Skip to navigation

Security Advisory Important: Red Hat Enterprise Linux 4.9 kernel security and bug fix update

Advisory: RHSA-2011:0263-1
Type: Security Advisory
Severity: Important
Issued on: 2011-02-16
Last updated on: 2011-02-16
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2010-4527
CVE-2010-4655
CVE-2011-0521

Details

Updated kernel packages that fix three security issues, hundreds of bugs,
and add numerous enhancements are now available as part of the ongoing
support and maintenance of Red Hat Enterprise Linux version 4. This is the
ninth regular update.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A buffer overflow flaw was found in the load_mixer_volumes() function in
the Linux kernel's Open Sound System (OSS) sound driver. On 64-bit PowerPC
systems, a local, unprivileged user could use this flaw to cause a denial
of service or escalate their privileges. (CVE-2010-4527, Important)

* A missing boundary check was found in the dvb_ca_ioctl() function in the
Linux kernel's av7110 module. On systems that use old DVB cards that
require the av7110 module, a local, unprivileged user could use this flaw
to cause a denial of service or escalate their privileges. (CVE-2011-0521,
Important)

* A missing initialization flaw was found in the ethtool_get_regs()
function in the Linux kernel's ethtool IOCTL handler. A local user who has
the CAP_NET_ADMIN capability could use this flaw to cause an information
leak. (CVE-2010-4655, Low)

Red Hat would like to thank Dan Rosenberg for reporting CVE-2010-4527, and
Kees Cook for reporting CVE-2010-4655.

These updated kernel packages also fix hundreds of bugs and add numerous
enhancements. For details on individual bug fixes and enhancements included
in this update, refer to the Red Hat Enterprise Linux 4.9 Release Notes,
linked to in the References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues and add these enhancements. The system must
be rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
kernel-2.6.9-100.EL.src.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2d350c4c1327c94c55083eb7a6ed7d11
SHA-256: f0f562b80358b2ceaf0f2a0200cee5b660edcd6b5859fde12bed5fe91c058bf5
 
IA-32:
kernel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 48fb47263d8906bc8836fc47bdc689f4
SHA-256: 8aba21aab1e4665a1514c15218755948d732de8a24a7bd954b1008af4f91ff37
kernel-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: a9b07a8c0d88302b096417157208086d
SHA-256: 2272788253787de15c4a179ee40c08301dddefecc47c19f459df28310ddcf64c
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-hugemem-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: f91670b5b0227d3e7771669cb74cd84e
SHA-256: 1cdc6901393a1d07649e97c941242eb0a4aa5754afd2ca513ad2fb69f92b505d
kernel-hugemem-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 0c145c30e654088e145b586f47950af4
SHA-256: 3975c55320d158bec9aba72db9ded600e46e73473f03d6e1cd490d8ebb7e1125
kernel-smp-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: bd752ad1404eed20512e5fad8934797f
SHA-256: cc443af8726ac5b0d24a1b0c8d8ea62c4acd400828b0d08464133aea7020c760
kernel-smp-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: dbaf9e41815e0d0741c67baa008084fc
SHA-256: b5b8682aceee1b7f507bf6b40269fe8432047d4991480abc95db6a8078f3af59
kernel-xenU-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 01d8ced99485bd6511cb1d68a8b45d48
SHA-256: e211eb36062e497fbdf752853d5bd39ea4b2d6410be5c2331a5b85fbedf7dcd1
kernel-xenU-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: df6815450e7133d437140ebe91d5d9de
SHA-256: 7de4ffd2dd319fe9b17f2af41d1a6f60168b211b39faa63c7e1aa1c41189b268
 
