Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2010:0046-1
Type: Security Advisory
Severity: Important
Issued on: 2010-01-19
Last updated on: 2010-01-19
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.4.z server)
CVEs (cve.mitre.org): CVE-2006-6304
CVE-2009-2910
CVE-2009-3080
CVE-2009-3556
CVE-2009-3889
CVE-2009-3939
CVE-2009-4020
CVE-2009-4021
CVE-2009-4138
CVE-2009-4141
CVE-2009-4272

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* an array index error was found in the gdth driver. A local user could
send a specially-crafted IOCTL request that would cause a denial of service
or, possibly, privilege escalation. (CVE-2009-3080, Important)

* a flaw was found in the FUSE implementation. When a system is low on
memory, fuse_put_request() could dereference an invalid pointer, possibly
leading to a local denial of service or privilege escalation.
(CVE-2009-4021, Important)

* Tavis Ormandy discovered a deficiency in the fasync_helper()
implementation. This could allow a local, unprivileged user to leverage a
use-after-free of locked, asynchronous file descriptors to cause a denial
of service or privilege escalation. (CVE-2009-4141, Important)

* the Parallels Virtuozzo Containers team reported the RHSA-2009:1243
update introduced two flaws in the routing implementation. If an attacker
was able to cause a large enough number of collisions in the routing hash
table (via specially-crafted packets) for the emergency route flush to
trigger, a deadlock could occur. Secondly, if the kernel routing cache was
disabled, an uninitialized pointer would be left behind after a route
lookup, leading to a kernel panic. (CVE-2009-4272, Important)

* the RHSA-2009:0225 update introduced a rewrite attack flaw in the
do_coredump() function. A local attacker able to guess the file name a
process is going to dump its core to, prior to the process crashing, could
use this flaw to append data to the dumped core file. This issue only
affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the
default value is 0). (CVE-2006-6304, Moderate)

The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable
set to 2, the core file will not be recorded if the file already exists.
For example, core files will not be overwritten on subsequent crashes of
processes whose core files map to the same name.

* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)

* the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)
support in the qla2xxx driver, resulting in two new sysfs pseudo files,
"/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete".
These two files were world-writable by default, allowing a local user to
change SCSI host attributes. This flaw only affects systems using the
qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)

* permission issues were found in the megaraid_sas driver. The "dbg_lvl"
and "poll_mode_io" files on the sysfs file system ("/sys/") had
world-writable permissions. This could allow local, unprivileged users to
change the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)

* a NULL pointer dereference flaw was found in the firewire-ohci driver
used for OHCI compliant IEEE 1394 controllers. A local, unprivileged user
with access to /dev/fw* files could issue certain IOCTL calls, causing a
denial of service or privilege escalation. The FireWire modules are
blacklisted by default, and if enabled, only root has access to the files
noted above by default. (CVE-2009-4138, Moderate)

* a buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS file system implementation. This could lead to a denial of service if a
user browsed a specially-crafted HFS file system, for example, by running
"ls". (CVE-2009-4020, Low)

Bug fix documentation for this update will be available shortly from
www.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/
index.html

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-164.11.1.el5.src.rpm
File outdated by:  RHBA-2011:0956
    MD5: e7400d646902bda71e8cc2e273d5b0bb
 
IA-32:
kernel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e1666c2a7317b843f9ded948e5040979
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: fd266b8a67376ddd4f3db46bf20b4767
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 67b8e7ad93417d070af3b2388ddb9bba
kernel-debug-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d6c6f79e6595dd522a1553e050cb5d57
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 99dc6475416e6208f6163ef132fcc7f1
kernel-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: fd3e90d33a15a35d792f786c830aa3fe
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: a99ed628f3d8521e8c99e62932c27ad4
kernel-xen-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 722896702ed800a70192fc28803b1122
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b59ddf6673c9aa8e66312ccce90bc1f7
 
IA-64:
kernel-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 67b3439e65958ba913b7838aca1ed816
kernel-debug-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ae8a3ce114da0b1e1f7ae3c6559805ce
kernel-debug-devel-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5b64627b7fac2f02e5ef7d53f7ff54c3
kernel-devel-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ed2cf4c167b35f4b2b2b7e6e5cd6e3e0
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ee64337e56b9aa70e36603a4fd4122af
kernel-xen-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4d09251dcfc7428c31fb75621237c520
kernel-xen-devel-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 436fa5231c1b6bf193d2705f86fb6320
 
PPC:
kernel-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 95ac4d9df4248c40946721e1bbf6b6de
kernel-debug-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: dd2fa660683c1bccd0784015a5b2ff38
kernel-debug-devel-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 374052893eae23ad4899d82807f8e4c5
kernel-devel-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1a559ca64f80b6bc45caee8816e44c5d
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: fe6e3600a6eaf712e5da810ad2a50c12
kernel-headers-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 77675b68a1aa746a30358e8becca39fa
kernel-kdump-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: faeeb3e9c6c3c052b4c2f4544c41ff1d
kernel-kdump-devel-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4245e5851a6ace42f386a030f174c092
 
s390x:
kernel-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4ed55f613f9c15b06897345142eb6ff5
kernel-debug-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: d76bd1e2c05b37137395db14b8becaf2
kernel-debug-devel-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 930f1293f12528e3bb2bd6d52d05f32a
kernel-devel-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: c44a1817336ae9e9a78e7f3de08da7a8
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: d3fb7c0d826e6294fceb7d8a00366ada
kernel-kdump-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 06d19a6c39bed558c341937f6060c9e9
kernel-kdump-devel-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 569fa44233840e3fb7901bd3f678fc63
 
x86_64:
kernel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 308391b9aec2e3e3c663e83a5cb000a7
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4725323e8a2b3a9482b7cfa7a9be65d9
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7d14af5277b5e85d9f17cb2673eddc7e
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b67965436b5249cbeb6167ebefe02ba
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b30c02887fdf97c2abe04f9e97564ab
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 50c6d0e184af77fd068c261833f9505a
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7a54bb3e2b6d95e2449e5f5d83d82dd3
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-164.11.1.el5.src.rpm
File outdated by:  RHBA-2011:0956
    MD5: e7400d646902bda71e8cc2e273d5b0bb
 
IA-32:
kernel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e1666c2a7317b843f9ded948e5040979
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: fd266b8a67376ddd4f3db46bf20b4767
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 67b8e7ad93417d070af3b2388ddb9bba
kernel-debug-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d6c6f79e6595dd522a1553e050cb5d57
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 99dc6475416e6208f6163ef132fcc7f1
kernel-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: fd3e90d33a15a35d792f786c830aa3fe
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: a99ed628f3d8521e8c99e62932c27ad4
kernel-xen-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 722896702ed800a70192fc28803b1122
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b59ddf6673c9aa8e66312ccce90bc1f7
 
x86_64:
kernel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 308391b9aec2e3e3c663e83a5cb000a7
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4725323e8a2b3a9482b7cfa7a9be65d9
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7d14af5277b5e85d9f17cb2673eddc7e
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b67965436b5249cbeb6167ebefe02ba
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b30c02887fdf97c2abe04f9e97564ab
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 50c6d0e184af77fd068c261833f9505a
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7a54bb3e2b6d95e2449e5f5d83d82dd3
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
kernel-2.6.18-164.11.1.el5.src.rpm
File outdated by:  RHBA-2011:0956
    MD5: e7400d646902bda71e8cc2e273d5b0bb
 
IA-32:
kernel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: e1666c2a7317b843f9ded948e5040979
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: fd266b8a67376ddd4f3db46bf20b4767
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 67b8e7ad93417d070af3b2388ddb9bba
kernel-debug-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: d6c6f79e6595dd522a1553e050cb5d57
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 99dc6475416e6208f6163ef132fcc7f1
kernel-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: fd3e90d33a15a35d792f786c830aa3fe
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.i386.rpm
File outdated by:  RHBA-2011:0956
    MD5: a99ed628f3d8521e8c99e62932c27ad4
kernel-xen-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 722896702ed800a70192fc28803b1122
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: b59ddf6673c9aa8e66312ccce90bc1f7
 
IA-64:
kernel-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 67b3439e65958ba913b7838aca1ed816
kernel-debug-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: ae8a3ce114da0b1e1f7ae3c6559805ce
kernel-debug-devel-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 5b64627b7fac2f02e5ef7d53f7ff54c3
kernel-devel-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: ed2cf4c167b35f4b2b2b7e6e5cd6e3e0
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: ee64337e56b9aa70e36603a4fd4122af
kernel-xen-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 4d09251dcfc7428c31fb75621237c520
kernel-xen-devel-2.6.18-164.11.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 436fa5231c1b6bf193d2705f86fb6320
 
PPC:
kernel-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 95ac4d9df4248c40946721e1bbf6b6de
kernel-debug-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: dd2fa660683c1bccd0784015a5b2ff38
kernel-debug-devel-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 374052893eae23ad4899d82807f8e4c5
kernel-devel-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 1a559ca64f80b6bc45caee8816e44c5d
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.ppc.rpm
File outdated by:  RHBA-2011:0956
    MD5: fe6e3600a6eaf712e5da810ad2a50c12
kernel-headers-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 77675b68a1aa746a30358e8becca39fa
kernel-kdump-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: faeeb3e9c6c3c052b4c2f4544c41ff1d
kernel-kdump-devel-2.6.18-164.11.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 4245e5851a6ace42f386a030f174c092
 
s390x:
kernel-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 4ed55f613f9c15b06897345142eb6ff5
kernel-debug-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: d76bd1e2c05b37137395db14b8becaf2
kernel-debug-devel-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 930f1293f12528e3bb2bd6d52d05f32a
kernel-devel-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: c44a1817336ae9e9a78e7f3de08da7a8
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: d3fb7c0d826e6294fceb7d8a00366ada
kernel-kdump-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 06d19a6c39bed558c341937f6060c9e9
kernel-kdump-devel-2.6.18-164.11.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 569fa44233840e3fb7901bd3f678fc63
 
x86_64:
kernel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 308391b9aec2e3e3c663e83a5cb000a7
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 4725323e8a2b3a9482b7cfa7a9be65d9
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 7d14af5277b5e85d9f17cb2673eddc7e
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 3b67965436b5249cbeb6167ebefe02ba
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: c2dd9dc7b379b42dc712ca0a5c38bf6b
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 3b30c02887fdf97c2abe04f9e97564ab
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 50c6d0e184af77fd068c261833f9505a
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 7a54bb3e2b6d95e2449e5f5d83d82dd3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

526068 - CVE-2009-3889 CVE-2009-3939 kernel: megaraid_sas permissions in sysfs
526788 - CVE-2009-2910 kernel: x86_64 32 bit process register leak
537027 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour [rhel-5.4.z]
537177 - CVE-2009-3556 kernel: qla2xxx NPIV vport management pseudofiles are world writable
537273 - CVE-2006-6304 kernel: use flag in do_coredump()
538734 - CVE-2009-4021 kernel: fuse: prevent fuse_put_request on invalid pointer
539414 - CVE-2009-3080 kernel: gdth: Prevent negative offsets in ioctl
539686 - bnx2: panic in bnx2_poll_work() [rhel-5.4.z]
540736 - CVE-2009-4020 kernel: hfs buffer overflow
540896 - PV clock fix throws off database application time [rhel-5.4.z]
542582 - kdump corefile cannot be backtraced in IA64 [rhel-5.4.z]
543448 - Using IPoIB, losing connectivity with 1 host, other hosts accessible [rhel-5.4.z]
544978 - glock_workqueue -- glock ref count via gfs2_glock_hold [rhel-5.4.z]
545411 - CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock
547236 - CVE-2009-4138 kernel: firewire: ohci: handle receive packets with a data length of zero
547521 - CRM#1971672, Data loss in GFS2 when multiple nodes writes to same file [rhel-5.4.z]
547530 - kernel: BUG: soft lockup - CPU#1 stuck for 13s! [httpd:4490] [rhel-5.4.z]
547906 - CVE-2009-4141 kernel: create_elf_tables can leave urandom in a bad state
548370 - kernel: sleeping vfs_check_frozen in called in atomic context from do_wp_page [rhel-5.4.z]
549905 - hvm, x86_64 guest panic on 2.6.18-164.9.1.el5 [rhel-5.4.z]
549906 - [NetApp 5.4.z bug] Emulex FC ports on RHEL 5.4 GA offlined during target controller faults [rhel-5.4.z]
549907 - Hang when echoing to /proc/sys/net/ipv4/route/secret_interval [rhel-5.4.z]
549908 - resize2fs online resize hangs [rhel-5.4.z]
550968 - RHEL5.4 guest with PV clock: inconsistent times returned by clock_gettime(CLOCK_REALTIME) and gettimeofday() [rhel-5.4.z]


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/