Skip to navigation

Security Advisory Important: Red Hat Enterprise Linux 5.7 kernel security and bug fix update

Advisory: RHSA-2011:1065-1
Type: Security Advisory
Severity: Important
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2011-1780
CVE-2011-2525
CVE-2011-2689

Details

Updated kernel packages that fix multiple security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the seventh regular update.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A flaw was found in the way the Xen hypervisor implementation handled
instruction emulation during virtual machine exits. A malicious user-space
process running in an SMP guest could trick the emulator into reading a
different instruction than the one that caused the virtual machine to exit.
An unprivileged guest user could trigger this flaw to crash the host. This
only affects systems with both an AMD x86 processor and the AMD
Virtualization (AMD-V) extensions enabled. (CVE-2011-1780, Important)

* A flaw allowed the tc_fill_qdisc() function in the Linux kernel's packet
scheduler API implementation to be called on built-in qdisc structures. A
local, unprivileged user could use this flaw to trigger a NULL pointer
dereference, resulting in a denial of service. (CVE-2011-2525, Moderate)

* A flaw was found in the way space was allocated in the Linux kernel's
Global File System 2 (GFS2) implementation. If the file system was almost
full, and a local, unprivileged user made an fallocate() request, it could
result in a denial of service. Note: Setting quotas to prevent users from
using all available disk space would prevent exploitation of this flaw.
(CVE-2011-2689, Moderate)

These updated kernel packages include a number of bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Refer to the Red Hat Enterprise Linux 5.7 Technical Notes for
information about the most significant bug fixes and enhancements included
in this update:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1065

All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-274.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 070920684d4a9d284185131c7d1a0b3e
SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8
 
IA-32:
kernel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d914076f8c92d5f0e94ea358e54075b
SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f
kernel-PAE-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d699512de9d30c6429ee315fa850d439
SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982
kernel-PAE-devel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8bcd1c868f226d692cbad3287b1f96e0
SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17
kernel-debug-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bfbbe0da808c26bfadc2336b32880918
SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2
kernel-debug-devel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c80eb76535a280553ebd2cc5de7099c2
SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b
kernel-devel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1c6cb6b20a4b3319bda36889add65631
SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b
kernel-doc-2.6.18-274.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ac17f77d0b63caa9df83ee3e65c7a4d
SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7cfad41099f0e84f5df50a7bc70a95a6
SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f
kernel-xen-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 54414e10a21593a8c7819579c1e60344
SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc
kernel-xen-devel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1e8e94665838cc343274b67f3105f874
SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235
 
IA-64:
kernel-2.6.18-274.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d39a9854d42763cd1e5974dc223366f9
SHA-256: f8f7ac033db153fa664727eff31414ff422f55a1cfb4544cf90c5e2a095c2970
kernel-debug-2.6.18-274.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7c4d45cd1c4efb8ddc362ba12000f702
SHA-256: cee72357fa6fcdea4efbb8f39b4bc3c0b333c998d60e334007773e40284e9ea7
kernel-debug-devel-2.6.18-274.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ca75418c4474ef0e1cca92d1121369bc
SHA-256: 4ea4bb4e168bd4a2920fd6c3360c90d1ab46254bd621a9e90b4069fbcfa5663a
kernel-devel-2.6.18-274.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 45324e141669387bbda8403481a3598c
SHA-256: 0cc22314c10ba4a8e53a94b5ca4cb715bf336dc68611110ef201fa27056e80f3
kernel-doc-2.6.18-274.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ac17f77d0b63caa9df83ee3e65c7a4d
SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 080fc73ec929f2ca966d4f7be216d5b0
SHA-256: 0c65b7c5ca7c56305462b05ef48eb1d2da7d83f98344ffc0d023fd671872a9a9
kernel-xen-2.6.18-274.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c7fa9566fce8c9a1eb25e031a8fb0ee5
SHA-256: 38773710ae866e3c8a6f91c90e566deaa59e3f84f29ae8679c6d11869961bfae
kernel-xen-devel-2.6.18-274.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bca24662530d2ddfacfd26fa0f0072ff
SHA-256: dd4a9c917cb771d92d76c29689999e409fa22bb2cd7236ddbf282351329933ae
 