x86_64:
kernel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 729b54159c4b2f4d133dece4fcebcac0
SHA-256: 1dfca0b2a1c441c19130713323725a35761c4f4a96896576da0601eb3fd5dcf2
kernel-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d8e031c8c3f94204b41c4d5c9d1f61ef
SHA-256: 4c2f57d9291c897984fe756ee6cf70b07236b83cbe6e7b393ffcabffd4f88fd1
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-largesmp-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 56b1921f20ca7c945c8797dc027975fc
SHA-256: 72a3a704d5c54d504fa1a006e32ae636641034e1a91a54ead2adf05e6853c7b3
kernel-largesmp-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: f79106292a3ae3631b48edd4749dff0d
SHA-256: 74228d183503d10ee84caab393c0e3f6d64ad0a7dea12d9c0ccdcead805f2b01
kernel-smp-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d0b492a990ee1a6157400cdbc6c6c155
SHA-256: 796efdf9d0a5716f1360ec6b3a6805ad3bdc302eea78213514c72abb11b12ced
kernel-smp-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3bc0dfed8e1948f3cbf50cf162dc0984
SHA-256: 05e36347b7c2985c5c7d03b600fffd25085616a1eef29a732f3b49ae2b7765fe
kernel-xenU-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74aae8c65c17300bc497951061a2740f
SHA-256: 3333612b6c964e5a5e7aeca500824baffb4f5eccc238907ab57ec9162edacd86
kernel-xenU-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3c38ef997d0d114d0224ebdebd6b6bcb
SHA-256: f1f80ea70c8cf81aea351bbb76935e79f7cefcd6262762c545b5eec786133db1
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
kernel-2.6.9-100.EL.src.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2d350c4c1327c94c55083eb7a6ed7d11
SHA-256: f0f562b80358b2ceaf0f2a0200cee5b660edcd6b5859fde12bed5fe91c058bf5
 
IA-32:
kernel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 48fb47263d8906bc8836fc47bdc689f4
SHA-256: 8aba21aab1e4665a1514c15218755948d732de8a24a7bd954b1008af4f91ff37
kernel-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: a9b07a8c0d88302b096417157208086d
SHA-256: 2272788253787de15c4a179ee40c08301dddefecc47c19f459df28310ddcf64c
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-hugemem-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: f91670b5b0227d3e7771669cb74cd84e
SHA-256: 1cdc6901393a1d07649e97c941242eb0a4aa5754afd2ca513ad2fb69f92b505d
kernel-hugemem-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 0c145c30e654088e145b586f47950af4
SHA-256: 3975c55320d158bec9aba72db9ded600e46e73473f03d6e1cd490d8ebb7e1125
kernel-smp-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: bd752ad1404eed20512e5fad8934797f
SHA-256: cc443af8726ac5b0d24a1b0c8d8ea62c4acd400828b0d08464133aea7020c760
kernel-smp-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: dbaf9e41815e0d0741c67baa008084fc
SHA-256: b5b8682aceee1b7f507bf6b40269fe8432047d4991480abc95db6a8078f3af59
kernel-xenU-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 01d8ced99485bd6511cb1d68a8b45d48
SHA-256: e211eb36062e497fbdf752853d5bd39ea4b2d6410be5c2331a5b85fbedf7dcd1
kernel-xenU-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: df6815450e7133d437140ebe91d5d9de
SHA-256: 7de4ffd2dd319fe9b17f2af41d1a6f60168b211b39faa63c7e1aa1c41189b268
 
IA-64:
kernel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 89437783e079e20ab50367f845f5d89e
SHA-256: 76463e28bf66b8c52014b02a13899e9a202c23d66485d74512fec6d7b3894d16
kernel-devel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ba139e66d10b34fa8a3c30abfd50e015
SHA-256: bf8b8a289319612b8fbc890c3e78d8d880713975147de29f9a68511fb52359ff
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-largesmp-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1d5b1b263b646cef05fd3c23199de6ec
SHA-256: cebc30aeb5f6074328f4133e73c6617214500675e1ddf2dec6baabf0538a60ac
kernel-largesmp-devel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 81fb23e790101c7319f31c0687255a51
SHA-256: 94e7cd4231fb58358eed846a57d535931679f1c1b50d73543cf9d27ddd54ab34
 
