|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:017-01 (kernel)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:017-01] Updated kernel packages available for Red Hat Enterprise Linux 3 Update 1
Date:  Fri, 16 Jan 2004 13:35 -0500

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 1 Advisory ID: RHSA-2004:017-01 Issue date: 2004-01-13 Updated on: 2004-01-13 Product: Red Hat Enterprise Linux Keywords: taroon kernel update Cross references: Obsoletes: RHBA-2003:308 RHSA-2003:416 CVE Names: CAN-2004-0001 - --------------------------------------------------------------------- 1. Topic: Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the first regular update. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - athlon, i386, i686, ia64, ppc64, ppc64iseries, ppc64pseries, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - athlon, i386, i686 Red Hat Enterprise Linux WS version 3 - athlon, i386, i686, ia64, x86_64 3. Problem description: The Linux kernel handles the basic functions of the operating system. This is the first regular kernel update for Red Hat Enterprise Linux version 3. It contains a new critical security fix, many other bug fixes, several device driver updates, and numerous performance and scalability enhancements. On AMD64 systems, a fix was made to the eflags checking in 32-bit ptrace emulation that could have allowed local users to elevate their privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0001 to this issue. Other bug fixes were made in the following kernel areas: VM, NPTL, IPC, kernel timer, ext3, NFS, netdump, SCSI, ACPI, several device drivers, and machine-dependent support for the x86_64, ppc64, and s390 architectures. The VM subsystem was improved to better handle extreme loads and resource contention (such as might occur during heavy database application usage). This has resulted in a significantly reduced possibility of hangs, OOM kills, and low-mem exhaustion. Several NPTL fixes were made to resolve POSIX compliance issues concerning process IDs and thread IDs. A section in the Release Notes elaborates on a related issue with file record locking in multi-threaded applications. AMD64 kernels are now configured with NUMA support, S390 kernels now have CONFIG_BLK_STATS enabled, and DMA capability was restored in the IA64 agpgart driver. The following drivers have been upgraded to new versions: cmpci ------ 6.36 e100 ------- 2.3.30-k1 e1000 ------ 5.2.20-k1 ips -------- 6.10.52 megaraid --- v1.18k megaraid2 -- v2.00.9 All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 71514 - Infinite recursion in SCSI mid layer 77839 - Assert failure in transaction.c:1224: "!jh->b_committed_data 85974 - IDE tape generates errors when execute mt command 90204 - Downgrade assert failure at revoke.c:329 to a warning 90207 - RHEL AS2.1 IPF: Linux scheduler interaction - threads all running on one processor 97065 - Updated cciss driver does not clean up properly after load failiure 98132 - (NET E1000) Taroon Alpha4 e1000 driver does not detect currently being tested NIC/LOM\'s 99251 - aic7xxx/79xx causes PCI PARITY ERROR on PE4600 101938 - C write fails for records gt 2 GB 102258 - [ibmsis] LTC3905 - RHEL_3 scsi midlayer hang 102400 - LTC3932 - kill10 hangs with RHEL 3 kernel 102535 - hang in ptrace for gdb traceback 103245 - LTC4138 - Vmstat not printing irqs/second 103304 - x86_64 oprofile.o driver misidentifies processor 103491 - NPTL-related invalid uses of thread ID 103671 - More informative memory error reporting on AMD64 104116 - [x86_64] Crash/CPU lockup running lmbench 104172 - GCC testsuite crashing .421 and .411 kernels 104260 - LTC4351 - kernel panic after rmmod'ing and then insmod'ing the olympic token ring module. 