Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2006:0575 - Security Advisory
Issued:
2006-08-10
Updated:
2006-08-10

RHSA-2006:0575 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

This is the fourth regular update to Red Hat Enterprise Linux 4.

Description

New features introduced in this update include:

  • Device Mapper mirroring support
  • IDE diskdump support
  • x86, AMD64 and Intel EM64T: Multi-core scheduler support enhancements
  • Itanium: perfmon support for Montecito
  • much improved support for IBM x460
  • AMD PowerNow! patches to support Opteron Rev G
  • Vmalloc support > 64MB

The following device drivers have been upgraded to new versions:

ipmi: 33.11 to 33.13
ib_mthca: 0.06 to 0.08
bnx2: 1.4.30 to 1.4.38
bonding: 2.6.1 to 2.6.3
e100: 3.4.8-k2-NAPI to 3.5.10-k2-NAPI
e1000: 6.1.16-k3-NAPI to 7.0.33-k2-NAPI
sky2: 0.13 to 1.1
tg3: 3.43-rh to 3.52-rh
ipw2100: 1.1.0 to git-1.1.4
ipw2200: 1.0.0 to git-1.0.10
3w-9xxx: 2.26.02.001 to 2.26.04.010
ips: 7.10.18 to 7.12.02
iscsi_sfnet: 4:0.1.11-2 to 4:0.1.11-3
lpfc: 0:8.0.16.18 to 0:8.0.16.27
megaraid_sas: 00.00.02.00 to 00.00.02.03-RH1
qla2xxx: 8.01.02-d4 to 8.01.04-d7
qla6312: 8.01.02-d4 to 8.01.04-d7
sata_promise: 1.03 to 1.04
sata_vsc: 1.1 to 1.2
ibmvscsic: 1.5.5 to 1.5.6
ipr: 2.0.11.1 to 2.0.11.2

Added drivers:

dcdbas: 5.6.0-2
sata_mv: 0.6
sata_qstor: 0.05
sata_uli: 0.5
skge: 1.1
stex: 2.9.0.13
pdc_adma: 0.03

This update includes fixes for the security issues:

  • a flaw in the USB devio handling of device removal that allowed a
    local user to cause a denial of service (crash) (CVE-2005-3055,
    moderate)
  • a flaw in the ACL handling of nfsd that allowed a remote user to
    bypass ACLs for readonly mounted NFS file systems (CVE-2005-3623,
    moderate)
  • a flaw in the netfilter handling that allowed a local user with
    CAP_NET_ADMIN rights to cause a buffer overflow (CVE-2006-0038, low)
  • a flaw in the IBM S/390 and IBM zSeries strnlen_user() function that
    allowed a local user to cause a denial of service (crash) or to retrieve
    random kernel data (CVE-2006-0456, important)
  • a flaw in the keyctl functions that allowed a local user to cause a
    denial of service (crash) or to read sensitive kernel memory
    (CVE-2006-0457, important)
  • a flaw in unaligned accesses handling on Itanium processors that
    allowed a local user to cause a denial of service (crash)
    (CVE-2006-0742, important)
  • a flaw in SELinux ptrace logic that allowed a local user with ptrace
    permissions to change the tracer SID to a SID of another process
    (CVE-2006-1052, moderate)
  • an info leak on AMD-based x86 and x86_64 systems that allowed a local
    user to retrieve the floating point exception state of a process run by a
    different user (CVE-2006-1056, important)
  • a flaw in IPv4 packet output handling that allowed a remote user to
    bypass the zero IP ID countermeasure on systems with a disabled firewall
    (CVE-2006-1242, low)
  • a minor info leak in socket option handling in the network code
    (CVE-2006-1343, low)
  • a flaw in the HB-ACK chunk handling of SCTP that allowed a remote user to
    cause a denial of service (crash) (CVE-2006-1857, moderate)
  • a flaw in the SCTP implementation that allowed a remote user to cause a
    denial of service (deadlock) (CVE-2006-2275, moderate)
  • a flaw in the socket buffer handling that allowed a remote user to cause
    a denial of service (panic) (CVE-2006-2446, important)
  • a flaw in the signal handling access checking on PowerPC that allowed a
    local user to cause a denial of service (crash) or read arbitrary kernel
    memory on 64-bit systems (CVE-2006-2448, important)
  • a flaw in the netfilter SCTP module when receiving a chunkless packet
    that allowed a remote user to cause a denial of service (crash)
    (CVE-2006-2934, important)

There were several bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 141342 - install hangs on Dell PowerVault 745 with SATA drives (sata_vsc module)
  • BZ - 149933 - fix missing wakeup in ipc/sem
  • BZ - 151981 - udevd fails to create /dev files after misc_register
  • BZ - 154984 - Sound Blaster Audigy 2 Value audio does not work
  • BZ - 155926 - [RHEL4-U2][Diskdump] OS_INIT dump function is broken
  • BZ - 156145 - kernel may oops if more than 4k worth of string data returned in /proc/devices
  • BZ - 156663 - Can't install from SATA CD/DVD drive
  • BZ - 157404 - Loss of SATA ICH device hangs RAID1
  • BZ - 157902 - [PATCH] ata_piix fails on some ICH7 hardware
  • BZ - 158989 - snd-nm256 module hangs Dell Latitude CSx
  • BZ - 165113 - kernel build broken when 4KSTACKS disabled
  • BZ - 165245 - EHCI Host driver violates USB2.0 Specification leading to device failures
  • BZ - 166541 - mdadm --grow infinite resync
  • BZ - 168285 - No (useful) logging of parameters to execve
  • BZ - 169260 - CVE-2005-3055 async usb devio oops
  • BZ - 169456 - COMM_LOST problem with SCTP stream socket
  • BZ - 169600 - SMP kernel crash when use as LVS router
  • BZ - 170143 - rm command hangs when removing a symlink on ext2 loop filesystem
  • BZ - 170434 - Deadlock in fc_target_unblock while shutting down the system
  • BZ - 171304 - sata_promise: missing PCI ID for SATA300 TX4
  • BZ - 171645 - Oops kernel NULL pointer
  • BZ - 171740 - ipw2100 modules crashes and restarts whenever in use
  • BZ - 172199 - Spurious keyboard repeats and clock is fast
  • BZ - 172696 - kernel panic after a few hours/days of operation with pulse
  • BZ - 173193 - vmalloc limited to 64Mb
  • BZ - 173489 - kernel panics when rebooting
  • BZ - 173843 - Kernel panic with this comment: <4>VFS: Busy inodes after unmount. Self-destruct in 5 seconds. Have a nice day...
  • BZ - 173895 - Kernel panic on install on 64BG EM64T
  • BZ - 174019 - TG3 driver crashes with BCM4704C chipset with heavy traffic
  • BZ - 174155 - Documentation mismatch
  • BZ - 174470 - RFE: tg3 support for Broadcom 5751 PCIe
  • BZ - 174639 - System hangs with kernel panic when using current 3ware drivers
  • BZ - 174671 - [PATCH] bonding: don't drop non-VLAN traffic
  • BZ - 175616 - [RHEL 4 U2] kernel panic on EM64T with long cmdline args
  • BZ - 175763 - misleading overcommit_memory reference in Documentation/filesystems/proc.txt
  • BZ - 175778 - Accessing automounted directories can cause a process to hang forever
  • BZ - 175854 - [RHEL4-U3] Checking dump partition fails when a swap partition whose size is less than memory size is configured for diskdump.
  • BZ - 176107 - sata-nv crashes on multiple SATA disks
  • BZ - 176173 - The hash.h hash_long function, when used on a 64 bit machine, ignores many of the middle-order bits.
  • BZ - 176361 - io_setup() fails for 32bit tasks in x86-64
  • BZ - 176601 - Oprofile unsupported recent Pentium4
  • BZ - 176612 - xw6400 System panic while installing RHEL4-U3
  • BZ - 177439 - SELinux MLS compatibility
  • BZ - 177509 - No i915 DRM module
  • BZ - 178084 - Last AIO read of a file opened with O_DIRECT returns wrong length
  • BZ - 178720 - O_DIRECT bug when reading last block of sparse file
  • BZ - 178845 - RHEL4u4 FEAT: Provide support for Opteron Rev G and Power Now! clean-up
  • BZ - 179206 - Please backport the sata_mv Marvell MV88SX5081 driver?
  • BZ - 179334 - kernel boot can Oops in work queue code when console blanks
