Red Hat 9038 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4
Advisory ID: RHSA-2006:0575-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0575.html
Issue date: 2006-08-10
Updated on: 2006-08-10
Product: Red Hat Enterprise Linux
Keywords: nahant kernel update
Obsoletes: RHSA-2006:0574
CVE Names: CVE-2005-3055 CVE-2005-3623 CVE-2006-0038
CVE-2006-0456 CVE-2006-0457 CVE-2006-0742
CVE-2006-1052 CVE-2006-1056 CVE-2006-1242
CVE-2006-1343 CVE-2006-1857 CVE-2006-2275
CVE-2006-2446 CVE-2006-2448 CVE-2006-2934
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

This is the fourth regular update to Red Hat Enterprise Linux 4.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

New features introduced in this update include:

* Device Mapper mirroring support

* IDE diskdump support

* x86, AMD64 and Intel EM64T: Multi-core scheduler support enhancements

* Itanium: perfmon support for Montecito

* much improved support for IBM x460

* AMD PowerNow! patches to support Opteron Rev G

* Vmalloc support > 64MB

The following device drivers have been upgraded to new versions:

ipmi: 33.11 to 33.13
ib_mthca: 0.06 to 0.08
bnx2: 1.4.30 to 1.4.38
bonding: 2.6.1 to 2.6.3
e100: 3.4.8-k2-NAPI to 3.5.10-k2-NAPI
e1000: 6.1.16-k3-NAPI to 7.0.33-k2-NAPI
sky2: 0.13 to 1.1
tg3: 3.43-rh to 3.52-rh
ipw2100: 1.1.0 to git-1.1.4
ipw2200: 1.0.0 to git-1.0.10
3w-9xxx: 2.26.02.001 to 2.26.04.010
ips: 7.10.18 to 7.12.02
iscsi_sfnet: 4:0.1.11-2 to 4:0.1.11-3
lpfc: 0:8.0.16.18 to 0:8.0.16.27
megaraid_sas: 00.00.02.00 to 00.00.02.03-RH1
qla2xxx: 8.01.02-d4 to 8.01.04-d7
qla6312: 8.01.02-d4 to 8.01.04-d7
sata_promise: 1.03 to 1.04
sata_vsc: 1.1 to 1.2
ibmvscsic: 1.5.5 to 1.5.6
ipr: 2.0.11.1 to 2.0.11.2

Added drivers:

dcdbas: 5.6.0-2
sata_mv: 0.6
sata_qstor: 0.05
sata_uli: 0.5
skge: 1.1
stex: 2.9.0.13
pdc_adma: 0.03

This update includes fixes for the security issues:

* a flaw in the USB devio handling of device removal that allowed a
local user to cause a denial of service (crash) (CVE-2005-3055,
moderate)

* a flaw in the ACL handling of nfsd that allowed a remote user to
bypass ACLs for readonly mounted NFS file systems (CVE-2005-3623,
moderate)

* a flaw in the netfilter handling that allowed a local user with
CAP_NET_ADMIN rights to cause a buffer overflow (CVE-2006-0038, low)

* a flaw in the IBM S/390 and IBM zSeries strnlen_user() function that
allowed a local user to cause a denial of service (crash) or to retrieve
random kernel data (CVE-2006-0456, important)

* a flaw in the keyctl functions that allowed a local user to cause a
denial of service (crash) or to read sensitive kernel memory
(CVE-2006-0457, important)

* a flaw in unaligned accesses handling on Itanium processors that
allowed a local user to cause a denial of service (crash)
(CVE-2006-0742, important)

* a flaw in SELinux ptrace logic that allowed a local user with ptrace
permissions to change the tracer SID to a SID of another process
(CVE-2006-1052, moderate)

* an info leak on AMD-based x86 and x86_64 systems that allowed a local
user to retrieve the floating point exception state of a process run by a
different user (CVE-2006-1056, important)

* a flaw in IPv4 packet output handling that allowed a remote user to
bypass the zero IP ID countermeasure on systems with a disabled firewall
(CVE-2006-1242, low)

* a minor info leak in socket option handling in the network code
(CVE-2006-1343, low)

* a flaw in the HB-ACK chunk handling of SCTP that allowed a remote user to
cause a denial of service (crash) (CVE-2006-1857, moderate)

* a flaw in the SCTP implementation that allowed a remote user to cause a
denial of service (deadlock) (CVE-2006-2275, moderate)

