Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2008:1017-14
Type: Security Advisory
Severity: Important
Issued on: 2008-12-16
Last updated on: 2008-12-16
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.2.z server)
CVEs (cve.mitre.org): CVE-2008-3831
CVE-2008-4554
CVE-2008-4576

Details

Updated kernel packages that resolve several security issues and fix
various bugs are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* Olaf Kirch reported a flaw in the i915 kernel driver. This flaw could,
potentially, lead to local privilege escalation. Note: the flaw only
affects systems based on the Intel G33 Express Chipset and newer.
(CVE-2008-3831, Important)

* Miklos Szeredi reported a missing check for files opened with O_APPEND in
the sys_splice(). This could allow a local, unprivileged user to bypass the
append-only file restrictions. (CVE-2008-4554, Important)

* a deficiency was found in the Linux kernel Stream Control Transmission
Protocol (SCTP) implementation. This could lead to a possible denial of
service if one end of a SCTP connection did not support the AUTH extension.
(CVE-2008-4576, Important)

In addition, these updated packages fix the following bugs:

* on Itanium® systems, when a multithreaded program was traced using the
command "strace -f", messages such as

PANIC: attached pid 10740 exited
PANIC: handle_group_exit: 10740 leader 10721
...

will be displayed, and after which the trace would stop. With these
updated packages, "strace -f" command no longer results in these error
messages, and strace terminates normally after tracing all threads.

* on big-endian systems such as PowerPC, the getsockopt() function
incorrectly returned 0 depending on the parameters passed to it when the
time to live (TTL) value equaled 255.

* when using an NFSv4 file system, accessing the same file with two
separate processes simultaneously resulted in the NFS client process
becoming unresponsive.

* on AMD64 and Intel® 64 hypervisor-enabled systems, when a syscall
correctly returned '-1' in code compiled on Red Hat Enterprise Linux 5, the
same code, when run with the strace utility, would incorrectly return an
invalid return value. This has been fixed: on AMD64 and Intel® 64
hypervisor-enabled systems, syscalls in compiled code return the same,
correct values as syscalls run with strace.

* on the Itanium® architecture, fully-virtualized guest domains created
using more than 64 GB of memory caused other guest domains not to receive
interrupts. This caused soft lockups on other guests. All guest domains are
now able to receive interrupts regardless of their allotted memory.

* when user-space used SIGIO notification, which was not disabled before
closing a file descriptor and was then re-enabled in a different process,
an attempt by the kernel to dereference a stale pointer led to a kernel
crash. With this fix, such a situation no longer causes a kernel crash.

* modifications to certain pages made through a memory-mapped region could
have been lost in cases when the NFS client needed to invalidate the page
cache for that particular memory-mapped file.

* fully-virtualized Windows® guests became unresponsive due to the vIOSAPIC
component being multiprocessor-unsafe. With this fix, vIOSAPIC is
multiprocessor-safe and Windows guests do not become unresponsive.

* on certain systems, keyboard controllers could not withstand continuous
requests to switch keyboard LEDs on or off. This resulted in some or all
key presses not being registered by the system.

* on the Itanium® architecture, setting the "vm.nr_hugepages" sysctl
parameter caused a kernel stack overflow resulting in a kernel panic, and
possibly stack corruption. With this fix, setting vm.nr_hugepages works
correctly.

* hugepages allow the Linux kernel to utilize the multiple page size
capabilities of modern hardware architectures. In certain configurations,
systems with large amounts of memory could fail to allocate most of this
memory for hugepages even if it was free. This could result, for example,
in database restart failures.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-92.1.22.el5.src.rpm
File outdated by:  RHSA-2010:0148
    MD5: fda3805a9c15c957926a98ea2cbb88e9
 
IA-32:
kernel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b4b043c3490611a121df26f69920bb3
kernel-PAE-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: fd3ac09ae78e144b4a5b6aadd911a2bf
kernel-PAE-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b7a78473089e40259f6e64b3d180787e
kernel-debug-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 702035b612bf2b9ab1ee760301ec9499
kernel-debug-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2455d94272e675c6f86629e02d9d1ba0
kernel-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5911cff771d2a4aa5cf8cd45ef0fe230
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6665be36965e24d21e3e596bb30c1d00
kernel-xen-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6374ad463e39b7ad59cfa71ba32b6ddd
kernel-xen-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 79c6b54ae08080c5bda136ebc6d47895
 
IA-64:
kernel-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 59089302b18f58957d8725d1f81faac4
kernel-debug-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8a474e4809fda4f458379bb27011c1f9
kernel-debug-devel-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ee867b50256fac1788c7490e0a956ced
kernel-devel-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2ef85649a8a36ae7e2bc43e57274b537
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9c68cebb1aab59881ad179b7d679b37e
kernel-xen-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 290fea2e353ecc4be36ed1b0b81b609d
kernel-xen-devel-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d5a4c3ecb4b64500c4a4d7a0f8fb2e41
 
PPC:
kernel-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b39dede2417cf38a5067b4cc4263fed8
kernel-debug-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4b9e4240fae1d93d03b91c70b0eca344
kernel-debug-devel-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4d242b5083e955af2d4d3e3a24fbb149
kernel-devel-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2c3c4f8286ffa854319981f5d5874e18
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: c00f9f8aca6c43eb0b208b424ac2bc37
kernel-headers-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 28efd6bc5b8b0b473593de8fcf5eb95d
kernel-kdump-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 66dcb2139c245067450f9c1b94083fff
kernel-kdump-devel-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b2b74ff2f3b1d1cb8b4c08c2c64ea180
 
s390x:
kernel-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: a293dea9a795800221e349b2450acc54
kernel-debug-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5a008fc171bc5245e5cc77e9e7137e67
kernel-debug-devel-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: ea0e35074f626807e8782ff383dadd4f
kernel-devel-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 27423d6e32d105e55488f5480af22a66
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 66e9f73628eacb60e0919703adcb9815
kernel-kdump-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: b75a93e9b9f5712049d5297ced12faeb
kernel-kdump-devel-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: dd81a25a0d53699691b827a1902a0cee
 
x86_64:
kernel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a3b514d7214ef765c2096a1a87dd03d
kernel-debug-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ad3e8b737385c482b72417d2463afcbb
kernel-debug-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d0115758fb384b9baa305be0bc033b32
kernel-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 155aa853b8a4d8818c403c2e4d47e6fd
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bce6dbb4bd5310c1e71ea4796607ce7e
kernel-xen-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d6d30da8932c9e0e9cb3f82dd65b9cb6
kernel-xen-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7059085c072ced9785b9249ba3ca2e1e
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-92.1.22.el5.src.rpm
File outdated by:  RHSA-2010:0148
    MD5: fda3805a9c15c957926a98ea2cbb88e9
 
IA-32:
kernel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b4b043c3490611a121df26f69920bb3
kernel-PAE-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: fd3ac09ae78e144b4a5b6aadd911a2bf
kernel-PAE-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b7a78473089e40259f6e64b3d180787e
kernel-debug-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 702035b612bf2b9ab1ee760301ec9499
kernel-debug-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2455d94272e675c6f86629e02d9d1ba0
kernel-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5911cff771d2a4aa5cf8cd45ef0fe230
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6665be36965e24d21e3e596bb30c1d00
kernel-xen-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6374ad463e39b7ad59cfa71ba32b6ddd
kernel-xen-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 79c6b54ae08080c5bda136ebc6d47895
 
x86_64:
kernel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a3b514d7214ef765c2096a1a87dd03d
kernel-debug-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ad3e8b737385c482b72417d2463afcbb
kernel-debug-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d0115758fb384b9baa305be0bc033b32
kernel-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 155aa853b8a4d8818c403c2e4d47e6fd
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bce6dbb4bd5310c1e71ea4796607ce7e
kernel-xen-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d6d30da8932c9e0e9cb3f82dd65b9cb6
kernel-xen-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7059085c072ced9785b9249ba3ca2e1e
 
Red Hat Enterprise Linux EUS (v. 5.2.z server)

SRPMS:
kernel-2.6.18-92.1.22.el5.src.rpm
File outdated by:  RHSA-2010:0148
    MD5: fda3805a9c15c957926a98ea2cbb88e9
 
IA-32:
kernel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 3b4b043c3490611a121df26f69920bb3
kernel-PAE-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: fd3ac09ae78e144b4a5b6aadd911a2bf
kernel-PAE-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: b7a78473089e40259f6e64b3d180787e
kernel-debug-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 702035b612bf2b9ab1ee760301ec9499
kernel-debug-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 2455d94272e675c6f86629e02d9d1ba0
kernel-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 5911cff771d2a4aa5cf8cd45ef0fe230
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.i386.rpm
File outdated by:  RHSA-2010:0148
    MD5: 6665be36965e24d21e3e596bb30c1d00
kernel-xen-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 6374ad463e39b7ad59cfa71ba32b6ddd
kernel-xen-devel-2.6.18-92.1.22.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 79c6b54ae08080c5bda136ebc6d47895
 
IA-64:
kernel-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 59089302b18f58957d8725d1f81faac4
kernel-debug-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 8a474e4809fda4f458379bb27011c1f9
kernel-debug-devel-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: ee867b50256fac1788c7490e0a956ced
kernel-devel-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 2ef85649a8a36ae7e2bc43e57274b537
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 9c68cebb1aab59881ad179b7d679b37e
kernel-xen-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 290fea2e353ecc4be36ed1b0b81b609d
kernel-xen-devel-2.6.18-92.1.22.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: d5a4c3ecb4b64500c4a4d7a0f8fb2e41
 
PPC:
kernel-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: b39dede2417cf38a5067b4cc4263fed8
kernel-debug-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4b9e4240fae1d93d03b91c70b0eca344
kernel-debug-devel-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4d242b5083e955af2d4d3e3a24fbb149
kernel-devel-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 2c3c4f8286ffa854319981f5d5874e18
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.ppc.rpm
File outdated by:  RHSA-2010:0148
    MD5: c00f9f8aca6c43eb0b208b424ac2bc37
kernel-headers-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 28efd6bc5b8b0b473593de8fcf5eb95d
kernel-kdump-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 66dcb2139c245067450f9c1b94083fff
kernel-kdump-devel-2.6.18-92.1.22.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: b2b74ff2f3b1d1cb8b4c08c2c64ea180
 
s390x:
kernel-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: a293dea9a795800221e349b2450acc54
kernel-debug-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 5a008fc171bc5245e5cc77e9e7137e67
kernel-debug-devel-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: ea0e35074f626807e8782ff383dadd4f
kernel-devel-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 27423d6e32d105e55488f5480af22a66
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 66e9f73628eacb60e0919703adcb9815
kernel-kdump-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: b75a93e9b9f5712049d5297ced12faeb
kernel-kdump-devel-2.6.18-92.1.22.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: dd81a25a0d53699691b827a1902a0cee
 
x86_64:
kernel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 3a3b514d7214ef765c2096a1a87dd03d
kernel-debug-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: ad3e8b737385c482b72417d2463afcbb
kernel-debug-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: d0115758fb384b9baa305be0bc033b32
kernel-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 155aa853b8a4d8818c403c2e4d47e6fd
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 8d7d3cd0a6cc02cb70cbf88219c142d0
kernel-headers-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: bce6dbb4bd5310c1e71ea4796607ce7e
kernel-xen-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: d6d30da8932c9e0e9cb3f82dd65b9cb6
kernel-xen-devel-2.6.18-92.1.22.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 7059085c072ced9785b9249ba3ca2e1e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

248710 - Local keyboard DoS through LED switching
450335 - LTC41974-Pages of a memory mapped NFS file get corrupted.
459080 - [Xen][5.2.z] softlockup occurs while creating a guest which has large memory.
464502 - CVE-2008-3831 kernel: i915 kernel drm driver arbitrary ioremap
465744 - kernel: rtc: fix kernel panic on second use of SIGIO notification
466079 - CVE-2008-4576 kernel: sctp: Fix oops when INIT-ACK indicates that peer doesn't support AUTH
466707 - CVE-2008-4554 kernel: don't allow splice() to files opened with O_APPEND
467727 - [Xen][5.2] Network Performance Test causes Guest Hang.
469150 - [REG][5.2] The trace of some threads unexpectedly stops when being traced by 'strace -f'.
469649 - getsockopt() returning incorrectly in PPC
469650 - [REG][5.2][NFSv4] Accessing the same file at the same time causes NFSv4 open() call to stall forever on NFS4ERR_DELAY
470853 - [RHEL5.2]: Running strace with a bad syscall doesn't return -ENOSYS
474347 - [REG][5.3] Kernel panics when you prepare hugepages.
474760 - [RHEL5 patch] Allow hugepage allocation to use most of memory.


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/