  • BZ - 179752 - Request to update lpfc driver in RHEL 4 U4
  • BZ - 180028 - deadlocks on ext2,sync mounted fs
  • BZ - 180138 - kmir_mon worker thread doesn't exit
  • BZ - 180195 - aic7xxx and aic79xx Drivers Don't Support 16-byte CDBs
  • BZ - 180568 - typo in spinlock.h? line 407
  • BZ - 180621 - ipv6 ready logo-P1 ND Test24 fails- RA Lifetime=5 not understood
  • BZ - 180958 - [RHEL4] MCE arg parsing broken on x86-64
  • BZ - 181457 - Console redirection on DRAC 3 results in repeated key strokes (P1)
  • BZ - 181475 - lpfc driver: add managment ioctl module to kernel tree
  • BZ - 181780 - Gettimeofday() timer related slowdown and scaling issue
  • BZ - 181793 - add MCP51/ NVidia 430 IDE support
  • BZ - 181869 - Error given when duplicate non-updateable key (eg: keyring) added
  • BZ - 181870 - Key quota handling incorrect in allocation
  • BZ - 181879 - CVE-2006-0457 Key syscalls use get length of strings before copying, and assume terminating NUL copied from userspace
  • BZ - 181881 - CVE-2006-0456 s390/s390x strnlen_user() is broken
  • BZ - 182137 - NFS lockd recovery is broken in U3 due to missing code.
  • BZ - 182684 - [EMC/Oracle RHEL 4.4] ISCSI MODULE SHOWS MULTIPLE DEVICES FOR A SINGLE LUN IN RHEL 4.0 U2
  • BZ - 182726 - Possible hang when ptracing and using hugepages
  • BZ - 183392 - [RHEL4] [RFE] Add diskdump capability to IDE
  • BZ - 183416 - DoS attack possible via nfsservctl
  • BZ - 183463 - CVE-2006-0742 Bug in IA64 unaligned access handler causes kernel panic
  • BZ - 183661 - ramfs: update dir mtime and ctime
  • BZ - 183664 - dm: make sure don't give out the same minor number twice
  • BZ - 184208 - Large LUNS can't be seen with Hitachi Open- SAN
  • BZ - 184254 - PCI interrupts on ioapic pins 0-15 always get "legacy" IRQs.
  • BZ - 184535 - [BETA RHEL4 U3] brokenness in cfq_dispatch_requests
  • BZ - 184583 - Kernel should export number and state of local APICs
  • BZ - 185043 - CVE-2005-3623 ACL setting on read-only fs
  • BZ - 185289 - CVE-2006-1052 SELinux flaw
  • BZ - 185431 - kernel dm: bad argument count check in dm-log.c
  • BZ - 185444 - kernel dm: missing bdput
  • BZ - 185445 - kernel dm: fix free_dev del_gendisk
  • BZ - 185447 - kernel dm: flush queued bios if suspend is interrupted
  • BZ - 185450 - kernel dm: log bitset fix BE find_next_zero_bit
  • BZ - 185454 - kernel device-mapper mirroring: table output incorrect
  • BZ - 185455 - kernel dm snapshots: replace siblings list
  • BZ - 185456 - kernel dm mirroring: suspend operation is not well behaved
  • BZ - 185459 - kernel dm snapshots: fix invalidation
  • BZ - 185468 - kernel dm: striped access beyond end of device
  • BZ - 185754 - [RHEL4 U3] kernel dm mirror: unrelated mirror devices stall if any log device fails
  • BZ - 185782 - [RHEL4 U3] device-mapper mirror: Data corruption if the default mirror fails during recovery.
  • BZ - 185785 - [RHEL4 U3] device-mapper mirror: Data corruption by temporal errors during recovery.
  • BZ - 185991 - kernel dm: bio split bvec fix
  • BZ - 186004 - [RHEL4 U3] device-mapper mirror: Write failure region becomes in-sync when suspension.
  • BZ - 186057 - CVE-2006-1242 Linux zero IP ID vulnerability?
  • BZ - 186066 - Connectathon tests fail against newer Irix server
  • BZ - 186071 - NFSD fails SETCLIENTID_CONFIRM
  • BZ - 186104 - kernel dm mirror: lvs Copy% overs 100% by lvreduce/lvresize.
  • BZ - 186242 - CVE-2006-1343 Small information leak in SO_ORIGINAL_DST
  • BZ - 186295 - CVE-2006-0038 netfilters do_replace() overflow
  • BZ - 186316 - nvidia cache aliasing problem: change_page_attr drops GLOBAL bit from executable kernel pages
  • BZ - 186564 - ACPI 2.0 systems with no XSDT fail to boot
  • BZ - 186751 - kernel problem to deal with 3ware 9500SX-12 RAID cards
  • BZ - 187249 - [RHEL4 U3] dm-mirror: read stalls if all mirrors failed
  • BZ - 187494 - CVE-2006-2275 SCTP traffic probably never resumes
  • BZ - 187498 - diskdump_sysfs_store() needs to check sscanf retval
  • BZ - 187500 - diskdump_sysfs_store() should check partition number
  • BZ - 187501 - device_to_gendisk() is lacking mntput(nd.mnt) on exit
  • BZ - 187502 - diskdump - device_to_gendisk() is both racy
  • BZ - 187910 - CVE-2006-1056 FPU Information leak on i386/x86-64 on AMD CPUs
  • BZ - 187951 - Replication failover fails if the NFS permissions are incorrect on one of the servers...
  • BZ - 188080 - kernel dm snapshots: Incorrect processing of incorrect chunk size
  • BZ - 188141 - Kernel appears too conservative in memory use
  • BZ - 188296 - tlb_clear_slave races with tlb_choose_channel
  • BZ - 188912 - Update Qlogic qla2xxx driver in RHEL 4 U4
  • BZ - 189127 - Trouble with recent module - one packet is seen more than one time
  • BZ - 189198 - VLAN not working on initial startup
  • BZ - 189279 - [Stratus RHEL4 U4 bug] unchecked error path in usb_alloc_dev can lead to an Oops.
  • BZ - 189390 - RHEL4-U3: openipmi: startup race condition
  • BZ - 189392 - Submit Promise RHEL4 driver in-box to RHEL4 CD
  • BZ - 189393 - Submit Promise RHEL4 driver in-box to RHEL4 CD
  • BZ - 189397 - Submit Promise RHEL4 driver in-box to RHEL4 CD
  • BZ - 189797 - dm: Fix mapped device references
  • BZ - 190576 - REGRESSION: kabi breakage on ia64_mv
  • BZ - 191138 - CVE-2006-0742 Bug in IA64 unaligned access handler causes kernel panic
  • BZ - 191139 - installer does not see SATA HDs attached to JMB360 chipset which in legacy mode
  • BZ - 191141 - MCE arg parsing broken on x86-64
  • BZ - 191723 - device-mapper mirror: Need proper notification of sync status chage on write failure
  • BZ - 191847 - REGRESSION: kernel-2.6.9.36 does not boot on ALTIX systems
  • BZ - 192098 - Fix problems with MSI-X on 64-bit platforms
  • BZ - 192635 - CVE-2006-1857 SCTP HB-ACK chunk overflow
  • BZ - 192779 - CVE-2006-2446 LTC20512-kernel BUG in __kfree_skb while running TCP+Kernel stress
  • BZ - 193230 - RFE: add pci ids for atiixp
  • BZ - 193696 - Not using all available system memory - swapping too aggressive - high load average (iowait)
  • BZ - 193728 - A write to a cluster mirror volume not in sync will hang and also cause the sync to hang as well
  • BZ - 193838 - gettimeofday goes backwards on IBM x460 merged servers
  • BZ - 194215 - CVE-2006-2448 missing access_ok checks in powerpc signal*.c
  • BZ - 194533 - veritas storage foundation 32bit apps crash in glibc during post-process installation
  • BZ - 195002 - RHEL4 U4 i386 partner beta will not install on ES7000/one
  • BZ - 195254 - HP xw9400 network card not getting seen
  • BZ - 195502 - Regression: cluster mirror creation cmd hangs even though mirror gets created
  • BZ - 196512 - VLANs, tg3 driver, and 2.6.9-34.EL kernel update
  • BZ - 196712 - O=/objdir builds fail for out-of-tree builds with 2.6.9-39.4
  • BZ - 197387 - CVE-2006-2934 SCTP netfilter DoS with chunkless packets
  • BZ - 198321 - kernel freeze at "kernel BUG at kernel/timer.c:420!"
  • BZ - 198892 - kernel deadlock on reading /proc/meminfo on 4 CPU's at the same time