* a flaw in the socket buffer handling that allowed a remote user to cause
a denial of service (panic) (CVE-2006-2446, important)

* a flaw in the signal handling access checking on PowerPC that allowed a
local user to cause a denial of service (crash) or read arbitrary kernel
memory on 64-bit systems (CVE-2006-2448, important)

* a flaw in the netfilter SCTP module when receiving a chunkless packet
that allowed a remote user to cause a denial of service (crash)
(CVE-2006-2934, important)

There were several bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

141342 - install hangs on Dell PowerVault 745 with SATA drives (sata_vsc module)
149933 - fix missing wakeup in ipc/sem
151981 - udevd fails to create /dev files after misc_register
154984 - Sound Blaster Audigy 2 Value audio does not work
155926 - [RHEL4-U2][Diskdump] OS_INIT dump function is broken
156145 - kernel may oops if more than 4k worth of string data returned in /proc/devices
156663 - Can't install from SATA CD/DVD drive
157404 - Loss of SATA ICH device hangs RAID1
157902 - [PATCH] ata_piix fails on some ICH7 hardware
158989 - snd-nm256 module hangs Dell Latitude CSx
165113 - kernel build broken when 4KSTACKS disabled
165245 - EHCI Host driver violates USB2.0 Specification leading to device failures
166541 - mdadm --grow infinite resync
168285 - No (useful) logging of parameters to execve
169260 - CVE-2005-3055 async usb devio oops
169456 - COMM_LOST problem with SCTP stream socket
169600 - SMP kernel crash when use as LVS router
170143 - rm command hangs when removing a symlink on ext2 loop filesystem
170434 - Deadlock in fc_target_unblock while shutting down the system
171304 - sata_promise: missing PCI ID for SATA300 TX4
171645 - Oops kernel NULL pointer
171740 - ipw2100 modules crashes and restarts whenever in use
172199 - Spurious keyboard repeats and clock is fast
172696 - kernel panic after a few hours/days of operation with pulse
173193 - vmalloc limited to 64Mb
173489 - kernel panics when rebooting
173843 - Kernel panic with this comment: <4>VFS: Busy inodes after unmount. Self-destruct in 5 seconds. Have a nice day...
173895 - Kernel panic on install on 64BG EM64T
174019 - TG3 driver crashes with BCM4704C chipset with heavy traffic
174155 - Documentation mismatch
174470 - RFE: tg3 support for Broadcom 5751 PCIe
174639 - System hangs with kernel panic when using current 3ware drivers
174671 - [PATCH] bonding: don't drop non-VLAN traffic
175616 - [RHEL 4 U2] kernel panic on EM64T with long cmdline args
175763 - misleading overcommit_memory reference in Documentation/filesystems/proc.txt
175778 - Accessing automounted directories can cause a process to hang forever
175854 - [RHEL4-U3] Checking dump partition fails when a swap partition whose size is less than memory size is configured for diskdump.
176107 - sata-nv crashes on multiple SATA disks
176173 - The hash.h hash_long function, when used on a 64 bit machine, ignores many of the middle-order bits.
176361 - io_setup() fails for 32bit tasks in x86-64
176601 - Oprofile unsupported recent Pentium4
176612 - xw6400 System panic while installing RHEL4-U3
177439 - SELinux MLS compatibility
177509 - No i915 DRM module
178084 - Last AIO read of a file opened with O_DIRECT returns wrong length
178720 - O_DIRECT bug when reading last block of sparse file
178845 - RHEL4u4 FEAT: Provide support for Opteron Rev G and Power Now! clean-up
179206 - Please backport the sata_mv Marvell MV88SX5081 driver?
179334 - kernel boot can Oops in work queue code when console blanks
179752 - Request to update lpfc driver in RHEL 4 U4
180028 - deadlocks on ext2,sync mounted fs
180138 - kmir_mon worker thread doesn't exit
180195 - aic7xxx and aic79xx Drivers Don't Support 16-byte CDBs
180568 - typo in spinlock.h? line 407
180621 - ipv6 ready logo-P1 ND Test24 fails- RA Lifetime=5 not understood
180958 - [RHEL4] MCE arg parsing broken on x86-64
181457 - Console redirection on DRAC 3 results in repeated key strokes (P1)
181475 - lpfc driver: add managment ioctl module to kernel tree
181780 - Gettimeofday() timer related slowdown and scaling issue
181793 - add MCP51/ NVidia 430 IDE support
181869 - Error given when duplicate non-updateable key (eg: keyring) added
181870 - Key quota handling incorrect in allocation
181879 - CVE-2006-0457 Key syscalls use get length of strings before copying, and assume terminating NUL copied from userspace
181881 - CVE-2006-0456 s390/s390x strnlen_user() is broken
182137 - NFS lockd recovery is broken in U3 due to missing code.
182684 - [EMC/Oracle RHEL 4.4] ISCSI MODULE SHOWS MULTIPLE DEVICES FOR A SINGLE LUN IN RHEL 4.0 U2
182726 - Possible hang when ptracing and using hugepages
183392 - [RHEL4] [RFE] Add diskdump capability to IDE
183416 - DoS attack possible via nfsservctl
183463 - CVE-2006-0742 Bug in IA64 unaligned access handler causes kernel panic
