- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5
Advisory ID:       RHSA-2005:294-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2005:294.html
Issue date:        2005-05-18
Updated on:        2005-05-18
Product:           Red Hat Enterprise Linux
Obsoletes:         RHSA-2005:293
CVE Names:         CAN-2005-0757
- ---------------------------------------------------------------------1. Summary:

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 3.  This is the
fifth regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the fifth regular kernel update to Red Hat Enterprise Linux 3.

New features introduced by this update include:

  - support for 2-TB partitions on block devices
  - support for new disk, network, and USB devices
  - support for clustered APIC mode on AMD64 NUMA systems
  - netdump support on AMD64, Intel EM64T, Itanium, and ppc64 systems
  - diskdump support on sym53c8xx and SATA piix/promise adapters
  - NMI switch support on AMD64 and Intel EM64T systems

There were many bug fixes in various parts of the kernel.  The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 3.

Some key areas affected by these fixes include the kernel's networking,
SATA, TTY, and USB subsystems, as well as the architecture-dependent
handling under the ia64, ppc64, and x86_64 directories.  Scalability
improvements were made primarily in the memory management and file
system areas.

A flaw in offset handling in the xattr file system code backported to
Red Hat Enterprise Linux 3 was fixed.  On 64-bit systems, a user who
can access an ext3 extended-attribute-enabled file system could cause
a denial of service (system crash).  This issue is rated as having a
moderate security impact (CAN-2005-0757).

The following device drivers have been upgraded to new versions:

  3c59x ------ LK1.1.18
  3w-9xxx ---- 2.24.00.011fw (new in Update 5)
  3w-xxxx ---- 1.02.00.037
  8139too ---- (upstream 2.4.29)
  b44 -------- 0.95
  cciss ------ v2.4.54.RH1
  e100 ------- 3.3.6-k2
  e1000 ------ 5.6.10.1-k2
  lpfcdfc ---- 1.0.13 (new in Update 5)
  tg3 -------- 3.22RH

Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm

ppc:
58bf58e0cea36b6bbe06b41bd1c09153  kernel-2.4.21-32.EL.ppc64iseries.rpm
41e8d849240559fa694a636bd826537a  kernel-2.4.21-32.EL.ppc64pseries.rpm
8397f50f3ec6f1e889090895e7eb66fb  kernel-doc-2.4.21-32.EL.ppc64.rpm
9444e6fd23671724e861b06bc555bae5  kernel-source-2.4.21-32.EL.ppc64.rpm
6590395e036ae1832f1b55790d8d0821  kernel-unsupported-2.4.21-32.EL.ppc64iseries.rpm
07417ced420144cdb932ec66125a0b57  kernel-unsupported-2.4.21-32.EL.ppc64pseries.rpm

s390:
d06b1ae5b6556386c443e8c94b6fc4c8  kernel-2.4.21-32.EL.s390.rpm
53da0a3fe4e89213f9e26fb97b016ea6  kernel-doc-2.4.21-32.EL.s390.rpm
0fe7cf2c4c26154847d210a4a6667793  kernel-source-2.4.21-32.EL.s390.rpm
e6aee965886f221e431b40c846bb4bbe  kernel-unsupported-2.4.21-32.EL.s390.rpm

s390x:
4a3f013bae04963eafc67c6a7d26919d  kernel-2.4.21-32.EL.s390x.rpm
c5d899ad8ca24d2bcba1fd529c612754  kernel-doc-2.4.21-32.EL.s390x.rpm
c4b13e1642a7f61e02b9ca587fc1752a  kernel-source-2.4.21-32.EL.s390x.rpm
9075beed557f713bacc0711eb59f7d31  kernel-unsupported-2.4.21-32.EL.s390x.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
d5420415832273a5518afd0b5e3d7a47  kernel-2.4.21-32.EL.src.rpm

