 23a494cfcc0161ab8504e3200a3ee5a0 kernel-smp-devel-2.6.9-11.EL.i686.rpm
ia64: 2892022024e23e29b1c1da1100c0ef8b kernel-2.6.9-11.EL.ia64.rpm a51565dfad63ff5ff980e9ceb30e51cd kernel-devel-2.6.9-11.EL.ia64.rpm
noarch: bda3f275715e889b1b1111cd5b372873 kernel-doc-2.6.9-11.EL.noarch.rpm
x86_64: 160141d384ecd5b072a0476b6dd07973 kernel-2.6.9-11.EL.x86_64.rpm 805b6de472bbe54f74028c823fd82d78 kernel-devel-2.6.9-11.EL.x86_64.rpm eedc9ef7106687b1177a688371c004c2 kernel-smp-2.6.9-11.EL.x86_64.rpm 35606ad7ab97e97d6f1a88776b6d389c kernel-smp-devel-2.6.9-11.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: 708e5239dd9d9a9a425d0f5d77489806 kernel-2.6.9-11.EL.src.rpm
i386: 8cd6de3e57442035516b60f12911e067 kernel-2.6.9-11.EL.i686.rpm ecc10b63ecd7c909e0272eb86f2d21c0 kernel-devel-2.6.9-11.EL.i686.rpm 0a3ca2d16911ce2f882b16d00b459683 kernel-hugemem-2.6.9-11.EL.i686.rpm 2938d82720a88684d78735307c154d7b kernel-hugemem-devel-2.6.9-11.EL.i686.rpm 84082bb98ce1d8131e67622e9584d209 kernel-smp-2.6.9-11.EL.i686.rpm 23a494cfcc0161ab8504e3200a3ee5a0 kernel-smp-devel-2.6.9-11.EL.i686.rpm
ia64: 2892022024e23e29b1c1da1100c0ef8b kernel-2.6.9-11.EL.ia64.rpm a51565dfad63ff5ff980e9ceb30e51cd kernel-devel-2.6.9-11.EL.ia64.rpm
noarch: bda3f275715e889b1b1111cd5b372873 kernel-doc-2.6.9-11.EL.noarch.rpm
x86_64: 160141d384ecd5b072a0476b6dd07973 kernel-2.6.9-11.EL.x86_64.rpm 805b6de472bbe54f74028c823fd82d78 kernel-devel-2.6.9-11.EL.x86_64.rpm eedc9ef7106687b1177a688371c004c2 kernel-smp-2.6.9-11.EL.x86_64.rpm 35606ad7ab97e97d6f1a88776b6d389c kernel-smp-devel-2.6.9-11.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0136 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1264

Package List


Severity
Advisory ID: RHSA-2005:420-01
Advisory URL: https://access.redhat.com/errata/RHSA-2005:420.html
Issued Date: : 2005-06-08
Updated on: 2005-06-08
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0136 CAN-2005-1264 Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 4. This is the first regular update.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64


Bugs Fixed


Related News