- Issued:
- 2010-04-07
- Updated:
- 2010-04-07
RHBA-2010:0344 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated kernel packages that resolve several issues are now available for Red
Hat Enterprise Linux 5.3 Extended Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
These updated kernel packages provide fixes for the following bugs:
- if a program that calls posix_fadvise() were compiled on x86, and then run on
a 64-bit system, that program could experience various problems, including
performance issues and the call to posix_fadvise() failing, causing the program
to not run as expected or even abort. With this update, when such programs
attempt to call posix_fadvise() on 64-bit systems, sys32_fadvise64() is called
instead, which resolves this issue. This update also fixes other 32-bit system
calls that were mistakenly called on 64-bit systems (including systems running
the kernel-xen kernel). (BZ#569596)
- calling the open() system call on a file located under a process ID in the
proc file system (i.e. /proc/[pid_number]/[file]) resulted in the EINVAL error
code being returned if that process was exiting at the same time. This was the
wrong error code to use for this condition. With this update, ENOENT is returned
instead. (BZ#571361)
- TSC was not made available on systems with multi-clustered APICs. This could
cause slow performance for time-sensitive applications. (BZ#574488)
- Xen guests occasionally became unresponsive during boot time at the 'Bringing
up interface eth0' stage. This was caused by incorrect locking in the Xen
netfront code, and has been fixed in this update. (BZ#574672)
Users should upgrade to these updated packages, which contain backported patches
to correct these issues. The system must be rebooted for this update to take
effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
- Red Hat Enterprise Linux Server - AUS 5.3 x86_64
- Red Hat Enterprise Linux Server - AUS 5.3 ia64
- Red Hat Enterprise Linux Server - AUS 5.3 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
Fixes
- BZ - 569596 - posix_fadvise() handles its arguments incorrectly in 32-bit compat mode. [rhel-5.3.z]
- BZ - 571361 - [5.4] open(/proc/PID/xxx) fails with EINVAL even though it should be ENOENT. [rhel-5.3.z]
- BZ - 574488 - [Intel 5.5 FEAT] Support Intel multi-APIC-cluster systems [rhel-5.3.z]
- BZ - 574672 - RHEL-5: Deadlock in Xen netfront driver. [rhel-5.3.z]
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.