i386:
8992dd4ed1397d860a1ae85dfc7b2dbd  kernel-2.4.21-32.EL.athlon.rpm
7cd1f101f584fc58a804320ab0a55455  kernel-2.4.21-32.EL.i686.rpm
bb1a35656242fb6e15e0a0051af10799  kernel-BOOT-2.4.21-32.EL.i386.rpm
aa69d228a91a1f045f920b42360f3c11  kernel-doc-2.4.21-32.EL.i386.rpm
c7488ce800ccef31568e8b8dda1f405e  kernel-hugemem-2.4.21-32.EL.i686.rpm
d1479b65b4a6aac62cf97ec4870cf1c1  kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm
5d86be94c356e79de1ed971fa4a0ac75  kernel-smp-2.4.21-32.EL.athlon.rpm
28fac40c22db6db1a7b14a903dc8533b  kernel-smp-2.4.21-32.EL.i686.rpm
55fd4b598560907990a420ce99932f57  kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm
36ffa544956f7a7b98d2f97a31c1fe99  kernel-smp-unsupported-2.4.21-32.EL.i686.rpm
ed0102588582ffe0dcf59b12d6d5826c  kernel-source-2.4.21-32.EL.i386.rpm
6110eda2670195aacb0bac8f8e378d33  kernel-unsupported-2.4.21-32.EL.athlon.rpm
ac92f37920c8e99fbab7b9d36e1ca565  kernel-unsupported-2.4.21-32.EL.i686.rpm

ia64:
b073901a18678b5fb31d38031aa68b8c  kernel-2.4.21-32.EL.ia64.rpm
25fab30ddaeca594c1aa81a6c809bec9  kernel-doc-2.4.21-32.EL.ia64.rpm
5303ff75aa0208dd98a17fb684dd102e  kernel-source-2.4.21-32.EL.ia64.rpm
a98dd1aa4a42edfbf8d750398f7bf0da  kernel-unsupported-2.4.21-32.EL.ia64.rpm

x86_64:
a2e8ed1142c8e49b63121abdaa4f07d4  kernel-2.4.21-32.EL.ia32e.rpm
3bed6796650f2feecbbdf18dc922c36e  kernel-2.4.21-32.EL.x86_64.rpm
789238cb24bc8f775df251814d719859  kernel-doc-2.4.21-32.EL.x86_64.rpm
2fdd45ff58088a3eaaeb8b2b63fbcfa3  kernel-smp-2.4.21-32.EL.x86_64.rpm
9e441aabd0c66dfdc307f68bfe132a0f  kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm
55d4e2e890d1a86c0824aff16e374d82  kernel-source-2.4.21-32.EL.x86_64.rpm
3c1f18d57e43ea15a1294266a9b59ed4  kernel-unsupported-2.4.21-32.EL.ia32e.rpm
cfb343332b2d03f4df3504104531c7e2  kernel-unsupported-2.4.21-32.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

6. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0757

7. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

RedHat: Updated kernel packages available for Red Hat RHSA-2005:294-01

Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3

Summary



Summary

The Linux kernel handles the basic functions of the operating system. This is the fifth regular kernel update to Red Hat Enterprise Linux 3. New features introduced by this update include: - support for 2-TB partitions on block devices - support for new disk, network, and USB devices - support for clustered APIC mode on AMD64 NUMA systems - netdump support on AMD64, Intel EM64T, Itanium, and ppc64 systems - diskdump support on sym53c8xx and SATA piix/promise adapters - NMI switch support on AMD64 and Intel EM64T systems There were many bug fixes in various parts of the kernel. The ongoing effort to resolve these problems has resulted in a marked improvement in the reliability and scalability of Red Hat Enterprise Linux 3. Some key areas affected by these fixes include the kernel's networking, SATA, TTY, and USB subsystems, as well as the architecture-dependent handling under the ia64, ppc64, and x86_64 directories. Scalability improvements were made primarily in the memory management and file system areas. A flaw in offset handling in the xattr file system code backported to Red Hat Enterprise Linux 3 was fixed. On 64-bit systems, a user who can access an ext3 extended-attribute-enabled file system could cause a denial of service (system crash). This issue is rated as having a moderate security impact (CAN-2005-0757). The following device drivers have been upgraded to new versions: 3c59x ------ LK1.1.18 3w-9xxx ---- 2.24.00.011fw (new in Update 5) 3w-xxxx ---- 1.02.00.037 8139too ---- (upstream 2.4.29) b44 -------- 0.95 cciss ------ v2.4.54.RH1 e100 ------- 3.3.6-k2 e1000 ------ 5.6.10.1-k2 lpfcdfc ---- 1.0.13 (new in Update 5) tg3 -------- 3.22RH Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed. All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.