183661 - ramfs: update dir mtime and ctime
183664 - dm: make sure don't give out the same minor number twice
184208 - Large LUNS can't be seen with Hitachi Open- SAN
184254 - PCI interrupts on ioapic pins 0-15 always get "legacy" IRQs.
184535 - [BETA RHEL4 U3] brokenness in cfq_dispatch_requests
184583 - Kernel should export number and state of local APICs
185043 - CVE-2005-3623 ACL setting on read-only fs
185289 - CVE-2006-1052 SELinux flaw
185431 - kernel dm: bad argument count check in dm-log.c
185444 - kernel dm: missing bdput
185445 - kernel dm: fix free_dev del_gendisk
185447 - kernel dm: flush queued bios if suspend is interrupted
185450 - kernel dm: log bitset fix BE find_next_zero_bit
185454 - kernel device-mapper mirroring: table output incorrect
185455 - kernel dm snapshots: replace siblings list
185456 - kernel dm mirroring: suspend operation is not well behaved
185459 - kernel dm snapshots: fix invalidation
185468 - kernel dm: striped access beyond end of device
185754 - [RHEL4 U3] kernel dm mirror: unrelated mirror devices stall if any log device fails
185782 - [RHEL4 U3] device-mapper mirror: Data corruption if the default mirror fails during recovery.
185785 - [RHEL4 U3] device-mapper mirror: Data corruption by temporal errors during recovery.
185991 - kernel dm: bio split bvec fix
186004 - [RHEL4 U3] device-mapper mirror: Write failure region becomes in-sync when suspension.
186057 - CVE-2006-1242 Linux zero IP ID vulnerability?
186066 - Connectathon tests fail against newer Irix server
186071 - NFSD fails SETCLIENTID_CONFIRM
186104 - kernel dm mirror: lvs Copy% overs 100% by lvreduce/lvresize.
186242 - CVE-2006-1343 Small information leak in SO_ORIGINAL_DST
186295 - CVE-2006-0038 netfilters do_replace() overflow
186316 - nvidia cache aliasing problem: change_page_attr drops GLOBAL bit from executable kernel pages
186564 - ACPI 2.0 systems with no XSDT fail to boot
186751 - kernel problem to deal with 3ware 9500SX-12 RAID cards
187249 - [RHEL4 U3] dm-mirror: read stalls if all mirrors failed
187494 - CVE-2006-2275 SCTP traffic probably never resumes
187498 - diskdump_sysfs_store() needs to check sscanf retval
187500 - diskdump_sysfs_store() should check partition number
187501 - device_to_gendisk() is lacking mntput(nd.mnt) on exit
187502 - diskdump - device_to_gendisk() is both racy
187910 - CVE-2006-1056 FPU Information leak on i386/x86-64 on AMD CPUs
187951 - Replication failover fails if the NFS permissions are incorrect on one of the servers...
188080 - kernel dm snapshots: Incorrect processing of incorrect chunk size
188141 - Kernel appears too conservative in memory use
188296 - tlb_clear_slave races with tlb_choose_channel
188912 - Update Qlogic qla2xxx driver in RHEL 4 U4
189127 - Trouble with recent module - one packet is seen more than one time
189198 - VLAN not working on initial startup
189279 - [Stratus RHEL4 U4 bug] unchecked error path in usb_alloc_dev can lead to an Oops.
189390 - RHEL4-U3: openipmi: startup race condition
189392 - Submit Promise RHEL4 driver in-box to RHEL4 CD
189393 - Submit Promise RHEL4 driver in-box to RHEL4 CD
189397 - Submit Promise RHEL4 driver in-box to RHEL4 CD
189797 - dm: Fix mapped device references
190576 - REGRESSION: kabi breakage on ia64_mv
191138 - CVE-2006-0742 Bug in IA64 unaligned access handler causes kernel panic
191139 - installer does not see SATA HDs attached to JMB360 chipset which in legacy mode
191141 - MCE arg parsing broken on x86-64
191723 - device-mapper mirror: Need proper notification of sync status chage on write failure
191847 - REGRESSION: kernel-2.6.9.36 does not boot on ALTIX systems
192098 - Fix problems with MSI-X on 64-bit platforms
192635 - CVE-2006-1857 SCTP HB-ACK chunk overflow
192779 - CVE-2006-2446 LTC20512-kernel BUG in __kfree_skb while running TCP+Kernel stress
193230 - RFE: add pci ids for atiixp
193696 - Not using all available system memory - swapping too aggressive - high load average (iowait)
193728 - A write to a cluster mirror volume not in sync will hang and also cause the sync to hang as well
193838 - gettimeofday goes backwards on IBM x460 merged servers
194215 - CVE-2006-2448 missing access_ok checks in powerpc signal*.c
194533 - veritas storage foundation 32bit apps crash in glibc during post-process installation
195002 - RHEL4 U4 i386 partner beta will not install on ES7000/one
195254 - HP xw9400 network card not getting seen
195502 - Regression: cluster mirror creation cmd hangs even though mirror gets created
196512 - VLANs, tg3 driver, and 2.6.9-34.EL kernel update
196712 - O=/objdir builds fail for out-of-tree builds with 2.6.9-39.4
197387 - CVE-2006-2934 SCTP netfilter DoS with chunkless packets
198321 - kernel freeze at "kernel BUG at kernel/timer.c:420!"
198892 - kernel deadlock on reading /proc/meminfo on 4 CPU's at the same time

