Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 154953 Details for
Bug 240382
dupe errata mail deluges to the same account
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
email that was sent out today, only one copy per errata of this batch was received
correct-alert.txt (text/plain), 5.97 KB, created by
Máirín Duffy
on 2007-05-17 19:59:44 UTC
(
hide
)
Description:
email that was sent out today, only one copy per errata of this batch was received
Filename:
MIME Type:
Creator:
Máirín Duffy
Created:
2007-05-17 19:59:44 UTC
Size:
5.97 KB
patch
obsolete
>Subject: >RHN Errata Alert: Important: kernel security and bug fix update >From: >Red Hat Network Alert <dev-null@rhn.redhat.com> >Date: >Thu, 17 May 2007 14:59:08 -0400 >To: >"maureenduffy" <duffy@redhat.com> >X-Mozilla-Status: >0001 >X-Mozilla-Status2: >00000000 >Return-Path: ><dev-null@rhn.redhat.com> >Received: >from mail.boston.redhat.com ([unix socket]) by mail.boston.redhat.com (Cyrus v2.2.12-Invoca-RPM-2.2.12-8.1.RHEL4) with LMTPA; Thu, 17 May 2007 14:59:15 -0400 >X-Sieve: >CMU Sieve 2.2 >Received: >from int-mx1.corp.redhat.com (int-mx1.corp.redhat.com [172.16.52.254]) by mail.boston.redhat.com (8.13.1/8.13.1) with ESMTP id l4HIxEq6023188 for <duffy@boston.redhat.com>; Thu, 17 May 2007 14:59:14 -0400 >Received: >from mx1.util.phx.redhat.com (mx1.util.phx.redhat.com [10.8.4.92]) by int-mx1.corp.redhat.com (8.13.1/8.13.1) with ESMTP id l4HIxEXW011343 for <duffy@int-mx1.corp.redhat.com>; Thu, 17 May 2007 14:59:14 -0400 >Received: >from alertmail.util.phx.redhat.com (alertmail.util.phx.redhat.com [10.8.4.113]) by mx1.util.phx.redhat.com (8.13.1/8.13.1) with ESMTP id l4HIx9aI000840 for <duffy@redhat.com>; Thu, 17 May 2007 14:59:09 -0400 >Received: >from scripts11.app.phx.redhat.com (nat-pool.util.phx.redhat.com [10.8.5.200]) by alertmail.util.phx.redhat.com (8.13.1/8.13.1) with ESMTP id l4HIlPnh030318 for <duffy@redhat.com>; Thu, 17 May 2007 14:59:08 -0400 >Message-ID: ><200705171859.l4HIlPnh030318@alertmail.util.phx.redhat.com> >X-RHN-Login: >maureenduffy >Precedence: >first-class >Errors-To: >dev-null@rhn.redhat.com >X-RHN-Email: ><duffy@redhat.com> >X-RHN-Info: >Autogenerated mail for maureenduffy >Content-Type: >TEXT/PLAIN; charset=US-ASCII > >Red Hat Network has determined that the following advisory is applicable to >one or more of the systems you have registered: > >Complete information about this errata can be found at the following location: > https://rhn.redhat.com/network/errata/errata_details.pxt?eid=5690 > >Security Advisory - RHSA-2007:0347-2 >------------------------------------------------------------------------------ >Summary: >Important: kernel security and bug fix update > >Updated kernel packages that fix security issues and bugs in the Red Hat >Enterprise Linux 5 kernel are now available. > >This update has been rated as having important security impact by the Red >Hat Security Response Team. > >Description: >The Linux kernel handles the basic functions of the operating system. > >These new kernel packages contain fixes for the following security issues: > >* a flaw in the handling of IPv6 type 0 routing headers that allowed remote >users to cause a denial of service that led to a network amplification >between two routers (CVE-2007-2242, Important). > >* a flaw in the nfnetlink_log netfilter module that allowed a local user to >cause a denial of service (CVE-2007-1496, Important). > >* a flaw in the flow list of listening IPv6 sockets that allowed a local >user to cause a denial of service (CVE-2007-1592, Important). > >* a flaw in the handling of netlink messages that allowed a local user to >cause a denial of service (infinite recursion) (CVE-2007-1861, Important). > >* a flaw in the IPv4 forwarding base that allowed a local user to cause an >out-of-bounds access (CVE-2007-2172, Important). > >* a flaw in the nf_conntrack netfilter module for IPv6 that allowed remote >users to bypass certain netfilter rules using IPv6 fragments >(CVE-2007-1497, Moderate). > >In addition to the security issues described above, fixes for the following >have been included: > >* a regression in ipv6 routing. > >* an error in memory initialization that caused gdb to output inaccurate >backtraces on ia64. > >* the nmi watchdog timeout was updated from 5 to 30 seconds. > >* a flaw in distributed lock management that could result in errors during >virtual machine migration. > >* an omitted include in kernel-headers that led to compile failures for >some packages. > >Red Hat Enterprise Linux 5 users are advised to upgrade to these packages, >which contain backported patches to correct these issues. > >References: >http://www.redhat.com/security/updates/classification/#important >------------------------------------------------------------------------------ > >------------- >Taking Action >------------- >You may address the issues outlined in this advisory in two ways: > > - select your server name by clicking on its name from the list > available at the following location, and then schedule an > errata update for it: > https://rhn.redhat.com/network/systemlist/system_list.pxt > > - run the Update Agent on each affected server. > > >--------------------------------- >Changing Notification Preferences >--------------------------------- >To enable/disable your Errata Alert preferences globally please log in to RHN >and navigate from "Your RHN" / "Your Account" to the "Preferences" tab. > > URL: https://rhn.redhat.com/network/my_account/my_prefs.pxt > >You can also enable/disable notification on a per system basis by selecting an >individual system from the "Systems List". From the individual system view >click the "Details" tab. > > >--------------------- >Affected Systems List >--------------------- >This Errata Advisory may apply to the systems listed below. If you know that >this errata does not apply to a system listed, it might be possible that the >package profile for that server is out of date. In that case you should run >'up2date -p' as root on the system in question to refresh your software profile. > >There is 1 affected system registered in 'Your RHN' (only systems for >which you have explicitly enabled Errata Alerts are shown). > >Release Arch Profile Name >-------- -------- ------------ >5Server athlon tsukushi > > >The Red Hat Network Team > >This message is being sent by Red Hat Network Alert to: > RHN user login: maureenduffy > Email address on file: <duffy@redhat.com> > >If you lost your RHN password, you can use the information above to >retrieve it by email from the following address: > https://rhn.redhat.com/forgot_password.pxt > >To cancel these notices, go to: > https://rhn.redhat.com/oo.pxt?uid=3557121&oid=4106726 > > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 240382
: 154953