CVEs

  • CVE-2006-1056
  • CVE-2006-1343
  • CVE-2005-3055
  • CVE-2006-0742
  • CVE-2006-1242
  • CVE-2006-2446
  • CVE-2006-1052
  • CVE-2006-0038
  • CVE-2006-1857
  • CVE-2006-2448
  • CVE-2005-3623
  • CVE-2006-2934
  • CVE-2006-0456
  • CVE-2006-0457
  • CVE-2006-2275

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-42.EL.src.rpm SHA-256: c20d895c1b02adcabef6b03a39e1d2bf8d67d7cae7b6bfdbb436f5201c52e0c0
x86_64
kernel-2.6.9-42.EL.x86_64.rpm SHA-256: 09bf7189bb62082d2f2e5d6394966998bea89f5f8889c5efae334b9916449566
kernel-2.6.9-42.EL.x86_64.rpm SHA-256: 09bf7189bb62082d2f2e5d6394966998bea89f5f8889c5efae334b9916449566
kernel-devel-2.6.9-42.EL.x86_64.rpm SHA-256: 9382350e09580e5c3206610f85599f36bd86b760818db15aa59671a7ea7b4936
kernel-devel-2.6.9-42.EL.x86_64.rpm SHA-256: 9382350e09580e5c3206610f85599f36bd86b760818db15aa59671a7ea7b4936
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-largesmp-2.6.9-42.EL.x86_64.rpm SHA-256: 451f4ece025220021f316d57717154e077e3b7827556ab83669dd4fb13d9f422
kernel-largesmp-2.6.9-42.EL.x86_64.rpm SHA-256: 451f4ece025220021f316d57717154e077e3b7827556ab83669dd4fb13d9f422
kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm SHA-256: 97abed43400cf2f27acf1fc558c2436539e28de59c9f2601b499f58b929abf07
kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm SHA-256: 97abed43400cf2f27acf1fc558c2436539e28de59c9f2601b499f58b929abf07
kernel-smp-2.6.9-42.EL.x86_64.rpm SHA-256: 6189cd843fadec709e2d5e999213588516ae5a461ba70a3d59011a360d9afc66
kernel-smp-2.6.9-42.EL.x86_64.rpm SHA-256: 6189cd843fadec709e2d5e999213588516ae5a461ba70a3d59011a360d9afc66
kernel-smp-devel-2.6.9-42.EL.x86_64.rpm SHA-256: d1c109fd3bb39a4eab34b9762475a5998d7f5af4f9b8a78907d9ab5173f29d1a
kernel-smp-devel-2.6.9-42.EL.x86_64.rpm SHA-256: d1c109fd3bb39a4eab34b9762475a5998d7f5af4f9b8a78907d9ab5173f29d1a
ia64
kernel-2.6.9-42.EL.ia64.rpm SHA-256: cb83254647b46261cd10f68dccd2829c3c02d60efbf5b832eda5439563de5c20
kernel-2.6.9-42.EL.ia64.rpm SHA-256: cb83254647b46261cd10f68dccd2829c3c02d60efbf5b832eda5439563de5c20