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-42.EL.src.rpm
11a024e010dc8f2e3dbec9f816c8fec5 kernel-2.6.9-42.EL.src.rpm

i386:
cba4519a04c6271eafa1ffd5df0708b8 kernel-2.6.9-42.EL.i686.rpm
86bfc2516a07531d321d5f3bf819a67e kernel-debuginfo-2.6.9-42.EL.i686.rpm
5a96a68e49041a8e142a047c7d52d744 kernel-devel-2.6.9-42.EL.i686.rpm
47517050f412936223b130719ae9c7b5 kernel-hugemem-2.6.9-42.EL.i686.rpm
a77cef2d88c5df96f26812e9eb66ab95 kernel-hugemem-devel-2.6.9-42.EL.i686.rpm
95cc28bb2c8012a19e1ec8c1f8a1eb1d kernel-smp-2.6.9-42.EL.i686.rpm
896615edeb7d593bf330888da95b8315 kernel-smp-devel-2.6.9-42.EL.i686.rpm

ia64:
3315efa6779b1d00f227adb085a40e15 kernel-2.6.9-42.EL.ia64.rpm
6d49881cf7c5fc87abd1b224a53dd7c9 kernel-debuginfo-2.6.9-42.EL.ia64.rpm
bb991f581fc4e61757717c64b7c54bf5 kernel-devel-2.6.9-42.EL.ia64.rpm
9638115a8925655c5f72499d4cf34adf kernel-largesmp-2.6.9-42.EL.ia64.rpm
f0f98d3d2d789d3ed98219dcf7567de4 kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm

noarch:
35877d309fcc505f606398f10de3594c kernel-doc-2.6.9-42.EL.noarch.rpm

ppc:
d7cb2ee73437c698a1f314f429e0da17 kernel-2.6.9-42.EL.ppc64.rpm
41d0dbfc97d8f31d9b331311fce2e501 kernel-2.6.9-42.EL.ppc64iseries.rpm
2cae20f796673bbd838e6d2d16833c93 kernel-debuginfo-2.6.9-42.EL.ppc64.rpm
5cb483bf9668209f65ca46c00f503cd6 kernel-debuginfo-2.6.9-42.EL.ppc64iseries.rpm
05ee813e788213f4284fa8314c53e255 kernel-devel-2.6.9-42.EL.ppc64.rpm
b14cf9cd736dbff98fc96afa96bde9eb kernel-devel-2.6.9-42.EL.ppc64iseries.rpm
afbaacfef8016ef3de821df78fb35c29 kernel-largesmp-2.6.9-42.EL.ppc64.rpm
7a49c313c8c49af72245ae539296310f kernel-largesmp-devel-2.6.9-42.EL.ppc64.rpm

