Skip to navigation

Security Advisory Important: Red Hat Enterprise Linux 5.5 kernel security and bug fix update

Advisory: RHSA-2010:0178-4
Type: Security Advisory
Severity: Important
Issued on: 2010-03-30
Last updated on: 2010-03-30
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2009-4027
CVE-2009-4307
CVE-2010-0727
CVE-2010-1188

Details

Updated kernel packages that fix three security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the fifth regular update.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a race condition was found in the mac80211 implementation, a framework
used for writing drivers for wireless devices. An attacker could trigger
this flaw by sending a Delete Block ACK (DELBA) packet to a target system,
resulting in a remote denial of service. Note: This issue only affected
users on 802.11n networks, and that also use the iwlagn driver with Intel
wireless hardware. (CVE-2009-4027, Important)

* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code
could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged user
on a system that has a GFS2 file system mounted could use this flaw to
cause a kernel panic. (CVE-2010-0727, Moderate)

* a divide-by-zero flaw was found in the ext4 file system code. A local
attacker could use this flaw to cause a denial of service by mounting a
specially-crafted ext4 file system. (CVE-2009-4307, Low)

These updated packages also include several hundred bug fixes for and
enhancements to the Linux kernel. Space precludes documenting each of these
changes in this advisory and users are directed to the Red Hat Enterprise
Linux 5.5 Release Notes for information on the most significant of these
changes:

http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/

Also, for details concerning every bug fixed in and every enhancement added
to the kernel for this release, refer to the kernel chapter in the Red Hat
Enterprise Linux 5.5 Technical Notes:

http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html

All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which address these vulnerabilities as well as fixing the bugs
and adding the enhancements noted in the Red Hat Enterprise Linux 5.5
Release Notes and Technical Notes. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-194.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0e4c71d8d030f5151fd8f400560d7a5d
SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f
 
IA-32:
kernel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2251698a3a4992eb64ba0a1c8349b9aa
SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c
kernel-PAE-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ef53f4123e999df710fc3b15ebf89a8
SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2
kernel-PAE-devel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1945e5b4005d377f59670586c6771b37
SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7
kernel-debug-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 46ab07c306af1400923f8e3504eb41e5
SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f
kernel-debug-devel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: f4662c1538cf0afb2d5083e6c779cace
SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc
kernel-devel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ef138e39b2ad66c1fb87116f6eb6ed1b
SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5
kernel-doc-2.6.18-194.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d3663c9a6867656806f33cb4ffab66d
SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8dd284fa4e283319352c640aa486dbbf
SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4
kernel-xen-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ee3716de72c3f6b4b0d95c4e8d30b6a3
SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a
kernel-xen-devel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: afba1a404200f8833165e8d8d3617214
SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10
 
IA-64:
kernel-2.6.18-194.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 04bccde64b1494d97e724319332d643c
SHA-256: 54601729cc3bfe1f9a26e15249e3f11e4b62241b9e4be2a9bfca71b816085f42
kernel-debug-2.6.18-194.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 31426b1cb2651ad566738d3440bae329
SHA-256: 8fa8326f79d5223862880793a239fadb742beee7b43199227bd6ddd76679b70a
kernel-debug-devel-2.6.18-194.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bb3dc4256bba6c4a850f608eece3e858
SHA-256: dd842c74761b4dc73573e1ecb444d7abab2d521a7b4af8a37ca99f6c77248ebd
kernel-devel-2.6.18-194.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: aaca3206a21b63b9db78b4bd828dff50
SHA-256: fb05a88d78de9696b52433cc8fe05288a14331b5ded414ef4e65e87e7419ffa7
kernel-doc-2.6.18-194.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d3663c9a6867656806f33cb4ffab66d
SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b87fa6d2391afe132c76a4aa4f32cd0c
SHA-256: 1b17403282e0daef28a3a57fcccef5e306d16ecf67a6fefde24a1a783e597867
kernel-xen-2.6.18-194.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 37f351a0311c973890b589a313fe8df6
SHA-256: 1dd9064dbefb78fc9ee83b4f07db23a15bdd26a124198e5dae7dd129254d0548
kernel-xen-devel-2.6.18-194.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a0e6d6ce49fc902963ef1990b7838dd1
SHA-256: 21b19915293be9f7d33a2c2d8a2af091f9dfa0f8838e41a653b6909b903f1ca7
 
PPC:
kernel-2.6.18-194.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e61333fde152bdaec43a8c6a12c3fdc0
SHA-256: de34cc79c204d99c6a234e1c2a67c3522a924b5e8e95511a0de5275eefb40ab8
kernel-debug-2.6.18-194.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7262e551e23431c07e8e0e1a3efa9d37
SHA-256: 858b4e187da982bea23774730de79e24e53bf19ce6ac3136014dc93b915eaa2d
kernel-debug-devel-2.6.18-194.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5cf730efdd2017d9fd57f0824273fe1d
SHA-256: fe4b9afeec455d8d95953237f8f84211d05070965a60fc0f2975a8d8505e3233
kernel-devel-2.6.18-194.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5f43b320084f9144cd9180c967eeeb4c
SHA-256: 5105802dea90e7db86361d8f3e2b3f18564ad90eb905694beaf385acc6d5a311
kernel-doc-2.6.18-194.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d3663c9a6867656806f33cb4ffab66d
SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4e8f0a5e4246bd84036e2bc006d71dc4
SHA-256: 4c6756cf6b87b8fd41902d0d3c04bd290b45f44bc97b46ae0ee86a6f6bb290ff
kernel-headers-2.6.18-194.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8425772cf285ad740dcfb3749f5a4dce
SHA-256: ab56e79999f460c09bf3394cce48a5a96e0c50e00e7193341ebb7186820054b6
kernel-kdump-2.6.18-194.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d4050a74eb6b0de8f314abf5de36b557
SHA-256: 10ecb1f69c83bdb147151d997d8b16563addfb7d20255e12a2a84a8df1cc8352
kernel-kdump-devel-2.6.18-194.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cab662f321c3bb3a716e169febc39dc2
SHA-256: 595fd31a236366d00dcaa9894593f92bef5ec895de86b8f032ec6af4a955fa55
 
s390x:
kernel-2.6.18-194.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: ff9864e1d976edb803b8fbad2a354874
SHA-256: fb3efedad26d2f5df192eeb856dd112765209a4168843584ed8dab548f689e2b
kernel-debug-2.6.18-194.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 93ac458354b08c65aacd3b7fbee69746
SHA-256: 843c6266765bf325a694dc41b9bb0016a5b47e6a1ec315685c1184cdd94855a9
kernel-debug-devel-2.6.18-194.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8e060391967463a819b908c540dde455
SHA-256: a9dea16a8f865a7b3a1c4f0d9d1ee6b8c25e787eacf732f16de209706766b7e0
kernel-devel-2.6.18-194.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8435c608ecff7dfeab0b754f7a78f278
SHA-256: 9ecefc25bd450878f25139f671f06dd469ab8d0c4711179988b074ea2ef687b4
kernel-doc-2.6.18-194.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d3663c9a6867656806f33cb4ffab66d
SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: ac4b0ca2fcd5583208ce2544b1a46271
SHA-256: 7c214912866394379e28562cdd74c2356414a5fd5785aa4eb3b517d30e33df43
kernel-kdump-2.6.18-194.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3c12bf0f9da2b61e6aefb4f6412f4b12
SHA-256: c233a3025d505384f0f3b3672dfbfe65f224ed38fcf0488d020c3e4ce9a2798c
kernel-kdump-devel-2.6.18-194.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: ddc64dd1c6d955c87bc5d8e397b377eb
SHA-256: f8f24af1ad75b215c85a2b005450dff93ce08d4dbe20e96fbce25a386c649d16
 
x86_64:
kernel-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f7da212be2fdfb593c19f8b382417392
SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95
kernel-debug-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d9d79163ae99328ef54f5e3feb2f23e
SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 81fd8c467d06c4ed17a7a3462917af2f
SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8
kernel-devel-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ea7da36b3f2f2c9bfbc336127f36977
SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a
kernel-doc-2.6.18-194.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d3663c9a6867656806f33cb4ffab66d
SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5424a3ab3912960aef047e82b92930db
SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a
kernel-xen-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6e267f60e6e25501d8b3a6e3a28db4cb
SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 977e12facdb3a9632f1d50a63d996772
SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-194.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0e4c71d8d030f5151fd8f400560d7a5d
SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f
 
IA-32:
kernel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2251698a3a4992eb64ba0a1c8349b9aa
SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c
kernel-PAE-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ef53f4123e999df710fc3b15ebf89a8
SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2
kernel-PAE-devel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1945e5b4005d377f59670586c6771b37
SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7
kernel-debug-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 46ab07c306af1400923f8e3504eb41e5
SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f
kernel-debug-devel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: f4662c1538cf0afb2d5083e6c779cace
SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc
kernel-devel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ef138e39b2ad66c1fb87116f6eb6ed1b
SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5
kernel-doc-2.6.18-194.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d3663c9a6867656806f33cb4ffab66d
SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8dd284fa4e283319352c640aa486dbbf
SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4
kernel-xen-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ee3716de72c3f6b4b0d95c4e8d30b6a3
SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a
kernel-xen-devel-2.6.18-194.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: afba1a404200f8833165e8d8d3617214
SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10
 
x86_64:
kernel-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f7da212be2fdfb593c19f8b382417392
SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95
kernel-debug-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d9d79163ae99328ef54f5e3feb2f23e
SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 81fd8c467d06c4ed17a7a3462917af2f
SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8
kernel-devel-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ea7da36b3f2f2c9bfbc336127f36977
SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a
kernel-doc-2.6.18-194.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d3663c9a6867656806f33cb4ffab66d
SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5424a3ab3912960aef047e82b92930db
SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a
kernel-xen-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6e267f60e6e25501d8b3a6e3a28db4cb
SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 977e12facdb3a9632f1d50a63d996772
SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

250561 - w83627ehf sensor not supported by 2.6.18-8.1.8.el5 kernel
322881 - /proc/self/smaps unreadable after setuid
427709 - dump and large file ops are slow, please implement kernel workaround
446061 - IT87 hwmon module does not support later chipset revisions.
448130 - 50-75 % drop in cfq read performance compared to rhel 4.6+
450121 - RFE: Symbol pci_domain_nr needs to be added the whitelist for ppc64
452129 - memory mapped files not updating timestamps
456181 - Read speed of /sbin/dump command is critically slow with CFQ I/O scheduler
461100 - [PATCH]RHEL5:fix dio write returning EIO due to bh race
461442 - VLAN driver logs excessive messages in kernel message log (dmesg)
461506 - kernel BUG at mm/mempool.c:121! caused by lvcreate
466681 - pygrub uses cached and eventually outdated grub.conf, kernel and initrd
469976 - The EDAC driver not support The Intel 3200 and 3210 Chipsets
473404 - [5.3] Kdump Kernel Hangs on Dell AMD Machines
475457 - [FUJITSU 5.5] More tracepoints support - networking
476075 - use KVM pvclock code to detect/correct lost ticks
481658 - Backport partition table sanity checks to RHEL5
482756 - GFS2: After gfs2_grow, new size is not seen immediately
483646 - bridge: Fix LRO crash with tun (tun_chr_read())
485016 - HP6510b close lid cause system crash
485099 - Inconsistent behaviour in stripping SUID/SGID flags when chmod/chgrp directories
486092 - httpd Sendfile troubles reading from a CIFS share
486975 - kernel: Unable to write to file as non-root user with setuid and setgid bit set
487346 - ifdown bond0 causes a deadlock
487763 - Adding bonding in balance-alb mode to bridge causes host network connectivity to be lost
488161 - (direct_io) __blockdev_direct_IO calls kzalloc for dio struct causes OLTP performance regression
489566 - when booted with P-state limit, limit can never be increased
489774 - AVC denied 0x100000 for a directory with eCryptFS and Apache
489931 - NFS umount deadlock in rpciod with rpc_shutdown_client()
491010 - ip_vs module (LVS) routes demasqueraded packets out wrong interface on multihomed directors
493517 - get_partstats() returns NULL and causes panic
494120 - XEN NMI detection fails on Dell 1950 server
495059 - deadlock with NFSv4 reclaimer thread reconnecting socket
496716 - GFS2 ">>" will not update ctime,mtime after appending to the file
496847 - [Patch] jbd slab cache creation/deletion is racey
497200 - definition of file-nr differs from sysctl/fs.txt to filesystems/proc.txt
497257 - The tmpfs filesystem goes on readonly mode.
498461 - I/O scheduler setting via elevator kernel option not picked up by Xen guest
498489 - blktrace stops working after a trace-file-directory replacement
498510 - don't OOM kill task during fresh huge page allocation
498532 - RHEL5 cmirror tracker: multiple device failure of fully synced cmirror causes corruption
498976 - GFS2 - probably lost glock call back
499019 - CRM 1908390 - BUG: warning at fs/inotify.c:181/set_dentry_child_flags()
499063 - [RHEL5] undefined reference to `__udivdi3'
499253 - kernel leaves initrd in vmalloc space
499884 - A bond's preferred primary setting is lost after bringing down and up of the primary slave.
500346 - Please update mlx4_en driver for performance improvements and bug fixes
500653 - NFS: problems with virtual IP and locking
500838 - CIFS update for RHEL5.5
501030 - Need to display the current settings of the options bits in st driver.
501075 - soft lockups with software RAID6 create and re-sync'
502491 - rtl8139 doesn't work with bonding in alb mode
502531 - GFS2: smbd proccess hangs with flock() call.
502572 - cat stop responding after 1st cat and CTRL+C interrupt.
502822 - OOPS in "inet_select_addr" on ICMP when "icmp_errors_use_inbound_ifaddr" is turned on
502826 - [RHEL-5 Xen]: F-11 Xen 64-bit domU cannot be started with > 2047MB of memory
502927 - dm-raid1 can return write request as finished and later revert the data
502965 - Snapshot creation in VG with 1k extent size can fail
503837 - [Intel 5.4 Bug] Function dependency link calculated incorrectly for integrated endpoint
505331 - GFS2: genesis stuck writing to unlinked file
506200 - ahci: add device ID for 82801JI sata controller
506217 - Implement blkdev_releasepage() to release the buffer_heads and pages after we release private data belonging to a mounted filesystem.
506799 - Serial ports don't function on 4838-310 without pnpacpi=off boot option
506899 - timeout with physical cdrom on a PV guest
507159 - Cannot increase open file limit greater then 1024 * 1024 (1048576)
507549 - Bug in lockd prevents a locks being freed.
509625 - kernel: fd leak if pipe() is called with an invalid address [rhel-5.4]
509713 - getdents() reports /proc/1/task/1/ as DT_UNKNOWN.
509809 - Host panic when try to run kvm guest on a host which restored from suspend.
509866 - [RHEL5.3] Even if a process have received data but schedule() in select() cannot return
509962 - RHEL 5.4 Beta fails to activate sw raid devices, unable to install to sw raid
510225 - Segfault/Infinite loop in TLS double access
510257 - allow more flexibility for read_ahead_kb store
510686 - xen does not build on gcc 4.4
510746 - BUG: warning at kernel/softirq.c:138/local_bh_enable() (Tainted: G )
510814 - CPU hotplug notifiers for KVM (for suspend and cpu hotplug support)
510818 - cxgb3 driver fixes
511170 - [NetApp 5.5 bug] nfs_readdir() may fail to return all the files in the directory
511211 - cpuspeed behave strangely after suspend/resume on intel machine hp-dl580g5-01.rhts.bos.redhat.com
511278 - /proc/self/exe reports wrong path after fstat on NFSv4
511374 - ExpressCards should be detected and useful
512006 - [LTC 5.5 FEAT] AF_IUCV SOCK_SEQPACKET support [201885]
512013 - [LTC 5.5 FEAT] Support ACPI S3/S4 Sleeping States [201941]
512203 - [LTC 5.5 FEAT] Update ibmvscsi driver with upstream multipath enhancements [201916]
512361 - Server should return NFS4ERR_ATTRNOTSUPP if attribute 'ACL' is not supported
512552 - Can't write to XFS mount during raid5 resync
513136 - [RHEL5.4 Snapshot1] File write performance degradation in RHEL5.4 Snapshot1 compared to RHEL5.3 GA
513203 - system fails to go into s4
513410 - cifs: panic when mounting DFS referral with hostname that can't be resolved
513692 - ifdown on nVidia CK804 (rev f3) NIC doesn't work
513827 - Out of SW-IOMMU space: External hard disk inaccessible
514141 - mlx4_core fails to load on systems with32 cores
514147 - TCP traffic for VLAN interfaces fails over mlx4_en parent interface.
514250 - e100: return PCI_ERS_RESULT_DISCONNECT on permanent failure
514256 - igb: return PCI_ERS_RESULT_DISCONNECT on permanent failure
514589 - r8169 stopping all activity until the link is reset
514654 - nfsv4-server return NFS4ERR_BAD_STATEID, but return NFS4ERR_EXPIRED when it has invalid stateID
515176 - scsi_transport_fc: fc_user_scan can loop forever, needs mutex with rport list changes
515252 - CIFS multiuser mount fails to locate smbid
515312 - [Broadcom 5.5 feat] Update tg3 and add support for 5717/5718 and 57765 asic revs
515405 - [PATCH RHEL5.5] :NFS Handle putpubfh operation correctly.
515408 - Code under CONFIG_X86_VSMP incorrect after an incorrect patch pull from upstream
515529 - ENOSPC during fsstress leads to filesystem corruption on ext2, ext3, and ext4
515716 - [Broadcom 5.5 FEAT] Update bnx2x to 1.52.1-5
515753 - kdump corefile cannot be backtraced in IA64
515812 - [Emulex 5.5 feat] Three scsi_nl APIs should be added to kabi_whitelist
515863 - FEAT RHEL5.5: Make MegaRAID SAS driver legacy I/O port free
516541 - [NetApp 5.5 bug] Emulex FC ports on RHEL 5.4 GA offlined during target controller faults
516589 - Kernel netlink neighbor updates not sent to multicast group (RTMGRP_NEIGH)
516833 - [QLogic 5.5 feat] netxen - P3 updates
516881 - [Promise 5.5 feat] Update stex driver to version 4.6.0102.4
517238 - [RHEL5 Xen]: Fix for array out-of-bounds in blkfront
517377 - [Broadcom 5.5 FEAT] Update bnx2 to 2.0.2
517378 - [Broadcom 5.5 FEAT] Update bnx2i and cnic drivers
517454 - Add Support for Huawei EC1260 to the RHEL5 kernel
517504 - SCTP Messages out of order
517893 - [QLogic 5.5 bug] qlge - fix hangs and read perfromance
517922 - [QLogic 5.5 bug] qla2xxx - allow use of MSI when MSI-X disabled.
517928 - bare-metal and xen: /proc/cpuinfo does not list all CPU flags presented by CPU
518103 - VTD IOMMU 1:1 mapping performance and bug fixes
518106 - [RFE] GFS2: New mount option: -o errors=withdraw|panic
518496 - Add kernel (scsi_dh_rdac) support for Sun 6540 storage arrays.
519049 - GFS2 Filesystem Withdrawal: fatal: invalid metadata block
519076 - Update for HighPoint RocketRAID hptiop driver in RHEL 5.5 kernel
519086 - [Cisco 5.5 FEAT] Include/Update support for enic version 1.1.0.100
519091 - [Cisco 5.5 FEAT] Update fnic to version x.y.z
519112 - statfs on NFS partition always returns 0
519184 - nfsnobody == 4294967294 causes idmapd to stop responding
519447 - [QLogic 5.5 bug] qla2xxx - updates and fixes from upstream or testing.
519453 - [QLogic 5.5 bug] qlge - updates and fixes from upstream or testing.
519771 - pvclock return bogus wallclock values
520192 - kernel panics from list corruption when using a tape drive connected through cciss adapter
520297 - kernel: ipv4: make ip_append_data() handle NULL routing table [rhel-5.5]
520867 - glibc should call pselect() and ppoll() on ia64 kernel
521081 - [RHEL5.4 RC2] KMP for xen kernel cannot be applied
521093 - Cluster hangs after node rejoins from simulated network outage
521203 - Update arcmsr driver
521345 - vlan with sky2 is not possible anymore with kernel-xen 2.6.18-164
521865 - Xen fails to boot on ia64 with > 128GB memory
522600 - bnx2x: increase coalescing granularity to 4us instead of 12us
522629 - [LTC 5.5 FEAT] Provide balloon driver for KVM guests [202025]
522745 - thinkpad_acpi: CMOS NVRAM (7) and EC (5) do not agree on display brightness level
522846 - Nehalem Turbo Boost "ida" flag not present in Xen kernel's /proc/cpuinfo output
523335 - sound no longer works after upgrade to RHEL 5.4
523450 - cpu1 didn't come online in a kvm i686 guest
523888 - [RFE] Add qcserial module to RHEL 5 kernel
523982 - kernel: ipt_recent: sanity check hit count [rhel-5.5]
524052 - Boot hang when installing HVM DomU
524129 - LVS master and backup director - Synchronised connections on backup director have unsuitable timeout value
524335 - [LSI 5.5 feat] update rdac scsi device handler to upstream
524651 - Lost the network in a KVM VM on top of 5.4
524702 - kvm_clock patches are slowing guests' shutdown to unusable levels
524787 - cannot compile kernel with CONFIG_ACPI_DEBUG=y
525100 - resize2fs online resize hangs
525390 - FEAT: RHEL 5.5 - update ALSA HDA audio driver from upstream
525467 - Xen panic in msi_msg_read_remap_rte with acpi=off
526043 - Implement smp_call_function_[single|many] in x86_64 and i386
526092 - rw_semaphore bug
526259 - [Cisco 5.5 feat] libfc bug fixes and improvements
526481 - bnx2: panic in bnx2_poll_work()
526612 - kernel: BUG: soft lockup with dcache_lock
526751 - xset b as well as setterm -bfreq set beep to wrong pitch with CONFIG_HDA_INPUT_BEEP
526819 - system crashes in audit_update_watch()
526888 - NFSv4 reclaimer thread in an infinite loop
527424 - igb driver does not work with kexec
527496 - pci_dev->is_enabled is not set in RHEL5.4
527748 - /proc/net/dev sometimes contains bogus values (BCM5706)
528054 - ext4: tech preview refresh
528070 - skip inodes without pages to free in drop_pagecache_sb()
528153 - scsi: export symbol scsilun_to_int
529431 - Update to 2.6.18-164.el5PAE causes working CIFS mount to fail
529796 - GFS2: Enhance statfs and quota usability
530537 - dlm_recv deadlock under memory pressure while processing GFP_KERNEL locks.
531016 - NFS: stale nfs_fattr passed to nfs_readdir_lookup()
531268 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour
531488 - [scsi] Fix inconsistent usage of max_lun
531552 - threads on pthread_mutex_lock wake in fifo order, but posix specifies by priority
531593 - [QLogic 5.5 bug] qla2xxx - enable MSI-X and correct/cleanup irq request code
531784 - ipoib: null tx/rx_ring skb pointers on free
532701 - dprintk macro in NFS code doesn't work in some files
533489 - [Cisco 5.5 feat] Need scsi and libfc symbols to be added to whitelist_file
533496 - xen server crashes when used with network bonding modes 5 or 6
534018 - kernel: sysctl: require CAP_SYS_RAWIO to set mmap_min_addr [rhel-5.5]
534158 - Updates for mlx4 drivers
537514 - [LSI 5.5 feat] make scsi_dh_activate asynchronous to address the slower lun failovers with large number of luns
537734 - Backporting MSI-X mask bit acceleration
537876 - Kernel panic when using GRO through ixgbe driver and xen bridge
538407 - PCI AER code introduced a compile problem in powerpc
538484 - gfs2 rename rgrp lock issue
539240 - glock_workqueue -- glock ref count via gfs2_glock_hold
539521 - Call trace error display when resume from suspend to disk (ide block) - pvclock related
540811 - [RHEL5 Xen]: PV guest crash on poweroff
541149 - CVE-2009-4026 CVE-2009-4027 kernel: mac80211: fix spurious delBA handling
541213 - Possible access to invalid memory
541325 - [RHEL5]: A new xenfb thread is created on every save/restore
541953 - kernel panic when doing cpu offline/online frequently on hp-dl785g5-01.rhts.eng.bos.redhat.com
541956 - kernel: sleeping vfs_check_frozen in called in atomic context from do_wp_page [rhel-5.5]
542593 - recursive lock of devlist_mtx
542746 - [QLogic 5.5 feat] netxen P3 - updates from 2.6.32
542834 - [QLogic 5.5 bug] qla2xxx - further testing updates for 5.5
543057 - [QLogic 5.5 bug] qla2xxx - testing updates #3
543270 - Fix deadlock in multipath when removing a device
543307 - Lock snapshot while reporting status
544138 - PTRACE_KILL hangs in 100% cpu loop
544349 - RHEL5: fallocate on XFS returns incorrect value on ENOSPC
544417 - cifs: possible NULL pointer dereference in mount-time DFS referral chasing code
544448 - Strange vm performance degradation moving 32 bit app from RHEL 4.6 32bit to 5.4 64bit
545121 - possible null pointer dereference in ieee80211_change_iface
545135 - [Broadcom 5.5 feat] Add support for 57765 asic revs
545612 - Please implement upstream fix for potential filesystem corruption bug
545899 - rtl8180 shows 0% signal strength while connected
546281 - wireless: report reasonable bitrate for MCS rates through wext
546326 - bnx2: panic in bnx2_free_tx_skbs() because of wrong frags index
546624 - RFE: Add debug to bonding driver as module option
547251 - CVE-2009-4307 kernel: ext4: avoid divide by zero when trying to mount a corrupted file system
547762 - PCI AER: HEST FIRMWARE FIRST support
547980 - [SR-IOV] VF can not be enabled in Dom0
548079 - [RHEL5.4][REGRESSION] iptables --reject-with tcp-reset doesn't work
548565 - aio: eventfd support introduced a 0.5% performance regression
549397 - I/O errors while accessing loop devices or file-based Xen images from GFS volume after Update from RHEL 5.3 to 5.4
549460 - [Emulex 5.5 bug] Multiple bug fixes for be2net
549465 - Cannot run NVIDIA display driver on 32-bit RHEL 5.3 or 5.4
549750 - audit rule with directory auditing crashes the kernel
549763 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63 FC/FCoE
550014 - khungtaskd not stopped during suspend
550148 - [Cisco 5.5 bug] Update enic driver to version 1.1.0.241a
552675 - ipmi_watchdog deadlock
553324 - [RHEL5 Xen]: Cpu frequency scaling is broken on Intel
553447 - GFS2: fatal: filesystem consistency error in gfs2_ri_update
553670 - filesystem mounted with ecryptfs_xattr option could not be written
554078 - Lost the network in a KVM VM on top of 5.4
554545 - [Emulex 5.5 bug] Update be2iscsi driver for bugfixes
555120 - dm-raid1: dmsetup stuck at suspending failed mirror device
555171 - dm-raid1: kernel panic when bio on recovery failed region is released
555604 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.1p FC/FCoE
557095 - kvm pvclock on i386 suffers from double registering
557109 - [5.4] VLAN performance issue with 10gbE Mellanox NICs
557172 - inserting w83627hf kernel module results in panic
557792 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.2p FC/FCoE
557974 - e1000e: wol is broken on 2.6.18-185.el5
558809 - e1000 & e1000e: Memory corruption/paging error when tx hang occurs
559329 - [sky2] initial carrier state is always on
559410 - posix_fadvise() handles its arguments incorrectly in 32-bit compat mode.
559711 - Add wireless fixes from 2.6.32.y tree
560944 - kernel panic during modprobe smsc47m1
561076 - igb: fix warning in drivers/net/igb/igb_ethtool.c:2090
561322 - [Emulex 5.5 bug] be2net bug fixes for be3 hardware from Alpha testing
561578 - [Broadcom 5.5 feat] Update bnx2 firmware
562006 - WARNING: APIC timer calibration may be wrong
562947 - late breaking CIFS patches for RHEL5.5
564145 - [Emulex 5.5 bug] Fix scsi eh callouts and add support for new chip to be2iscsi driver
564399 - f71805f hwmon driver passes '&sio_data' to platform_device_add_data()
564506 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.3p FC/FCoE
565494 - "dmraid -ay" panics kernel
565594 - [Cisco 5.5 bug] Update fnic to 1.4.0.98 to fix FIP crash/hang issues
565964 - [Broadcom 5.5 bug] tg3: 5717 and 57765 asic revs can panic under load
565965 - [Broadcom 5.5 bug] tg3: Race condition - performance / panic with 57765 devices
566016 - [Broadcom 5.5 bug] tg3: 57765 LED does not work correctly
566221 - GFS2: Use correct GFP for alloc page on write
566696 - iwl5000/5300 fail to transmit data on N-only netwrok
567718 - [Emulex 5.5 bug] be2net bug fixes for be3 hardware from Alpha testing
568040 - network does not work with rhel 5.5 snap1 x64 server, xen kernel, and r8169 driver
568153 - ixgbe: stop unmapping DMA buffers too early
569610 - GFS2 - fiemap - Kernel BUG at fs/gfs2/bmap.c:433
570814 - Disk performance regression in CFQ
570863 - CVE-2010-0727 bug in GFS/GFS2 locking code leads to dos
571818 - Iozone Outcache testing has a greater than 5 % performance regression on reads
573098 - [5.4] VLAN performance issue with 10gbE Mellanox NICs


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/