kernel-devel-2.6.9-42.EL.ia64.rpm SHA-256: 831a5652686ed1d6b736acfd6405e6e8771e3878bf3e8c978bae7d0bce6fef4a
kernel-devel-2.6.9-42.EL.ia64.rpm SHA-256: 831a5652686ed1d6b736acfd6405e6e8771e3878bf3e8c978bae7d0bce6fef4a
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-largesmp-2.6.9-42.EL.ia64.rpm SHA-256: 4e84df1a37fa167e3559692a028c8e669817f7f61c62ef9acddc22bd420fa012
kernel-largesmp-2.6.9-42.EL.ia64.rpm SHA-256: 4e84df1a37fa167e3559692a028c8e669817f7f61c62ef9acddc22bd420fa012
kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm SHA-256: 694dccc83f9fcc3a78e9b9bd33e89471ef52327fd757798715c97f46c2b1a245
kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm SHA-256: 694dccc83f9fcc3a78e9b9bd33e89471ef52327fd757798715c97f46c2b1a245
i386
kernel-2.6.9-42.EL.i686.rpm SHA-256: 45b7572a4d36f78d5d959526da2a07c4341cab36894cb0beb97ba3bdc3aa00a7
kernel-2.6.9-42.EL.i686.rpm SHA-256: 45b7572a4d36f78d5d959526da2a07c4341cab36894cb0beb97ba3bdc3aa00a7
kernel-devel-2.6.9-42.EL.i686.rpm SHA-256: b741f657e5dc5be0acf258321dbc6a5c38bb3dd52357f2f07f1ae1d6c181e0b6
kernel-devel-2.6.9-42.EL.i686.rpm SHA-256: b741f657e5dc5be0acf258321dbc6a5c38bb3dd52357f2f07f1ae1d6c181e0b6
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-hugemem-2.6.9-42.EL.i686.rpm SHA-256: 154796d006722899846ac7b17da8e6a48ee82b2b603676f3d605510a39e1a72a
kernel-hugemem-2.6.9-42.EL.i686.rpm SHA-256: 154796d006722899846ac7b17da8e6a48ee82b2b603676f3d605510a39e1a72a
kernel-hugemem-devel-2.6.9-42.EL.i686.rpm SHA-256: 5409298b97cbe4b7314f6c643ec8e4223895ac015e986e8c1771d01b257b4a74
kernel-hugemem-devel-2.6.9-42.EL.i686.rpm SHA-256: 5409298b97cbe4b7314f6c643ec8e4223895ac015e986e8c1771d01b257b4a74
kernel-smp-2.6.9-42.EL.i686.rpm SHA-256: 82174043f980d7ad720129f37a7c3eab60c9ac528e4ed93dc599d01832f61ebf
kernel-smp-2.6.9-42.EL.i686.rpm SHA-256: 82174043f980d7ad720129f37a7c3eab60c9ac528e4ed93dc599d01832f61ebf
kernel-smp-devel-2.6.9-42.EL.i686.rpm SHA-256: a9dd6e15cb6c0010fffd13976efe2569639c184e683ac9920d9aa156f2ba2515
kernel-smp-devel-2.6.9-42.EL.i686.rpm SHA-256: a9dd6e15cb6c0010fffd13976efe2569639c184e683ac9920d9aa156f2ba2515

