Skip to navigation

Bug Fix Advisory Updated kernel packages for Red Hat Enterprise Linux 5 Update 1

Advisory: RHBA-2007:0959-13
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2007-10-30
Last updated on: 2007-11-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 5. This is the first
regular update.

The Linux kernel handles the basic functions of the operating system. This
is the first regular kernel update to Red Hat Enterprise Linux 5.

Feature updates:
* Applied several enhancements to GFS2 (technology preview feature), which
require a change to the on-disk file system format.
* Added the firewire-sbp2 module as a technology preview to enable
connectivity with FireWire devices.
* Added the devicescape stack (mac80211) to enable the iwlwifi 4965GN
wireless driver. This stack allows certain wireless devices to connect to
any WiFi network. At present, this stack is presented as a technology preview.
* iSCSI installation and boot is now fully supported.
* The EXT3 file system now has a maximum capacity of 16TB.
* Fixed ext2 overflows on file systems greater than 8TB.

Virtualization-related changes:
* The virtualized kernel can now use the kdump function.
* Virtualization is now fully supported on ia64 architectures.
* Added support for AMD-V domain live migration.
* Enabled Xen booting on machines with over 64G of RAM.
* Xen upgraded to version 3.1.

Generic kernel updates:
* Added support for LSPP certification.
* Added replication and migration support for NFSv4 referrals.
* Updated CIFS to version 1.48aRH.
* Added support for shared page table for hugetlb pages.
* Added MODULE_FIRMWARE support.
* Expanded the in-kernel socket API.

For a comprehensive list of kernel-related updates, refer to the latest
version of the Red Hat Enterprise Linux 5.1 release notes on:

http://www.redhat.com/docs/manuals/enterprise/

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which apply these kernel updates.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-53.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: c4eeaeec80488f7ad61b8c06d0038f6e
 
IA-32:
kernel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3f57af1514fe7620a36432bade4bf094
kernel-PAE-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 77cfd489760f29cb55cdbf66486de470
kernel-PAE-devel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b4f2133b3697eee65484bcfebfb61aa5
kernel-debug-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 987255e6b4b6d25a5d92c2f8afea4f57
kernel-debug-devel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d40ec032059702c0b5d6d8128108daac
kernel-devel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b138a0e0a1b717539548f60b6fc79953
kernel-doc-2.6.18-53.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3180e8d1261ab284cf73b9a2aae8c0d1
kernel-headers-2.6.18-53.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 78185704080ed82e3ff03fc4c730844b
kernel-xen-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: cf8649f169a7d7ae911d0a18dbd64029
kernel-xen-devel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9043e40a3be77fd0a811746e63ef458f
 
IA-64:
kernel-2.6.18-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 10a138c481aa41099367bc88ead676f3
kernel-debug-2.6.18-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 31e2ea1dbdf269e431a49b63feb62848
kernel-debug-devel-2.6.18-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 53000cbb2488fb2133bd798bf5e9a953
kernel-devel-2.6.18-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 35d9600e1e41a1ca8ba1d175d4d6446f
kernel-doc-2.6.18-53.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3180e8d1261ab284cf73b9a2aae8c0d1
kernel-headers-2.6.18-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8fd4b640595501f93682729d30768d9c
kernel-xen-2.6.18-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 45a67359aa324079325ef4d2d7d61569
kernel-xen-devel-2.6.18-53.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3447abd140b22c5a2caeddc5fd2d39c3
 
PPC:
kernel-2.6.18-53.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a80e0b436be48571236434d5958f0d80
kernel-debug-2.6.18-53.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5efc2b074d716de9e2207e36cdce71f0
kernel-debug-devel-2.6.18-53.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3f3d82fd9239d2bc3fcb8bc48d014a39
kernel-devel-2.6.18-53.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d2cd2a89781d833f6440c7173a39621
kernel-doc-2.6.18-53.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3180e8d1261ab284cf73b9a2aae8c0d1
kernel-headers-2.6.18-53.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: c8bb4b24718ee88d14ed76cd961636b8
kernel-headers-2.6.18-53.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 170cea9d5a62853da736acae6b376cd8
kernel-kdump-2.6.18-53.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 12f0bec11d7445ee7ed4f3c6948656d4
kernel-kdump-devel-2.6.18-53.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2fe1e260f70a76c15da6b4cbffb3f847
 
