Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0488 -- [RedHat] Important: Updated kernel packages for Red Hat Enterprise Linux 3 Update 8 21 July 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Red Hat Operating System: Red Hat Desktop 3 Red Hat Enterprise Linux AS/ES/WS 3 Impact: Denial of Service Access Privileged Data Reduced Security Access: Remote/Unauthenticated CVE Names: CVE-2006-2444 CVE-2006-1343 CVE-2006-1242 CVE-2006-1056 CVE-2006-0744 CVE-2006-0742 CVE-2006-0741 CVE-2005-3107 CVE-2005-3055 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2006-0437.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: Updated kernel packages for Red Hat Enterprise Linux 3 Update 8 Advisory ID: RHSA-2006:0437-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0437.html Issue date: 2006-07-20 Updated on: 2006-07-20 Product: Red Hat Enterprise Linux Keywords: taroon kernel update Obsoletes: RHSA-2006:0144 CVE Names: CVE-2005-3055 CVE-2005-3107 CVE-2006-0741 CVE-2006-0742 CVE-2006-0744 CVE-2006-1056 CVE-2006-1242 CVE-2006-1343 CVE-2006-2444 - - --------------------------------------------------------------------- 1. Summary: Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the eighth regular update. This security advisory has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: The Linux kernel handles the basic functions of the operating system. This is the eighth regular kernel update to Red Hat Enterprise Linux 3. New features introduced by this update include: - addition of the adp94xx and dcdbas device drivers - diskdump support on megaraid_sas, qlogic, and swap partitions - support for new hardware via driver and SCSI white-list updates There were many bug fixes in various parts of the kernel. The ongoing effort to resolve these problems has resulted in a marked improvement in the reliability and scalability of Red Hat Enterprise Linux 3. There were numerous driver updates and security fixes (elaborated below). Other key areas affected by fixes in this update include the networking subsystem, the NFS and autofs4 file systems, the SCSI and USB subsystems, and architecture-specific handling affecting AMD Opteron and Intel EM64T processors. The following device drivers have been added or upgraded to new versions: adp94xx -------- 1.0.8 (new) bnx2 ----------- 1.4.38 cciss ---------- 2.4.60.RH1 dcdbas --------- 5.6.0-1 (new) e1000 ---------- 7.0.33-k2 emulex --------- 7.3.6 forcedeth ------ 0.30 ipmi ----------- 35.13 qlogic --------- 7.07.04b6 tg3 ------------ 3.52RH The following security bugs were fixed in this update: - a flaw in the USB devio handling of device removal that allowed a local user to cause a denial of service (crash) (CVE-2005-3055, moderate) - a flaw in the exec() handling of multi-threaded tasks using ptrace() that allowed a local user to cause a denial of service (hang of a user process) (CVE-2005-3107, low) - a difference in "sysretq" operation of EM64T (as opposed to Opteron) processors that allowed a local user to cause a denial of service (crash) upon return from certain system calls (CVE-2006-0741 and CVE-2006-0744, important) - a flaw in unaligned accesses handling on Intel Itanium processors that allowed a local user to cause a denial of service (crash) (CVE-2006-0742, important) - an info leak on AMD-based x86 and x86_64 systems that allowed a local user to retrieve the floating point exception state of a process run by a different user (CVE-2006-1056, important) - a flaw in IPv4 packet output handling that allowed a remote user to bypass the zero IP ID countermeasure on systems with a disabled firewall (CVE-2006-1242, low) - a minor info leak in socket option handling in the network code (CVE-2006-1343, low) - a flaw in IPv4 netfilter handling for the unlikely use of SNMP NAT processing that allowed a remote user to cause a denial of service (crash) or potential memory corruption (CVE-2006-2444, moderate) Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed. All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. 4. Solution: Before applying this update, make sure that all previously released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 97000 - i8253 count too high! resetting... 102504 - cannot reboot on Dell 6450 with RHEL 3 102973 - i8253 count too high 103024 - "i8253 count too high! resetting.." ? 119457 - panics in generic_aio_complete_rw and unmap_kvec after __iodesc_free calls generic_aio_complete_read() 127689 - Reboot fails on Dell PowerEdge 6450 129477 - kernel panic in umount 131881 - clock_gettime() triggers audit kill from i386 binary on x86_64 132105 - autofs (automount) failover does not work 132994 - kernel oops when unplugging usb serial adapter using pl2303 and mct_u232 134555 - System hangs when rebooting Dell PE6450 134736 - kernel panic in md driver (md lacks proper locking of device lists) 142718 - [PATCH] [RHEL3] dpt_i2o modules in RHEL gets oops 146789 - Implement a better solution to the dma memory allocation done in the kernel 146954 - megaraid2 driver fails to recognize all LSI RAID adapters when there are more than 4 with >=4GB 149732 - Hang with radeon driver when DRM DRI actve 152630 - timer interrupt received twice on ATI chipset motherboard, clock runs at double speed 153954 - kernel panic when removing active USB serial converter used as serial console 154680 - Kernel panic on 8GB machines under stress running e1000 diagnostics 157667 - I/O Errors when swtiching Blade USB Media Tray 159862 - kernel oops with usbserial (minicom key pressed) 160600 - Accessing automounted directories can cause a process to hang forever 165246 - EHCI Host driver violates USB2.0 Specification leading to device failures. 167636 - Unable to unmount a local file system exported by NFS 167672 - GART error during bootup 167839 - kernel crashes with an Ooops 169261 - CVE-2005-3055 async usb devio oops 170261 - CVE-2005-3107 zap_threads DoS 171277 - MCE arg parsing broken on x86-64 174818 - [PATCH] bonding: don't drop non-VLAN traffic 175143 - sys_io_setup() can leak an mm reference on failure 175759 - Reboot of Dell 6450 fails 177451 - Kernel panic : Unable to handle kernel paging