s390:
3be376e40170c59099bcac60ae72b230 kernel-2.6.9-42.EL.s390.rpm
a6cb721a60628aad7e1ebb84615e1f0a kernel-debuginfo-2.6.9-42.EL.s390.rpm
d1b563a510c61c9831f6ad58770d3dc3 kernel-devel-2.6.9-42.EL.s390.rpm

s390x:
9a28d8c9f1c17c49971e530b12c2cf52 kernel-2.6.9-42.EL.s390x.rpm
c3ce451e9ea457f9292b5f3c42a9e5cd kernel-debuginfo-2.6.9-42.EL.s390x.rpm
f332531af396a8e88cd0365214098ab6 kernel-devel-2.6.9-42.EL.s390x.rpm

x86_64:
d9c9139f0fc50387bc687c2ce91be404 kernel-2.6.9-42.EL.x86_64.rpm
0ea6b69c6ee7a24db7f45907bb9e2392 kernel-debuginfo-2.6.9-42.EL.x86_64.rpm
ea60a89f3b08289381e8be6e6213f6a0 kernel-devel-2.6.9-42.EL.x86_64.rpm
76868583b4666bfdfd3187f4522be573 kernel-largesmp-2.6.9-42.EL.x86_64.rpm
1bc693d3e3e3f304507cab6c8a498a4d kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm
ef31d24cf073aeda4a90094f60641bb6 kernel-smp-2.6.9-42.EL.x86_64.rpm
b64aaf4baec4373bde909251bd7924c9 kernel-smp-devel-2.6.9-42.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-42.EL.src.rpm
11a024e010dc8f2e3dbec9f816c8fec5 kernel-2.6.9-42.EL.src.rpm

i386:
cba4519a04c6271eafa1ffd5df0708b8 kernel-2.6.9-42.EL.i686.rpm
86bfc2516a07531d321d5f3bf819a67e kernel-debuginfo-2.6.9-42.EL.i686.rpm
5a96a68e49041a8e142a047c7d52d744 kernel-devel-2.6.9-42.EL.i686.rpm
47517050f412936223b130719ae9c7b5 kernel-hugemem-2.6.9-42.EL.i686.rpm
a77cef2d88c5df96f26812e9eb66ab95 kernel-hugemem-devel-2.6.9-42.EL.i686.rpm
95cc28bb2c8012a19e1ec8c1f8a1eb1d kernel-smp-2.6.9-42.EL.i686.rpm
896615edeb7d593bf330888da95b8315 kernel-smp-devel-2.6.9-42.EL.i686.rpm

noarch:
35877d309fcc505f606398f10de3594c kernel-doc-2.6.9-42.EL.noarch.rpm

x86_64:
d9c9139f0fc50387bc687c2ce91be404 kernel-2.6.9-42.EL.x86_64.rpm
0ea6b69c6ee7a24db7f45907bb9e2392 kernel-debuginfo-2.6.9-42.EL.x86_64.rpm
ea60a89f3b08289381e8be6e6213f6a0 kernel-devel-2.6.9-42.EL.x86_64.rpm
76868583b4666bfdfd3187f4522be573 kernel-largesmp-2.6.9-42.EL.x86_64.rpm
1bc693d3e3e3f304507cab6c8a498a4d kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm
ef31d24cf073aeda4a90094f60641bb6 kernel-smp-2.6.9-42.EL.x86_64.rpm
b64aaf4baec4373bde909251bd7924c9 kernel-smp-devel-2.6.9-42.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-42.EL.src.rpm
11a024e010dc8f2e3dbec9f816c8fec5 kernel-2.6.9-42.EL.src.rpm

i386:
cba4519a04c6271eafa1ffd5df0708b8 kernel-2.6.9-42.EL.i686.rpm
86bfc2516a07531d321d5f3bf819a67e kernel-debuginfo-2.6.9-42.EL.i686.rpm
5a96a68e49041a8e142a047c7d52d744 kernel-devel-2.6.9-42.EL.i686.rpm
47517050f412936223b130719ae9c7b5 kernel-hugemem-2.6.9-42.EL.i686.rpm
a77cef2d88c5df96f26812e9eb66ab95 kernel-hugemem-devel-2.6.9-42.EL.i686.rpm
95cc28bb2c8012a19e1ec8c1f8a1eb1d kernel-smp-2.6.9-42.EL.i686.rpm
896615edeb7d593bf330888da95b8315 kernel-smp-devel-2.6.9-42.EL.i686.rpm

