Red Hat 9062 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: Updated kernel packages for Red Hat Enterprise Linux 3 Update 8
Advisory ID: RHSA-2006:0437-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0437.html
Issue date: 2006-07-20
Updated on: 2006-07-20
Product: Red Hat Enterprise Linux
Keywords: taroon kernel update
Obsoletes: RHSA-2006:0144
CVE Names: CVE-2005-3055 CVE-2005-3107 CVE-2006-0741
CVE-2006-0742 CVE-2006-0744 CVE-2006-1056
CVE-2006-1242 CVE-2006-1343 CVE-2006-2444
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 3. This is the eighth
regular update.

This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the eighth regular kernel update to Red Hat Enterprise Linux 3.

New features introduced by this update include:

- addition of the adp94xx and dcdbas device drivers
- diskdump support on megaraid_sas, qlogic, and swap partitions
- support for new hardware via driver and SCSI white-list updates

There were many bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement in
the reliability and scalability of Red Hat Enterprise Linux 3.

There were numerous driver updates and security fixes (elaborated below).
Other key areas affected by fixes in this update include the networking
subsystem, the NFS and autofs4 file systems, the SCSI and USB subsystems,
and architecture-specific handling affecting AMD Opteron and Intel EM64T
processors.

The following device drivers have been added or upgraded to new versions:

adp94xx -------- 1.0.8 (new)
bnx2 ----------- 1.4.38
cciss ---------- 2.4.60.RH1
dcdbas --------- 5.6.0-1 (new)
e1000 ---------- 7.0.33-k2
emulex --------- 7.3.6
forcedeth ------ 0.30
ipmi ----------- 35.13
qlogic --------- 7.07.04b6
tg3 ------------ 3.52RH

The following security bugs were fixed in this update:

- a flaw in the USB devio handling of device removal that allowed a
local user to cause a denial of service (crash) (CVE-2005-3055,
moderate)

- a flaw in the exec() handling of multi-threaded tasks using ptrace()
that allowed a local user to cause a denial of service (hang of a
user process) (CVE-2005-3107, low)

- a difference in "sysretq" operation of EM64T (as opposed to Opteron)
processors that allowed a local user to cause a denial of service
(crash) upon return from certain system calls (CVE-2006-0741 and
CVE-2006-0744, important)

- a flaw in unaligned accesses handling on Intel Itanium processors
that allowed a local user to cause a denial of service (crash)
(CVE-2006-0742, important)

- an info leak on AMD-based x86 and x86_64 systems that allowed a local
user to retrieve the floating point exception state of a process
run by a different user (CVE-2006-1056, important)

- a flaw in IPv4 packet output handling that allowed a remote user to
bypass the zero IP ID countermeasure on systems with a disabled
firewall (CVE-2006-1242, low)

- a minor info leak in socket option handling in the network code
(CVE-2006-1343, low)

- a flaw in IPv4 netfilter handling for the unlikely use of SNMP NAT
processing that allowed a remote user to cause a denial of service
(crash) or potential memory corruption (CVE-2006-2444, moderate)

Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

97000 - i8253 count too high! resetting...
102504 - cannot reboot on Dell 6450 with RHEL 3
102973 - i8253 count too high
103024 - "i8253 count too high! resetting.." ?
119457 - panics in generic_aio_complete_rw and unmap_kvec after __iodesc_free calls generic_aio_complete_read()
127689 - Reboot fails on Dell PowerEdge 6450
129477 - kernel panic in umount
131881 - clock_gettime() triggers audit kill from i386 binary on x86_64
132105 - autofs (automount) failover does not work
132994 - kernel oops when unplugging usb serial adapter using pl2303 and mct_u232
134555 - System hangs when rebooting Dell PE6450
134736 - kernel panic in md driver (md lacks proper locking of device lists)
142718 - [PATCH] [RHEL3] dpt_i2o modules in RHEL gets oops
146789 - Implement a better solution to the dma memory allocation done in the kernel
146954 - megaraid2 driver fails to recognize all LSI RAID adapters when there are more than 4 with >=4GB
149732 - Hang with radeon driver when DRM DRI actve
152630 - timer interrupt received twice on ATI chipset motherboard, clock runs at double speed
153954 - kernel panic when removing active USB serial converter used as serial console
154680 - Kernel panic on 8GB machines under stress running e1000 diagnostics
157667 - I/O Errors when swtiching Blade USB Media Tray
159862 - kernel oops with usbserial (minicom key pressed)
160600 - Accessing automounted directories can cause a process to hang forever
165246 - EHCI Host driver violates USB2.0 Specification leading to device failures.
167636 - Unable to unmount a local file system exported by NFS
167672 - GART error during bootup
167839 - kernel crashes with an Ooops
169261 - CVE-2005-3055 async usb devio oops
170261 - CVE-2005-3107 zap_threads DoS
171277 - MCE arg parsing broken on x86-64
174818 - [PATCH] bonding: don't drop non-VLAN traffic
175143 - sys_io_setup() can leak an mm reference on failure
175759 - Reboot of Dell 6450 fails
177451 - Kernel panic : Unable to handle kernel paging request at virtual address 6668c79a
177571 - [RHEL3] [RFE] forcedeth driver on xw9300 has minimal support for ethtool and mii-tool
178119 - [RHEL3] dump_stack() isn't implemented on x86_64
178131 - syslog-only netdump still tries to dump memory
178885 - bonding mode=6 + dhcp doesn't work correctly
179657 - Intermittently unable to mount NFS filesystem using autofs --ghost
180968 - Data corruption in ext3 FS when running hazard (corrupt inodes)
181815 - Phantom escalating load due to flawed rq->nr_uninterruptible increment
182961 - IBM x336, x260, and x460 requires acpi=noirq bootup option.
182996 - ST Tape Driver Bug!!
183881 - kernel/libc type mismatch on siginfo_t->si_band - breaks FAM on 64bit arches
185183 - Kernel BUG at pci_dma:43 encountered
185735 - BNX2 Patch in 2.4.21-40.EL kills "Network Device Support" config menu
186058 - CVE-2006-1242 Linux zero IP ID vulnerability?
186244 - CVE-2006-1343 Small information leak in SO_ORIGINAL_DST
186307 - RHEL3U7 fails installation using RSA(2).
186455 - Submission of a patch for non-sequential LUN mapping
186901 - make menuconfig crashes
187548 - IPMI startup race condition
187911 - CVE-2006-1056 FPU Information leak on i386/x86-64 on AMD CPUs
192633 - CVE-2006-2444 SNMP NAT netfilter memory corruption
196938 - [Beta RHEL3 U8 Regression] Processes hung while allocating stack using gdb

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-47.EL.src.rpm
ad2d8788e17c18d3a6e078c42ddefc8c kernel-2.4.21-47.EL.src.rpm

i386:
3a6be922eb8205b6e8890d524963fd12 kernel-2.4.21-47.EL.athlon.rpm
d39a30f4a73a8b2b4ed7f78cef37a8dd kernel-2.4.21-47.EL.i686.rpm
828c25797547dbb19fbe90d04c8e0681 kernel-BOOT-2.4.21-47.EL.i386.rpm
9de060bf02043ede15eb4fbaa53df368 kernel-debuginfo-2.4.21-47.EL.athlon.rpm
af4c9cacf7c98658c15429230494e8f5 kernel-debuginfo-2.4.21-47.EL.i386.rpm
26d39b74be39a90bb87f244252a905d7 kernel-debuginfo-2.4.21-47.EL.i686.rpm
f996ed7d81e56b863f4ee95bf77f2232 kernel-doc-2.4.21-47.EL.i386.rpm
dd3a082be14db9a3f2c5d8fffaa5a88b kernel-hugemem-2.4.21-47.EL.i686.rpm
171cfbd96711dd6b9c130253616836e6 kernel-hugemem-unsupported-2.4.21-47.EL.i686.rpm
6cb9e4f65d21ed49cd0b95a15b477c17 kernel-smp-2.4.21-47.EL.athlon.rpm
1e26e704c1d685f7f25159d0c728c5a0 kernel-smp-2.4.21-47.EL.i686.rpm
f16baf3eacd80c5fd06b0fba15263089 kernel-smp-unsupported-2.4.21-47.EL.athlon.rpm
58e4b4842750f55d67d42f73541c6d4b kernel-smp-unsupported-2.4.21-47.EL.i686.rpm
8b703059bed38e9382617bb2561971a5 kernel-source-2.4.21-47.EL.i386.rpm
73778bab6685813ee7a10d84c62106e0 kernel-unsupported-2.4.21-47.EL.athlon.rpm
e7e7407b6c042bea70b8dc9dafb3216a kernel-unsupported-2.4.21-47.EL.i686.rpm