Solution

Before applying this update, make sure that all previously released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS: d5420415832273a5518afd0b5e3d7a47 kernel-2.4.21-32.EL.src.rpm
i386: 8992dd4ed1397d860a1ae85dfc7b2dbd kernel-2.4.21-32.EL.athlon.rpm 7cd1f101f584fc58a804320ab0a55455 kernel-2.4.21-32.EL.i686.rpm bb1a35656242fb6e15e0a0051af10799 kernel-BOOT-2.4.21-32.EL.i386.rpm aa69d228a91a1f045f920b42360f3c11 kernel-doc-2.4.21-32.EL.i386.rpm c7488ce800ccef31568e8b8dda1f405e kernel-hugemem-2.4.21-32.EL.i686.rpm d1479b65b4a6aac62cf97ec4870cf1c1 kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm 5d86be94c356e79de1ed971fa4a0ac75 kernel-smp-2.4.21-32.EL.athlon.rpm 28fac40c22db6db1a7b14a903dc8533b kernel-smp-2.4.21-32.EL.i686.rpm 55fd4b598560907990a420ce99932f57 kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm 36ffa544956f7a7b98d2f97a31c1fe99 kernel-smp-unsupported-2.4.21-32.EL.i686.rpm ed0102588582ffe0dcf59b12d6d5826c kernel-source-2.4.21-32.EL.i386.rpm 6110eda2670195aacb0bac8f8e378d33 kernel-unsupported-2.4.21-32.EL.athlon.rpm ac92f37920c8e99fbab7b9d36e1ca565 kernel-unsupported-2.4.21-32.EL.i686.rpm
ia64: b073901a18678b5fb31d38031aa68b8c kernel-2.4.21-32.EL.ia64.rpm 25fab30ddaeca594c1aa81a6c809bec9 kernel-doc-2.4.21-32.EL.ia64.rpm 5303ff75aa0208dd98a17fb684dd102e kernel-source-2.4.21-32.EL.ia64.rpm a98dd1aa4a42edfbf8d750398f7bf0da kernel-unsupported-2.4.21-32.EL.ia64.rpm
ppc: 58bf58e0cea36b6bbe06b41bd1c09153 kernel-2.4.21-32.EL.ppc64iseries.rpm 41e8d849240559fa694a636bd826537a kernel-2.4.21-32.EL.ppc64pseries.rpm 8397f50f3ec6f1e889090895e7eb66fb kernel-doc-2.4.21-32.EL.ppc64.rpm 9444e6fd23671724e861b06bc555bae5 kernel-source-2.4.21-32.EL.ppc64.rpm 6590395e036ae1832f1b55790d8d0821 kernel-unsupported-2.4.21-32.EL.ppc64iseries.rpm 07417ced420144cdb932ec66125a0b57 kernel-unsupported-2.4.21-32.EL.ppc64pseries.rpm
s390: d06b1ae5b6556386c443e8c94b6fc4c8 kernel-2.4.21-32.EL.s390.rpm 53da0a3fe4e89213f9e26fb97b016ea6 kernel-doc-2.4.21-32.EL.s390.rpm 0fe7cf2c4c26154847d210a4a6667793 kernel-source-2.4.21-32.EL.s390.rpm e6aee965886f221e431b40c846bb4bbe kernel-unsupported-2.4.21-32.EL.s390.rpm
s390x: 4a3f013bae04963eafc67c6a7d26919d kernel-2.4.21-32.EL.s390x.rpm c5d899ad8ca24d2bcba1fd529c612754 kernel-doc-2.4.21-32.EL.s390x.rpm c4b13e1642a7f61e02b9ca587fc1752a kernel-source-2.4.21-32.EL.s390x.rpm 9075beed557f713bacc0711eb59f7d31 kernel-unsupported-2.4.21-32.EL.s390x.rpm
x86_64: a2e8ed1142c8e49b63121abdaa4f07d4 kernel-2.4.21-32.EL.ia32e.rpm 3bed6796650f2feecbbdf18dc922c36e kernel-2.4.21-32.EL.x86_64.rpm 789238cb24bc8f775df251814d719859 kernel-doc-2.4.21-32.EL.x86_64.rpm 2fdd45ff58088a3eaaeb8b2b63fbcfa3 kernel-smp-2.4.21-32.EL.x86_64.rpm 9e441aabd0c66dfdc307f68bfe132a0f kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm 55d4e2e890d1a86c0824aff16e374d82 kernel-source-2.4.21-32.EL.x86_64.rpm 3c1f18d57e43ea15a1294266a9b59ed4 kernel-unsupported-2.4.21-32.EL.ia32e.rpm cfb343332b2d03f4df3504104531c7e2 kernel-unsupported-2.4.21-32.EL.x86_64.rpm