PPC:
kernel-2.6.18-274.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c75d114eeb3769d0767abd5f86cc0687
SHA-256: 9fbcc5dee444513ad868128a62910f54002200722834788782c7fbed08968a6c
kernel-debug-2.6.18-274.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 83e071a5d54015ba0d6a18f51ead73c3
SHA-256: 59b3a3a90288b8bc3587cb98b162d0bbaf0ae06624a06f79d18b7583af574270
kernel-debug-devel-2.6.18-274.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b8ab06fc807a5b0a03e2e2fbc986ddfc
SHA-256: a617b0c8fcde6ec713184c3eae922a2182c7e05a39b04eac3a1e12d0600f2801
kernel-devel-2.6.18-274.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c4862425ebe47a97beed76d86de4e888
SHA-256: 2930bf8824c32c8e1a95c1c70768ac9caea0af2163a8fd0b7b4921002a419244
kernel-doc-2.6.18-274.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ac17f77d0b63caa9df83ee3e65c7a4d
SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6d2639bc46a56686c24445517b3932f6
SHA-256: 11e76a6d365c30ad256004c45bfb463e0b18a70b503df8135888c79bc40c2d35
kernel-headers-2.6.18-274.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 561725a14ff808432caf1ef141adacf0
SHA-256: 4d40859303a37bae0b670659933247bc97320542f10de2d6badf034e8950ed0d
kernel-kdump-2.6.18-274.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ea8fd0566ff1b9adc11168f078cb44fc
SHA-256: 49ff584ce491432fbc8f70a4f525a9617773e949b2119bdc575b9933c646c57d
kernel-kdump-devel-2.6.18-274.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e296b907bbbac239634c8f924806745c
SHA-256: 4a2644e52a1d83e1acb7abbf538770936d4295331f4039fc78abfa89d8d940cf
 
s390x:
kernel-2.6.18-274.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4beb4b149e4e8fe694b21115f40ab964
SHA-256: d0354a7b66c0541dd63ab296344509ffdf7625c7f85c2fa635d2ab089eb5823a
kernel-debug-2.6.18-274.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: aceb55bc3843924f39d7424dfabfb429
SHA-256: e9e666892f50c3b143930b9a1ff51493be3709c6eccaeba4936807d73cda3053
kernel-debug-devel-2.6.18-274.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 41fea73cc24618d71d1e42ebf9a333d2
SHA-256: 12199fb71a4fa53c85c95baa981afe1d19de5dc6d8d85e771fadf2937ff9afd7
kernel-devel-2.6.18-274.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5e3c9765fa1c251a6c8a3109952339dc
SHA-256: 139368e15bd79f539fce46290535ceb9fe2fbbf5299db5b3cbbaccd13415cf00
kernel-doc-2.6.18-274.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ac17f77d0b63caa9df83ee3e65c7a4d
SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 273f06610d2e558d979fd49693dcf3c7
SHA-256: 47ac2fd1b79332858a8315d19d1fcb337d8a0e5ba4578faf5becd02e348408c0
kernel-kdump-2.6.18-274.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: bc04fe1feba3fe6f2890fac653ce4534
SHA-256: 7f499eebac7b001dd3ee8e182e448d40affa2476999c9ad235ff44aaac813f57
kernel-kdump-devel-2.6.18-274.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8cc94ef4b12208ec905268c383823737
SHA-256: ce271eeba644b013d5fdb88c1241833e79e6e5d137b04bce254f7d8fb1519a24
 
x86_64:
kernel-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 66bbb83e9a4274fc95184684fc5678a5
SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2
kernel-debug-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 500aeb4a1400a2c089fb355a13cdb1b9
SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: af5ec52dee8c94051385092db45aa26c
SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9
kernel-devel-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 578618e2656f1fcfc89b34a25051fe24
SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92
kernel-doc-2.6.18-274.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ac17f77d0b63caa9df83ee3e65c7a4d
SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 70b0346beaa6a4ac2514a8d8a8a2c666
SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a
kernel-xen-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8b9b63668da85231538eeba503d7e123
SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ac29a0f03c37e87b1ece3512218fcaee
SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-274.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 070920684d4a9d284185131c7d1a0b3e
SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8
 
IA-32:
kernel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d914076f8c92d5f0e94ea358e54075b
SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f
kernel-PAE-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d699512de9d30c6429ee315fa850d439
SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982
kernel-PAE-devel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8bcd1c868f226d692cbad3287b1f96e0
SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17
kernel-debug-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bfbbe0da808c26bfadc2336b32880918
SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2
kernel-debug-devel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c80eb76535a280553ebd2cc5de7099c2
SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b
kernel-devel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1c6cb6b20a4b3319bda36889add65631
SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b
kernel-doc-2.6.18-274.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ac17f77d0b63caa9df83ee3e65c7a4d
SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7cfad41099f0e84f5df50a7bc70a95a6
SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f
kernel-xen-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 54414e10a21593a8c7819579c1e60344
SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc
kernel-xen-devel-2.6.18-274.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1e8e94665838cc343274b67f3105f874
SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235
 
x86_64:
kernel-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 66bbb83e9a4274fc95184684fc5678a5
SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2
kernel-debug-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 500aeb4a1400a2c089fb355a13cdb1b9
SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: af5ec52dee8c94051385092db45aa26c
SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9
kernel-devel-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 578618e2656f1fcfc89b34a25051fe24
SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92
kernel-doc-2.6.18-274.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ac17f77d0b63caa9df83ee3e65c7a4d
SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 70b0346beaa6a4ac2514a8d8a8a2c666
SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a
kernel-xen-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8b9b63668da85231538eeba503d7e123
SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ac29a0f03c37e87b1ece3512218fcaee
SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