104313 - LTC4357 - viocons making > 4k writes 104338 - missing critical HP agp related patches 104520 - SMP Kernel hang on shutdown with Intel SRCZCR Raid Controller 104651 - RHEL 3 U1: Ability to blacklist what LUNS/scsi devices so kernel doesn't send start-unit commands in the event the LUN is identified as "not ready". 104730 - aic7xxx causes PCI PARITY ERROR on PE4600 104913 - LTC4532 - Signal handlers run with unaligned stack 105717 - ibm_opteron - Pid: 1, comm: swapper Not tainted 105749 - LTC4613 - machines fail to respond to reset 105890 - New Feature for AS 2.1 Update 3 - IA64 reqmt: tsc disable patch 105953 - dmidecode generates unaligned access errors 105989 - LTC4623 - install / as LVM throws python exception 106004 - Broadcom tg3 driver duplex won't set 106209 - Unblock device after queue full status 106214 - "reset erp" gone missing in 2.4.21-2.E 106396 - Hardware crypto support 106399 - SCSI I/O stall problem 106450 - Requesting updated acenic.o driver 106502 - Base driver button not loaded 106579 - LTC4821 - hwbrowser displays incorrect floppy capacity 106626 - Incorporate ESB PATA support 106648 - lcs updates from "the 38" 106651 - Export noop elevator 106785 - amd64 has siginificant bug in 32 bit emulation 106794 - LTC4829-RHEL 3 HANGS under heavy stress load 106944 - fcntl() returns tid rather than pid 107942 - thread code indeed freezes the kernel 107960 - No disk/partition statistics in /proc/partitions 108432 - Exiting program using multicast addr locks up a CPU after restart of network 108488 - Millisecond timer resolution on ia64 108492 - Possible security issue in the ia32 subsystem 108648 - No AGP support on Tyan 2885 K8W 110558 - [ ia64 ] Install disc panics on boot on some systems 110895 - running processes are not listed in /proc, with ps or top 111388 - [Patch] LTC5474 - CSP corrupted on P690 after update_flash of new firmware in LPAR 111446 - hang in RHEL 3 pthreads library 112365 - Kernel Panic when running pulse deamon 113106 - CAN-2004-0001 ptrace hole in x86-64 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/3AS/en/os/SRPMS/kernel-2.4.21-9.EL.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-9.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.i686.rpm ia64: Available from Red Hat Network: kernel-2.4.21-9.EL.ia64.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.ia64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.ia64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.ia64.rpm ppc64: Available from Red Hat Network: kernel-doc-2.4.21-9.EL.ppc64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.ppc64.rpm ppc64iseries: Available from Red Hat Network: kernel-2.4.21-9.EL.ppc64iseries.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.ppc64iseries.rpm ppc64pseries: Available from Red Hat Network: kernel-2.4.21-9.EL.ppc64pseries.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.ppc64pseries.rpm s390: Available from Red Hat Network: kernel-2.4.21-9.EL.s390.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.s390.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.s390.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.s390.rpm s390x: Available from Red Hat Network: kernel-2.4.21-9.EL.s390x.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.s390x.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.s390x.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.s390x.rpm x86_64: Available from Red Hat Network: kernel-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/3ES/en/os/SRPMS/kernel-2.4.21-9.EL.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-9.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.i686.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/3WS/en/os/SRPMS/kernel-2.4.21-9.EL.src.rpm athlon: Available from Red Hat Network: kernel-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.EL.athlon.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.athlon.rpm i386: Available from Red Hat Network: kernel-BOOT-2.4.21-9.EL.i386.