s390x:
kernel-2.6.18-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: e64c956b3013189dbe13d5376f07c526
kernel-debug-2.6.18-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 96dfa3eeaaa19c12ef935bb544b5a906
kernel-debug-devel-2.6.18-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: a9a81a17542c6c07e2c39a88406e3e60
kernel-devel-2.6.18-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: ac3cc3927173c786733f8a47147595bc
kernel-doc-2.6.18-53.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3180e8d1261ab284cf73b9a2aae8c0d1
kernel-headers-2.6.18-53.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2ea5d64a9ae7a70a4f8b8da6621b3cfa
 
x86_64:
kernel-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 521ebb270843014603ab88f21071c839
kernel-debug-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bc5e7074d31285eb8e0069277665e924
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cd1551df63a5fdc4619469603b50d379
kernel-devel-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f45c221818bcfd1144e6e8252c12711c
kernel-doc-2.6.18-53.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3180e8d1261ab284cf73b9a2aae8c0d1
kernel-headers-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ad3fcf6f89a596e0418060731743d27e
kernel-xen-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: aa6a4f8451f50334595efc5469532ddf
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0bc1de11ca3df748ac33781771c4797c
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-53.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: c4eeaeec80488f7ad61b8c06d0038f6e
 
IA-32:
kernel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3f57af1514fe7620a36432bade4bf094
kernel-PAE-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 77cfd489760f29cb55cdbf66486de470
kernel-PAE-devel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b4f2133b3697eee65484bcfebfb61aa5
kernel-debug-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 987255e6b4b6d25a5d92c2f8afea4f57
kernel-debug-devel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d40ec032059702c0b5d6d8128108daac
kernel-devel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b138a0e0a1b717539548f60b6fc79953
kernel-doc-2.6.18-53.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3180e8d1261ab284cf73b9a2aae8c0d1
kernel-headers-2.6.18-53.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 78185704080ed82e3ff03fc4c730844b
kernel-xen-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: cf8649f169a7d7ae911d0a18dbd64029
kernel-xen-devel-2.6.18-53.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9043e40a3be77fd0a811746e63ef458f
 
x86_64:
kernel-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 521ebb270843014603ab88f21071c839
kernel-debug-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bc5e7074d31285eb8e0069277665e924
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cd1551df63a5fdc4619469603b50d379
kernel-devel-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f45c221818bcfd1144e6e8252c12711c
kernel-doc-2.6.18-53.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3180e8d1261ab284cf73b9a2aae8c0d1
kernel-headers-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ad3fcf6f89a596e0418060731743d27e
kernel-xen-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: aa6a4f8451f50334595efc5469532ddf
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0bc1de11ca3df748ac33781771c4797c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

