Enhancement Advisory rp-pppoe enhancement update

Advisory: RHEA-2014:0424-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2014-04-23
Last updated on: 2014-10-13
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated rp-pppoe packages that add one enhancement are now available for Red Hat
Enterprise Linux 6.

The rp-pppoe packages provide the Roaring Penguin PPPoE (Point-to-Point Protocol
over Ethernet) client, a user-mode program that does not require any kernel
modifications. This client is fully compliant with RFC 2516, the official PPPoE
specification.

This update adds the following enhancement:

* In Red Hat Enterprise Linux 6, the adsl-setup script in the rp-pppoe packages
was renamed to pppoe-setup. To assist users migrating from Red Hat Enterprise
Linux 5 to Red Hat Enterprise Linux 6, a symbolic link has been created to allow
the old script name to continue to work. (BZ#1009268)

Users of rp-pppoe are advised to upgrade to these updated packages, which add
this enhancement.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
rp-pppoe-3.10-11.el6.src.rpm     MD5: 1922b022bff525f058ec96f0e9eeb516
SHA-256: 306e1a9b035e22b648162053df12650cc433f0825d718fd200fa505111a5e8a6
 
IA-32:
rp-pppoe-3.10-11.el6.i686.rpm     MD5: dd052cb202d7edaaf6e12cd97dee521f
SHA-256: 210a0c82c9408326c220e805851b62545bb1a61e75062f0cece6428b822b9c2f
rp-pppoe-debuginfo-3.10-11.el6.i686.rpm     MD5: cbd9f40da7e065041200e13e028baf99
SHA-256: 40a9c2969d981127dc68e9a26867e579eb05aa65a8b1778db7388105757f0719
 
x86_64:
rp-pppoe-3.10-11.el6.x86_64.rpm     MD5: 279a7c46890794e7976c77f7ce474fb3
SHA-256: 578ca362ce444d52938cd46a1d5aa14320498d9f4553b9b5b96a0cc0119dc06a
rp-pppoe-debuginfo-3.10-11.el6.x86_64.rpm     MD5: aa6f6cb1bf107ef15974ea71b621c7f4
SHA-256: 94bccd43f89f2e2dc594c02a46f336b6a7215983b33e220a976c6d2a69052707
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
rp-pppoe-3.10-11.el6.src.rpm     MD5: 1922b022bff525f058ec96f0e9eeb516
SHA-256: 306e1a9b035e22b648162053df12650cc433f0825d718fd200fa505111a5e8a6
 
x86_64:
rp-pppoe-3.10-11.el6.x86_64.rpm     MD5: 279a7c46890794e7976c77f7ce474fb3
SHA-256: 578ca362ce444d52938cd46a1d5aa14320498d9f4553b9b5b96a0cc0119dc06a
rp-pppoe-debuginfo-3.10-11.el6.x86_64.rpm     MD5: aa6f6cb1bf107ef15974ea71b621c7f4
SHA-256: 94bccd43f89f2e2dc594c02a46f336b6a7215983b33e220a976c6d2a69052707
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
rp-pppoe-3.10-11.el6.src.rpm     MD5: 1922b022bff525f058ec96f0e9eeb516
SHA-256: 306e1a9b035e22b648162053df12650cc433f0825d718fd200fa505111a5e8a6
 
IA-32:
rp-pppoe-3.10-11.el6.i686.rpm     MD5: dd052cb202d7edaaf6e12cd97dee521f
SHA-256: 210a0c82c9408326c220e805851b62545bb1a61e75062f0cece6428b822b9c2f
rp-pppoe-debuginfo-3.10-11.el6.i686.rpm     MD5: cbd9f40da7e065041200e13e028baf99
SHA-256: 40a9c2969d981127dc68e9a26867e579eb05aa65a8b1778db7388105757f0719
 
PPC:
rp-pppoe-3.10-11.el6.ppc64.rpm     MD5: 041c0219532424d3db1ecb5e4608acea
SHA-256: 384566a7ecb388b951b8ddbd9eeb53d2b1079e0d10f7f40ebcb97aea4ec90c07
rp-pppoe-debuginfo-3.10-11.el6.ppc64.rpm     MD5: d7c9446a9fc288b3265eecbaa7a34d24
SHA-256: bd0c67f3ad88efa29a061586e444a0a2fcb6a3f42d6a5454b98c60c373b2b6d8
 
x86_64:
rp-pppoe-3.10-11.el6.x86_64.rpm     MD5: 279a7c46890794e7976c77f7ce474fb3
SHA-256: 578ca362ce444d52938cd46a1d5aa14320498d9f4553b9b5b96a0cc0119dc06a
rp-pppoe-debuginfo-3.10-11.el6.x86_64.rpm     MD5: aa6f6cb1bf107ef15974ea71b621c7f4
SHA-256: 94bccd43f89f2e2dc594c02a46f336b6a7215983b33e220a976c6d2a69052707
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
rp-pppoe-3.10-11.el6.src.rpm     MD5: 1922b022bff525f058ec96f0e9eeb516
SHA-256: 306e1a9b035e22b648162053df12650cc433f0825d718fd200fa505111a5e8a6
 
IA-32:
rp-pppoe-3.10-11.el6.i686.rpm     MD5: dd052cb202d7edaaf6e12cd97dee521f
SHA-256: 210a0c82c9408326c220e805851b62545bb1a61e75062f0cece6428b822b9c2f
rp-pppoe-debuginfo-3.10-11.el6.i686.rpm     MD5: cbd9f40da7e065041200e13e028baf99
SHA-256: 40a9c2969d981127dc68e9a26867e579eb05aa65a8b1778db7388105757f0719
 
x86_64:
rp-pppoe-3.10-11.el6.x86_64.rpm     MD5: 279a7c46890794e7976c77f7ce474fb3
SHA-256: 578ca362ce444d52938cd46a1d5aa14320498d9f4553b9b5b96a0cc0119dc06a
rp-pppoe-debuginfo-3.10-11.el6.x86_64.rpm     MD5: aa6f6cb1bf107ef15974ea71b621c7f4
SHA-256: 94bccd43f89f2e2dc594c02a46f336b6a7215983b33e220a976c6d2a69052707
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1009268 - adsl-setup renamed to pppoe-setup



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/