Red Hat Desktop version 3:
SRPMS: d5420415832273a5518afd0b5e3d7a47 kernel-2.4.21-32.EL.src.rpm
i386: 8992dd4ed1397d860a1ae85dfc7b2dbd kernel-2.4.21-32.EL.athlon.rpm 7cd1f101f584fc58a804320ab0a55455 kernel-2.4.21-32.EL.i686.rpm bb1a35656242fb6e15e0a0051af10799 kernel-BOOT-2.4.21-32.EL.i386.rpm aa69d228a91a1f045f920b42360f3c11 kernel-doc-2.4.21-32.EL.i386.rpm c7488ce800ccef31568e8b8dda1f405e kernel-hugemem-2.4.21-32.EL.i686.rpm d1479b65b4a6aac62cf97ec4870cf1c1 kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm 5d86be94c356e79de1ed971fa4a0ac75 kernel-smp-2.4.21-32.EL.athlon.rpm 28fac40c22db6db1a7b14a903dc8533b kernel-smp-2.4.21-32.EL.i686.rpm 55fd4b598560907990a420ce99932f57 kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm 36ffa544956f7a7b98d2f97a31c1fe99 kernel-smp-unsupported-2.4.21-32.EL.i686.rpm ed0102588582ffe0dcf59b12d6d5826c kernel-source-2.4.21-32.EL.i386.rpm 6110eda2670195aacb0bac8f8e378d33 kernel-unsupported-2.4.21-32.EL.athlon.rpm ac92f37920c8e99fbab7b9d36e1ca565 kernel-unsupported-2.4.21-32.EL.i686.rpm
x86_64: a2e8ed1142c8e49b63121abdaa4f07d4 kernel-2.4.21-32.EL.ia32e.rpm 3bed6796650f2feecbbdf18dc922c36e kernel-2.4.21-32.EL.x86_64.rpm 789238cb24bc8f775df251814d719859 kernel-doc-2.4.21-32.EL.x86_64.rpm 2fdd45ff58088a3eaaeb8b2b63fbcfa3 kernel-smp-2.4.21-32.EL.x86_64.rpm 9e441aabd0c66dfdc307f68bfe132a0f kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm 55d4e2e890d1a86c0824aff16e374d82 kernel-source-2.4.21-32.EL.x86_64.rpm 3c1f18d57e43ea15a1294266a9b59ed4 kernel-unsupported-2.4.21-32.EL.ia32e.rpm cfb343332b2d03f4df3504104531c7e2 kernel-unsupported-2.4.21-32.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS: d5420415832273a5518afd0b5e3d7a47 kernel-2.4.21-32.EL.src.rpm
i386: 8992dd4ed1397d860a1ae85dfc7b2dbd kernel-2.4.21-32.EL.athlon.rpm 7cd1f101f584fc58a804320ab0a55455 kernel-2.4.21-32.EL.i686.rpm bb1a35656242fb6e15e0a0051af10799 kernel-BOOT-2.4.21-32.EL.i386.rpm aa69d228a91a1f045f920b42360f3c11 kernel-doc-2.4.21-32.EL.i386.rpm c7488ce800ccef31568e8b8dda1f405e kernel-hugemem-2.4.21-32.EL.i686.rpm d1479b65b4a6aac62cf97ec4870cf1c1 kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm 5d86be94c356e79de1ed971fa4a0ac75 kernel-smp-2.4.21-32.EL.athlon.rpm 28fac40c22db6db1a7b14a903dc8533b kernel-smp-2.4.21-32.EL.i686.rpm 55fd4b598560907990a420ce99932f57 kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm 36ffa544956f7a7b98d2f97a31c1fe99 kernel-smp-unsupported-2.4.21-32.EL.i686.rpm ed0102588582ffe0dcf59b12d6d5826c kernel-source-2.4.21-32.EL.i386.rpm 6110eda2670195aacb0bac8f8e378d33 kernel-unsupported-2.4.21-32.EL.athlon.rpm ac92f37920c8e99fbab7b9d36e1ca565 kernel-unsupported-2.4.21-32.EL.i686.rpm
ia64: b073901a18678b5fb31d38031aa68b8c kernel-2.4.21-32.EL.ia64.rpm 25fab30ddaeca594c1aa81a6c809bec9 kernel-doc-2.4.21-32.EL.ia64.rpm 5303ff75aa0208dd98a17fb684dd102e kernel-source-2.4.21-32.EL.ia64.rpm a98dd1aa4a42edfbf8d750398f7bf0da kernel-unsupported-2.4.21-32.EL.ia64.rpm
x86_64: a2e8ed1142c8e49b63121abdaa4f07d4 kernel-2.4.21-32.EL.ia32e.rpm 3bed6796650f2feecbbdf18dc922c36e kernel-2.4.21-32.EL.x86_64.rpm 789238cb24bc8f775df251814d719859 kernel-doc-2.4.21-32.EL.x86_64.rpm 2fdd45ff58088a3eaaeb8b2b63fbcfa3 kernel-smp-2.4.21-32.EL.x86_64.rpm 9e441aabd0c66dfdc307f68bfe132a0f kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm 55d4e2e890d1a86c0824aff16e374d82 kernel-source-2.4.21-32.EL.x86_64.rpm 3c1f18d57e43ea15a1294266a9b59ed4 kernel-unsupported-2.4.21-32.EL.ia32e.rpm cfb343332b2d03f4df3504104531c7e2 kernel-unsupported-2.4.21-32.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS: d5420415832273a5518afd0b5e3d7a47 kernel-2.4.21-32.EL.src.rpm
i386: 8992dd4ed1397d860a1ae85dfc7b2dbd kernel-2.4.21-32.EL.athlon.rpm 7cd1f101f584fc58a804320ab0a55455 kernel-2.4.21-32.EL.i686.rpm bb1a35656242fb6e15e0a0051af10799 kernel-BOOT-2.4.21-32.EL.i386.rpm aa69d228a91a1f045f920b42360f3c11 kernel-doc-2.4.21-32.EL.i386.rpm c7488ce800ccef31568e8b8dda1f405e kernel-hugemem-2.4.21-32.EL.i686.rpm d1479b65b4a6aac62cf97ec4870cf1c1 kernel-hugemem-unsupported-2.4.21-32.EL.i686.rpm 5d86be94c356e79de1ed971fa4a0ac75 kernel-smp-2.4.21-32.EL.athlon.rpm 28fac40c22db6db1a7b14a903dc8533b kernel-smp-2.4.21-32.EL.i686.rpm 55fd4b598560907990a420ce99932f57 kernel-smp-unsupported-2.4.21-32.EL.athlon.rpm 36ffa544956f7a7b98d2f97a31c1fe99 kernel-smp-unsupported-2.4.21-32.EL.i686.rpm ed0102588582ffe0dcf59b12d6d5826c kernel-source-2.4.21-32.EL.i386.rpm 6110eda2670195aacb0bac8f8e378d33 kernel-unsupported-2.4.21-32.EL.athlon.rpm ac92f37920c8e99fbab7b9d36e1ca565 kernel-unsupported-2.4.21-32.EL.i686.rpm
ia64: b073901a18678b5fb31d38031aa68b8c kernel-2.4.21-32.EL.ia64.rpm 25fab30ddaeca594c1aa81a6c809bec9 kernel-doc-2.4.21-32.EL.ia64.rpm 5303ff75aa0208dd98a17fb684dd102e kernel-source-2.4.21-32.EL.ia64.rpm a98dd1aa4a42edfbf8d750398f7bf0da kernel-unsupported-2.4.21-32.EL.ia64.rpm
x86_64: a2e8ed1142c8e49b63121abdaa4f07d4 kernel-2.4.21-32.EL.ia32e.rpm 3bed6796650f2feecbbdf18dc922c36e kernel-2.4.21-32.EL.x86_64.rpm 789238cb24bc8f775df251814d719859 kernel-doc-2.4.21-32.EL.x86_64.rpm 2fdd45ff58088a3eaaeb8b2b63fbcfa3 kernel-smp-2.4.21-32.EL.x86_64.rpm 9e441aabd0c66dfdc307f68bfe132a0f kernel-smp-unsupported-2.4.21-32.EL.x86_64.rpm 55d4e2e890d1a86c0824aff16e374d82 kernel-source-2.4.21-32.EL.x86_64.rpm 3c1f18d57e43ea15a1294266a9b59ed4 kernel-unsupported-2.4.21-32.EL.ia32e.rpm cfb343332b2d03f4df3504104531c7e2 kernel-unsupported-2.4.21-32.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0757

Package List


Severity
Advisory ID: RHSA-2005:294-01
Advisory URL: https://access.redhat.com/errata/RHSA-2005:294.html
Issued Date: : 2005-05-18
Updated on: 2005-05-18
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2005:293
CVE Names: CAN-2005-0757 Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the fifth regular update.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Desktop version 3 - i386, x86_64

Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64


Bugs Fixed


Related News