- Issued:
- 2008-08-26
- Updated:
- 2008-08-26
RHBA-2008:0846 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix various bugs are now available for Red Hat
Enterprise Linux 4.5.
Description
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following bugs:
- the GNU libc stub resolver is a minimal resolver that works with Domain
Name System (DNS) servers to satisfy requests from applications for names.
The GNU libc stub resolver did not specify a source UDP port, and therefore
used predictable port numbers. This could have made DNS-spoofing attacks
easier.
The Linux kernel has been updated to implement random UDP source ports
where none are specified by an application. This allows applications, such
as those using the GNU libc stub resolver, to use random UDP source ports,
helping to make DNS spoofing attacks harder.
- added support for platforms based on Intel(r) Penryn processors. This
enables the possibility of performance profiling with the oprofile system
profiler utility.
- Intel(r) Penryn and later processor models were incorrectly identified.
These updated kernel packages fix the detection of CPU Family IDs for
recent-model Intel(r) processors.
- a client-side race on blocking locks caused large time delays on NFS file
systems.
Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc
Fixes
- BZ - 440401 - LTC41942-30 second flock() calls against files stored on a NetApp while using NFS
- BZ - 448357 - oprofile fix to support Penryn-based processors
- BZ - 448359 - RHEL4 kernel ignores extended cpu model field
CVEs
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.21.EL.src.rpm | SHA-256: 4bf0ab2dcc99a7d370e7c59cf7bca1662b34bf6c566d023d1d89f1cae2cc26f6 |
x86_64 | |
kernel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: dedd04b6081db5708c313a27b623fc39688a1f2671b307035c7a4d24e13ea9a8 |
kernel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: dedd04b6081db5708c313a27b623fc39688a1f2671b307035c7a4d24e13ea9a8 |
kernel-devel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: a7d9bc139980d73abbb4baa6025a5ba6347a108a5f08e5a70b3c5e0372cd92e1 |
kernel-devel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: a7d9bc139980d73abbb4baa6025a5ba6347a108a5f08e5a70b3c5e0372cd92e1 |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
kernel-largesmp-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: 826e4cd88366fd1a69796da33e5ba08fc21d02e3b144ed28a5d9f0d92cbfeb25 |
kernel-largesmp-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: 826e4cd88366fd1a69796da33e5ba08fc21d02e3b144ed28a5d9f0d92cbfeb25 |
kernel-largesmp-devel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: 2026f0988e266186dce0dd88df7ed8c75b848a11213b79e901487a7dbf57f7ae |
kernel-largesmp-devel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: 2026f0988e266186dce0dd88df7ed8c75b848a11213b79e901487a7dbf57f7ae |
kernel-smp-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: b7284e9cdc728ac06df078f135063ebc32e3d3e78a2742bfbd60204adb7ebcb4 |
kernel-smp-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: b7284e9cdc728ac06df078f135063ebc32e3d3e78a2742bfbd60204adb7ebcb4 |
kernel-smp-devel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: f80ca9fc6175f496b42a8d059f8d8d8660fe0e910d27916a398ffc8bc201d999 |
kernel-smp-devel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: f80ca9fc6175f496b42a8d059f8d8d8660fe0e910d27916a398ffc8bc201d999 |
kernel-xenU-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: 40fa45e55fa7cbb16c44ce31962c3d5fecd6907a59560d674266d732b5cfd068 |
kernel-xenU-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: 40fa45e55fa7cbb16c44ce31962c3d5fecd6907a59560d674266d732b5cfd068 |
kernel-xenU-devel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: 3fdfa6e86e06c27849303321c892ca24e42ae8dc4975b8eda8cb60f0e7db854c |
kernel-xenU-devel-2.6.9-55.0.21.EL.x86_64.rpm | SHA-256: 3fdfa6e86e06c27849303321c892ca24e42ae8dc4975b8eda8cb60f0e7db854c |
ia64 | |
kernel-2.6.9-55.0.21.EL.ia64.rpm | SHA-256: 6d985718859d71fa57013301df948c739ec77bdb1964f1061bc68e972f25233e |
kernel-2.6.9-55.0.21.EL.ia64.rpm | SHA-256: 6d985718859d71fa57013301df948c739ec77bdb1964f1061bc68e972f25233e |
kernel-devel-2.6.9-55.0.21.EL.ia64.rpm | SHA-256: 4a4629ba0d13ea7145ae18352efa14cf64aebdeda2f16f574a96fad710c31591 |
kernel-devel-2.6.9-55.0.21.EL.ia64.rpm | SHA-256: 4a4629ba0d13ea7145ae18352efa14cf64aebdeda2f16f574a96fad710c31591 |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
kernel-largesmp-2.6.9-55.0.21.EL.ia64.rpm | SHA-256: 0187b712bdbd1353fd3709621f6393a6ced36a3b4b6bd0e5d418d2d657628383 |
kernel-largesmp-2.6.9-55.0.21.EL.ia64.rpm | SHA-256: 0187b712bdbd1353fd3709621f6393a6ced36a3b4b6bd0e5d418d2d657628383 |
kernel-largesmp-devel-2.6.9-55.0.21.EL.ia64.rpm | SHA-256: 02e15c472426bd61ea6f5194ff1f19f9d0aeeb8bbec6311601ce46a667ea38b2 |
kernel-largesmp-devel-2.6.9-55.0.21.EL.ia64.rpm | SHA-256: 02e15c472426bd61ea6f5194ff1f19f9d0aeeb8bbec6311601ce46a667ea38b2 |
i386 | |
kernel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 686c901d782f121cd63d4faadabc7a1c079ce52b77e1c0498ef89d55ba95300a |
kernel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 686c901d782f121cd63d4faadabc7a1c079ce52b77e1c0498ef89d55ba95300a |
kernel-devel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: c61eb90ccfdc7e55eec3ea39f4264b0e18594fe5788a9ba78d16c49e1d6d10bb |
kernel-devel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: c61eb90ccfdc7e55eec3ea39f4264b0e18594fe5788a9ba78d16c49e1d6d10bb |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
kernel-hugemem-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 1d80b9c120156e70dd73898e393099e85c988b406b180908625417692a5d5f6f |
kernel-hugemem-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 1d80b9c120156e70dd73898e393099e85c988b406b180908625417692a5d5f6f |
kernel-hugemem-devel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 2ec42fef075fc2e0a0dcdf9322a9cc49fb8dba9286567a7e66df3c509369a562 |
kernel-hugemem-devel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 2ec42fef075fc2e0a0dcdf9322a9cc49fb8dba9286567a7e66df3c509369a562 |
kernel-smp-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 78224299e516571f364d5602226d7be58663e17c2f48d2d13e6762adc0730b8b |
kernel-smp-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 78224299e516571f364d5602226d7be58663e17c2f48d2d13e6762adc0730b8b |
kernel-smp-devel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: a55d2e7a791881ea024059fb6749c366fcec12b99afc46c93eaa730b41e3c694 |
kernel-smp-devel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: a55d2e7a791881ea024059fb6749c366fcec12b99afc46c93eaa730b41e3c694 |
kernel-xenU-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 028644fedcdb0a7badcac73d0295cec30a3e774c3a80025c751904d330d5fa79 |
kernel-xenU-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 028644fedcdb0a7badcac73d0295cec30a3e774c3a80025c751904d330d5fa79 |
kernel-xenU-devel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 8101a6d2a5086192b81e49d63aed1939934d06367b731307749845867e4d8bf6 |
kernel-xenU-devel-2.6.9-55.0.21.EL.i686.rpm | SHA-256: 8101a6d2a5086192b81e49d63aed1939934d06367b731307749845867e4d8bf6 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.21.EL.src.rpm | SHA-256: 4bf0ab2dcc99a7d370e7c59cf7bca1662b34bf6c566d023d1d89f1cae2cc26f6 |
s390x | |
kernel-2.6.9-55.0.21.EL.s390x.rpm | SHA-256: 0ae31b90cc444b7fcceddbb5253c5fe0f9ed93e550d48cd9d50dfe97db19529f |
kernel-devel-2.6.9-55.0.21.EL.s390x.rpm | SHA-256: 0465a99baa4ad8a86b4b1fe672c3e191a9f207fde1e6e9c7d4325e7d84cde178 |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
s390 | |
kernel-2.6.9-55.0.21.EL.s390.rpm | SHA-256: 9478dce38caeaaf5c7e00ccee2a7744306f53bf5695aca761db6cf0d3c2efc2d |
kernel-devel-2.6.9-55.0.21.EL.s390.rpm | SHA-256: 404c707fb0e6f255d84dc6abed405083b606328334008e670e575afe6e6f9ee5 |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.21.EL.src.rpm | SHA-256: 4bf0ab2dcc99a7d370e7c59cf7bca1662b34bf6c566d023d1d89f1cae2cc26f6 |
ppc | |
kernel-2.6.9-55.0.21.EL.ppc64.rpm | SHA-256: 06777558c5065127f08d17183d05eb019c75af4f1c7f107dc7865e8688213785 |
kernel-2.6.9-55.0.21.EL.ppc64iseries.rpm | SHA-256: 520a349a876ad4dcb75706853ed123b06eb429abae97b9da4522251d34194b3e |
kernel-devel-2.6.9-55.0.21.EL.ppc64.rpm | SHA-256: 67e3dd49b0c72410ab20cef8acb540c335e0dcf2b2679acebec33e678d500d81 |
kernel-devel-2.6.9-55.0.21.EL.ppc64iseries.rpm | SHA-256: 3e8c255ad0113de61ae58dd5b0723c0a1c289036caec4232e29dec3e8698155b |
kernel-doc-2.6.9-55.0.21.EL.noarch.rpm | SHA-256: c02dfcb49e95caf78702a5e6825867ebc78437279eebaa4b01d873a7190ed375 |
kernel-largesmp-2.6.9-55.0.21.EL.ppc64.rpm | SHA-256: e20f8a25d238b8baffa44be7712bdc7ab8f42a14446ba4a19b18d9311ed033d7 |
kernel-largesmp-devel-2.6.9-55.0.21.EL.ppc64.rpm | SHA-256: 23ac5d339b7ab83ab587bdc9b4e5d41b7328899f29a0527a69758945af2322a9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.