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.i386.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.i386.rpm i686: Available from Red Hat Network: kernel-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-hugemem-unsupported-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.EL.i686.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.i686.rpm ia64: Available from Red Hat Network: kernel-2.4.21-9.EL.ia64.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.ia64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.ia64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.ia64.rpm x86_64: Available from Red Hat Network: kernel-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-doc-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-smp-unsupported-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-source-2.4.21-9.EL.x86_64.rpm Available from Red Hat Network: kernel-unsupported-2.4.21-9.EL.x86_64.rpm 7. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- b1d43ee719f7512ddfb5360ed014f4ea 3AS/en/os/SRPMS/kernel-2.4.21-9.EL.src.rpm ed1284363a046a45ae4f59fbe43def3f 3AS/en/os/athlon/kernel-2.4.21-9.EL.athlon.rpm bef88e6becebe943da7a21ff4dad573e 3AS/en/os/athlon/kernel-smp-2.4.21-9.EL.athlon.rpm d75b6a19ff691700e82db24d5c6c8b45 3AS/en/os/athlon/kernel-smp-unsupported-2.4.21-9.EL.athlon.rpm b39a4c74e306ab4a27e2d7c60df4b513 3AS/en/os/athlon/kernel-unsupported-2.4.21-9.EL.athlon.rpm 2610d07611dfaaee6444652d60596d0d 3AS/en/os/i386/kernel-BOOT-2.4.21-9.EL.i386.rpm 41b9ebb072afd6bbc3356be10092ee46 3AS/en/os/i386/kernel-doc-2.4.21-9.EL.i386.rpm 192bfcd25513a10952f254603a3a6090 3AS/en/os/i386/kernel-source-2.4.21-9.EL.i386.rpm 1e1a24752b11880546efd627c8abbb8a 3AS/en/os/i686/kernel-2.4.21-9.EL.i686.rpm 2907aa21140a30e9d87ed8342e63f505 3AS/en/os/i686/kernel-hugemem-2.4.21-9.EL.i686.rpm 42f75c4cb9bc17b53e9395150cec8539 3AS/en/os/i686/kernel-hugemem-unsupported-2.4.21-9.EL.i686.rpm 0dc01fea313a1ca9719a3ea7c902d3c4 3AS/en/os/i686/kernel-smp-2.4.21-9.EL.i686.rpm bc0fa995c1a52556efc20317a4e5857e 3AS/en/os/i686/kernel-smp-unsupported-2.4.21-9.EL.i686.rpm d121f00a23f84363525d02280a1d83dd 3AS/en/os/i686/kernel-unsupported-2.4.21-9.EL.i686.rpm 71e5578a555a6e4a7deae66184399086 3AS/en/os/ia64/kernel-2.4.21-9.EL.ia64.rpm d11e463e882858c19023c2273b6c27e7 3AS/en/os/ia64/kernel-doc-2.4.21-9.EL.ia64.rpm 28204f3695d2ea110cb1c4df5a9aaf5c 3AS/en/os/ia64/kernel-source-2.4.21-9.EL.ia64.rpm 8dd3ed0c9c950ead287cacc4a399e0db 3AS/en/os/ia64/kernel-unsupported-2.4.21-9.EL.ia64.rpm ab39bdba7937b5d215521d58cf6dab6b 3AS/en/os/ppc64/kernel-doc-2.4.21-9.EL.ppc64.rpm afe9ee1c67c9e710fcd8dad96a7f6c0b 3AS/en/os/ppc64/kernel-source-2.4.21-9.EL.ppc64.rpm 559e6c511b44843cd67fffe4151625e8 3AS/en/os/ppc64iseries/kernel-2.4.21-9.EL.ppc64iseries.rpm f5c86ceb2bf8cc902437403a9ceb6515 3AS/en/os/ppc64iseries/kernel-unsupported-2.4.21-9.EL.ppc64iseries.rpm 7425c1fcef4aba84a7b3e5d81ec547b7 3AS/en/os/ppc64pseries/kernel-2.4.21-9.EL.ppc64pseries.rpm 5c6ba7b45d60e7edfbf9ba1fd0d58dfe 3AS/en/os/ppc64pseries/kernel-unsupported-2.4.21-9.EL.ppc64pseries.rpm 1e3980726df913881babe4868b200295 3AS/en/os/s390/kernel-2.4.21-9.EL.s390.rpm 4f272598aae91bb680b0b9cfd0bb9fed 3AS/en/os/s390/kernel-doc-2.4.21-9.EL.s390.rpm 184574a77f3befec4871ec599813b59b 3AS/en/os/s390/kernel-source-2.4.21-9.EL.s390.rpm 1756eece0f2ff7d0f260fccd543f228a 3AS/en/os/s390/kernel-unsupported-2.4.21-9.EL.s390.rpm a2237d0079a46ce9c991a1e8466df7df 3AS/en/os/s390x/kernel-2.4.21-9.EL.s390x.rpm ca6a94fe2a7f1ef6f8b9ba2236ecd768 3AS/en/os/s390x/kernel-doc-2.4.21-9.EL.s390x.rpm 26c7c5f301ea304d5dda792a1ef42048 3AS/en/os/s390x/kernel-source-2.4.21-9.EL.s390x.rpm 367ba45f9fdec1dd9f8ecf5a026b8035 3AS/en/os/s390x/kernel-unsupported-2.4.21-9.EL.s390x.rpm fc41216af0df50ece83512e746798343 3AS/en/os/x86_64/kernel-2.4.21-9.EL.x86_64.rpm 69b978b11ed7ae43648c871248975572 