RHSA-2004:188-01: Updated kernel packages available
Posted on: 05/12/2004 05:57 AM

Updated kernel packages are available for Red Hat Enterprise Linux 3 Update 2

----------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 2
Advisory ID: RHSA-2004:188-01
Issue date: 2004-05-11
Updated on: 2004-05-11
Product: Red Hat Enterprise Linux
Keywords: taroon kernel update
Cross references:
Obsoletes: RHSA-2004:017 RHSA-2004:183
CVE Names: CAN-2003-0461 CAN-2003-0465 CAN-2003-0984 CAN-2004-0003 CAN-2004-0010
----------------------------------------------------------------------

1. Topic:

Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the second regular update.



2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - athlon, i386, i686, ia32e, ia64, ppc64, ppc64iseries, ppc64pseries, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - athlon, i386, i686
Red Hat Enterprise Linux WS version 3 - athlon, i386, i686, ia32e, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the second regular kernel update to Red Hat Enterprise Linux version 3. It contains several minor security fixes, many bug fixes, device driver updates, new hardware support, and the introduction of Linux
Syscall Auditing support.

There were bug fixes in many different parts of the kernel, the bulk of which addressed unusual situations such as error handling, race conditions, and resource starvation. The combined effect of the approximately 140 fixes is a strong improvement in the reliability and durability of Red Hat Enterprise Linux. Some of the key areas affected are disk drivers, network drivers, USB support, x86_64 and ppc64 platform support, ia64 32-bit emulation layer enablers, and the VM, NFS, IPv6, and SCSI subsystems.

A significant change in the SCSI subsystem (the disabling of the scsi-affine-queue patch) should significantly improve SCSI disk driver performance in many scenarios. There were 10 Bugzillas against SCSI performance problems addressed by this change.

The following drivers have been upgraded to new versions:

bonding ---- 2.4.1
cciss ------ 2.4.50.RH1
e1000 ------ 5.2.30.1-k1
fusion ----- 2.05.11.03
ipr -------- 1.0.3
ips -------- 6.11.07
megaraid2 -- 2.10.1.1
qla2x00 ---- 6.07.02-RH1
tg3 -------- 3.1
z90crypt --- 1.1.4

This update introduces support for the new Intel EM64T processor. A new "ia32e" architecture has been created to support booting on platforms based on either the original AMD Opteron CPU or the new Intel EM64T CPU. The existing "x86_64" architecture has remained optimized for Opteron systems. Kernels for both types of systems are built from the same x86_64-architecture sources and share a common kernel source RPM (kernel-source-2.4.21-15.EL.x86_64.rpm).

Other highlights in this update include a major upgrade to the SATA infrastructure, addition of IBM JS20 Power Blade support, and creation of an optional IBM eServer zSeries On-Demand Timer facility for reducing idle CPU overhead.

The following security issues were addressed in this update:

A minor flaw was found where /proc/tty/driver/serial reveals the exact character counts for serial links. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0461 to this issue.

The kernel strncpy() function in Linux 2.4 and 2.5 does not pad the target buffer with null bytes on architectures other than x86, as opposed to the expected libc behavior, which could lead to information leaks. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0465 to this issue.

A minor data leak was found in two real time clock drivers (for /dev/rtc). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0984 to this issue.

A flaw in the R128 Direct Render Infrastructure (dri) driver could allow local privilege escalation. This driver is part of the kernel-unsupported package. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0003 to this issue.

A flaw in ncp_lookup() in ncpfs could allow local privilege escalation. The ncpfs module allows a system to mount volumes of NetWare servers or print to NetWare printers and is in the kernel-unsupported package. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0010 to this issue.

(Note that the kernel-unsupported package contains drivers and other modules that are unsupported and therefore might contain security problems that have not been addressed.)

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.

Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

102194 - Disk READ performance worse compared with 2.4.20-18.9smp
103706 - Some numerical values in /proc/partitions file becomes an unusual value.
104084 - ctc interface unexpectedly dies
104444 - RHEL3 U2: Syscall Auditing Support
104633 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1.
104634 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1.
104636 - The synchronous write() system call of RHEL3.0 is slower than that of RHEL2.1.
106111 - RHEL 3 U2: Only one CPU is initialized in a Hypthreading enabled Intel ICH5 platform.
106219 - raid level 1 disk failures
106334 - RHEL 3 - U2 -Qlogic FAStT Fibre driver 6.05 or later
106396 - Hardware crypto support
106402 - LTC4736 - PTS: Kernel Panic during mutex contention test.
106503 - ia64 kernel stops allocating memory too early when overcommit_memory set to strict
106584 - 'cp -p' returns error when destination is an nfs directory
106870 - RHEL 3 AS/IPF/QU1: Qlogic qla2300 6.06.50
106890 - RHEL 3 U2: preserve_argv0 patch missing - IPF x86 compat.
106894 - RHEL 3, U2: IA32 feat: new microcode update format sup. (Prescott/Nocona)
106969 - Random stall during boot-up
107330 - NC6770 adapter fails to regain connection after lost link
107331 - (tg3) Jumbo Frames w/bonding fails on NC7771 and Red Hat EL 3 RC1 respin
107744 - RHEL3 Update1: ia32 on ia64 syscall table
107864 - Data corruption in iozone benchmark
107915 - binfmt_misc.o is a part of kernel-unsupported - x86 compat on IPF
108958 - MINSIGSTKSZ mismatch between ia32 and ia64
109242 - LTC5267 - Network degradation as runs progress in specweb99
109618 - 3ware raid extremely low throughput
109660 - op_time no samples files found
109843 - Typo in module parameter of scsi_mod module
109914 - PATCH: LTC5351-Large external array causes SIGILL in 32-bit
110170 - [PATCH] LTC5381- rhel 3 will need to pick up the cyclone-lpj-fix patch
110633 - iptables ipt_limit module fails on ppc (iserie) RS64-IV RHEL3
110716 - RHEL 3 - U2 - JS30 Blade - kernel enablement
110849 - zcrypt update to 06-11 and up
110872 - System Hangs after 5-10 minutes with USB attached
110999 - clock is running to fast on IBM x445
111250 - tg3 driver fails to autonegotiate correctly
111264 - ada compiler crashes on even hello-world
111287 - [PATCH] alternate signal stack bug corrupts RNaT bits
111403 - [PATCH] LTC3766 - pthreads/NPTL problems with large memory processes
111446 - hang in RHEL 3 pthreads library
111629 - ACL over NFS problem
111673 - RHEL 3 U2 - ServeRAID update for IA64 fixes
111681 - Invalid ICMP type 11 messages echo'd to console
111768 - /proc/pid/statm can return negative values
111774 - [PATCH] HP cciss driver bug fix
111853 - [PATCH] cciss hba pointer may be null when trying to release I/O memory
111854 - [PATCH] need to enable prefetch on HP 64xx controllers
111855 - [PATCH] problems hot plugging older cciss controllers
111856 - [PATCH] cciss driver may panic system when sharing IRQ's
111858 - [PATCH] cciss may display #blocks as a negative value
111903 - [PATCH] oops in IUCV code
111911 - avoid hang during initialization on I/O errors
111968 - Allow async read/write to propagate down to transports that support async
112006 - [PATCH] BUG() from __remove_inode_page
112025 - SMP kernels parsing of AICP tables limited - breaks hyperthreading
112039 - RHEL 3 U2: Qlogic qla2300 driver version 6.07.++
112040 - RHEL 3 U2: Update cciss driver to 2.4.50
112057 - RHEL3 U2: update megaraid2 to version 2.10.x
112103 - RHEL3 U2: IA32 core dump support on IPF
112111 - RHEL 3 U2: ICH6 PATA support
112139 - RHEL 3 U2: update cciss driver (new funct/bug fixes) to 2.4.50
112163 - RHEL 3 U2 - Update e1000
112190 - Duplicate get_partition_list bug to track Bugzilla 111342 in Taroon -
112288 - [PATCH] ICMPv6 error message contains incorrect original packet's data.
112359 - RHEL 3.0 using v6.06.00b11 driver attached to McData switch doesn't log in or scan devices successfully.
112363 - NC7722 when using the TG3 driver has no active link Th established
112449 - (TG3) driver doesn't work properly with bcm5700 nic
112584 - reservation error code, corrupts request queue
112607 - aironet driver fixes
112646 - defunct processes whose parent process is 'init' are created.
112724 - kernel hang when unmap a hugetlb vma
112764 - RHEL3 kernel not preventing or recovering from fork bomb when ulimit used
112826 - LTC5732 - MMIO alignment error when inserting the olympic TR module.
113034 - RHEL 3 U2: Merge IBM IPR driver into main kernel RPM
113051 - [PATCH] LTC5757 - RHEL3 update 2 RAS patches - rtas syscall and os-term
113052 - [PATCH] LTC5758 - /proc/ppc64/lparcfg file missing in RHEL 3
113071 - [PATCH] RHEL3 ia64: 32 bit applications don't dump core properly
113072 - [PATCH] RHEL3/ia64: strace -f on multithreaded 32 bit applications doesn't work
113099 - CAN-2003-0461 /proc reveals char count
113100 - CAN-2003-0465 kernel strncpy padding
113103 - CAN-2003-0984 minor /dev/rtc leak
113105 - Al-Viro kmod local DoS
113171 - lousy read performance on megaraid with 2.4.21-4.0.2.EL
113213 - kernel crashes when unmap_kvec() is called in interrupt context
113328 - RHEL 3 - U2 ACPI support for multiple IDE devices (x455)
113341 - netdump - various race conditions that lead to hangs in panic()/die()
113413 - too many ipv6 aliases cause kernel oops
113561 - Patch for BLIST_SPARSELUN in scsi_scan.c
113604 - CAN-2004-0003 r128 DRI
113737 - [PATCH] sym53c8xx.c - odd byte tape fix
113738 - [PATCH] updated megaraid2 driver (2.10.1)
113739 - [PATCH] updated mptfusion driver (2.05.11)
113809 - depmod is not run for kernel-2.4.21-9.EL from Quaterly Update #1
113890 - [PATCH] Excutable compiled on x86 can cause kernel seg fault on x86_64
114052 - Raw device performance poor under WS 3 Dreamworks IT#29689
114135 - LSI Megaraid(2) performance subpar in RHEL3, using RHEL3 kernel
114137 - RHEL3 U2: patch for sym53c8xx.c to address odd byte tape fix
114356 - USB keyboard/mouse don\\'t work on upcoming Dell servers
114529 - RHEL3: [PATCH] Inclusion of Handspring Treo patch into next kernel release
114553 - Bad performance with Q1 update kernel (-9EL)
114560 - zfcp updates for RHEL3 U2
114588 - [PATCH] don't serialize NFS direct writes
114773 - Panic in elf_core_copy_regs() core dumping ia32 binary
114869 - date returns future year of 586562
114873 - RHEL3 U2: softirq interrupt deferral patch
114874 - RHEL 2.1 U4 and RHEL 3 U2 - e1000 fix for SOL
114940 - RHEL 3.0 default QLogic driver v6.06.00b11 spews sg_low_free and QUEUE FULL messages at load time.
114942 - Running I/O on RHEL 3.0 and using the v6.06.00b11 driver, the driver ran out of memory and began arbitrarily killing processes.
115072 - Lack of file close processing for O_DIRECT unsupported filesystem in dentry_open()
115231 - RHEL 3_U2 Adds new processor support
115273 - bad disk I/O performance with the 2.4.21-4.ELsmp kernel
115334 - Suspected VM problem causes gradual Tux performance degradation
115390 - Kernel panic and/or EXT3-fs corruption running sysreport on rx7620
115438 - strange load - kswapd/IO ?
115439 - LTC5321-Cannot enable quota on RHEL 3 for ppc64
115823 - CAN-2004-0010 ncpfs hole (unsupported)
116261 - RHEL3 kernel specfile for s390* should require minimum version of s390utils
116916 - tg3 driver doesn't support bonding driver's ALB mode
117454 - /proc/cpuinfo has bad info on ia32e
117741 - P4 2.8ghz HT, Using RHEL WS 3.0 Update 1, latest SMP Kernel, see only 1 CPU
117914 - RHEL3 U3: Handspring Treo ID
117941 - frequent kernel panics
118109 - System hangs while running stress tests with hugetlbfs on hugemem kernel
118397 - system needlessly thrashing swap partition
118494 - updates to scsi_scan.c (RHEL3 U2 alpha)
118556 - MTRRs not initialized correctly
118647 - kswapd in state R and D load constant at 1+
118882 - Machine doesn't boot SMP Kernel after installation
118885 - [PATCH] kernel panics when removing expired IPsec SAs
118974 - stack overflows during ACPI initialization
118980 - option \\'acpi=off\\' not working correctly
119009 - Kernel panic occurs when trying to install RHEL 3 U2 B2 for AMD64
119174 - /proc/cpuinfo vendor_id is wrong. shows $
119234 - RHEL3 U2 beta1 hard locks on Celcius 810v
119545 - kernel module binfmt_misc missing
119638 - Can't set speed/duplex on tg3 fiber interfaces
119903 - nfs peformance very bad on EL3
120232 - [x86_64] Crash on install disc boot without newly-required noapictimers
120341 - Runaway processes with USB console on Blade Center
121856 - LTC7932-Kernel Panic with TCE allocation failure w/ Qlogic queue depth issue
122077 - servers freeze (only respond to ping and sysrq) periodically