request at virtual address 6668c79a 177571 - [RHEL3] [RFE] forcedeth driver on xw9300 has minimal support for ethtool and mii-tool 178119 - [RHEL3] dump_stack() isn't implemented on x86_64 178131 - syslog-only netdump still tries to dump memory 178885 - bonding mode=6 + dhcp doesn't work correctly 179657 - Intermittently unable to mount NFS filesystem using autofs --ghost 180968 - Data corruption in ext3 FS when running hazard (corrupt inodes) 181815 - Phantom escalating load due to flawed rq->nr_uninterruptible increment 182961 - IBM x336, x260, and x460 requires acpi=noirq bootup option. 182996 - ST Tape Driver Bug!! 183881 - kernel/libc type mismatch on siginfo_t->si_band - breaks FAM on 64bit arches 185183 - Kernel BUG at pci_dma:43 encountered 185735 - BNX2 Patch in 2.4.21-40.EL kills "Network Device Support" config menu 186058 - CVE-2006-1242 Linux zero IP ID vulnerability? 186244 - CVE-2006-1343 Small information leak in SO_ORIGINAL_DST 186307 - RHEL3U7 fails installation using RSA(2). 186455 - Submission of a patch for non-sequential LUN mapping 186901 - make menuconfig crashes 187548 - IPMI startup race condition 187911 - CVE-2006-1056 FPU Information leak on i386/x86-64 on AMD CPUs 192633 - CVE-2006-2444 SNMP NAT netfilter memory corruption 196938 - [Beta RHEL3 U8 Regression] Processes hung while allocating stack using gdb 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-47.EL.src.rpm ad2d8788e17c18d3a6e078c42ddefc8c kernel-2.4.21-47.EL.src.rpm i386: 3a6be922eb8205b6e8890d524963fd12 kernel-2.4.21-47.EL.athlon.rpm d39a30f4a73a8b2b4ed7f78cef37a8dd kernel-2.4.21-47.EL.i686.rpm 828c25797547dbb19fbe90d04c8e0681 kernel-BOOT-2.4.21-47.EL.i386.rpm 9de060bf02043ede15eb4fbaa53df368 kernel-debuginfo-2.4.21-47.EL.athlon.rpm af4c9cacf7c98658c15429230494e8f5 kernel-debuginfo-2.4.21-47.EL.i386.rpm 26d39b74be39a90bb87f244252a905d7 kernel-debuginfo-2.4.21-47.EL.i686.rpm f996ed7d81e56b863f4ee95bf77f2232 kernel-doc-2.4.21-47.EL.i386.rpm dd3a082be14db9a3f2c5d8fffaa5a88b kernel-hugemem-2.4.21-47.EL.i686.rpm 171cfbd96711dd6b9c130253616836e6 kernel-hugemem-unsupported-2.4.21-47.EL.i686.rpm 6cb9e4f65d21ed49cd0b95a15b477c17 kernel-smp-2.4.21-47.EL.athlon.rpm 1e26e704c1d685f7f25159d0c728c5a0 kernel-smp-2.4.21-47.EL.i686.rpm f16baf3eacd80c5fd06b0fba15263089 kernel-smp-unsupported-2.4.21-47.EL.athlon.rpm 58e4b4842750f55d67d42f73541c6d4b kernel-smp-unsupported-2.4.21-47.EL.i686.rpm 8b703059bed38e9382617bb2561971a5 kernel-source-2.4.21-47.EL.i386.rpm 73778bab6685813ee7a10d84c62106e0 kernel-unsupported-2.4.21-47.EL.athlon.rpm e7e7407b6c042bea70b8dc9dafb3216a kernel-unsupported-2.4.21-47.EL.i686.rpm ia64: b634628de6cc83505cbdba01b8e504f0 kernel-2.4.21-47.EL.ia64.rpm 6119af9de2554caefbd51412d1e82f14 kernel-debuginfo-2.4.21-47.EL.ia64.rpm da355dc014ec9481cfdbce10a5e662c9 kernel-doc-2.4.21-47.EL.ia64.rpm 5f19afc2c3de3ef76e7d683d6034c2f9 kernel-source-2.4.21-47.EL.ia64.rpm 65f7865cd8ead2c38e44388e14238a3a kernel-unsupported-2.4.21-47.EL.ia64.rpm ppc: a1e773d9e270c4ce355f8cabaca8b204 kernel-2.4.21-47.EL.ppc64iseries.rpm 7536e9fe229f99225be383601fef379d kernel-2.4.21-47.EL.ppc64pseries.rpm 642d28ffa8ded5b9b7bfda83870d6c6e kernel-debuginfo-2.4.21-47.EL.ppc64.rpm 6c54fcfcee1399b2465c48f7f2836019 kernel-debuginfo-2.4.21-47.EL.ppc64iseries.rpm 97d1692de52c1d55ce60f7bd20ced32f kernel-debuginfo-2.4.21-47.EL.ppc64pseries.rpm 17197d16b0758b8bc746fe6e77a07aa2 kernel-doc-2.4.21-47.EL.ppc64.rpm 354f626eaec3328a2303753074c33bf7 kernel-source-2.4.21-47.EL.ppc64.rpm fc3da58c8347792f1cdf3e7aceb37e9c kernel-unsupported-2.4.21-47.EL.ppc64iseries.rpm 34ec69fc6f843d817f86a2a84bc2110e kernel-unsupported-2.4.21-47.EL.ppc64pseries.rpm s390: 90c37c377be5ef7d6165a4638f15311d kernel-2.4.21-47.EL.s390.rpm 9b64618d9cc519b5dcc1c1299465d7af kernel-debuginfo-2.4.21-47.EL.s390.rpm 2e42e40a96cf582cd615ad6a2dde56b2 kernel-doc-2.4.21-47.EL.s390.rpm 090df94b03b41fec1bf304169e0cf1d0 kernel-source-2.4.21-47.EL.s390.rpm 2f1e2b1b4243550e381606f501b20d34 kernel-unsupported-2.4.21-47.EL.s390.rpm s390x: ad7a8351a357cba1e4b96ddb7bf1b87e kernel-2.4.21-47.EL.s390x.rpm df3a5731ab3da6a92e89f81f3f39582a kernel-debuginfo-2.4.21-47.EL.s390x.rpm 5f1733d166b15065c4223b2924fe0022 kernel-doc-2.4.21-47.EL.s390x.rpm 691c88969be0422a222ff69bdde23929 kernel-source-2.4.21-47.EL.s390x.rpm 8c6f35a9efff280d9ccce308a5248e13 kernel-unsupported-2.4.21-47.EL.s390x.rpm x86_64: 42ad1b6c57955012a6945b240b933f17 kernel-2.4.21-47.EL.ia32e.rpm 3d02d42d9b936857999ffffebad26366 kernel-2.4.21-47.EL.x86_64.rpm 87ec6c9cee8b8f89671f210c2e8d1141 kernel-debuginfo-2.4.21-47.EL.ia32e.rpm 6072bb496dd48e82d7ad46daa6075a0f kernel-debuginfo-2.4.21-47.EL.x86_64.rpm c999d4b2af19b5ea930d23af1be52811 kernel-doc-2.4.21-47.EL.x86_64.rpm 68bb412d217d00fd53acf16f65a1cd69 kernel-smp-2.4.21-47.EL.x86_64.rpm 3e0e9ccd5332658e7f481166725fdb70 kernel-smp-unsupported-2.4.21-47.EL.x86_64.rpm 22c324aa82aec45b3bd01f40bc6245f2 kernel-source-2.4.21-47.EL.x86_64.rpm 57f87cdd8cdeaf3308a4e574dab9b8f4 kernel-unsupported-2.4.21-47.EL.ia32e.rpm f4bab8b064c3bf989976525f2d3e90a5 kernel-unsupported-2.4.21-47.EL.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-47.EL.src.rpm ad2d8788e17c18d3a6e078c42ddefc8c kernel-2.4.21-47.EL.src.rpm i386: 3a6be922eb8205b6e8890d524963fd12 kernel-2.4.21-47.EL.athlon.rpm d39a30f4a73a8b2b4ed7f78cef37a8dd kernel-2.4.21-47.EL.i686.rpm 828c25797547dbb19fbe90d04c8e0681 kernel-BOOT-2.4.21-47.EL.i386.rpm 9de060bf02043ede15eb4fbaa53df368 kernel-debuginfo-2.4.21-47.EL.athlon.rpm af4c9cacf7c98658c15429230494e8f5 kernel-debuginfo-2.4.21-47.EL.i386.rpm 26d39b74be39a90bb87f244252a905d7 kernel-debuginfo-2.4.21-47.EL.i686.rpm f996ed7d81e56b863f4ee95bf77f2232 kernel-doc-2.4.21-47.EL.i386.rpm dd3a082be14db9a3f2c5d8fffaa5a88b kernel-hugemem-2.4.21-47.EL.i686.rpm 171cfbd96711dd6b9c130253616836e6 kernel-hugemem-unsupported-2.4.21-47.EL.i686.rpm 6cb9e4f65d21ed49cd0b95a15b477c17 kernel-smp-2.4.21-47.EL.athlon.rpm 1e26e704c1d685f7f25159d0c728c5a0 kernel-smp-2.4.21-47.EL.i686.rpm f16baf3eacd80c5fd06b0fba15263089 kernel-smp-unsupported-2.4.21-47.EL.athlon.rpm 58e4b4842750f55d67d42f73541c6d4b kernel-smp-unsupported-2.4.21-47.EL.i686.rpm 8b703059bed38e9382617bb2561971a5 