Last week one or more of Red Hat’s servers got cracked. Now, it has been revealed that both Fedora and Red Hat servers have been compromised. As a result Fedora is changing their package signing key. The intruder was able to sign a small number of OpenSSH packages relating only to Red Hat Enterprise Linux 4 (i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64 architecture only). This update has been rated as having critical security impact.
A few days ago I noticed that NFS performance between a web server node and NFS server went down by 50%. NFS was optimized and the only thing was updated Red Hat kernel v5.2. I also noticed same trend on CentOS 5.2 64 bit edition.
Companies are increasingly choosing free community-driven Linux distributions instead of commercial offerings with conventional support options from Red Hat or Novell due to dissatisfaction with the cost of support services.
An updated kexec-tools package that fixes a bug is now available for RHEL systems. The kexec-tools package provides tools that facilitate a new kernel to boot using the Linux kernel kexec feature, either on a normal or a panic reboot.
An updated autofs package that fixes a bug is now available under RHEL 4.x server and desktop systems.
Updated freetype packages that fix various security issues are now available for CentOS / Red Hat Enterprise Linux 3, 4, 5 and 2.1 server software.