Skip to navigation

Security Advisory Moderate: kernel security and bug fix update

Advisory: RHSA-2010:0839-1
Type: Security Advisory
Severity: Moderate
Issued on: 2010-11-09
Last updated on: 2010-11-09
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2010-3066
CVE-2010-3067
CVE-2010-3078
CVE-2010-3086
CVE-2010-3477

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A NULL pointer dereference flaw was found in the io_submit_one() function
in the Linux kernel asynchronous I/O implementation. A local, unprivileged
user could use this flaw to cause a denial of service. (CVE-2010-3066,
Moderate)

* A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel
XFS file system implementation. A data structure in xfs_ioc_fsgetxattr()
was not initialized properly before being copied to user-space. A local,
unprivileged user could use this flaw to cause an information leak.
(CVE-2010-3078, Moderate)

* The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,
and futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a
NOP instruction. A local, unprivileged user could use this flaw to cause a
denial of service. (CVE-2010-3086, Moderate)

* A flaw was found in the tcf_act_police_dump() function in the Linux
kernel network traffic policing implementation. A data structure in
tcf_act_police_dump() was not initialized properly before being copied to
user-space. A local, unprivileged user could use this flaw to cause an
information leak. (CVE-2010-3477, Moderate)

* A missing upper bound integer check was found in the sys_io_submit()
function in the Linux kernel asynchronous I/O implementation. A local,
unprivileged user could use this flaw to cause an information leak.
(CVE-2010-3067, Low)

Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,
CVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting
CVE-2010-3078.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-194.26.1.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3f475ddfcf08bfef82b6f65174790016
SHA-256: 8a6775a9d5c9d8cd0acce190a3ae08fbe1d450430ade7f25b98c6c22e7a3defa
 
IA-32:
kernel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 13a74ddd24c1e238b6be0866c2958a4e
SHA-256: a2f3f03facef62d0f2cda3929d3bd11a32f0b0f66cf9e5ed552b63392c659a02
kernel-PAE-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6d335ce30fe385173bc2f4a2c5d6326e
SHA-256: 64193f8d3966add5e9fb17c973a630c1ffa91fdc164b53a1f21a78936d176f64
kernel-PAE-devel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 014ee2933b247b2e2d7fef9f20f8e75e
SHA-256: 453f999f118ebd452e510631338dd7e53b927d7c6e510aa92888babbdfdcd75f
kernel-debug-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 83a9bdeed9d639c8c44e8dba800445e6
SHA-256: 4f69eb45e8a8f76679ccb77d9720fc1897430aff0ac4cf83ee90a781b4e6249d
kernel-debug-devel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 061d4ed7553eb9ebeb7ef4979a03b23b
SHA-256: 1d1dd271ff1681fcbf7b265697b1bdb957796cefc7b53735a24cfeb494081a0e
kernel-devel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b1b385c57109623e55eaadda010b197f
SHA-256: aa70ddbe8997d9cea4974d896d0a44a9b9c2b6309fcbf28b3a82c12748679b40
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2c897f1262fc52f52e1f377189a39f18
SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: c3cf93e395e91c381f7b5a7d3b9bfbde
SHA-256: 947a9da5abe43c3ab2bbb0d8f92f3c38814afdb3a08b8966687bc5ee3ddfdb18
kernel-xen-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 942d42dddfca67f2241456d5621ba75e
SHA-256: bf1a7774099783d7c3457d4ff042509e543adbadb609c465951748260b82a3e8
kernel-xen-devel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6157af017a6c098dfa87cd58fc4786fc
SHA-256: 72b4129275ba77f4064ba5aa080cce283c4e3f7890c0b05e922e34857707272b
 
IA-64:
kernel-2.6.18-194.26.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cbe84015e3cc8dabce1f7b0eee14dcf0
SHA-256: 6f22cc9cba6d921b85da61b9c14ce3582f173589e70bdc45212b20efc0144180
kernel-debug-2.6.18-194.26.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 293b1004a51442ad5a4375274e1e08ce
SHA-256: 70bc3103f0dc2ff13c7c9a3f78b9a853adbf6b73ee0e1e08c409a1e33b903ac9
kernel-debug-devel-2.6.18-194.26.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 52db05a618836289b820541bb347d40a
SHA-256: 157e073bc630aaa9731d6e05857994f4d0899baa90f6277d6ce1a793cb2b8cc6
kernel-devel-2.6.18-194.26.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: de81af46866a3cb270fd65bdf335a92d
SHA-256: 149783b945f0cb62931f98097dccefdc2c86bd9fce3f934666ace74526bc106b
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2c897f1262fc52f52e1f377189a39f18
SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b46c5112f081c9a1288c0cdcd13581ef
SHA-256: a942794ab690b485d5d8cfd3d042ddb8d7bd13e3a4e5a13041613b5acb7f7153
kernel-xen-2.6.18-194.26.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: fcb33f9570e98613981f6ca28f50e8e8
SHA-256: 8a022543ca91ceb992df74dd58234f72d339e4b18043291974ab5019ddf5d7d8
kernel-xen-devel-2.6.18-194.26.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7e9c3f8f006e246011189762068aa4ca
SHA-256: 907b44e8f3073e2678df9aaf83d72b94fd41b57f7fd123631602cdc1cc8288aa
 
PPC:
kernel-2.6.18-194.26.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6e6d9c1eecc5135343468f10084bfb77
SHA-256: 204497cb51be7e0a7588e8aad056313246598cba52bd99f0cf53c8913fe8450d
kernel-debug-2.6.18-194.26.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 815f2516d4d42ceb893df3d7be83c562
SHA-256: 0dbf825842be0cf357f999d5905a6e974146eddeda176921cc5076339057ea35
kernel-debug-devel-2.6.18-194.26.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 25a04926fba8347e51003a90580c3121
SHA-256: 1f6c9dfcd698910c9a08c569d48c86031b13c3bbdf0c73f9fb5e1f22d70eba45
kernel-devel-2.6.18-194.26.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 616709812d71b1141743f4299d9d7329
SHA-256: b6783d5d266152457bc8a99981384e4a53b4ba0743652f3e8b399f5b7da2d78e
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2c897f1262fc52f52e1f377189a39f18
SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 443841b966d742168f8e39f274aa7130
SHA-256: 150cfe0d93b09323247a4a16fb041920f940945d26bc884cca90780db863d5a2
kernel-headers-2.6.18-194.26.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9bef2f8d8da640836c42c1f0d4b09aae
SHA-256: 8a43af8f850492798edd82563cba54f711d35c33017daa9e5be969ce479351fe
kernel-kdump-2.6.18-194.26.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ba0923d48f50331d871d09c1a702f8e8
SHA-256: c7fef8d4cbde0c6c69b2b0d2a4a7187c051e6d160d872091f9f8680d7ba91cec
kernel-kdump-devel-2.6.18-194.26.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e21320674c4840dec0beeab6e53299da
SHA-256: e69cc89d507eda00e4cc0e2eded54eabe103a13ba957d39e2c2b599e4a02aeb6
 
s390x:
kernel-2.6.18-194.26.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: e007c6ad8cf0320b24da8c40d8b91c7d
SHA-256: 01ea46d06923c815b1f788f0cce2a9307f8db79b2dff198256da52b1b9ebe16b
kernel-debug-2.6.18-194.26.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2aedefd7022babb0fa309b0b922d6c6c
SHA-256: 31a93c10e6cc68d1bac07793df524aeaa50e80d55a05a179afd91153bfb3bab0
kernel-debug-devel-2.6.18-194.26.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 131441ddfc88b0f97da3f5c1fec3eb9a
SHA-256: cad96ea2aa26daa15631ad651fc85454309cdd589fb547303c3cdeb86a599a1e
kernel-devel-2.6.18-194.26.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4aec4b4d86a54a89c4ea0c1b141d58da
SHA-256: ecc131158be916e460cc6adbbae11fee471349219f66fb99ece86e4f9d8d1ed1
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2c897f1262fc52f52e1f377189a39f18
SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8e6b8191cb313c228434b8f58193fcf3
SHA-256: a04045b1c10c4121e1f8f2656ca47520899e2b5e4c9a0f06a0607d05d0f485e1
kernel-kdump-2.6.18-194.26.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: df4e493c1f6341b146e7897250515b8a
SHA-256: 0c349d7009fe0b568df35e33064ef5953daf7b7ff5c737b3b22251faae640e3b
kernel-kdump-devel-2.6.18-194.26.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1bedc08a8a0c414e7da55c45f2599f69
SHA-256: 20d8973024577bcb94b5ae88c84e2fdd0c4b73371eabd1d39848c365095ea89d
 
x86_64:
kernel-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bef9134428f63220c7c129412aa79f59
SHA-256: 77643aa9c5b99df8a3f871d81536faccaa4b7d2a8f11351357d016af4de87a0d
kernel-debug-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bdba7b904f19c081a4d4671c17bb4249
SHA-256: 5aa94c0d542a213715f94734df466ce5c0e540838d226e25ba0d2b7d6247e818
kernel-debug-devel-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b92b8a8edd9c517d511fe3c4814356a
SHA-256: 877611c028f534d018579c878e0d4679983e62ba53ec5d2f0228f00b8132e966
kernel-devel-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6baefd0a2513bfda7be2d1c74196c756
SHA-256: 238a25448ccd2d8d671d06c994142de8305af1daac1923f8ed4fb2e9f01a24a5
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2c897f1262fc52f52e1f377189a39f18
SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c8dc7d85a161935d8c00e7bbd7cff630
SHA-256: 3d0544bb937b0a3a9d3827795d67614f9f02e12d45ae5b11df564418f5c85322
kernel-xen-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ddeeadddb1ce64f8470a440ae87d8666
SHA-256: 9721aef0f6bfeedd4b089a6fccbfa432f65f7089dea4cbf21fd2b0f4ef6fab70
kernel-xen-devel-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 91e9cea30eba38ae1598711db3644740
SHA-256: 4a55791bca602738b57f08805d236cbe2159b44c97b72d394ea18f939fa39f2a
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-194.26.1.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3f475ddfcf08bfef82b6f65174790016
SHA-256: 8a6775a9d5c9d8cd0acce190a3ae08fbe1d450430ade7f25b98c6c22e7a3defa
 
IA-32:
kernel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 13a74ddd24c1e238b6be0866c2958a4e
SHA-256: a2f3f03facef62d0f2cda3929d3bd11a32f0b0f66cf9e5ed552b63392c659a02
kernel-PAE-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6d335ce30fe385173bc2f4a2c5d6326e
SHA-256: 64193f8d3966add5e9fb17c973a630c1ffa91fdc164b53a1f21a78936d176f64
kernel-PAE-devel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 014ee2933b247b2e2d7fef9f20f8e75e
SHA-256: 453f999f118ebd452e510631338dd7e53b927d7c6e510aa92888babbdfdcd75f
kernel-debug-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 83a9bdeed9d639c8c44e8dba800445e6
SHA-256: 4f69eb45e8a8f76679ccb77d9720fc1897430aff0ac4cf83ee90a781b4e6249d
kernel-debug-devel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 061d4ed7553eb9ebeb7ef4979a03b23b
SHA-256: 1d1dd271ff1681fcbf7b265697b1bdb957796cefc7b53735a24cfeb494081a0e
kernel-devel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b1b385c57109623e55eaadda010b197f
SHA-256: aa70ddbe8997d9cea4974d896d0a44a9b9c2b6309fcbf28b3a82c12748679b40
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2c897f1262fc52f52e1f377189a39f18
SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: c3cf93e395e91c381f7b5a7d3b9bfbde
SHA-256: 947a9da5abe43c3ab2bbb0d8f92f3c38814afdb3a08b8966687bc5ee3ddfdb18
kernel-xen-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 942d42dddfca67f2241456d5621ba75e
SHA-256: bf1a7774099783d7c3457d4ff042509e543adbadb609c465951748260b82a3e8
kernel-xen-devel-2.6.18-194.26.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6157af017a6c098dfa87cd58fc4786fc
SHA-256: 72b4129275ba77f4064ba5aa080cce283c4e3f7890c0b05e922e34857707272b
 
x86_64:
kernel-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bef9134428f63220c7c129412aa79f59
SHA-256: 77643aa9c5b99df8a3f871d81536faccaa4b7d2a8f11351357d016af4de87a0d
kernel-debug-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bdba7b904f19c081a4d4671c17bb4249
SHA-256: 5aa94c0d542a213715f94734df466ce5c0e540838d226e25ba0d2b7d6247e818
kernel-debug-devel-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b92b8a8edd9c517d511fe3c4814356a
SHA-256: 877611c028f534d018579c878e0d4679983e62ba53ec5d2f0228f00b8132e966
kernel-devel-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6baefd0a2513bfda7be2d1c74196c756
SHA-256: 238a25448ccd2d8d671d06c994142de8305af1daac1923f8ed4fb2e9f01a24a5
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2c897f1262fc52f52e1f377189a39f18
SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c8dc7d85a161935d8c00e7bbd7cff630
SHA-256: 3d0544bb937b0a3a9d3827795d67614f9f02e12d45ae5b11df564418f5c85322
kernel-xen-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ddeeadddb1ce64f8470a440ae87d8666
SHA-256: 9721aef0f6bfeedd4b089a6fccbfa432f65f7089dea4cbf21fd2b0f4ef6fab70
kernel-xen-devel-2.6.18-194.26.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 91e9cea30eba38ae1598711db3644740
SHA-256: 4a55791bca602738b57f08805d236cbe2159b44c97b72d394ea18f939fa39f2a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

619365 - [LSI 5.6 feat] update megaraid_sas to version 4.31 [rhel-5.5.z]
628889 - [NetApp 5.6 bug] RHEL NFS clients disconnected from NetApp NFSv4 shares with: v4 server returned a bad sequence-id error! [rhel-5.5.z]
629241 - kernel: thinkpad-acpi: lock down video output state access [rhel-5.5.z]
629441 - CVE-2010-3067 kernel: do_io_submit() infoleak
629861 - Reserve PNP enumerated system board iomem resources [rhel-5.5.z]
630540 - [RHEL5.5] soft lockup on vlan with bonding in balance-alb mode [rhel-5.5.z]
630804 - CVE-2010-3078 kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
630989 - HVM guest w/ UP and PV driver hangs after live migration or suspend/resume [rhel-5.5.z]
631716 - CVE-2010-3066 kernel: io_submit_one() NULL ptr deref
632255 - RHEVH - Vdsm - Storage: lvextend fails during VMs intensive power up [rhel-5.5.z]
633170 - CVE-2010-3086 kernel panic via futex
634976 - icmpmsg_put() in kernel writes beyond array bounds, leading to junk in /proc/net/snmp and memory corruption [rhel-5.5.z]
634977 - Spinning up disk for device on standby path causing long boot up [rhel-5.5.z]
636386 - CVE-2010-3477 kernel: net/sched/act_police.c infoleak
637069 - time drift with VXTIME_PMTMR mode in case of early / short real ticks [rhel-5.5.z]
637206 - system crashes due to corrupt net_device_wrapper structure [rhel-5.5.z]
637220 - [RHEL5 IA64 XEN] netfront driver: alloc_dev: Private data too big. [rhel-5.5.z]
637727 - lpfc ioctl crash in lpfc_nlp_put() [rhel-5.5.z]
638579 - dasd: fix race between tasklet and dasd_sleep_on [rhel-5.5.z]
638866 - [5.5] a race in pid generation that causes pids to be reused immediately. [rhel-5.5.z]
639073 - GFS1 vs GFS2 performance issue [rhel-5.5.z]
640973 - Bonded interface doesn't issue IGMP report (join) on slave interface during failover [rhel-5.5.z]
641915 - backward time drift in RHEL4, 5, and 6 Xen HVM guests that use PM timer / bug in hypervisor routine pmt_update_time() [rhel-5.5.z]
642465 - CVE-2010-2963 kernel: v4l: VIDIOCSMICROCODE arbitrary write
642470 - CVE-2010-2963 kernel: v4l: VIDIOCSMICROCODE arbitrary write [rhel-5.5.z]
642628 - [5.6 FEAT] NFSv4 remove does not wait for close. Silly rename [rhel-5.5.z]
643135 - [NetApp/QLogic 5.5.z bug] Kernel panic hit on RHEL 5.5 QLogic FC host at qla2x00_abort_fcport_cmds [rhel-5.5.z]
643571 - [EMC 5.6 bug] severe fragmentation with xfs file system [rhel-5.5.z]
643806 - Add OFED-1.5.2 patch to increase log_mtts_per_seg for 5.5z-stream [rhel-5.5.z]
644822 - 802.3ad link aggregation won't work with newer (2.6.194-8.1.el5) kernel and ixgbe driver [rhel-5.5.z]
647601 - Direct IO write to a file on an nfs mount does not work [rhel-5.5.z]


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/