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-42.EL.src.rpm SHA-256: c20d895c1b02adcabef6b03a39e1d2bf8d67d7cae7b6bfdbb436f5201c52e0c0
x86_64
kernel-2.6.9-42.EL.x86_64.rpm SHA-256: 09bf7189bb62082d2f2e5d6394966998bea89f5f8889c5efae334b9916449566
kernel-devel-2.6.9-42.EL.x86_64.rpm SHA-256: 9382350e09580e5c3206610f85599f36bd86b760818db15aa59671a7ea7b4936
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-largesmp-2.6.9-42.EL.x86_64.rpm SHA-256: 451f4ece025220021f316d57717154e077e3b7827556ab83669dd4fb13d9f422
kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm SHA-256: 97abed43400cf2f27acf1fc558c2436539e28de59c9f2601b499f58b929abf07
kernel-smp-2.6.9-42.EL.x86_64.rpm SHA-256: 6189cd843fadec709e2d5e999213588516ae5a461ba70a3d59011a360d9afc66
kernel-smp-devel-2.6.9-42.EL.x86_64.rpm SHA-256: d1c109fd3bb39a4eab34b9762475a5998d7f5af4f9b8a78907d9ab5173f29d1a
ia64
kernel-2.6.9-42.EL.ia64.rpm SHA-256: cb83254647b46261cd10f68dccd2829c3c02d60efbf5b832eda5439563de5c20
kernel-devel-2.6.9-42.EL.ia64.rpm SHA-256: 831a5652686ed1d6b736acfd6405e6e8771e3878bf3e8c978bae7d0bce6fef4a
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-largesmp-2.6.9-42.EL.ia64.rpm SHA-256: 4e84df1a37fa167e3559692a028c8e669817f7f61c62ef9acddc22bd420fa012
kernel-largesmp-devel-2.6.9-42.EL.ia64.rpm SHA-256: 694dccc83f9fcc3a78e9b9bd33e89471ef52327fd757798715c97f46c2b1a245
i386
kernel-2.6.9-42.EL.i686.rpm SHA-256: 45b7572a4d36f78d5d959526da2a07c4341cab36894cb0beb97ba3bdc3aa00a7
kernel-devel-2.6.9-42.EL.i686.rpm SHA-256: b741f657e5dc5be0acf258321dbc6a5c38bb3dd52357f2f07f1ae1d6c181e0b6
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-hugemem-2.6.9-42.EL.i686.rpm SHA-256: 154796d006722899846ac7b17da8e6a48ee82b2b603676f3d605510a39e1a72a
kernel-hugemem-devel-2.6.9-42.EL.i686.rpm SHA-256: 5409298b97cbe4b7314f6c643ec8e4223895ac015e986e8c1771d01b257b4a74
kernel-smp-2.6.9-42.EL.i686.rpm SHA-256: 82174043f980d7ad720129f37a7c3eab60c9ac528e4ed93dc599d01832f61ebf
kernel-smp-devel-2.6.9-42.EL.i686.rpm SHA-256: a9dd6e15cb6c0010fffd13976efe2569639c184e683ac9920d9aa156f2ba2515