390451 - Pick up paging performance improvements from upstream Xen
431738 - lsattr doesn't show attributes of ext3 quota files
441730 - [rhts] connectathon nfsidem test failing
452650 - [RHEL5.2]: Blktap is limited to 100 disks total
460821 - pv-on-hvm: disk shows up twice.
465876 - NMI Watchdog detected LOCKUP in :sctp:sctp_copy_local_addr_list
477032 - kdump hang on HP xw9400
481546 - HTB qdisc miscalculates bandwidth with TSO enabled
481629 - update myri10g driver from 1.3.2 to 1.5.2
491740 - export of an NFSV3 file system via kerberos requires AUTH_SYS as well
491786 - s2io should check inputs for rx_ring_sz
494927 - Read-only filesystem after 'ext3_free_blocks_sb: bit already cleared for block' errors
501314 - No beep when running xen kernel
511901 - [NFS]: silly renamed .nfs0000* files can be left on fs forever
517629 - Sequence id issue with nfs4/kerberos between RHEL kernel and Fedora 11
525898 - soft lockups with kswapd in RHEL 5.4 kernel 2.6.18-164.el5 x86_64
537277 - KERNEL: QLA2XXX 0000:0E:00.0: RISC PAUSED -- HCCR=0, DUMPING FIRMWARE!
553411 - xts crypto module missing from RHEL5 installer runtime
553803 - GFS2: recovery stuck on transaction lock
567449 - RHEL5.6: iw_cxgb4 driver inclusion
567540 - unregister_netdevice: waiting for veth5 to become free when I remove netloop
579000 - [RFE] Support L2 packets under bonding layer
579858 - Wrong RX bytes/packet count on vlan interface with igb driver
589512 - slab corruption after seeing some nfs-related BUG: warning
603345 - i5k_amb does not work for Intel 5000 Chipset (kernel)
607114 - System panic in pskb_expand_head When arp_validate option is specified in bonding ARP monitor mode
611407 - kvm guest unable to kdump without noapic
621916 - Host panic on cross-vendor migration (RHEL 5.5 guest)
622542 - Xorg failures on machines using intel video card driver
622647 - Reading /proc/locks yelds corrupt data
623979 - synch arch/i386/pci/irq-xen.c
626585 - GFS2: [RFE] fallocate support for GFS2
626974 - nfs: too many GETATTR and ACCESS calls after direct i/o
626977 - [nfs] make close(2) asynchronous when closing nfs o_direct files
627496 - Fix shrinking windows with window scaling
631950 - remove FS-Cache code from NFS
632399 - Misleading message from fs/nfs/file.c:do_vfs_lock()
633196 - testing NMI watchdog ... <4>WARNING: CPU#0: NMI appears to be stuck (62->62)!
635992 - Areca driver, arcmsr, update
637970 - GFS2: Not enough space reserved in gfs2_write_begin and possibly elsewhere.
642388 - ip_nat_ftp not working if ack for "227 Enter Passive mode" packet is lost
643292 - [netfront] ethtool -i should return proper information for netfront device
643872 - [netback] ethtool -i should return proper information for netback device
645343 - ISCSI/multipath hang - must propagate SCSI device deletion to DM mpath
645528 - SIGPROF keeps a large task from ever completing a fork()
645646 - RFE: Virtio nic should be support "ethtool -i virtio nic"
646513 - HP_GETHOSTINFO ioctl always causes mpt controller reset
648572 - virtio GSO makes IPv6 very slow
648657 - fseek()/NFS performance regression between RHEL4 and RHEL5
648854 - linux-2.6.18: netback: take net_schedule_list_lock when removing entry from net_schedule_list
651333 - RHEL5.6: EHCI: AMD periodic frame list table quirk
651409 - BAD SEQID error messages returned by the NFS server
651512 - e1000 driver tracebacks when running under VMware ESX4
652321 - jbd2_stats_proc_init has wrong location.
652369 - temporary loss of path to SAN results in persistent EIO with msync
653286 - [5.6][REG]for some uses of 'nfsservctl' system call, the kernel crashes.
653828 - bonding failover in every monitor interval with virtio-net driver
654293 - sunrpc: need a better way to set tcp_slot_table_entries in RHEL 5
656836 - Memory leak in virtio-console driver if driver probe routine fails
657166 - XFS causes kernel panic due to double free of log tickets
658012 - NMI panic during xfs forced shutdown
658418 - Kernel warning at boot: i7core_edac: probe of 0000:80:14.0 failed with error -22
659594 - Kernel panic when restart network on vlan with bonding
659715 - cifs: ia64 kernel unaligned access
659816 - Performance counters don't work on HP Magnycours machines
660368 - dm-crypt: backport changes to support xts crypto mode
660661 - fsck.gfs2 reported statfs error after gfs2_grow
660728 - [LSI 5.7 feat] Update megaraid_sas to 5.34 and Include "Thunderbolt" support
660871 - mpctl module doesn't release fasync_struct at file close
661300 - xfstest 222: filesystem on /dev/loop0 is inconsistent
661306 - [Cisco 5.7 FEAT] Update enic driver to version 2.1.1.9
661904 - GFS2: Kernel changes necessary to allow growing completely full filesystems.
663041 - gfs2 FIEMAP oops
663123 - /proc/partitions not updating after creating LUNs via hpacucli
663563 - [ext4/xfstests] 011 caused filesystem corruption after running many times in a loop
664592 - a test unit ready causes a panic on 5.6 (CCISS driver)