192082 - System won't suspend with GFS2 file system mounted
205897 - [Areca RHEL 5.1] Add kernel support for Areca RAID controllers (include arcmsr driver from 2.6.19)
206366 - [RHEL5 Beta1]: sysrq-t incurs a bogus softlockup warning
206520 - mount hangs when nodir=1 not always used.
209964 - NFS Client R/O in anaconda preinstall environment
211197 - xenoprofile uses incorrect mode and eip/rip for AMD-V
211516 - kernel dm: memory issues cause "failures" when creating many snapshots
211525 - kernel dm: mempool_resize BUG() during multiple snapshot removals
212968 - kernel-xen-devel packages all of /xen/
215536 - Xen0 can not startX in tiger4
216293 - blktap does not build on ia64
216750 - fcntl(F_SETLEASE, F_WRLCK) for a file on NFS always returns EAGAIN
217356 - GFS2 hangs waiting for semaphore?
219216 - [EMC/QLogic 5.1 bug] qla2xxx driver running IO on DM-MPIO devices cause "kernel: PCI-DMA: Out of SW-IOMMU space "
219563 - network-attaching and detaching too fast from xenbus will crash domU
219837 - selinux on RHEL5 and nfs does not cope with nohide exported fs
219897 - Unmatched decrementing of net device reference count
220526 - [RHEL5 Xen/IA64]: xennet triggers "Kernel panic - not syncing: Unable to reduce memory reservation"
220592 - kernel boot panic with >=64GB memory
221330 - kernel dm-multipath: stall on resume if noflush is used
221387 - HVM bug: MOVS/OUTS/INS crossing pages
222455 - Kernel oops when starting pcscd on a Dell Lattitude D620.
223087 - qla4xxx: mutex_lock needs to be released before sleep() in qla4xxx_mailbox_command
223530 - Make audit config immutable in kernel
223918 - LSPP: audit logs bogus obj label in some PATH records
223919 - LSPP: audit does not log obj label when opening an existing POSIX message queue
224131 - No zero holes for PTRACE_PEEKUSR/PTRACE_POKEUSR?
224359 - CIFS: bad session setup packet alignment leads to kernel crash
224620 - AVC_PATH audit records
224671 - x86_64 - Fix FS/GS registers for VT execution
225328 - LSPP: ipsec drops first packet when using IKE daemon
225515 - [patch]Kernel panic (handle kernel NULLpointer) occurred in NFSv4
225531 - ia64 PTRACE_GETREGS touches pt_all_user_regs words that should be left alone
228108 - mptscsi adds DID_BUS_BUSY host status when scsi status of BUSY is returned
228366 - LSPP: audit does not log obj label for signal recipient
228397 - PTRACE_PEEKUSR regression for i386/x86_64 unused words of struct user
228409 - LSPP: regular ipsec in upstream kernel crashes
228422 - LSPP: cleanup xfrm_audit_log interface
228540 - Need to add gfs2_tool lockdump support to gfs2
228557 - LSPP: In labeled ipsec, permissions are checked after deleting the policy
228854 - nfs protocol V3 :write procedure patch
229094 - LSPP: audit records for some f*xattr syscalls don't include object info
229345 - [GFS2] NFS fix - gfs2_decode_fh
229349 - [GFS2] NFS fix - gfs2_drevalidate panic
229395 - [GFS2] NFS fix - gfs2 filldir issue
229527 - LSPP: flow cache entries remain valid even after selinux policy reload
229528 - LSPP: memory leak in flow cache code
229720 - LSPP: pfkey_spdget does not audit xrfm policy changes
229732 - LSPP: pfkey_delete and xfrm_del_sa audit hook is misplaced.
229831 - [GFS2] gfs2 panic's occasionally in gfs2_unlink while running bonnie++
229873 - [GFS2] alternate test: assertion "!ip->i_inode.i_mapping->nrpages" failed
230143 - [GFS2] getting fatal: assertion "!atomic_read(&gl->gl_ail_count)" failed when using gfs2
230255 - LSPP: cipso mapping settings prevents login into system
230339 - The fatal error "Segmentation fault" happens when lots of continuous processes of mount.nfs4 are executed.
230620 - LSPP: xfrm_add_sa_expire bug
231312 - reproducible stack overflow with trivial test program
231371 - LSPP: audit=0 appears not to disable syscall auditing
231380 - GFS2 will hang if you run iozone on one node and do a du -h on another node
231392 - LSPP: Misc soft-lockups in x86_64 lspp.67 kernel
231518 - Fix error handling in check_partition(), again
231553 - jbd I/O errors after ext3 orphan processing on readonly device
231639 - [Symantec 5.1 bug] kernel thread current->mm dereference in grab_swap_token causes oops
231910 - GFS2 withdraws if you are trying to remove a file while doing a du