ia64:
b634628de6cc83505cbdba01b8e504f0 kernel-2.4.21-47.EL.ia64.rpm
6119af9de2554caefbd51412d1e82f14 kernel-debuginfo-2.4.21-47.EL.ia64.rpm
da355dc014ec9481cfdbce10a5e662c9 kernel-doc-2.4.21-47.EL.ia64.rpm
5f19afc2c3de3ef76e7d683d6034c2f9 kernel-source-2.4.21-47.EL.ia64.rpm
65f7865cd8ead2c38e44388e14238a3a kernel-unsupported-2.4.21-47.EL.ia64.rpm

ppc:
a1e773d9e270c4ce355f8cabaca8b204 kernel-2.4.21-47.EL.ppc64iseries.rpm
7536e9fe229f99225be383601fef379d kernel-2.4.21-47.EL.ppc64pseries.rpm
642d28ffa8ded5b9b7bfda83870d6c6e kernel-debuginfo-2.4.21-47.EL.ppc64.rpm
6c54fcfcee1399b2465c48f7f2836019 kernel-debuginfo-2.4.21-47.EL.ppc64iseries.rpm
97d1692de52c1d55ce60f7bd20ced32f kernel-debuginfo-2.4.21-47.EL.ppc64pseries.rpm
17197d16b0758b8bc746fe6e77a07aa2 kernel-doc-2.4.21-47.EL.ppc64.rpm
354f626eaec3328a2303753074c33bf7 kernel-source-2.4.21-47.EL.ppc64.rpm
fc3da58c8347792f1cdf3e7aceb37e9c kernel-unsupported-2.4.21-47.EL.ppc64iseries.rpm
34ec69fc6f843d817f86a2a84bc2110e kernel-unsupported-2.4.21-47.EL.ppc64pseries.rpm

s390:
90c37c377be5ef7d6165a4638f15311d kernel-2.4.21-47.EL.s390.rpm
9b64618d9cc519b5dcc1c1299465d7af kernel-debuginfo-2.4.21-47.EL.s390.rpm
2e42e40a96cf582cd615ad6a2dde56b2 kernel-doc-2.4.21-47.EL.s390.rpm
090df94b03b41fec1bf304169e0cf1d0 kernel-source-2.4.21-47.EL.s390.rpm
2f1e2b1b4243550e381606f501b20d34 kernel-unsupported-2.4.21-47.EL.s390.rpm

s390x:
ad7a8351a357cba1e4b96ddb7bf1b87e kernel-2.4.21-47.EL.s390x.rpm
df3a5731ab3da6a92e89f81f3f39582a kernel-debuginfo-2.4.21-47.EL.s390x.rpm
5f1733d166b15065c4223b2924fe0022 kernel-doc-2.4.21-47.EL.s390x.rpm
691c88969be0422a222ff69bdde23929 kernel-source-2.4.21-47.EL.s390x.rpm
8c6f35a9efff280d9ccce308a5248e13 kernel-unsupported-2.4.21-47.EL.s390x.rpm