664931 - COW corruption using popen(3).
665197 - WARNING: APIC timer calibration may be wrong
665972 - ISVM bit (ECX:31) for CPUID 0x00000001 is missing for HVM on AMD
666080 - GFS2: Blocks not marked free on delete
666304 - scsi_dh_emc gives "error attaching hardware handler" for EMC active-active SANs
666866 - Heavy load on ath5k wireless device makes system unresponsive
667327 - lib: fix vscnprintf() if @size is == 0
667660 - [NetApp 5.7 Bug] Include new NetApp PID entry to the alua_dev_list array in the ALUA hardware handler
667810 - "modprobe ip_conntrack hashsize=NNNN" panics kernel if /etc/modprobe.conf has hashsize=MMMM
668934 - UDP transmit under VLAN causes guest freeze
669603 - incomplete local port reservation
669961 - [NetApp 5.6 Bug] Erroneous TPG ID check in SCSI ALUA Handler
670367 - scsi_dh_emc get_req function should set REQ_FAILFAST flags same as upstream and other modules
670373 - panic in kfree() due to race condition in acpi_bus_receive_event()
671238 - [bonding] crash when adding/removing slaves with master interface down
671595 - Flapping errors (and panic) with bonding and arp_interval while using be2net included in 2.6.18-238
672619 - transmission stops when tap does not consume
672724 - mmapping a read only file on a gfs2 filesystem incorrectly acquires an exclusive glock
672981 - lseek() over NFS is returning an incorrect file length under some circumstances
673058 - kernel panic in pg_init_done - pgpath already deleted
673242 - Time runs too fast in a VM on processors with > 4GHZ freq
673459 - virtio_console driver never returns from selecting for write when the queue is full
673616 - vdso gettimeofday causes a segmentation fault
674175 - Impossible to load sctp module with ipv6 disable=1
674226 - Panic in selinux_bprm_post_apply_creds() due to an empty tty_files list
674298 - [NetApp 5.6 Bug] QLogic 8G FC firmware dumps seen during IO
674514 - xenctx shows nonsensical values for 32-on-64 and HVM domains
675727 - vdso: missing wall_to_monotomic export
675986 - Fix block based fiemap
677703 - [RHEL5.5] Panic in iscsi_sw_tcp_data_ready()
677893 - [TestOnly] gfs regression testing for 5.7 beta
677902 - Incorrect "Speed" is recorded in the file "/proc/net/bonding/bondX"
678073 - qeth: allow channel path changes in recovery
678074 - [usb-audio] unable to set capture mixer levels
678359 - online disk resizing may cause data corruption
678571 - hap_gva_to_gfn_* do not preserve domain context
678618 - gdbsx hypervisor part backport
679120 - qeth: remove needless IPA-commands in offline
679407 - [5.7] niu: Fix races between up/down and get_stats.
679487 - [5.7] net: Fix netdev_run_todo serialization
680329 - sunrpc: reconnect race can lead to socket read corruption
681303 - backport vzalloc and vzalloc_node in support of drivers needing these functions
681586 - Out of vmalloc space
683155 - gfs2: creating large files suddenly slow to a crawl
683978 - need to backport common vpd infrastructure to rhel 5
684795 - missed unlock_page() in gfs2_write_begin()
688646 - intel_iommu domain id exhaustion
688989 - [5.6] sysctl tcp_syn_retries is not honored
689860 - guest with passthrough nic got kernel panic when send system_reset signal in QEMU monitor
689943 - GFS2 causes kernel panic in spectator mode
690555 - GFS2: resource group bitmap corruption resulting in panics and withdraws
692946 - need to backport debugfs_remove_recursive functionality
695357 - dasd: fix race between open and offline
696411 - Missing patch for full use of tcp_rto_min parameter
698432 - [Emulex 5.7] Update lpfc driver to version 8.2.0.96.1p
698879 - The pci resource for vf is not released after hot-removing Intel 82576 NIC
700546 - RHEL5: apparent file system corruption of snapshot fs with qla2xxx driver
702355 - NFS: Fix build break with CONFIG_NFS_V4=n
702652 - provide option to disable HPET
702657 - CVE-2011-1780 kernel: xen: svm: insufficiencies in handling emulated instructions during vm exits
703213 - GFS2: Add "dlm callback owed" glock flag
703416 - host kernel panic while guest running on 10G public bridge.
704497 - VT-d: Fix resource leaks on error paths in intremap code
705324 - cifs: regression in unicode conversion routines when mounting with -o mapchars
705455 - intel-iommu: missing flush prior to removing domains + avoid broken vm/si domain unlinking
705725 - hvm guest time may go backwards on some hosts
706414 - Adding slave to balance-tlb bond device results in soft lockup
709224 - setfacl does not update ctime when changing file permission on ext3/4
711450 - 12% degradation running IOzone with Outcache testing
717068 - Kernel panics during Veritas SF testing.
717742 - [RHEL5.7][kernel-xen] HVM guests hang during installation on AMD systems
720552 - CVE-2011-2525 kernel: kernel: net_sched: fix qdisc_notify()
720861 - CVE-2011-2689 kernel: gfs2: make sure fallocate bytes is a multiple of blksize


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/