- Issued:
- 2007-12-06
- Updated:
- 2007-12-06
RHBA-2007:1079 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix various bugs are now available.
Description
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following bugs:
- a bug in the kernel NFS code significantly reduced the speed of file
operations when dealing with symbolic links. An extra GETATTR operation has
been removed, which resolves this issue.
- a bug in the kernel CIFS code may have resulted in corrupted memory. The
cifs_demultiplex_thread did not handle all of the error codes from the
kernel_recvmsg function, which may have caused any pointer at an address
above the kvec to be a candidate for corruption. This has been resolved in
these updated packages.
- using memory interleaving or the "numa=off" kernel boot argument caused
a kernel panic on HP Proliant DL585 systems which used an AMD K8 family
CPU, and the largesmp kernel.
- a flaw was found in the kernel signals handling code. A race condition
in the use of recalc_sigpending_tsk could lead to kernel-only system call
error codes being returned to user-space.
Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc
Fixes
- BZ - 360051 - extra GETATTR calls against symlinks in RHEL4
- BZ - 368411 - x86_64 largesmp kernel panics at boot time on DL585
- BZ - 381161 - [RHEL 4.4] task->mm or slab corruption with CIFS
- BZ - 381171 - select() occasionally returns errno 514
CVEs
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.14.EL.src.rpm | SHA-256: 645c4ec6ace7dbe39d58f199dbee5fac195505d8e5453a34973f44f2b14b0ead |
x86_64 | |
kernel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 1b0fafa370d45b47b65b9eea47886ef6009e99e58a114b9beb96b285bde1cc90 |
kernel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 1b0fafa370d45b47b65b9eea47886ef6009e99e58a114b9beb96b285bde1cc90 |
kernel-devel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: bf9cc6bd398eb95573bfad5a8638ecf41b86722d06b134fabe2a793f8123b661 |
kernel-devel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: bf9cc6bd398eb95573bfad5a8638ecf41b86722d06b134fabe2a793f8123b661 |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
kernel-largesmp-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 7a0db766826af08731ffdb0e50b59ebf2f8cc12a88634224355ef6d238bf52cd |
kernel-largesmp-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 7a0db766826af08731ffdb0e50b59ebf2f8cc12a88634224355ef6d238bf52cd |
kernel-largesmp-devel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 3637f9c9dbc85f627e11354db168197ebfb0da4dbd90ad0bfa546bcdc73dcf9c |
kernel-largesmp-devel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 3637f9c9dbc85f627e11354db168197ebfb0da4dbd90ad0bfa546bcdc73dcf9c |
kernel-smp-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 6be51a0fb4eb28d8beaf5a8dd95750e00b11e576944c10dc1745eb52aeda05c9 |
kernel-smp-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 6be51a0fb4eb28d8beaf5a8dd95750e00b11e576944c10dc1745eb52aeda05c9 |
kernel-smp-devel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 2991192635ed83b1e892b085e5ca25fcabb0f41e6e63ebbb9fb421e0533d59a9 |
kernel-smp-devel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 2991192635ed83b1e892b085e5ca25fcabb0f41e6e63ebbb9fb421e0533d59a9 |
kernel-xenU-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 58a87edb6b961b1fb0c609f3fa40001f49ea0abf5d2393295dbab59cf76327ba |
kernel-xenU-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 58a87edb6b961b1fb0c609f3fa40001f49ea0abf5d2393295dbab59cf76327ba |
kernel-xenU-devel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 4e730dba8900681471107054d8d9589f186f0523821f5c0ffc66f453d9b44e8b |
kernel-xenU-devel-2.6.9-55.0.14.EL.x86_64.rpm | SHA-256: 4e730dba8900681471107054d8d9589f186f0523821f5c0ffc66f453d9b44e8b |
ia64 | |
kernel-2.6.9-55.0.14.EL.ia64.rpm | SHA-256: 7ed39cf2cc6f5e61bc5d2f6af41fed0c1bad2a87615924b1f9d017e7d0c15cf0 |
kernel-2.6.9-55.0.14.EL.ia64.rpm | SHA-256: 7ed39cf2cc6f5e61bc5d2f6af41fed0c1bad2a87615924b1f9d017e7d0c15cf0 |
kernel-devel-2.6.9-55.0.14.EL.ia64.rpm | SHA-256: a488505d32fe107613b749569524e5d8feaa63e1d14c4b6295a224e618d79339 |
kernel-devel-2.6.9-55.0.14.EL.ia64.rpm | SHA-256: a488505d32fe107613b749569524e5d8feaa63e1d14c4b6295a224e618d79339 |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
kernel-largesmp-2.6.9-55.0.14.EL.ia64.rpm | SHA-256: a86b4502887014767f31f4c7bc59d0667f8da644c52081ec8f8b60853ad966d1 |
kernel-largesmp-2.6.9-55.0.14.EL.ia64.rpm | SHA-256: a86b4502887014767f31f4c7bc59d0667f8da644c52081ec8f8b60853ad966d1 |
kernel-largesmp-devel-2.6.9-55.0.14.EL.ia64.rpm | SHA-256: 786fe05c3efd228591a38e023c73437707fc1c0afc0a7511fc11b5d0a5aa712e |
kernel-largesmp-devel-2.6.9-55.0.14.EL.ia64.rpm | SHA-256: 786fe05c3efd228591a38e023c73437707fc1c0afc0a7511fc11b5d0a5aa712e |
i386 | |
kernel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 536a5cee0251ac6b0c18a57958f7617f329ffd9667fa8393d453da005eaaad9c |
kernel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 536a5cee0251ac6b0c18a57958f7617f329ffd9667fa8393d453da005eaaad9c |
kernel-devel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 8c4c5b022480aac70f811bbe3594d374818bfbb4058965f19084d9e66a27d9e9 |
kernel-devel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 8c4c5b022480aac70f811bbe3594d374818bfbb4058965f19084d9e66a27d9e9 |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
kernel-hugemem-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 95e830244f57cf637f5fd5e58964b0bb8e8df9709678cb968f54fa3cd2aadba7 |
kernel-hugemem-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 95e830244f57cf637f5fd5e58964b0bb8e8df9709678cb968f54fa3cd2aadba7 |
kernel-hugemem-devel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 045af43f21fe723baf33ff6252191e33ad95457b63a3a805916fa3bde1626c7d |
kernel-hugemem-devel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 045af43f21fe723baf33ff6252191e33ad95457b63a3a805916fa3bde1626c7d |
kernel-smp-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 959d983dd1c37c58f7b6ffcb3cb6226127006da51e59750d3c3f02dea91618f7 |
kernel-smp-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 959d983dd1c37c58f7b6ffcb3cb6226127006da51e59750d3c3f02dea91618f7 |
kernel-smp-devel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 6a10ce6f9d00aba1f7a75ce727c1a3304dd8d6138e221fe89ee5b980c3329140 |
kernel-smp-devel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 6a10ce6f9d00aba1f7a75ce727c1a3304dd8d6138e221fe89ee5b980c3329140 |
kernel-xenU-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 0ecff875ebabcb37349fbdc74867b6f8e1d78b896163f11e57366d49a8389578 |
kernel-xenU-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 0ecff875ebabcb37349fbdc74867b6f8e1d78b896163f11e57366d49a8389578 |
kernel-xenU-devel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 281fb37d5b15d88ca7a153b5047ef00333cc1309e7d34538f5ae5a4c15e0a37c |
kernel-xenU-devel-2.6.9-55.0.14.EL.i686.rpm | SHA-256: 281fb37d5b15d88ca7a153b5047ef00333cc1309e7d34538f5ae5a4c15e0a37c |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.14.EL.src.rpm | SHA-256: 645c4ec6ace7dbe39d58f199dbee5fac195505d8e5453a34973f44f2b14b0ead |
s390x | |
kernel-2.6.9-55.0.14.EL.s390x.rpm | SHA-256: 673d76d17b4e9a7bef03ae0170d611ec7c5bb47b4764bf4e3d299037bc11f197 |
kernel-devel-2.6.9-55.0.14.EL.s390x.rpm | SHA-256: d846a6c8311c86ddbaf872f888f6abb606ce1a95267886a5f125366eba4c6ae7 |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
s390 | |
kernel-2.6.9-55.0.14.EL.s390.rpm | SHA-256: 34cad8755989831ba402132a98af0b5643749eeef52ecdb0becaa7ab6eeebf6d |
kernel-devel-2.6.9-55.0.14.EL.s390.rpm | SHA-256: bf35c39b949164963cfd9c4140a27c2c7c1d6df136e211eb38ff7053af25edbf |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.14.EL.src.rpm | SHA-256: 645c4ec6ace7dbe39d58f199dbee5fac195505d8e5453a34973f44f2b14b0ead |
ppc | |
kernel-2.6.9-55.0.14.EL.ppc64.rpm | SHA-256: db029a3491963684d541113fad875ecf65255d48a0e9a88767e1bc7b28f0a703 |
kernel-2.6.9-55.0.14.EL.ppc64iseries.rpm | SHA-256: 25ed975695e7a75c285cd36518d163ed0e29ca8ef4681f2d26225c0e863c79c6 |
kernel-devel-2.6.9-55.0.14.EL.ppc64.rpm | SHA-256: a01496602f438f4e227e7834d8ad1aada3a05a66eaf38b74612a2a85fe73b99f |
kernel-devel-2.6.9-55.0.14.EL.ppc64iseries.rpm | SHA-256: e9c233cf03d6f8681365cdd8749ab8a56edb181557de93eec63b3d8009c7aa00 |
kernel-doc-2.6.9-55.0.14.EL.noarch.rpm | SHA-256: 88fb6f3180ac285399462e5e398cd94ef742121cce1438dc848ac766d4db7a8f |
kernel-largesmp-2.6.9-55.0.14.EL.ppc64.rpm | SHA-256: 2fffaddb4d7ebd3b95c602f24e48996949b5e9928cdcc914f557a205345106c5 |
kernel-largesmp-devel-2.6.9-55.0.14.EL.ppc64.rpm | SHA-256: f0262476220c394e91c80877c6795356f42d63f87e6c1836ee4cd75fd75f251f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.