kernel-source-2.4.21-47.EL.i386.rpm 73778bab6685813ee7a10d84c62106e0 kernel-unsupported-2.4.21-47.EL.athlon.rpm e7e7407b6c042bea70b8dc9dafb3216a kernel-unsupported-2.4.21-47.EL.i686.rpm x86_64: 42ad1b6c57955012a6945b240b933f17 kernel-2.4.21-47.EL.ia32e.rpm 3d02d42d9b936857999ffffebad26366 kernel-2.4.21-47.EL.x86_64.rpm 87ec6c9cee8b8f89671f210c2e8d1141 kernel-debuginfo-2.4.21-47.EL.ia32e.rpm 6072bb496dd48e82d7ad46daa6075a0f kernel-debuginfo-2.4.21-47.EL.x86_64.rpm c999d4b2af19b5ea930d23af1be52811 kernel-doc-2.4.21-47.EL.x86_64.rpm 68bb412d217d00fd53acf16f65a1cd69 kernel-smp-2.4.21-47.EL.x86_64.rpm 3e0e9ccd5332658e7f481166725fdb70 kernel-smp-unsupported-2.4.21-47.EL.x86_64.rpm 22c324aa82aec45b3bd01f40bc6245f2 kernel-source-2.4.21-47.EL.x86_64.rpm 57f87cdd8cdeaf3308a4e574dab9b8f4 kernel-unsupported-2.4.21-47.EL.ia32e.rpm f4bab8b064c3bf989976525f2d3e90a5 kernel-unsupported-2.4.21-47.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-47.EL.src.rpm ad2d8788e17c18d3a6e078c42ddefc8c kernel-2.4.21-47.EL.src.rpm i386: 3a6be922eb8205b6e8890d524963fd12 kernel-2.4.21-47.EL.athlon.rpm d39a30f4a73a8b2b4ed7f78cef37a8dd kernel-2.4.21-47.EL.i686.rpm 828c25797547dbb19fbe90d04c8e0681 kernel-BOOT-2.4.21-47.EL.i386.rpm 9de060bf02043ede15eb4fbaa53df368 kernel-debuginfo-2.4.21-47.EL.athlon.rpm af4c9cacf7c98658c15429230494e8f5 kernel-debuginfo-2.4.21-47.EL.i386.rpm 26d39b74be39a90bb87f244252a905d7 kernel-debuginfo-2.4.21-47.EL.i686.rpm f996ed7d81e56b863f4ee95bf77f2232 kernel-doc-2.4.21-47.EL.i386.rpm dd3a082be14db9a3f2c5d8fffaa5a88b kernel-hugemem-2.4.21-47.EL.i686.rpm 171cfbd96711dd6b9c130253616836e6 kernel-hugemem-unsupported-2.4.21-47.EL.i686.rpm 6cb9e4f65d21ed49cd0b95a15b477c17 kernel-smp-2.4.21-47.EL.athlon.rpm 1e26e704c1d685f7f25159d0c728c5a0 kernel-smp-2.4.21-47.EL.i686.rpm f16baf3eacd80c5fd06b0fba15263089 kernel-smp-unsupported-2.4.21-47.EL.athlon.rpm 58e4b4842750f55d67d42f73541c6d4b kernel-smp-unsupported-2.4.21-47.EL.i686.rpm 8b703059bed38e9382617bb2561971a5 kernel-source-2.4.21-47.EL.i386.rpm 73778bab6685813ee7a10d84c62106e0 kernel-unsupported-2.4.21-47.EL.athlon.rpm e7e7407b6c042bea70b8dc9dafb3216a kernel-unsupported-2.4.21-47.EL.i686.rpm ia64: b634628de6cc83505cbdba01b8e504f0 kernel-2.4.21-47.EL.ia64.rpm 6119af9de2554caefbd51412d1e82f14 kernel-debuginfo-2.4.21-47.EL.ia64.rpm da355dc014ec9481cfdbce10a5e662c9 kernel-doc-2.4.21-47.EL.ia64.rpm 5f19afc2c3de3ef76e7d683d6034c2f9 kernel-source-2.4.21-47.EL.ia64.rpm 65f7865cd8ead2c38e44388e14238a3a kernel-unsupported-2.4.21-47.EL.ia64.rpm x86_64: 42ad1b6c57955012a6945b240b933f17 kernel-2.4.21-47.EL.ia32e.rpm 3d02d42d9b936857999ffffebad26366 kernel-2.4.21-47.EL.x86_64.rpm 87ec6c9cee8b8f89671f210c2e8d1141 kernel-debuginfo-2.4.21-47.EL.ia32e.rpm 6072bb496dd48e82d7ad46daa6075a0f kernel-debuginfo-2.4.21-47.EL.x86_64.rpm c999d4b2af19b5ea930d23af1be52811 kernel-doc-2.4.21-47.EL.x86_64.rpm 68bb412d217d00fd53acf16f65a1cd69 kernel-smp-2.4.21-47.EL.x86_64.rpm 3e0e9ccd5332658e7f481166725fdb70 kernel-smp-unsupported-2.4.21-47.EL.x86_64.rpm 22c324aa82aec45b3bd01f40bc6245f2 kernel-source-2.4.21-47.EL.x86_64.rpm 57f87cdd8cdeaf3308a4e574dab9b8f4 kernel-unsupported-2.4.21-47.EL.ia32e.rpm f4bab8b064c3bf989976525f2d3e90a5 kernel-unsupported-2.4.21-47.EL.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-47.EL.src.rpm ad2d8788e17c18d3a6e078c42ddefc8c kernel-2.4.21-47.EL.src.rpm i386: 3a6be922eb8205b6e8890d524963fd12 kernel-2.4.21-47.EL.athlon.rpm d39a30f4a73a8b2b4ed7f78cef37a8dd kernel-2.4.21-47.EL.i686.rpm 828c25797547dbb19fbe90d04c8e0681 kernel-BOOT-2.4.21-47.EL.i386.rpm 9de060bf02043ede15eb4fbaa53df368 kernel-debuginfo-2.4.21-47.EL.athlon.rpm af4c9cacf7c98658c15429230494e8f5 kernel-debuginfo-2.4.21-47.EL.i386.rpm 26d39b74be39a90bb87f244252a905d7 kernel-debuginfo-2.4.21-47.EL.i686.rpm f996ed7d81e56b863f4ee95bf77f2232 kernel-doc-2.4.21-47.EL.i386.rpm dd3a082be14db9a3f2c5d8fffaa5a88b kernel-hugemem-2.4.21-47.EL.i686.rpm 171cfbd96711dd6b9c130253616836e6 kernel-hugemem-unsupported-2.4.21-47.EL.i686.rpm 6cb9e4f65d21ed49cd0b95a15b477c17 kernel-smp-2.4.21-47.EL.athlon.rpm 1e26e704c1d685f7f25159d0c728c5a0 kernel-smp-2.4.21-47.EL.i686.rpm f16baf3eacd80c5fd06b0fba15263089 kernel-smp-unsupported-2.4.21-47.EL.athlon.rpm 58e4b4842750f55d67d42f73541c6d4b kernel-smp-unsupported-2.4.21-47.EL.i686.rpm 8b703059bed38e9382617bb2561971a5 kernel-source-2.4.21-47.EL.i386.rpm 73778bab6685813ee7a10d84c62106e0 kernel-unsupported-2.4.21-47.EL.athlon.rpm e7e7407b6c042bea70b8dc9dafb3216a kernel-unsupported-2.4.21-47.EL.i686.rpm ia64: b634628de6cc83505cbdba01b8e504f0 kernel-2.4.21-47.EL.ia64.rpm 6119af9de2554caefbd51412d1e82f14 kernel-debuginfo-2.4.21-47.EL.ia64.rpm da355dc014ec9481cfdbce10a5e662c9 kernel-doc-2.4.21-47.EL.ia64.rpm 5f19afc2c3de3ef76e7d683d6034c2f9 kernel-source-2.4.21-47.EL.ia64.rpm 65f7865cd8ead2c38e44388e14238a3a kernel-unsupported-2.4.21-47.EL.ia64.rpm x86_64: 42ad1b6c57955012a6945b240b933f17 kernel-2.4.21-47.EL.ia32e.rpm 3d02d42d9b936857999ffffebad26366 kernel-2.4.21-47.EL.x86_64.rpm 87ec6c9cee8b8f89671f210c2e8d1141 kernel-debuginfo-2.4.21-47.EL.ia32e.rpm 6072bb496dd48e82d7ad46daa6075a0f kernel-debuginfo-2.4.21-47.EL.x86_64.rpm c999d4b2af19b5ea930d23af1be52811 kernel-doc-2.4.21-47.EL.x86_64.rpm 68bb412d217d00fd53acf16f65a1cd69 kernel-smp-2.4.21-47.EL.x86_64.rpm 3e0e9ccd5332658e7f481166725fdb70 kernel-smp-unsupported-2.4.21-47.EL.x86_64.rpm 22c324aa82aec45b3bd01f40bc6245f2 kernel-source-2.4.21-47.EL.x86_64.rpm 57f87cdd8cdeaf3308a4e574dab9b8f4 kernel-unsupported-2.4.21-47.EL.ia32e.rpm f4bab8b064c3bf989976525f2d3e90a5 kernel-unsupported-2.4.21-47.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3107 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0741 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0742 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFEv4N6XlSAg2UNWIIRAj8CAJ0WZ8Kka2PXzEcin+kfDez4lq+5/gCeMhZd 0VI7R5o70tqw8a8/2ygze68= =lOTh - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRMAwlyh9+71yA2DNAQLHpAQAmCHoK/6Jt1ynqam+2697VAHfhOWVsRzG G0QHz2DQS7h0Q9IMiGoNEIDf18CJEg303+PHekHVe2WU5xqW3e22x3v2zsohXrqj 41zJSxW5ls5c9xqMA8DrfkeQW7xMeBv468Rd9D4KPDO6k/i/R5toLiqgWGQSYdk7 ThCIEutOxqo= =Sat9 -----END PGP SIGNATURE-----