ia64:
3315efa6779b1d00f227adb085a40e15 kernel-2.6.9-42.EL.ia64.rpm
6d49881cf7c5fc87abd1b224a53dd7c9 kernel-debuginfo-2.6.9-42.EL.ia64.rpm
bb991f581fc4e61757717c64b7c54bf5 kernel-devel-2.6.9-42.EL.ia64.rpm
9638115a8925655c5f72499d4cf34adf kernel-largesmp-2.6.9-42.EL.ia64.rpm
f0f98d3d2d789d3ed98219dcf7567de4 kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm

noarch:
35877d309fcc505f606398f10de3594c kernel-doc-2.6.9-42.EL.noarch.rpm

x86_64:
d9c9139f0fc50387bc687c2ce91be404 kernel-2.6.9-42.EL.x86_64.rpm
0ea6b69c6ee7a24db7f45907bb9e2392 kernel-debuginfo-2.6.9-42.EL.x86_64.rpm
ea60a89f3b08289381e8be6e6213f6a0 kernel-devel-2.6.9-42.EL.x86_64.rpm
76868583b4666bfdfd3187f4522be573 kernel-largesmp-2.6.9-42.EL.x86_64.rpm
1bc693d3e3e3f304507cab6c8a498a4d kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm
ef31d24cf073aeda4a90094f60641bb6 kernel-smp-2.6.9-42.EL.x86_64.rpm
b64aaf4baec4373bde909251bd7924c9 kernel-smp-devel-2.6.9-42.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-42.EL.src.rpm
11a024e010dc8f2e3dbec9f816c8fec5 kernel-2.6.9-42.EL.src.rpm

i386:
cba4519a04c6271eafa1ffd5df0708b8 kernel-2.6.9-42.EL.i686.rpm
86bfc2516a07531d321d5f3bf819a67e kernel-debuginfo-2.6.9-42.EL.i686.rpm
5a96a68e49041a8e142a047c7d52d744 kernel-devel-2.6.9-42.EL.i686.rpm
47517050f412936223b130719ae9c7b5 kernel-hugemem-2.6.9-42.EL.i686.rpm
a77cef2d88c5df96f26812e9eb66ab95 kernel-hugemem-devel-2.6.9-42.EL.i686.rpm
95cc28bb2c8012a19e1ec8c1f8a1eb1d kernel-smp-2.6.9-42.EL.i686.rpm
896615edeb7d593bf330888da95b8315 kernel-smp-devel-2.6.9-42.EL.i686.rpm

ia64:
3315efa6779b1d00f227adb085a40e15 kernel-2.6.9-42.EL.ia64.rpm
6d49881cf7c5fc87abd1b224a53dd7c9 kernel-debuginfo-2.6.9-42.EL.ia64.rpm
bb991f581fc4e61757717c64b7c54bf5 kernel-devel-2.6.9-42.EL.ia64.rpm
9638115a8925655c5f72499d4cf34adf kernel-largesmp-2.6.9-42.EL.ia64.rpm
f0f98d3d2d789d3ed98219dcf7567de4 kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm

noarch:
35877d309fcc505f606398f10de3594c kernel-doc-2.6.9-42.EL.noarch.rpm

x86_64:
d9c9139f0fc50387bc687c2ce91be404 kernel-2.6.9-42.EL.x86_64.rpm
0ea6b69c6ee7a24db7f45907bb9e2392 kernel-debuginfo-2.6.9-42.EL.x86_64.rpm
ea60a89f3b08289381e8be6e6213f6a0 kernel-devel-2.6.9-42.EL.x86_64.rpm
76868583b4666bfdfd3187f4522be573 kernel-largesmp-2.6.9-42.EL.x86_64.rpm
1bc693d3e3e3f304507cab6c8a498a4d kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm
ef31d24cf073aeda4a90094f60641bb6 kernel-smp-2.6.9-42.EL.x86_64.rpm
b64aaf4baec4373bde909251bd7924c9 kernel-smp-devel-2.6.9-42.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3623
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0456
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0457
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0742
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1052
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2446
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFE26aaXlSAg2UNWIIRAtE0AKDCLvYec0x51zafW1pyhXsrVDCjrgCgu6nQ
5hg6hgm2QMMDBkkmHO9xu6o=
=8wvV
-----END PGP SIGNATURE-----