- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0016 - Bug Fix Advisory
Synopsis
amtu bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated amtu package that fixes a bug is now available.
Description
Abstract Machine Test Utility (AMTU) is an administrative utility to check
whether the underlying protection mechanism of the hardware are still being
enforced. This is a requirement of the Controlled Access Protection Profile
FPT_AMT.1.
This updated package addresses the following bug:
- on systems with more than 16GB of memory, amtu mis-detected the available
memory and, consequently, attempted to allocate too much memory for testing.
This caused the test to fail and returned a 'Could not allocate memory'
error.
Users of amtu should upgrade to this updated package, which resolves this
issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 426156 - amtu displays the wrong amount of memory
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
amtu-1.0.6-1.el5.src.rpm | SHA-256: 95c38240f56bc7068b43982e90abb67c6f7d8258e074fe67e70b14e401bbdc30 |
x86_64 | |
amtu-1.0.6-1.el5.x86_64.rpm | SHA-256: f62bff15ada6fd0b016bf5eb13173c410f7dcce858b45cb9b2a3d93eccc58f94 |
ia64 | |
amtu-1.0.6-1.el5.ia64.rpm | SHA-256: b4e02a34be8a7a5947fe94cfde651e006206575f70aee3f64fffba341e911a45 |
i386 | |
amtu-1.0.6-1.el5.i386.rpm | SHA-256: aba2f994dd5ca53c80eabed9825a70d14360959361a7292bf8acd48892c9076c |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
amtu-1.0.6-1.el5.src.rpm | SHA-256: 95c38240f56bc7068b43982e90abb67c6f7d8258e074fe67e70b14e401bbdc30 |
x86_64 | |
amtu-1.0.6-1.el5.x86_64.rpm | SHA-256: f62bff15ada6fd0b016bf5eb13173c410f7dcce858b45cb9b2a3d93eccc58f94 |
i386 | |
amtu-1.0.6-1.el5.i386.rpm | SHA-256: aba2f994dd5ca53c80eabed9825a70d14360959361a7292bf8acd48892c9076c |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
amtu-1.0.6-1.el5.src.rpm | SHA-256: 95c38240f56bc7068b43982e90abb67c6f7d8258e074fe67e70b14e401bbdc30 |
x86_64 | |
amtu-1.0.6-1.el5.x86_64.rpm | SHA-256: f62bff15ada6fd0b016bf5eb13173c410f7dcce858b45cb9b2a3d93eccc58f94 |
i386 | |
amtu-1.0.6-1.el5.i386.rpm | SHA-256: aba2f994dd5ca53c80eabed9825a70d14360959361a7292bf8acd48892c9076c |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
amtu-1.0.6-1.el5.src.rpm | SHA-256: 95c38240f56bc7068b43982e90abb67c6f7d8258e074fe67e70b14e401bbdc30 |
s390x | |
amtu-1.0.6-1.el5.s390x.rpm | SHA-256: 3a6f965db05aa863b078199cd69a4493baf065b5dd0f48929c256085c9c070a2 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
amtu-1.0.6-1.el5.src.rpm | SHA-256: 95c38240f56bc7068b43982e90abb67c6f7d8258e074fe67e70b14e401bbdc30 |
ppc | |
amtu-1.0.6-1.el5.ppc.rpm | SHA-256: a355aa30acbfcdadd008daa9910b1787c4beed9563f6877c549003fb322cd41b |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
amtu-1.0.6-1.el5.src.rpm | SHA-256: 95c38240f56bc7068b43982e90abb67c6f7d8258e074fe67e70b14e401bbdc30 |
x86_64 | |
amtu-1.0.6-1.el5.x86_64.rpm | SHA-256: f62bff15ada6fd0b016bf5eb13173c410f7dcce858b45cb9b2a3d93eccc58f94 |
i386 | |
amtu-1.0.6-1.el5.i386.rpm | SHA-256: aba2f994dd5ca53c80eabed9825a70d14360959361a7292bf8acd48892c9076c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.