232074 - forward port of SCSI blacklist from RHEL4
232107 - GFS2 panics if you try to rm -rf the lost+found directory
232369 - Exit notifications missing when tracing multi-threaded processes
232524 - LSPP: the audit record for ipsec when printing ipv6 addresses needs a correction.
232715 - fix double AIO completion due to invalidate_inode_pages2 failure
232967 - LSPP: Add audit rule bit operators patch
233387 - LSPP: security check needed when flushing SAD and SPD
233540 - utrace: wait does not report immediately after PTRACE_ATTACH of process already in job control stop
233934 - The patch "xen: Add PACKET_AUXDATA cmsg" cause /usr/include/linux/if_packet.h broken
233971 - HVM guest hangs on vcpu migration (ptc.ga emulation bug)
234086 - dlm locking error from gfs dio/aio during virt machine migration
234338 - use printk for error message before returning LM_OUT_ERROR
234352 - iser bug fixes for 5.1
234375 - PV guests can crash at boot w/ >4GB memory
234447 - BUG_ON(!entry) in shmem_writepage() is triggered in rare circumstances
234485 - LSPP: when searching for larval SAs check the protocol too
235039 - conditionalized flush causes clear region requests to remain unflushed
235184 - [rhts] ltp test vmsplice fails on ppc64 as a 32-bit app
235299 - GFS2 gfs_quota do_list operation hangs when you have a large sparse quota file
235475 - LSPP: Panic when running IPSEC labeled loopback on LSPP kernel
235545 - utrace: ptrace operations should work on child in job control stop
235640 - iscsi-initiator to solaris express n59, n60,n61 target leads to kernel panic
235675 - LSPP: INFO: possible recursive locking detected
235737 - Forcedeth module causes bmc access to fail while machine is off
236069 - GFS2: deadlock running d_rwdirectlarge
236087 - GFS2: mmap problems with distributed test cases
236195 - vga= values result in black screen
236205 - k8temp kernel modules for AMD K8 sensors
236271 - dm-mirror: Writes to mirror after log failure return EIO
236528 - TKIP errors when using WPA
236624 - dm-mirror: Call to rh_in_sync should be allowed to block in do_reads
236759 - Off-by-one error in arch/x86_64/k8.c::cache_k8_northbridges()
236875 - autofs problem with symbolic links
236880 - [PATCH] Fix NULL bio crash in loop worker thread
236922 - DMA: Out of SW-IOMMU space
237124 - zero new user lvbs
237125 - orphan locks and purging incomplete
237126 - invalid ids for user locks
237188 - ext2 failures above 8T
237374 - Oops in svcauth_gss_release when running connectathon04 test on NFSv3 with krb5i
237558 - GFS2: problem with drop_inode logic in memory pressure situations
238570 - HP5750: CDROM generates errors on tray open & close
238571 - HP5750: cpu_chain & cache_chain_mutex deadlock
238597 - update CIFS client to 1.48aRH
238687 - nfsv3 on krb5i printk's many RPC request reserved XXX but used YYY
238709 - GATT pages must be uncacheable
238898 - add lock timeouts and time warnings
238901 - lockup in shrink_zone when node out of memory
239040 - allow debugging to be enabled
239520 - kdump 2nd kernel failed to load cciss driver
239643 - device mapper multipath: round-robin path order is inverted
239645 - device mapper: incorrect suspend error path
239655 - kernel dm: allow offline devices
239887 - LSPP: watches using -p omit some syscalls
240307 - WARNING: "autofs_kill_sb" [fs/autofs/autofs.ko] undefined in
240354 - Broadcom Corporation BCM4306 gets ASSERTION FAILED error
240735 - Kernel Oops in aacraid loading SteelEye Lifekeeper
240751 - kernel dm io: panic on large request
240868 - ipw2xxx driver update for 5.1
241006 - device-mapper mirror: bad call to dm_io in read_async_bio causes I/O failure
241272 - kernel dm crypt: possible data corruptions
241817 - misc device removed when lockspace removal fails
241819 - kobject freeing error when new_lockspace fails
241821 - dumping master locks
241902 - Unprivileged users can't create default lockspace
241928 - IPMI driver updates for RHEL 5.1
242069 - device-mapper mirror: Blockable function [clear_region] called inside spinlock
242070 - queue_work oops
242116 - race in aio io_submit write/read
242122 - [RHEL5.1][XEN][IA64] blktap: Various cleanups necessary for ia64 support
242124 - [RHEL5.1][XEN][IA64] Fix HVM interrupts on IPF
242125 - [RHEL5.1][XEN][IA64] Change to new interrupt deliver mechanism
242126 - [RHEL5.1][XEN][IA64] evtchn_callback fix and clean
242136 - [RHEL5.1][XEN][IA64] Set IRQ_PER_CPU status on percpu IRQs
242137 - [RHEL5.1][XEN][IA64] Fix for irq_desc() missing in new upstream
242138 - [RHEL5.1][XEN][IA64] dma-mapping.h user our own swiotlb.h header
242140 - [RHEL5.1][XEN] Support new xm command: xm trigger <Domain> <nmi|reset|init> [<VCPU>]
242143 - [RHEL5.1][XEN][IA64] Skip MCA setup on domU
242144 - [RHEL5.1][XEN][IA64] Fix PV-on-HVM driver
242584 - GFS2 - cleanup inode number handling
242648 - kdump broken on x86_64
242779 - [RHEL5.1][XEN][IA64] changed foreign domain page mapping semantic
242807 - missing dlm_hold_rsb() causes assertion failure
242828 - [QLogic 5.1 bug] qla4xxx: Fix overrun/underrun handling and HBA online cond.
242975 - A number of NFS oops, memory leaks found in upstream.
242989 - [RHEL5.1][XEN][IA64] change interface version for 3.1
243136 - GFS2 - NFS SPECsfs test runs panic and/or stalled in lookup code
243555 - utrace: Failing PTRACE_DETACH after ATTACH+CONT(SIGSTOP)
243913 - NFS Client R/O in anaconda preinstall environment
243979 - PV-on-HVM interrupts not delivered promptly in APIC mode
244133 - B44 ethernet driver update
244150 - Cannot find IDE device with ATI/AMD SB700
244154 - SMBus does not work on ATI/AMD SB700 chipset
244215 - kernel dm snapshot: activating of snapshot marked invalid causes incorrect mapping
244923 - RHEL5.1: vfs support for FUSE
244949 - [NetApp-N 5.1 bug] umount utility
245062 - [patch]Kernel panic (handle kernel NULLpointer) occurred in NFSv4
245135 - Broadcom NetLink BCM5906M Fast Ethernet PCI Express does not work with RHEL5
245164 - kernel oops when watched file is unlinked and audit is disabled
245169 - Xen: Windows HVM guest image installed under VT cause blue screen if booted on AMD-V
245550 - bug in gdth.c crashing machine
245585 - kexec/xen machines may oops in case highmem is present
245637 - [RHEL5.1][BUG][XEN] Guest OS hangs on IPF montecito
246114 - GFS2: soft lockup in rgblk_search
247120 - NFSd oops when exporting krb5p mounts
247265 - race between loading xenblk.ko and scanning for LVM partitions etc.
247427 - utrace: i386 debugger + x86_64 kernel + threaded (i386) inferior = error
247581 - [LSI-M 5.1 Beta bug] megaraid_sas driver version incorrect (shows 3.05, should be 3.10)
248102 - Missing critical phys_to_virt in lib/swiotlb.c
248186 - gp dl535g2 / AMD 8132 MMCONFIG blacklist
248327 - RHEL5: MegaRAID SATA RAID 150-4/6 are not supported 64-bit DMA
248382 - Regression in support for third party drivers in RHEL5 kernels post -23.
249394 - CIFS deadlocks in cifs_get_inode_info_unix
249409 - Mapping guest pages can crash Dom0
250203 - ia64 Xen NVRAM support (Hypervisor parts)
250420 - [RHEL5.1]: Off-line (non-live) migrate of a RHEL5.1 PV guest panics the guest
250496 - eHCA infiniband adapter works only for IPoIB
250772 - GFS2: assertion failure gfs2_block_map, file = fs/gfs2/bmap.c, line = 475
251053 - GFS2 panic at function = do_strip, file = fs/gfs2/bmap.c, line = 764
251160 - [RHEL 5.1] Memory leak in audit tree watch code
251179 - clvmd startup times out and fails, but continues running
251731 - Fix broken AltSysrq-F (Force OOM kill functionality)
251854 - hda_codec panic at boot
251905 - use after free of skb in netfront.c:network_start_xmit
252033 - separate mapped file and mapped anonymous pages in show_mem()
252034 - forcedeth: missed 2 chunks from 0.60 backport
252191 - GFS2: More problems unstuffing journaled files
252243 - RHEL5.1: Updates to cxgb3 driver
252358 - Duplicate CONFIG_CHANGE audit records when starting auditd
253590 - GFS2: meta data corruption under heavy IOs
253921 - GFS2: NULL superblock pointer causes panic after bad mount option
253988 - Suspend/Resume tg3 does not work correctly
255841 - kmalloc args are reversed in iscsi_tcp
272021 - GFS2 - flocks from same process trip kernel BUG at fs/gfs2/glock.c:1118!
279571 - Can't boot 2.6.18-26.el5 with Vmware ESX
286501 - ext3 fs corruption noted after fresh install of RHEL5.1-Server-20070906.0
286821 - GFS2 lock_dlm1 deadlock itself
323771 - no sound when playing media with realplayer


Keywords

kernel, update


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/