x86_64:
42ad1b6c57955012a6945b240b933f17 kernel-2.4.21-47.EL.ia32e.rpm
3d02d42d9b936857999ffffebad26366 kernel-2.4.21-47.EL.x86_64.rpm
87ec6c9cee8b8f89671f210c2e8d1141 kernel-debuginfo-2.4.21-47.EL.ia32e.rpm
6072bb496dd48e82d7ad46daa6075a0f kernel-debuginfo-2.4.21-47.EL.x86_64.rpm
c999d4b2af19b5ea930d23af1be52811 kernel-doc-2.4.21-47.EL.x86_64.rpm
68bb412d217d00fd53acf16f65a1cd69 kernel-smp-2.4.21-47.EL.x86_64.rpm
3e0e9ccd5332658e7f481166725fdb70 kernel-smp-unsupported-2.4.21-47.EL.x86_64.rpm
22c324aa82aec45b3bd01f40bc6245f2 kernel-source-2.4.21-47.EL.x86_64.rpm
57f87cdd8cdeaf3308a4e574dab9b8f4 kernel-unsupported-2.4.21-47.EL.ia32e.rpm
f4bab8b064c3bf989976525f2d3e90a5 kernel-unsupported-2.4.21-47.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-47.EL.src.rpm
ad2d8788e17c18d3a6e078c42ddefc8c kernel-2.4.21-47.EL.src.rpm

i386:
3a6be922eb8205b6e8890d524963fd12 kernel-2.4.21-47.EL.athlon.rpm
d39a30f4a73a8b2b4ed7f78cef37a8dd kernel-2.4.21-47.EL.i686.rpm
828c25797547dbb19fbe90d04c8e0681 kernel-BOOT-2.4.21-47.EL.i386.rpm
9de060bf02043ede15eb4fbaa53df368 kernel-debuginfo-2.4.21-47.EL.athlon.rpm
af4c9cacf7c98658c15429230494e8f5 kernel-debuginfo-2.4.21-47.EL.i386.rpm
26d39b74be39a90bb87f244252a905d7 kernel-debuginfo-2.4.21-47.EL.i686.rpm
f996ed7d81e56b863f4ee95bf77f2232 kernel-doc-2.4.21-47.EL.i386.rpm
dd3a082be14db9a3f2c5d8fffaa5a88b kernel-hugemem-2.4.21-47.EL.i686.rpm
171cfbd96711dd6b9c130253616836e6 kernel-hugemem-unsupported-2.4.21-47.EL.i686.rpm
6cb9e4f65d21ed49cd0b95a15b477c17 kernel-smp-2.4.21-47.EL.athlon.rpm
1e26e704c1d685f7f25159d0c728c5a0 kernel-smp-2.4.21-47.EL.i686.rpm
f16baf3eacd80c5fd06b0fba15263089 kernel-smp-unsupported-2.4.21-47.EL.athlon.rpm
58e4b4842750f55d67d42f73541c6d4b kernel-smp-unsupported-2.4.21-47.EL.i686.rpm
8b703059bed38e9382617bb2561971a5 kernel-source-2.4.21-47.EL.i386.rpm
73778bab6685813ee7a10d84c62106e0 kernel-unsupported-2.4.21-47.EL.athlon.rpm
e7e7407b6c042bea70b8dc9dafb3216a kernel-unsupported-2.4.21-47.EL.i686.rpm

x86_64:
42ad1b6c57955012a6945b240b933f17 kernel-2.4.21-47.EL.ia32e.rpm
3d02d42d9b936857999ffffebad26366 kernel-2.4.21-47.EL.x86_64.rpm
87ec6c9cee8b8f89671f210c2e8d1141 kernel-debuginfo-2.4.21-47.EL.ia32e.rpm
6072bb496dd48e82d7ad46daa6075a0f kernel-debuginfo-2.4.21-47.EL.x86_64.rpm
c999d4b2af19b5ea930d23af1be52811 kernel-doc-2.4.21-47.EL.x86_64.rpm
68bb412d217d00fd53acf16f65a1cd69 kernel-smp-2.4.21-47.EL.x86_64.rpm
3e0e9ccd5332658e7f481166725fdb70 kernel-smp-unsupported-2.4.21-47.EL.x86_64.rpm
22c324aa82aec45b3bd01f40bc6245f2 kernel-source-2.4.21-47.EL.x86_64.rpm
57f87cdd8cdeaf3308a4e574dab9b8f4 kernel-unsupported-2.4.21-47.EL.ia32e.rpm
f4bab8b064c3bf989976525f2d3e90a5 kernel-unsupported-2.4.21-47.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-47.EL.src.rpm
ad2d8788e17c18d3a6e078c42ddefc8c kernel-2.4.21-47.EL.src.rpm

i386:
3a6be922eb8205b6e8890d524963fd12 kernel-2.4.21-47.EL.athlon.rpm
d39a30f4a73a8b2b4ed7f78cef37a8dd kernel-2.4.21-47.EL.i686.rpm
828c25797547dbb19fbe90d04c8e0681 kernel-BOOT-2.4.21-47.EL.i386.rpm
9de060bf02043ede15eb4fbaa53df368 kernel-debuginfo-2.4.21-47.EL.athlon.rpm
af4c9cacf7c98658c15429230494e8f5 kernel-debuginfo-2.4.21-47.EL.i386.rpm
26d39b74be39a90bb87f244252a905d7 kernel-debuginfo-2.4.21-47.EL.i686.rpm
f996ed7d81e56b863f4ee95bf77f2232 kernel-doc-2.4.21-47.EL.i386.rpm
dd3a082be14db9a3f2c5d8fffaa5a88b kernel-hugemem-2.4.21-47.EL.i686.rpm
171cfbd96711dd6b9c130253616836e6 kernel-hugemem-unsupported-2.4.21-47.EL.i686.rpm
6cb9e4f65d21ed49cd0b95a15b477c17 kernel-smp-2.4.21-47.EL.athlon.rpm
1e26e704c1d685f7f25159d0c728c5a0 kernel-smp-2.4.21-47.EL.i686.rpm
f16baf3eacd80c5fd06b0fba15263089 kernel-smp-unsupported-2.4.21-47.EL.athlon.rpm
58e4b4842750f55d67d42f73541c6d4b kernel-smp-unsupported-2.4.21-47.EL.i686.rpm
8b703059bed38e9382617bb2561971a5 kernel-source-2.4.21-47.EL.i386.rpm
73778bab6685813ee7a10d84c62106e0 kernel-unsupported-2.4.21-47.EL.athlon.rpm
e7e7407b6c042bea70b8dc9dafb3216a kernel-unsupported-2.4.21-47.EL.i686.rpm

ia64:
b634628de6cc83505cbdba01b8e504f0 kernel-2.4.21-47.EL.ia64.rpm
6119af9de2554caefbd51412d1e82f14 kernel-debuginfo-2.4.21-47.EL.ia64.rpm
da355dc014ec9481cfdbce10a5e662c9 kernel-doc-2.4.21-47.EL.ia64.rpm
5f19afc2c3de3ef76e7d683d6034c2f9 kernel-source-2.4.21-47.EL.ia64.rpm
65f7865cd8ead2c38e44388e14238a3a kernel-unsupported-2.4.21-47.EL.ia64.rpm

x86_64:
42ad1b6c57955012a6945b240b933f17 kernel-2.4.21-47.EL.ia32e.rpm
3d02d42d9b936857999ffffebad26366 kernel-2.4.21-47.EL.x86_64.rpm
87ec6c9cee8b8f89671f210c2e8d1141 kernel-debuginfo-2.4.21-47.EL.ia32e.rpm
6072bb496dd48e82d7ad46daa6075a0f kernel-debuginfo-2.4.21-47.EL.x86_64.rpm
c999d4b2af19b5ea930d23af1be52811 kernel-doc-2.4.21-47.EL.x86_64.rpm
68bb412d217d00fd53acf16f65a1cd69 kernel-smp-2.4.21-47.EL.x86_64.rpm
3e0e9ccd5332658e7f481166725fdb70 kernel-smp-unsupported-2.4.21-47.EL.x86_64.rpm
22c324aa82aec45b3bd01f40bc6245f2 kernel-source-2.4.21-47.EL.x86_64.rpm
57f87cdd8cdeaf3308a4e574dab9b8f4 kernel-unsupported-2.4.21-47.EL.ia32e.rpm
f4bab8b064c3bf989976525f2d3e90a5 kernel-unsupported-2.4.21-47.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-47.EL.src.rpm
ad2d8788e17c18d3a6e078c42ddefc8c kernel-2.4.21-47.EL.src.rpm