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-42.EL.src.rpm SHA-256: c20d895c1b02adcabef6b03a39e1d2bf8d67d7cae7b6bfdbb436f5201c52e0c0
x86_64
kernel-2.6.9-42.EL.x86_64.rpm SHA-256: 09bf7189bb62082d2f2e5d6394966998bea89f5f8889c5efae334b9916449566
kernel-devel-2.6.9-42.EL.x86_64.rpm SHA-256: 9382350e09580e5c3206610f85599f36bd86b760818db15aa59671a7ea7b4936
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-largesmp-2.6.9-42.EL.x86_64.rpm SHA-256: 451f4ece025220021f316d57717154e077e3b7827556ab83669dd4fb13d9f422
kernel-largesmp-devel-2.6.9-42.EL.x86_64.rpm SHA-256: 97abed43400cf2f27acf1fc558c2436539e28de59c9f2601b499f58b929abf07
kernel-smp-2.6.9-42.EL.x86_64.rpm SHA-256: 6189cd843fadec709e2d5e999213588516ae5a461ba70a3d59011a360d9afc66
kernel-smp-devel-2.6.9-42.EL.x86_64.rpm SHA-256: d1c109fd3bb39a4eab34b9762475a5998d7f5af4f9b8a78907d9ab5173f29d1a
i386
kernel-2.6.9-42.EL.i686.rpm SHA-256: 45b7572a4d36f78d5d959526da2a07c4341cab36894cb0beb97ba3bdc3aa00a7
kernel-devel-2.6.9-42.EL.i686.rpm SHA-256: b741f657e5dc5be0acf258321dbc6a5c38bb3dd52357f2f07f1ae1d6c181e0b6
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-hugemem-2.6.9-42.EL.i686.rpm SHA-256: 154796d006722899846ac7b17da8e6a48ee82b2b603676f3d605510a39e1a72a
kernel-hugemem-devel-2.6.9-42.EL.i686.rpm SHA-256: 5409298b97cbe4b7314f6c643ec8e4223895ac015e986e8c1771d01b257b4a74
kernel-smp-2.6.9-42.EL.i686.rpm SHA-256: 82174043f980d7ad720129f37a7c3eab60c9ac528e4ed93dc599d01832f61ebf
kernel-smp-devel-2.6.9-42.EL.i686.rpm SHA-256: a9dd6e15cb6c0010fffd13976efe2569639c184e683ac9920d9aa156f2ba2515

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-42.EL.src.rpm SHA-256: c20d895c1b02adcabef6b03a39e1d2bf8d67d7cae7b6bfdbb436f5201c52e0c0
s390x
kernel-2.6.9-42.EL.s390x.rpm SHA-256: f7e1f96429df0524ffc19425468b89321ff56f108802519dda67c73c4c976ae5
kernel-devel-2.6.9-42.EL.s390x.rpm SHA-256: 876f5175715cc226d87e7e3c3cb61ac9e916da0d987ef8b4cc27fadd1ae64c5a
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
s390
kernel-2.6.9-42.EL.s390.rpm SHA-256: 6f083776aa5d8d62f4d2462f67bc8617f608498af7e2ba80e3ed8196b75fb448
kernel-devel-2.6.9-42.EL.s390.rpm SHA-256: 75d185966f988fbd0b13c8d67361e5a3e55b1f939f1f2034b2c202100e9a5584
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-42.EL.src.rpm SHA-256: c20d895c1b02adcabef6b03a39e1d2bf8d67d7cae7b6bfdbb436f5201c52e0c0
ppc
kernel-2.6.9-42.EL.ppc64.rpm SHA-256: a5f7a7ff9c719ce168b413324b009257e2ea070cc8d3378b5b95823e29e07b08
kernel-2.6.9-42.EL.ppc64iseries.rpm SHA-256: 8b8016706068ae0ae023fd84ebde6dbe8c7c224e3acedfc55745f2b210c7a0a9
kernel-devel-2.6.9-42.EL.ppc64.rpm SHA-256: 8337b6dd8f7b482202875ff6053c094dfd9b2262c6fab50fb1ae621f82a03a70
kernel-devel-2.6.9-42.EL.ppc64iseries.rpm SHA-256: 2abbab9ac348d70e612f943fbfbb59a251d892452f789b89306c15f60a507e86
kernel-doc-2.6.9-42.EL.noarch.rpm SHA-256: e4a55e88da8ace5b20cfefb0d0c3fd9bb1f6311e9cd4c694d1720021030ff46f
kernel-largesmp-2.6.9-42.EL.ppc64.rpm SHA-256: 93575c03d691762e0c45f63ae1fbd6092b9e2fdeaafca2478e0128f1e69b690e
kernel-largesmp-devel-2.6.9-42.EL.ppc64.rpm SHA-256: fc1612e3f17cd4a6fb4a6851039abac7093a51dc11317d7929387e9abc1f878c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2021 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook