Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2008:0612-25
Type: Security Advisory
Severity: Important
Issued on: 2008-08-04
Last updated on: 2008-08-04
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.2.z server)
CVEs (cve.mitre.org): CVE-2008-1294
CVE-2008-2136
CVE-2008-2812

Details

Updated kernel packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

* a possible kernel memory leak was found in the Linux kernel Simple
Internet Transition (SIT) INET6 implementation. This could allow a local
unprivileged user to cause a denial of service. (CVE-2008-2136, Important)

* a flaw was found in the Linux kernel setrlimit system call, when setting
RLIMIT_CPU to a certain value. This could allow a local unprivileged user
to bypass the CPU time limit. (CVE-2008-1294, Moderate)

* multiple NULL pointer dereferences were found in various Linux kernel
network drivers. These drivers were missing checks for terminal validity,
which could allow privilege escalation. (CVE-2008-2812, Moderate)

These updated packages fix the following bugs:

* the GNU libc stub resolver is a minimal resolver that works with Domain
Name System (DNS) servers to satisfy requests from applications for names.
The GNU libc stub resolver did not specify a source UDP port, and therefore
used predictable port numbers. This could have made DNS spoofing attacks
easier.

The Linux kernel has been updated to implement random UDP source ports
where none are specified by an application. This allows applications, such
as those using the GNU libc stub resolver, to use random UDP source ports,
helping to make DNS spoofing attacks harder.

* when using certain hardware, a bug in UART_BUG_TXEN may have caused
incorrect hardware detection, causing data flow to "/dev/ttyS1" to hang.

* a 50-75% drop in NFS server rewrite performance, compared to Red Hat
Enterprise Linux 4.6, has been resolved.

* due a bug in the fast userspace mutex code, while one thread fetched a
pointer, another thread may have removed it, causing the first thread to
fetch the wrong pointer, possibly causing a system crash.

* on certain Hitachi hardware, removing the "uhci_hcd" module caused a
kernel oops, and the following error:

BUG: warning at arch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()

Even after the "uhci_hcd" module was reloaded, there was no access to USB
devices. As well, on systems that have legacy interrupts,
"acpi_unregister_gsi" incorrectly called "iosapci_unregister_intr()",
causing warning messages to be logged.

* when a page was mapped with mmap(), and "PROT_WRITE" was the only
"prot" argument, the first read of that page caused a segmentation fault.
If the page was read after it was written to, no fault occurred. This was
incompatible with the Red Hat Enterprise Linux 4 behavior.

* due to a NULL pointer dereference in powernowk8_init(), a panic may
have occurred.

* certain error conditions handled by the bonding sysfs interface could
have left rtnl_lock() unbalanced, either by locking and returning without
unlocking, or by unlocking when it did not lock, possibly causing a
"kernel: RTNL: assertion failed at net/core/fib_rules.c" error.

* the kernel currently expects a maximum of six Machine Check Exception
(MCE) banks to be exposed by a CPU. Certain CPUs have 7 or more, which may
have caused the MCE to be incorrectly reported.

* a race condition in UNIX domain sockets may have caused recv() to return
zero. For clusters, this may have caused unexpected failovers.

* msgrcv() frequently returned an incorrect "ERESTARTNOHAND (514)" error
number.

* on certain Intel Itanium-based systems, when kdump was configured to halt
the system after a dump operation, after the "System halted." output, the
kernel continued to output endless "soft lockup" messages.

Red Hat Enterprise Linux 5 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-92.1.10.el5.src.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1d57ede212089f9da02a2e66c34f3e5b
 
IA-32:
kernel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: e8f71efc9b4181d16faf6d110e24f39c
kernel-PAE-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 50eb08e0df8001a5257014392bb8a1e3
kernel-PAE-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: f2c33f07359711b11ef9bfa2ebb0bcc4
kernel-debug-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 213fa4ead209db2b17d3b3eba80a3c1e
kernel-debug-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: b58c453ce95f2cca43eb0738a33e45ff
kernel-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 6e23b5c9ad1dde8158d283cb1ae49b2b
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.i386.rpm
File outdated by:  RHSA-2014:0433
    MD5: f60c7fb774f2ae4a1df9483284302b77
kernel-xen-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9d41f8034786d31ffb5bf9789ea47b16
kernel-xen-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 2f04f3d4c459402d004e670e7e78cd85
 
IA-64:
kernel-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 4b4806dcc6355ff8770e430dd0f27e93
kernel-debug-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 78f8f3cebcff18271922e5c13670b537
kernel-debug-devel-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: c96d96c052bbd3587ef7a1eb7f59a29d
kernel-devel-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 72042a00b06788a0c623133ab09bdc58
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 1ae937941515712123216c2b187f0ee2
kernel-xen-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 85d450d77a793b0a0a1b82e390e41a9e
kernel-xen-devel-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: ce89953967fb4b427086824d5186f0af
 
PPC:
kernel-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 6eeb70911cf32f8f4403c72081ec66f4
kernel-debug-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: b13959af1f2b0508b41f8dd7cc73e59f
kernel-debug-devel-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 77a8daae06ca2e5355df8e3d169e36b3
kernel-devel-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 22577360c6009e14082ec8415fbe97e7
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.ppc.rpm
File outdated by:  RHSA-2014:0433
    MD5: c23a046aaa4f888c0f0e29175d7e62ac
kernel-headers-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: cec9c700208fa6454f8a2caf249a9c7e
kernel-kdump-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 682a29bd4a02ad13de4e784971a6a807
kernel-kdump-devel-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 5ecf447edca054e03c2e4fd62dbd41f0
 
s390x:
kernel-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: e247f7fc4efe2b951cc35cb3b510bf1c
kernel-debug-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: 206eaded2456f3bb35a739488640888a
kernel-debug-devel-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: c4426375c8c2bf9ada232faca2d89758
kernel-devel-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: 7fbd5a3b347473f67a9aac30d4170617
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: 015249c3dedb098dab3be3ce9300f1b1
kernel-kdump-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: d601e5f630d0806641586dd533b86ba6
kernel-kdump-devel-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: 81c5e0d2a0381b6b5a6b111dafa404e1
 
x86_64:
kernel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: b2864d2c0782486db64f251fb92245a0
kernel-debug-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: a162be17e641946f12bb8b251b2d678f
kernel-debug-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: e48a0caec738f1cc91aec2dd6ace08cc
kernel-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 721ab95b62308ae19c4c28e55fbce02c
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: f667fbd4b3f6085c376513cd91de79eb
kernel-xen-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: cb02390a5a287b69b1b18f68cd5a6a22
kernel-xen-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: dfff55886dc323c33311a3b9b826e6c2
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-92.1.10.el5.src.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1d57ede212089f9da02a2e66c34f3e5b
 
IA-32:
kernel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: e8f71efc9b4181d16faf6d110e24f39c
kernel-PAE-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 50eb08e0df8001a5257014392bb8a1e3
kernel-PAE-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: f2c33f07359711b11ef9bfa2ebb0bcc4
kernel-debug-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 213fa4ead209db2b17d3b3eba80a3c1e
kernel-debug-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: b58c453ce95f2cca43eb0738a33e45ff
kernel-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 6e23b5c9ad1dde8158d283cb1ae49b2b
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.i386.rpm
File outdated by:  RHSA-2014:0433
    MD5: f60c7fb774f2ae4a1df9483284302b77
kernel-xen-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9d41f8034786d31ffb5bf9789ea47b16
kernel-xen-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 2f04f3d4c459402d004e670e7e78cd85
 
x86_64:
kernel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: b2864d2c0782486db64f251fb92245a0
kernel-debug-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: a162be17e641946f12bb8b251b2d678f
kernel-debug-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: e48a0caec738f1cc91aec2dd6ace08cc
kernel-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 721ab95b62308ae19c4c28e55fbce02c
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: f667fbd4b3f6085c376513cd91de79eb
kernel-xen-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: cb02390a5a287b69b1b18f68cd5a6a22
kernel-xen-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: dfff55886dc323c33311a3b9b826e6c2
 
Red Hat Enterprise Linux EUS (v. 5.2.z server)

SRPMS:
kernel-2.6.18-92.1.10.el5.src.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1d57ede212089f9da02a2e66c34f3e5b
 
IA-32:
kernel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: e8f71efc9b4181d16faf6d110e24f39c
kernel-PAE-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 50eb08e0df8001a5257014392bb8a1e3
kernel-PAE-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: f2c33f07359711b11ef9bfa2ebb0bcc4
kernel-debug-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 213fa4ead209db2b17d3b3eba80a3c1e
kernel-debug-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: b58c453ce95f2cca43eb0738a33e45ff
kernel-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 6e23b5c9ad1dde8158d283cb1ae49b2b
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.i386.rpm
File outdated by:  RHSA-2010:0148
    MD5: f60c7fb774f2ae4a1df9483284302b77
kernel-xen-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 9d41f8034786d31ffb5bf9789ea47b16
kernel-xen-devel-2.6.18-92.1.10.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 2f04f3d4c459402d004e670e7e78cd85
 
IA-64:
kernel-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4b4806dcc6355ff8770e430dd0f27e93
kernel-debug-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 78f8f3cebcff18271922e5c13670b537
kernel-debug-devel-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: c96d96c052bbd3587ef7a1eb7f59a29d
kernel-devel-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 72042a00b06788a0c623133ab09bdc58
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1ae937941515712123216c2b187f0ee2
kernel-xen-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 85d450d77a793b0a0a1b82e390e41a9e
kernel-xen-devel-2.6.18-92.1.10.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: ce89953967fb4b427086824d5186f0af
 
PPC:
kernel-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 6eeb70911cf32f8f4403c72081ec66f4
kernel-debug-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: b13959af1f2b0508b41f8dd7cc73e59f
kernel-debug-devel-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 77a8daae06ca2e5355df8e3d169e36b3
kernel-devel-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 22577360c6009e14082ec8415fbe97e7
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.ppc.rpm
File outdated by:  RHSA-2010:0148
    MD5: c23a046aaa4f888c0f0e29175d7e62ac
kernel-headers-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: cec9c700208fa6454f8a2caf249a9c7e
kernel-kdump-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 682a29bd4a02ad13de4e784971a6a807
kernel-kdump-devel-2.6.18-92.1.10.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 5ecf447edca054e03c2e4fd62dbd41f0
 
s390x:
kernel-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: e247f7fc4efe2b951cc35cb3b510bf1c
kernel-debug-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 206eaded2456f3bb35a739488640888a
kernel-debug-devel-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: c4426375c8c2bf9ada232faca2d89758
kernel-devel-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 7fbd5a3b347473f67a9aac30d4170617
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 015249c3dedb098dab3be3ce9300f1b1
kernel-kdump-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: d601e5f630d0806641586dd533b86ba6
kernel-kdump-devel-2.6.18-92.1.10.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 81c5e0d2a0381b6b5a6b111dafa404e1
 
x86_64:
kernel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: b2864d2c0782486db64f251fb92245a0
kernel-debug-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: a162be17e641946f12bb8b251b2d678f
kernel-debug-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: e48a0caec738f1cc91aec2dd6ace08cc
kernel-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 721ab95b62308ae19c4c28e55fbce02c
kernel-doc-2.6.18-92.1.10.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 544cfaadf6627c5d114364506d9a7f0c
kernel-headers-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: f667fbd4b3f6085c376513cd91de79eb
kernel-xen-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: cb02390a5a287b69b1b18f68cd5a6a22
kernel-xen-devel-2.6.18-92.1.10.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: dfff55886dc323c33311a3b9b826e6c2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

437114 - CVE-2008-1294 kernel: setrlimit(RLIMIT_CPUINFO) with zero value doesn't inherit properly across children
443071 - [Stratus 5.2.z][1/2] ttyS1 lost interrupt and it stops transmitting [rhel-5.2.z]
446031 - CVE-2008-2136 kernel: sit memory leak
448685 - 50-75 % drop in nfs-server rewrite performance compared to rhel 4.6+ [rhel-5.2.z]
450336 - Kernel crash on futex [rhel-5.2.z]
450337 - [RHEL5] BUG: warning at arch/ia64/kernel/iosapic.c:1001/iosapic_unregiste
450758 - mmap() with PROT_WRITE on RHEL5 incompatible with RHEL4.
450866 - RHEL 5.3 NULL pointer dereferenced in powernowk8_init
451939 - bonding driver can leave rtnl_lock unbalanced
451941 - RHEL 5.3 extend MCE banks support for Dunnington, Nehalem, and beyond
452231 - [RHEL5.1] In unix domain sockets, recv() may incorrectly return zero
453419 - CVE-2008-2812 kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
454566 - kernel: randomize udp port allocation
455256 - [Stratus 5.2.z][2/2] ttyS1 lost interrupt and it stops transmitting
455278 - The msgrcv() syscall fails with error number 514 (ERESTARTNOHAND).
456117 - [REG][5.3] Soft lockup is detected


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/