i386:
3a6be922eb8205b6e8890d524963fd12 kernel-2.4.21-47.EL.athlon.rpm
d39a30f4a73a8b2b4ed7f78cef37a8dd kernel-2.4.21-47.EL.i686.rpm
828c25797547dbb19fbe90d04c8e0681 kernel-BOOT-2.4.21-47.EL.i386.rpm
9de060bf02043ede15eb4fbaa53df368 kernel-debuginfo-2.4.21-47.EL.athlon.rpm
af4c9cacf7c98658c15429230494e8f5 kernel-debuginfo-2.4.21-47.EL.i386.rpm
26d39b74be39a90bb87f244252a905d7 kernel-debuginfo-2.4.21-47.EL.i686.rpm
f996ed7d81e56b863f4ee95bf77f2232 kernel-doc-2.4.21-47.EL.i386.rpm
dd3a082be14db9a3f2c5d8fffaa5a88b kernel-hugemem-2.4.21-47.EL.i686.rpm
171cfbd96711dd6b9c130253616836e6 kernel-hugemem-unsupported-2.4.21-47.EL.i686.rpm
6cb9e4f65d21ed49cd0b95a15b477c17 kernel-smp-2.4.21-47.EL.athlon.rpm
1e26e704c1d685f7f25159d0c728c5a0 kernel-smp-2.4.21-47.EL.i686.rpm
f16baf3eacd80c5fd06b0fba15263089 kernel-smp-unsupported-2.4.21-47.EL.athlon.rpm
58e4b4842750f55d67d42f73541c6d4b kernel-smp-unsupported-2.4.21-47.EL.i686.rpm
8b703059bed38e9382617bb2561971a5 kernel-source-2.4.21-47.EL.i386.rpm
73778bab6685813ee7a10d84c62106e0 kernel-unsupported-2.4.21-47.EL.athlon.rpm
e7e7407b6c042bea70b8dc9dafb3216a kernel-unsupported-2.4.21-47.EL.i686.rpm

ia64:
b634628de6cc83505cbdba01b8e504f0 kernel-2.4.21-47.EL.ia64.rpm
6119af9de2554caefbd51412d1e82f14 kernel-debuginfo-2.4.21-47.EL.ia64.rpm
da355dc014ec9481cfdbce10a5e662c9 kernel-doc-2.4.21-47.EL.ia64.rpm
5f19afc2c3de3ef76e7d683d6034c2f9 kernel-source-2.4.21-47.EL.ia64.rpm
65f7865cd8ead2c38e44388e14238a3a kernel-unsupported-2.4.21-47.EL.ia64.rpm

x86_64:
42ad1b6c57955012a6945b240b933f17 kernel-2.4.21-47.EL.ia32e.rpm
3d02d42d9b936857999ffffebad26366 kernel-2.4.21-47.EL.x86_64.rpm
87ec6c9cee8b8f89671f210c2e8d1141 kernel-debuginfo-2.4.21-47.EL.ia32e.rpm
6072bb496dd48e82d7ad46daa6075a0f kernel-debuginfo-2.4.21-47.EL.x86_64.rpm
c999d4b2af19b5ea930d23af1be52811 kernel-doc-2.4.21-47.EL.x86_64.rpm
68bb412d217d00fd53acf16f65a1cd69 kernel-smp-2.4.21-47.EL.x86_64.rpm
3e0e9ccd5332658e7f481166725fdb70 kernel-smp-unsupported-2.4.21-47.EL.x86_64.rpm
22c324aa82aec45b3bd01f40bc6245f2 kernel-source-2.4.21-47.EL.x86_64.rpm
57f87cdd8cdeaf3308a4e574dab9b8f4 kernel-unsupported-2.4.21-47.EL.ia32e.rpm
f4bab8b064c3bf989976525f2d3e90a5 kernel-unsupported-2.4.21-47.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0742
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEv4N6XlSAg2UNWIIRAj8CAJ0WZ8Kka2PXzEcin+kfDez4lq+5/gCeMhZd
0VI7R5o70tqw8a8/2ygze68=
=lOTh
-----END PGP SIGNATURE-----