3AS/en/os/x86_64/kernel-doc-2.4.21-9.EL.x86_64.rpm 0d7965414e8e459396c0704bcc1dc293 3AS/en/os/x86_64/kernel-smp-2.4.21-9.EL.x86_64.rpm 0a2706f21232e1b00b42d22356367000 3AS/en/os/x86_64/kernel-smp-unsupported-2.4.21-9.EL.x86_64.rpm 3eb47aaf742c6cad2f7beda7e163a92e 3AS/en/os/x86_64/kernel-source-2.4.21-9.EL.x86_64.rpm d8c63d0935ff8b97e5531552399b3cf1 3AS/en/os/x86_64/kernel-unsupported-2.4.21-9.EL.x86_64.rpm b1d43ee719f7512ddfb5360ed014f4ea 3ES/en/os/SRPMS/kernel-2.4.21-9.EL.src.rpm ed1284363a046a45ae4f59fbe43def3f 3ES/en/os/athlon/kernel-2.4.21-9.EL.athlon.rpm bef88e6becebe943da7a21ff4dad573e 3ES/en/os/athlon/kernel-smp-2.4.21-9.EL.athlon.rpm d75b6a19ff691700e82db24d5c6c8b45 3ES/en/os/athlon/kernel-smp-unsupported-2.4.21-9.EL.athlon.rpm b39a4c74e306ab4a27e2d7c60df4b513 3ES/en/os/athlon/kernel-unsupported-2.4.21-9.EL.athlon.rpm 2610d07611dfaaee6444652d60596d0d 3ES/en/os/i386/kernel-BOOT-2.4.21-9.EL.i386.rpm 41b9ebb072afd6bbc3356be10092ee46 3ES/en/os/i386/kernel-doc-2.4.21-9.EL.i386.rpm 192bfcd25513a10952f254603a3a6090 3ES/en/os/i386/kernel-source-2.4.21-9.EL.i386.rpm 1e1a24752b11880546efd627c8abbb8a 3ES/en/os/i686/kernel-2.4.21-9.EL.i686.rpm 2907aa21140a30e9d87ed8342e63f505 3ES/en/os/i686/kernel-hugemem-2.4.21-9.EL.i686.rpm 42f75c4cb9bc17b53e9395150cec8539 3ES/en/os/i686/kernel-hugemem-unsupported-2.4.21-9.EL.i686.rpm 0dc01fea313a1ca9719a3ea7c902d3c4 3ES/en/os/i686/kernel-smp-2.4.21-9.EL.i686.rpm bc0fa995c1a52556efc20317a4e5857e 3ES/en/os/i686/kernel-smp-unsupported-2.4.21-9.EL.i686.rpm d121f00a23f84363525d02280a1d83dd 3ES/en/os/i686/kernel-unsupported-2.4.21-9.EL.i686.rpm b1d43ee719f7512ddfb5360ed014f4ea 3WS/en/os/SRPMS/kernel-2.4.21-9.EL.src.rpm ed1284363a046a45ae4f59fbe43def3f 3WS/en/os/athlon/kernel-2.4.21-9.EL.athlon.rpm bef88e6becebe943da7a21ff4dad573e 3WS/en/os/athlon/kernel-smp-2.4.21-9.EL.athlon.rpm d75b6a19ff691700e82db24d5c6c8b45 3WS/en/os/athlon/kernel-smp-unsupported-2.4.21-9.EL.athlon.rpm b39a4c74e306ab4a27e2d7c60df4b513 3WS/en/os/athlon/kernel-unsupported-2.4.21-9.EL.athlon.rpm 2610d07611dfaaee6444652d60596d0d 3WS/en/os/i386/kernel-BOOT-2.4.21-9.EL.i386.rpm 41b9ebb072afd6bbc3356be10092ee46 3WS/en/os/i386/kernel-doc-2.4.21-9.EL.i386.rpm 192bfcd25513a10952f254603a3a6090 3WS/en/os/i386/kernel-source-2.4.21-9.EL.i386.rpm 1e1a24752b11880546efd627c8abbb8a 3WS/en/os/i686/kernel-2.4.21-9.EL.i686.rpm 2907aa21140a30e9d87ed8342e63f505 3WS/en/os/i686/kernel-hugemem-2.4.21-9.EL.i686.rpm 42f75c4cb9bc17b53e9395150cec8539 3WS/en/os/i686/kernel-hugemem-unsupported-2.4.21-9.EL.i686.rpm 0dc01fea313a1ca9719a3ea7c902d3c4 3WS/en/os/i686/kernel-smp-2.4.21-9.EL.i686.rpm bc0fa995c1a52556efc20317a4e5857e 3WS/en/os/i686/kernel-smp-unsupported-2.4.21-9.EL.i686.rpm d121f00a23f84363525d02280a1d83dd 3WS/en/os/i686/kernel-unsupported-2.4.21-9.EL.i686.rpm 71e5578a555a6e4a7deae66184399086 3WS/en/os/ia64/kernel-2.4.21-9.EL.ia64.rpm d11e463e882858c19023c2273b6c27e7 3WS/en/os/ia64/kernel-doc-2.4.21-9.EL.ia64.rpm 28204f3695d2ea110cb1c4df5a9aaf5c 3WS/en/os/ia64/kernel-source-2.4.21-9.EL.ia64.rpm 8dd3ed0c9c950ead287cacc4a399e0db 3WS/en/os/ia64/kernel-unsupported-2.4.21-9.EL.ia64.rpm fc41216af0df50ece83512e746798343 3WS/en/os/x86_64/kernel-2.4.21-9.EL.x86_64.rpm 69b978b11ed7ae43648c871248975572 3WS/en/os/x86_64/kernel-doc-2.4.21-9.EL.x86_64.rpm 0d7965414e8e459396c0704bcc1dc293 3WS/en/os/x86_64/kernel-smp-2.4.21-9.EL.x86_64.rpm 0a2706f21232e1b00b42d22356367000 3WS/en/os/x86_64/kernel-smp-unsupported-2.4.21-9.EL.x86_64.rpm 3eb47aaf742c6cad2f7beda7e163a92e 3WS/en/os/x86_64/kernel-source-2.4.21-9.EL.x86_64.rpm d8c63d0935ff8b97e5531552399b3cf1 3WS/en/os/x86_64/kernel-unsupported-2.4.21-9.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0001 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFACC7qXlSAg2UNWIIRAqWvAJwIJr6y2x6xcwp9lh2qSg7Q7WGo6gCcCEqG bFA6S8KgB/uG/PK2Ow9vzis= =gTng -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds