Updated amtu package that fixes three bugs is now available for Red HatEnterprise Linux 6.

The Abstract Machine Test Utility (AMTU) is an administrative utility to verifythat the underlying protection mechanisms of the system hardware are beingenforced correctly.This update fixes the following bugs:* Previously, Abstract Machine Test Utility (AMTU) did not handle the name ofthe interface correctly under certain circumstances. As a consequence, AMTUfailed to obtain a list of network interfaces to test. With this update, theinterface hardware type and carriers are obtained from the /sys/class/net/directory. Now, only an Ethernet and a token ring can be used, and a carriermust be present. As a result, AMTU handles the new network interface names asexpected. (BZ#689823)* Prior to this update, AMTU ran network tests on interfaces configured with astatic IP that did not have an existing connection, causing those tests to fail.With this update, AMTU no longer runs tests on interfaces that are not up.(BZ#723049)* Previously, the name of the network interface was restricted to 4 characterson 32-bit systems and 8 characters on 64-bit system due to using the sizeof()operator instead of the strlen() function. As a consequence, AMTU did notcorrectly display the full network interface name in certain portions of theoutput. A patch has been applied to address this bug, and AMTU now alwaysdisplays the full network interface name as expected. (BZ#1098076)Users of amtu are advised to upgrade to the updated package, which fixes thesebugs.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
amtu-1.0.8-11.el6.src.rpm
    MD5: cb9703607ff8b0b0a8880d6d44ca752cSHA-256: aa72dfaab2b5abb22a40faa1852ade957e848b61f2d7738c5c42e5da8f10df77
 
IA-32:
amtu-1.0.8-11.el6.i686.rpm
    MD5: ffe51ee82f52962acc179da40541fd2eSHA-256: 2fefbad3fd273431db6228d59ecb137630b52dd2c23294338287dbad0d8b4740
amtu-debuginfo-1.0.8-11.el6.i686.rpm
    MD5: 4d26977be8677c130a631b9e3caea7e2SHA-256: cae683c6b11f975fa94e8120f52008e00653ac95e389651b3c21a489ec2305f2
 
x86_64:
amtu-1.0.8-11.el6.x86_64.rpm
    MD5: c9bf5ad3c04cbcd45f48df5c475e6ad6SHA-256: 65c4062655e733bd5dacbee7e83fcd64fb119ed80a5129027d369ccdc9abbf84
amtu-debuginfo-1.0.8-11.el6.x86_64.rpm
    MD5: 2f145a1ea429231ca13340bb25b9d9c8SHA-256: 9ea573ebd6a6669516ac7c6a3618f3c936767f1dc9f899a06186d2f8466f7a5d
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
amtu-1.0.8-11.el6.src.rpm
    MD5: cb9703607ff8b0b0a8880d6d44ca752cSHA-256: aa72dfaab2b5abb22a40faa1852ade957e848b61f2d7738c5c42e5da8f10df77
 
IA-32:
amtu-1.0.8-11.el6.i686.rpm
    MD5: ffe51ee82f52962acc179da40541fd2eSHA-256: 2fefbad3fd273431db6228d59ecb137630b52dd2c23294338287dbad0d8b4740
amtu-debuginfo-1.0.8-11.el6.i686.rpm
    MD5: 4d26977be8677c130a631b9e3caea7e2SHA-256: cae683c6b11f975fa94e8120f52008e00653ac95e389651b3c21a489ec2305f2
 
PPC:
amtu-1.0.8-11.el6.ppc64.rpm
    MD5: 4be1ab12187764c00ac8f0fb25fd0f77SHA-256: d66957ed2b0793c8827a6cb0d0d04c763168c2fdaa8d32fe8ed611b5c38a4a20
amtu-debuginfo-1.0.8-11.el6.ppc64.rpm
    MD5: c518ac1343a13ca1a05d143e784b0307SHA-256: fb4ebb6d4e41c0c01742012328c043a66d1523638c3dac0dd57276e8bb7451b7
 
s390x:
amtu-1.0.8-11.el6.s390x.rpm
    MD5: 221b5f7644354fb805b2616f983ae9f4SHA-256: 9d97aada570c20685c6d56e8a53a7f96a0b267efdff09406f683dc8b90a7ae09
amtu-debuginfo-1.0.8-11.el6.s390x.rpm
    MD5: 74af7205154ffe7fb61466a45cc8d63bSHA-256: bb969908369a941e3b2ed9bd63e09a3624a42c9f0646e469a7ad33c300fecd66
 
x86_64:
amtu-1.0.8-11.el6.x86_64.rpm
    MD5: c9bf5ad3c04cbcd45f48df5c475e6ad6SHA-256: 65c4062655e733bd5dacbee7e83fcd64fb119ed80a5129027d369ccdc9abbf84
amtu-debuginfo-1.0.8-11.el6.x86_64.rpm
    MD5: 2f145a1ea429231ca13340bb25b9d9c8SHA-256: 9ea573ebd6a6669516ac7c6a3618f3c936767f1dc9f899a06186d2f8466f7a5d
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
amtu-1.0.8-11.el6.src.rpm
    MD5: cb9703607ff8b0b0a8880d6d44ca752cSHA-256: aa72dfaab2b5abb22a40faa1852ade957e848b61f2d7738c5c42e5da8f10df77
 
IA-32:
amtu-1.0.8-11.el6.i686.rpm
    MD5: ffe51ee82f52962acc179da40541fd2eSHA-256: 2fefbad3fd273431db6228d59ecb137630b52dd2c23294338287dbad0d8b4740
amtu-debuginfo-1.0.8-11.el6.i686.rpm
    MD5: 4d26977be8677c130a631b9e3caea7e2SHA-256: cae683c6b11f975fa94e8120f52008e00653ac95e389651b3c21a489ec2305f2
 
x86_64:
amtu-1.0.8-11.el6.x86_64.rpm
    MD5: c9bf5ad3c04cbcd45f48df5c475e6ad6SHA-256: 65c4062655e733bd5dacbee7e83fcd64fb119ed80a5129027d369ccdc9abbf84
amtu-debuginfo-1.0.8-11.el6.x86_64.rpm
    MD5: 2f145a1ea429231ca13340bb25b9d9c8SHA-256: 9ea573ebd6a6669516ac7c6a3618f3c936767f1dc9f899a06186d2f8466f7a5d
 
(The unlinked packages above are only available from the Red Hat Network)
1098076 – amtu shows only 4 letters of name of network interface in its output.689823 – [AMTU] “Failed to get list of network interfaces to test.”723049 – [RHEL6.0] AMTU Running network tests on interfaces that have no link

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply