Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2010:0398-1
Type: Security Advisory
Severity: Important
Issued on: 2010-05-06
Last updated on: 2010-05-06
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2010-0307
CVE-2010-0410
CVE-2010-0730
CVE-2010-1085
CVE-2010-1086

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a flaw was found in the Unidirectional Lightweight Encapsulation (ULE)
implementation. A remote attacker could send a specially-crafted ISO
MPEG-2 Transport Stream (TS) frame to a target system, resulting in an
infinite loop (denial of service). (CVE-2010-1086, Important)

* on AMD64 systems, it was discovered that the kernel did not ensure the
ELF interpreter was available before making a call to the SET_PERSONALITY
macro. A local attacker could use this flaw to cause a denial of service by
running a 32-bit application that attempts to execute a 64-bit application.
(CVE-2010-0307, Moderate)

* a flaw was found in the kernel connector implementation. A local,
unprivileged user could trigger this flaw by sending an arbitrary number
of notification requests using specially-crafted netlink messages,
resulting in a denial of service. (CVE-2010-0410, Moderate)

* a flaw was found in the Memory-mapped I/O (MMIO) instruction decoder in
the Xen hypervisor implementation. An unprivileged guest user could use
this flaw to trick the hypervisor into emulating a certain instruction,
which could crash the guest (denial of service). (CVE-2010-0730, Moderate)

* a divide-by-zero flaw was found in the azx_position_ok() function in the
driver for Intel High Definition Audio, snd-hda-intel. A local,
unprivileged user could trigger this flaw to cause a kernel crash (denial
of service). (CVE-2010-1085, Moderate)

This update also fixes the following bugs:

* in some cases, booting a system with the "iommu=on" kernel parameter
resulted in a Xen hypervisor panic. (BZ#580199)

* the fnic driver flushed the Rx queue instead of the Tx queue after
fabric login. This caused crashes in some cases. (BZ#580829)

* "kernel unaligned access" warnings were logged to the dmesg log on some
systems. (BZ#580832)

* the "Northbridge Error, node 1, core: -1 K8 ECC error" error occurred on
some systems using the amd64_edac driver. (BZ#580836)

* in rare circumstances, when using kdump and booting a kernel with
"crashkernel=128M@16M", the kdump kernel did not boot after a crash.
(BZ#580838)

* TLB page table entry flushing was done incorrectly on IBM System z,
possibly causing crashes, subtle data inconsistency, or other issues.
(BZ#580839)

* iSCSI failover times were slower than in Red Hat Enterprise Linux 5.3.
(BZ#580840)

* fixed floating point state corruption after signal. (BZ#580841)

* in certain circumstances, under heavy load, certain network interface
cards using the bnx2 driver and configured to use MSI-X, could stop
processing interrupts and then network connectivity would cease.
(BZ#587799)

* cnic parts resets could cause a deadlock when the bnx2 device was
enslaved in a bonding device and that device had an associated VLAN.
(BZ#581148)

* some BIOS implementations initialized interrupt remapping hardware in a
way the Xen hypervisor implementation did not expect. This could have
caused a system hang during boot. (BZ#581150)

* AMD Magny-Cours systems panicked when booting a 32-bit kernel.
(BZ#580846)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-194.3.1.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: b378c81cf2c9a8f49089cd79f5f5a2d5
SHA-256: 5e28d71e716588fcac5bfbd0077a1b782111b47cfda33983c32c8d7777469647
 
IA-32:
kernel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5db6f2344794a78db507e68588702e21
SHA-256: baaea9a9f08524f75ebd9490df41c9446a1e0bd3bb2fe99743ba1d7722a33bd1
kernel-PAE-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 40cef64e02fba1846025a815bbfcc8a3
SHA-256: bd3d4d3300662d2bd558fbe5cc030c9c3de16c54f35d5be344f5fb723a896aea
kernel-PAE-devel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 74ffe0a384b2270278d07f67482c3c8e
SHA-256: 03b1e67b976947b9192a8c637e45ce0597ddfb4db2180a98d4b689ab924d5601
kernel-debug-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 54e7464c8b28cc776858ba237208897b
SHA-256: ebd19698f9442ed53244fbe00b30b7c1a9bbfab85b120a6560dd219555cb4509
kernel-debug-devel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 757733ced4a674a6591644368f93779d
SHA-256: 965c66fa9182b8cc18aa04bfe27cd01c852c36c181f7130b8009548520b92ae9
kernel-devel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4eda0ae49460669d227408c3f6fb14eb
SHA-256: a6595f48c6c10a154470bb44a0aadc64c07986a5c6895b242743cb75d161f846
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 97eee1c204f78e1c9667bfc5ccb56230
SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1caaf4863e6b7aa11f86ab71590f07fd
SHA-256: ccfdee6563fce7649b1c0745633738e7854507c697e56a79b232a40eea6b13f9
kernel-xen-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a9c8556d7b8d3811f2276286a2f8a5b8
SHA-256: 4fc4a552a87ab511e01f9844d17ca77bd75607e88064b6f4762ff20b9f28d6e8
kernel-xen-devel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 28a3a2553e5b75286c8547143f1c679b
SHA-256: 8f054db1134d3f26b53e00c73ee067ea0a3a3c56d2a6469250a1a0a628be45ac
 
IA-64:
kernel-2.6.18-194.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b9889259710b3dc7f59fe06ada4e62dd
SHA-256: 068712c5afad946a4bd857596ecd50fbc9a52d5f6b986f756c213f847a0bf4b3
kernel-debug-2.6.18-194.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0c401db81b12d034304dee59f89635ec
SHA-256: fb61bd1bc0b43d1d18c41e9202798aeb49ced138e66e61327e69761a27c9fb3a
kernel-debug-devel-2.6.18-194.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b15e21679d690d8cbb3dea577c659aa5
SHA-256: 83e7bf53321311cc30e1382293a02cfcbfa408d5f4a6f77d016c69ff09d51f3d
kernel-devel-2.6.18-194.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 23fe5cbb6faeac099fb096455cc72ec6
SHA-256: a48c7273975aec217a568e06cac0e6042d639acbf6f5f0978009201c6d963475
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 97eee1c204f78e1c9667bfc5ccb56230
SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3dd4dc264b2bf7731121ae5eb268f6d4
SHA-256: af209364dac213d77669da679102be23348988020499d5d81e7362da2ddcd40a
kernel-xen-2.6.18-194.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ab3d82a14c795ef635fe04cf57c648f9
SHA-256: 14a7d1db8e83c69d306d1ee582359e20c6eb3c4ed5a1ec044852c33e48767e15
kernel-xen-devel-2.6.18-194.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 709a3c38e21223a7144480a7377f7793
SHA-256: b5d25fd93f72240d8023fe308f828ead0cb59bf85020d257af065c96393749d2
 
PPC:
kernel-2.6.18-194.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ad5af0cabbe0568570f0d4fc7a5ff960
SHA-256: e4b258c2796b241fed00e09cbe1b1404de644ca970b6356712b15341973a4072
kernel-debug-2.6.18-194.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 40ef1c1c2d03f2c6f3a58dc6102bb97a
SHA-256: 8c6237824b9b36f04815855dad82879ccf345bf3cd183bcb6ae4af7faba1c1d3
kernel-debug-devel-2.6.18-194.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5f34582495ccedad8ab6e41e48e371d9
SHA-256: 463964c39db78acab9465c0e476688d0d55435913dfb39e3f81bc18dc62f2f35
kernel-devel-2.6.18-194.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 92ef2cfadd4b4605a9a7d67479262541
SHA-256: 61b83b0df8fd09ae3de5e30c28b3549db5287db24f12669b15214bfe766d1ba9
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 97eee1c204f78e1c9667bfc5ccb56230
SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 962cdde03ce9642fd703715486a0a272
SHA-256: 16fea9bf8f16a0064bb7463fa3b8d5bcce25623541e349e23c0d5f2cc50341f5
kernel-headers-2.6.18-194.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d112a38b0a93b928302f62b599f7da2
SHA-256: 8037dd43ced71b032857b969df6321dd0d42a84b3704bbeae0af76f77c197989
kernel-kdump-2.6.18-194.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9dd7486d794279554c2e96357fe71881
SHA-256: 76d2e66eea941c5e93bac5d80efa41a7b9138d935eb9a384879fe985180af590
kernel-kdump-devel-2.6.18-194.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 04c73796101982f36216d4a59da2d8ed
SHA-256: 80c47446e0059998ce8856833977c70521749644ea63a620f8e9ff0083b124da
 
s390x:
kernel-2.6.18-194.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5b4d4006c1ab49a53a53a4a4b9d9b122
SHA-256: d3c4eb46d9feb1d12760e4c4c5c1664617e8692aa2669d099f545ce74d50646e
kernel-debug-2.6.18-194.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: b4fe82b32f22769ed7fc6f3e93415d91
SHA-256: f73eef2c96112f63087c0efb93371165f8c06ee343d5d0656cea513d2ee663f7
kernel-debug-devel-2.6.18-194.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0e89a9aae4e6a9b614a981765e750431
SHA-256: 2d06d77cc5922354538ec3caeee60e809e406455568b21f5535858d261cdfcd4
kernel-devel-2.6.18-194.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 319658d63ae5e854883da6f641c09c34
SHA-256: 0406523a9ed4d085f4d1a3676e3af793aeda3ea3d4672c2d4f74a3d72ce80710
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 97eee1c204f78e1c9667bfc5ccb56230
SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: bdb49c785f4694a3bcc3ffb6bed8dd03
SHA-256: 4fbb6c8fe526259120245cdaa66060ecbc2a8ed3e0464a82b99ec240f184639f
kernel-kdump-2.6.18-194.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: e234b44920e8b49d1a158514e045dfbe
SHA-256: 3c2a203a0e9ec78dc9a324c246653a5a4ca1818165a39a164430318cae74bb57
kernel-kdump-devel-2.6.18-194.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9870598dcbad68c89805e92adc1e7259
SHA-256: f44090e67244620d7958602431623fd19c7a00d41f8948e2aff029c6fdd09f4e
 
x86_64:
kernel-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e84466720d48f52906a5e26c84fb39c3
SHA-256: 139ebe7babc9a24321e8c48c7e07030b589ddb8f3d4d0347c1b7dc4881691823
kernel-debug-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8e20fed94bc42ee2a044d6785d189b8c
SHA-256: cb7cdfa348f86af4d55e2376a7117c443386c5a418af71a8293f5e0214774232
kernel-debug-devel-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d282dc64d6c141a40d3247def4948af6
SHA-256: 22cf7d1167c7d9b45538e8788615bce2ea6d71e34cd642aa8f5a6f750443fc95
kernel-devel-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f177e6ccc994be7868fb1e3222b12a2f
SHA-256: e2b2a37871328d8d4a93179ceeee4f79cf3c4cf1289d93aa40e2511e3d1075fb
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 97eee1c204f78e1c9667bfc5ccb56230
SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4418e0d86aa0227670f14e0a0bf28a29
SHA-256: 1399ab7608d5d005793ddc3e4a52d6917c075963019381284e95496645b17ec2
kernel-xen-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3245ba3e0daaab928a0ada09df3697f9
SHA-256: 090eb497ecf1c526d893821f0070aad4e739ad81b34eed535c37cd2b82b4683e
kernel-xen-devel-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 35661b597ccb54e8a7d8e73243d6130b
SHA-256: cee70aa0c1dd44fdb9b1b7148fc04ab4aba8b0cdb2c6aac3a61003478fa9e8be
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-194.3.1.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: b378c81cf2c9a8f49089cd79f5f5a2d5
SHA-256: 5e28d71e716588fcac5bfbd0077a1b782111b47cfda33983c32c8d7777469647
 
IA-32:
kernel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5db6f2344794a78db507e68588702e21
SHA-256: baaea9a9f08524f75ebd9490df41c9446a1e0bd3bb2fe99743ba1d7722a33bd1
kernel-PAE-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 40cef64e02fba1846025a815bbfcc8a3
SHA-256: bd3d4d3300662d2bd558fbe5cc030c9c3de16c54f35d5be344f5fb723a896aea
kernel-PAE-devel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 74ffe0a384b2270278d07f67482c3c8e
SHA-256: 03b1e67b976947b9192a8c637e45ce0597ddfb4db2180a98d4b689ab924d5601
kernel-debug-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 54e7464c8b28cc776858ba237208897b
SHA-256: ebd19698f9442ed53244fbe00b30b7c1a9bbfab85b120a6560dd219555cb4509
kernel-debug-devel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 757733ced4a674a6591644368f93779d
SHA-256: 965c66fa9182b8cc18aa04bfe27cd01c852c36c181f7130b8009548520b92ae9
kernel-devel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4eda0ae49460669d227408c3f6fb14eb
SHA-256: a6595f48c6c10a154470bb44a0aadc64c07986a5c6895b242743cb75d161f846
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 97eee1c204f78e1c9667bfc5ccb56230
SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1caaf4863e6b7aa11f86ab71590f07fd
SHA-256: ccfdee6563fce7649b1c0745633738e7854507c697e56a79b232a40eea6b13f9
kernel-xen-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a9c8556d7b8d3811f2276286a2f8a5b8
SHA-256: 4fc4a552a87ab511e01f9844d17ca77bd75607e88064b6f4762ff20b9f28d6e8
kernel-xen-devel-2.6.18-194.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 28a3a2553e5b75286c8547143f1c679b
SHA-256: 8f054db1134d3f26b53e00c73ee067ea0a3a3c56d2a6469250a1a0a628be45ac
 
x86_64:
kernel-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e84466720d48f52906a5e26c84fb39c3
SHA-256: 139ebe7babc9a24321e8c48c7e07030b589ddb8f3d4d0347c1b7dc4881691823
kernel-debug-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8e20fed94bc42ee2a044d6785d189b8c
SHA-256: cb7cdfa348f86af4d55e2376a7117c443386c5a418af71a8293f5e0214774232
kernel-debug-devel-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d282dc64d6c141a40d3247def4948af6
SHA-256: 22cf7d1167c7d9b45538e8788615bce2ea6d71e34cd642aa8f5a6f750443fc95
kernel-devel-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f177e6ccc994be7868fb1e3222b12a2f
SHA-256: e2b2a37871328d8d4a93179ceeee4f79cf3c4cf1289d93aa40e2511e3d1075fb
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 97eee1c204f78e1c9667bfc5ccb56230
SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4418e0d86aa0227670f14e0a0bf28a29
SHA-256: 1399ab7608d5d005793ddc3e4a52d6917c075963019381284e95496645b17ec2
kernel-xen-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3245ba3e0daaab928a0ada09df3697f9
SHA-256: 090eb497ecf1c526d893821f0070aad4e739ad81b34eed535c37cd2b82b4683e
kernel-xen-devel-2.6.18-194.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 35661b597ccb54e8a7d8e73243d6130b
SHA-256: cee70aa0c1dd44fdb9b1b7148fc04ab4aba8b0cdb2c6aac3a61003478fa9e8be
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

560547 - CVE-2010-0307 kernel: DoS on x86_64
561682 - CVE-2010-0410 kernel: OOM/crash in drivers/connector
567168 - CVE-2010-1085 kernel: ALSA: hda-intel: Avoid divide by zero crash
569237 - CVE-2010-1086 kernel: dvb-core: DoS bug in ULE decapsulation code
572971 - CVE-2010-0730 xen: emulator instruction decoding inconsistency
580199 - xen: clear ioapic registers on boot [rhel-5.5.z]
580829 - [Cisco 5.6 bug] fnic: flush Tx queue bug fix [rhel-5.5.z]
580832 - kernel unaligned messages from mptsas_firmware_event_work [rhel-5.5.z]
580836 - EDAC driver error on system with bad memory [rhel-5.5.z]
580838 - [5.4]System panic occurred during boot sequence with the server which carries 256GMB physical memory. [rhel-5.5.z]
580839 - kernel: correct TLB flush of page table entries concurrently used by another cpu [rhel-5.5.z]
580840 - REGRESSION: Fix iscsi failover time [rhel-5.5.z]
580841 - floating point register state corruption after handling SIGSEGV [rhel-5.5.z]
581148 - Kernel: network: bonding: scheduling while atomic: ifdown-eth/0x00000100/21775 [rhel-5.5.z]
581150 - [Intel 5.6 Virt Bug] [VT-d] Dom0 booting may hang on Westmere-EP with intremap enabled [rhel-5.5.z]
587799 - NIC doesn't register packets [rhel-5.5.z]


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/