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-15.EL.src.rpm

athlon:
Available from Red Hat Network: kernel-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.21-15.EL.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.i386.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-hugemem-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.i686.rpm

ia32e:
Available from Red Hat Network: kernel-2.4.21-15.EL.ia32e.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ia32e.rpm

ia64:
Available from Red Hat Network: kernel-2.4.21-15.EL.ia64.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.ia64.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.ia64.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ia64.rpm

ppc64:
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.ppc64.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.ppc64.rpm

ppc64iseries:
Available from Red Hat Network: kernel-2.4.21-15.EL.ppc64iseries.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ppc64iseries.rpm

ppc64pseries:
Available from Red Hat Network: kernel-2.4.21-15.EL.ppc64pseries.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ppc64pseries.rpm

s390:
Available from Red Hat Network: kernel-2.4.21-15.EL.s390.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.s390.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.s390.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.s390.rpm

s390x:
Available from Red Hat Network: kernel-2.4.21-15.EL.s390x.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.s390x.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.s390x.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.s390x.rpm

x86_64:
Available from Red Hat Network: kernel-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-smp-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-15.EL.src.rpm

athlon:
Available from Red Hat Network: kernel-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.21-15.EL.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.i386.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-hugemem-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.i686.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-15.EL.src.rpm

athlon:
Available from Red Hat Network: kernel-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-smp-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.athlon.rpm

i386:
Available from Red Hat Network: kernel-BOOT-2.4.21-15.EL.i386.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.i386.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.i386.rpm

i686:
Available from Red Hat Network: kernel-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-hugemem-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-smp-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.i686.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.i686.rpm

ia32e:
Available from Red Hat Network: kernel-2.4.21-15.EL.ia32e.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ia32e.rpm

ia64:
Available from Red Hat Network: kernel-2.4.21-15.EL.ia64.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.ia64.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.ia64.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.ia64.rpm

x86_64:
Available from Red Hat Network: kernel-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-doc-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-smp-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-source-2.4.21-15.EL.x86_64.rpm
Available from Red Hat Network: kernel-unsupported-2.4.21-15.EL.x86_64.rpm



7. Verification:

MD5 sum Package Name
- --------------------------------------------------------------------------
ccad3e4dbb561cca63badec7b6317163 kernel-2.4.21-15.EL.athlon.rpm
f1cdb8023f0074a870c02e238feacd48 kernel-2.4.21-15.EL.i686.rpm
7e0980daf431587d541d42ce7e9ed1aa kernel-2.4.21-15.EL.ia32e.rpm
66352bf4f48daf50de4727f515a6c59c kernel-2.4.21-15.EL.ia64.rpm
b62cbd1cebb476be2c7959e9711c3974 kernel-2.4.21-15.EL.ppc64iseries.rpm
ac1ac2f389cdfd6fdd6c1a5ccb5b4b66 kernel-2.4.21-15.EL.ppc64pseries.rpm
30ca5c26882e9580b3d5e9796b0c4450 kernel-2.4.21-15.EL.s390.rpm
0eda90f574a83b83904bc6a34677e0d5 kernel-2.4.21-15.EL.s390x.rpm
b698c83996f9e178a2328a6819ac5351 kernel-2.4.21-15.EL.src.rpm
3b4b32cbaf79bbb8347a46a55e3f567b kernel-2.4.21-15.EL.x86_64.rpm
4292218598ef0d169b10a5b9c248b121 kernel-BOOT-2.4.21-15.EL.i386.rpm
496f073081daeb065744999269ebe0ff kernel-doc-2.4.21-15.EL.i386.rpm
8b00b405e53a2de14167ddf7826d3c2c kernel-doc-2.4.21-15.EL.ia64.rpm
607f87500495009130794a917a1507d4 kernel-doc-2.4.21-15.EL.ppc64.rpm
eb5aebe1ad8aeea59142d0522b778d15 kernel-doc-2.4.21-15.EL.s390.rpm
9809a3354afbebb5d72093ec57543936 kernel-doc-2.4.21-15.EL.s390x.rpm
7e23eb4b2dae89277af9158f4d060d15 kernel-doc-2.4.21-15.EL.x86_64.rpm
47246b48fcda4741cd7c74a16cef1f1e kernel-hugemem-2.4.21-15.EL.i686.rpm
1980c6ef8defadedbb591c1fb91cb710 kernel-hugemem-unsupported-2.4.21-15.EL.i686.rpm
2edfe3398e83c4dbb5ac47a9514a253f kernel-smp-2.4.21-15.EL.athlon.rpm
01a1577e4a501ce6db3879d3cc5134de kernel-smp-2.4.21-15.EL.i686.rpm
6c2bef2ec68fc88fb4e41ab365b892d6 kernel-smp-2.4.21-15.EL.x86_64.rpm
f6ff7ea30964f4960bb85e17cda3085e kernel-smp-unsupported-2.4.21-15.EL.athlon.rpm
aa7535be656bf89f60c8a01bf347b12c kernel-smp-unsupported-2.4.21-15.EL.i686.rpm
918aa8fe2dddd5b0e39fdda928d1ac11 kernel-smp-unsupported-2.4.21-15.EL.x86_64.rpm
003856a5f02c9e33124b6f8cba7eee3c kernel-source-2.4.21-15.EL.i386.rpm
93733a4a47b8303a6e34c50f31a840d3 kernel-source-2.4.21-15.EL.ia64.rpm
78311de9005374db527efd58a741ebf0 kernel-source-2.4.21-15.EL.ppc64.rpm
29868c0ee56a5c52986e4879d2d8317a kernel-source-2.4.21-15.EL.s390.rpm
5166eac7154184ed337eb5f3743ee449 kernel-source-2.4.21-15.EL.s390x.rpm
a5eed15aec5410d0fe7969cf6822cf8d kernel-source-2.4.21-15.EL.x86_64.rpm
2740555623bc674229d0336ac9e10a84 kernel-unsupported-2.4.21-15.EL.athlon.rpm
53da49b7178bdcba6d849aa2da30037d kernel-unsupported-2.4.21-15.EL.i686.rpm
e5ed73b33fec640983b6291d5563e72e kernel-unsupported-2.4.21-15.EL.ia32e.rpm
c5d55c5fb6ac3642fe3ddf1110e84b20 kernel-unsupported-2.4.21-15.EL.ia64.rpm
91b27b98335b877dc9691592967654d1 kernel-unsupported-2.4.21-15.EL.ppc64iseries.rpm
7c8fce1f061daa0cda1bd35bd163bcca kernel-unsupported-2.4.21-15.EL.ppc64pseries.rpm
dd9e29bcc2bfdd2ddeeb5c3026f677cd kernel-unsupported-2.4.21-15.EL.s390.rpm
1e107ae79f89952f5c62495253867458 kernel-unsupported-2.4.21-15.EL.s390x.rpm
d94b403c362b2a4c3f6f1b4cdb3eb6f5 kernel-unsupported-2.4.21-15.EL.x86_64.rpm


These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/team/key.html

You can verify each package with the following command:

rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:

md5sum <filename>


8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0461
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0465
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0984
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0003
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0010

9. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.


Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/rhsa_2004188_01_updated_kernel_packages_available.html)