Last week one or more of Red Hat’s servers got cracked. Now, it has been revealed that both Fedora and Red Hat servers have been compromised. As a result Fedora is changing their package signing key. The intruder was able to sign a small number of OpenSSH packages relating only to Red Hat Enterprise Linux 4 (i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64 architecture only). This update has been rated as having critical security impact.
A few days ago I noticed that NFS performance between a web server node and NFS server went down by 50%. NFS was optimized and the only thing was updated Red Hat kernel v5.2. I also noticed same trend on CentOS 5.2 64 bit edition.
Companies are increasingly choosing free community-driven Linux distributions instead of commercial offerings with conventional support options from Red Hat or Novell due to dissatisfaction with the cost of support services.
Updated kernel packages that fix several bugs, while adding an enhancement are now available for Red Hat Enterprise Linux 4.
An updated kexec-tools package that fixes a bug is now available for RHEL systems. The kexec-tools package provides tools that facilitate a new kernel to boot using the Linux kernel kexec feature, either on a normal or a panic reboot.
An updated autofs package that fixes a bug is now available under RHEL 4.x server and desktop systems.
Updated freetype packages that fix various security issues are now available for CentOS / Red Hat Enterprise Linux 3, 4, 5 and 2.1 server software.