PPC:
kernel-2.6.9-100.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2d3c306b1339e27c78eb0abc23cc7605
SHA-256: 852b72833cd7d72a2596cc2f62f3a3e50bd8075cc506c1f22d82f6346621ac46
kernel-2.6.9-100.EL.ppc64iseries.rpm
File outdated by:  RHBA-2011:1796
    MD5: 63133e3eb0d7e9b689207204ed256ed4
SHA-256: c55242b50e791c44f4dd2c290835e4f118ceb1a5a89b04768af022117c43e23c
kernel-devel-2.6.9-100.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 8e6f4a39e1f672198ee48e7968e97663
SHA-256: e2720af560b4a4da08409d83d55fe3d17e4493798548700b08823d74dc5b7943
kernel-devel-2.6.9-100.EL.ppc64iseries.rpm
File outdated by:  RHBA-2011:1796
    MD5: e1e42015f70eb32815e00954ce61550a
SHA-256: 29bdf73bf5b28b865ef9395e29e4e167eed3b79e5b018f9672547cbc494069b3
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-largesmp-2.6.9-100.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: aa311bb14fe225f12fced0690feec5fa
SHA-256: 535a977699ec1e2cccbd194995669ca2a08ae4cf8cd3024eb9e33a811f3b644c
kernel-largesmp-devel-2.6.9-100.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: e8223049a8c525d306b5080ea45f53be
SHA-256: 2e6631cd03c082afe31da21c7d6c0bfe73ea26f817276f2810ca842cc94d6ac4
 
s390:
kernel-2.6.9-100.EL.s390.rpm
File outdated by:  RHBA-2011:1796
    MD5: 53e418f0c2459339dd0c1f3c1036f70f
SHA-256: 73586356c8b37dd1e8afda47ef08a235a17b141cd17f7c7340ad6a0447d32fa3
kernel-devel-2.6.9-100.EL.s390.rpm
File outdated by:  RHBA-2011:1796
    MD5: 9dcb204ffb1699fe5a40f43f0ccf7421
SHA-256: a98e37f5ba4e4d028b4ba70aef0ba944033885585fdc37f4cb9a02c3336ef827
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
 
s390x:
kernel-2.6.9-100.EL.s390x.rpm
File outdated by:  RHBA-2011:1796
    MD5: dcab8eb22cffce7f1d81609d1a19367e
SHA-256: 33ceda7f6bac6ea8357bc7c0f2152bd87d5b83e830bd025c1189cd49c393a5c7
kernel-devel-2.6.9-100.EL.s390x.rpm
File outdated by:  RHBA-2011:1796
    MD5: c723ca81a2d788acb586e4d6831b680f
SHA-256: eff83a3c1cc9c2f1a3efc80dd0dadb62765eeb6965a4bdfbc58937c27442c4c3
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
 
x86_64:
kernel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 729b54159c4b2f4d133dece4fcebcac0
SHA-256: 1dfca0b2a1c441c19130713323725a35761c4f4a96896576da0601eb3fd5dcf2
kernel-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d8e031c8c3f94204b41c4d5c9d1f61ef
SHA-256: 4c2f57d9291c897984fe756ee6cf70b07236b83cbe6e7b393ffcabffd4f88fd1
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-largesmp-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 56b1921f20ca7c945c8797dc027975fc
SHA-256: 72a3a704d5c54d504fa1a006e32ae636641034e1a91a54ead2adf05e6853c7b3
kernel-largesmp-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: f79106292a3ae3631b48edd4749dff0d
SHA-256: 74228d183503d10ee84caab393c0e3f6d64ad0a7dea12d9c0ccdcead805f2b01
kernel-smp-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d0b492a990ee1a6157400cdbc6c6c155
SHA-256: 796efdf9d0a5716f1360ec6b3a6805ad3bdc302eea78213514c72abb11b12ced
kernel-smp-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3bc0dfed8e1948f3cbf50cf162dc0984
SHA-256: 05e36347b7c2985c5c7d03b600fffd25085616a1eef29a732f3b49ae2b7765fe
kernel-xenU-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74aae8c65c17300bc497951061a2740f
SHA-256: 3333612b6c964e5a5e7aeca500824baffb4f5eccc238907ab57ec9162edacd86
kernel-xenU-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3c38ef997d0d114d0224ebdebd6b6bcb
SHA-256: f1f80ea70c8cf81aea351bbb76935e79f7cefcd6262762c545b5eec786133db1
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
kernel-2.6.9-100.EL.src.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2d350c4c1327c94c55083eb7a6ed7d11
SHA-256: f0f562b80358b2ceaf0f2a0200cee5b660edcd6b5859fde12bed5fe91c058bf5
 
IA-32:
kernel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 48fb47263d8906bc8836fc47bdc689f4
SHA-256: 8aba21aab1e4665a1514c15218755948d732de8a24a7bd954b1008af4f91ff37
kernel-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: a9b07a8c0d88302b096417157208086d
SHA-256: 2272788253787de15c4a179ee40c08301dddefecc47c19f459df28310ddcf64c
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-hugemem-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: f91670b5b0227d3e7771669cb74cd84e
SHA-256: 1cdc6901393a1d07649e97c941242eb0a4aa5754afd2ca513ad2fb69f92b505d
kernel-hugemem-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 0c145c30e654088e145b586f47950af4
SHA-256: 3975c55320d158bec9aba72db9ded600e46e73473f03d6e1cd490d8ebb7e1125
kernel-smp-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: bd752ad1404eed20512e5fad8934797f
SHA-256: cc443af8726ac5b0d24a1b0c8d8ea62c4acd400828b0d08464133aea7020c760
kernel-smp-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: dbaf9e41815e0d0741c67baa008084fc
SHA-256: b5b8682aceee1b7f507bf6b40269fe8432047d4991480abc95db6a8078f3af59
kernel-xenU-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 01d8ced99485bd6511cb1d68a8b45d48
SHA-256: e211eb36062e497fbdf752853d5bd39ea4b2d6410be5c2331a5b85fbedf7dcd1
kernel-xenU-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: df6815450e7133d437140ebe91d5d9de
SHA-256: 7de4ffd2dd319fe9b17f2af41d1a6f60168b211b39faa63c7e1aa1c41189b268
 
IA-64:
kernel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 89437783e079e20ab50367f845f5d89e
SHA-256: 76463e28bf66b8c52014b02a13899e9a202c23d66485d74512fec6d7b3894d16
kernel-devel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ba139e66d10b34fa8a3c30abfd50e015
SHA-256: bf8b8a289319612b8fbc890c3e78d8d880713975147de29f9a68511fb52359ff
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-largesmp-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1d5b1b263b646cef05fd3c23199de6ec
SHA-256: cebc30aeb5f6074328f4133e73c6617214500675e1ddf2dec6baabf0538a60ac
kernel-largesmp-devel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 81fb23e790101c7319f31c0687255a51
SHA-256: 94e7cd4231fb58358eed846a57d535931679f1c1b50d73543cf9d27ddd54ab34
 
x86_64:
kernel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 729b54159c4b2f4d133dece4fcebcac0
SHA-256: 1dfca0b2a1c441c19130713323725a35761c4f4a96896576da0601eb3fd5dcf2
kernel-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d8e031c8c3f94204b41c4d5c9d1f61ef
SHA-256: 4c2f57d9291c897984fe756ee6cf70b07236b83cbe6e7b393ffcabffd4f88fd1
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-largesmp-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 56b1921f20ca7c945c8797dc027975fc
SHA-256: 72a3a704d5c54d504fa1a006e32ae636641034e1a91a54ead2adf05e6853c7b3
kernel-largesmp-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: f79106292a3ae3631b48edd4749dff0d
SHA-256: 74228d183503d10ee84caab393c0e3f6d64ad0a7dea12d9c0ccdcead805f2b01
kernel-smp-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d0b492a990ee1a6157400cdbc6c6c155
SHA-256: 796efdf9d0a5716f1360ec6b3a6805ad3bdc302eea78213514c72abb11b12ced
kernel-smp-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3bc0dfed8e1948f3cbf50cf162dc0984
SHA-256: 05e36347b7c2985c5c7d03b600fffd25085616a1eef29a732f3b49ae2b7765fe
kernel-xenU-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74aae8c65c17300bc497951061a2740f
SHA-256: 3333612b6c964e5a5e7aeca500824baffb4f5eccc238907ab57ec9162edacd86
kernel-xenU-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3c38ef997d0d114d0224ebdebd6b6bcb
SHA-256: f1f80ea70c8cf81aea351bbb76935e79f7cefcd6262762c545b5eec786133db1
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
kernel-2.6.9-100.EL.src.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2d350c4c1327c94c55083eb7a6ed7d11
SHA-256: f0f562b80358b2ceaf0f2a0200cee5b660edcd6b5859fde12bed5fe91c058bf5
 
IA-32:
kernel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 48fb47263d8906bc8836fc47bdc689f4
SHA-256: 8aba21aab1e4665a1514c15218755948d732de8a24a7bd954b1008af4f91ff37
kernel-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: a9b07a8c0d88302b096417157208086d
SHA-256: 2272788253787de15c4a179ee40c08301dddefecc47c19f459df28310ddcf64c
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-hugemem-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: f91670b5b0227d3e7771669cb74cd84e
SHA-256: 1cdc6901393a1d07649e97c941242eb0a4aa5754afd2ca513ad2fb69f92b505d
kernel-hugemem-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 0c145c30e654088e145b586f47950af4
SHA-256: 3975c55320d158bec9aba72db9ded600e46e73473f03d6e1cd490d8ebb7e1125
kernel-smp-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: bd752ad1404eed20512e5fad8934797f
SHA-256: cc443af8726ac5b0d24a1b0c8d8ea62c4acd400828b0d08464133aea7020c760
kernel-smp-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: dbaf9e41815e0d0741c67baa008084fc
SHA-256: b5b8682aceee1b7f507bf6b40269fe8432047d4991480abc95db6a8078f3af59
kernel-xenU-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 01d8ced99485bd6511cb1d68a8b45d48
SHA-256: e211eb36062e497fbdf752853d5bd39ea4b2d6410be5c2331a5b85fbedf7dcd1
kernel-xenU-devel-2.6.9-100.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: df6815450e7133d437140ebe91d5d9de
SHA-256: 7de4ffd2dd319fe9b17f2af41d1a6f60168b211b39faa63c7e1aa1c41189b268
 
IA-64:
kernel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 89437783e079e20ab50367f845f5d89e
SHA-256: 76463e28bf66b8c52014b02a13899e9a202c23d66485d74512fec6d7b3894d16
kernel-devel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ba139e66d10b34fa8a3c30abfd50e015
SHA-256: bf8b8a289319612b8fbc890c3e78d8d880713975147de29f9a68511fb52359ff
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-largesmp-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1d5b1b263b646cef05fd3c23199de6ec
SHA-256: cebc30aeb5f6074328f4133e73c6617214500675e1ddf2dec6baabf0538a60ac
kernel-largesmp-devel-2.6.9-100.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 81fb23e790101c7319f31c0687255a51
SHA-256: 94e7cd4231fb58358eed846a57d535931679f1c1b50d73543cf9d27ddd54ab34
 
x86_64:
kernel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 729b54159c4b2f4d133dece4fcebcac0
SHA-256: 1dfca0b2a1c441c19130713323725a35761c4f4a96896576da0601eb3fd5dcf2
kernel-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d8e031c8c3f94204b41c4d5c9d1f61ef
SHA-256: 4c2f57d9291c897984fe756ee6cf70b07236b83cbe6e7b393ffcabffd4f88fd1
kernel-doc-2.6.9-100.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: de3bf9962861894c46bedcc64add9227
SHA-256: b48dac9f6177acf53497345e309e91d6945de95889faed7b28a3367fef2fc591
kernel-largesmp-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 56b1921f20ca7c945c8797dc027975fc
SHA-256: 72a3a704d5c54d504fa1a006e32ae636641034e1a91a54ead2adf05e6853c7b3
kernel-largesmp-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: f79106292a3ae3631b48edd4749dff0d
SHA-256: 74228d183503d10ee84caab393c0e3f6d64ad0a7dea12d9c0ccdcead805f2b01
kernel-smp-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d0b492a990ee1a6157400cdbc6c6c155
SHA-256: 796efdf9d0a5716f1360ec6b3a6805ad3bdc302eea78213514c72abb11b12ced
kernel-smp-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3bc0dfed8e1948f3cbf50cf162dc0984
SHA-256: 05e36347b7c2985c5c7d03b600fffd25085616a1eef29a732f3b49ae2b7765fe
kernel-xenU-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74aae8c65c17300bc497951061a2740f
SHA-256: 3333612b6c964e5a5e7aeca500824baffb4f5eccc238907ab57ec9162edacd86
kernel-xenU-devel-2.6.9-100.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3c38ef997d0d114d0224ebdebd6b6bcb
SHA-256: f1f80ea70c8cf81aea351bbb76935e79f7cefcd6262762c545b5eec786133db1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

176848 - NLM: Fix Oops in nlmclnt_mark_reclaim()
189918 - kernel: serious ugliness in iget() uses by nfsd [rhel-4.9]
217829 - Powernow driver does not work properly with different voltage CPUs
247116 - RFE: Add debug to bonding driver as module option
396631 - Increase timeout for device connection on boot
427998 - RHEL4: Can enter no tick idle mode with RCU pending leading to hang
445957 - Change "decode_getfattr: xdr error %d!" to dprintk
456047 - Kernel Panic at end_bio_bh_io_sync+44
456649 - xenbus suspend_mutex remains locked after transaction failure
457519 - groups_search() cannot handle large gid correctly
459466 - kernel: binfmt_misc.c: avoid potential kernel stack overflow [rhel-4.8]
459499 - proc_loginuid_write() uses simple_strtoul() on non-terminated array
461038 - el4u5 pv guest user coredump crashing system
462717 - IPVS wrr scheduler bug
472752 - BUG() in end_buffer_async_write()
476700 - Loss of USB HID devices when switching with a KVM
479090 - Panic in do_cciss_intr removeQ
479264 - [RHEL4] lost siginfo when a signal queue is full
480404 - kernel BUG at fs/mpage.c:417!
480937 - RHEL-4: Deadlock in Xen netfront driver.
481292 - [RHEL4.7] Original ether's status is keeping PROMISC MULTICAST mode
481371 - PG_error bit is never cleared, even when a fresh I/O to the page succeeds
483783 - kernel hid-input.c divide error crash
484415 - CCISS device-mapper-multipath support: missing sysfs attributes
485904 - [RHEL4] Netfilter modules unloading hangs
488931 - ACLs on NFS mounted directories disappear
490148 - Xen domU, RAID1, LVM, iscsi target export with blockio bug
491284 - [x86_64]: copy_user_c can zero more data than needed
492868 - Xen guest kernel advertises absolute mouse pointer feature which it is incapable of setting up correctly
493780 - EL4U7 kernel bug fix update (Oracle bug 7916406 - JVM process hang)
494404 - [RHEL4.5] Even if a process have received data but schedule() in select() cannot return
494688 - e1000e: sporadic hang in netdump
495858 - show_partition() oops when race with rescan_partitions().
496201 - [RHEL4] Nscd consumes many cpu resources ( nearly 100% ) continuously.
496205 - PVFB frontend can send bogus screen updates
496206 - xenkbd can crash when probe fails
496209 - PVFB frontend mouse wheel support
498012 - Bonding driver updelay parameter actual behavior doesn't match documented behavior
499355 - e1000_clean_tx_irq: Detected Tx Unit Hang
499548 - kernel: proc: avoid information leaks to non-privileged processes [rhel-4.9]
499848 - [RHEL4-U8] Kernel - testing NMI watchdog ... CPU#0: NMI appears to be stuck (0)!
500637 - A bond's preferred primary setting is lost after bringing down and up of the primary slave.
500889 - Various IPv4/v6 SNMP counter fixes
500904 - renaming file on a share w/o write permissions causes oops
501064 - [Stratus 4.9 bug] panic reading /proc/bus/input/devices during input device removal
501335 - oops in nfs4_put_open_state
501500 - oops in nfsd_svc after forced unmount of stale nfs4 filesystem and reboot
501844 - kernel: random: ICE at get_random_int() [rhel-4.3]
502473 - Failure logging execve with lots of arguments
502884 - NFSv4 Issue/slowdown when testing against the NetApp server
503489 - [NetApp 4.8 bug] Issues with "qioctlmod" module on RHEL4.8 hosts with QLogic FC inbox drivers
503762 - Adding bonding in balance-alb mode to bridge cause network connectivity to be lost [rhel-4.9]
504080 - MegaRAID SAS 1078 tape I/O errors when using mt erase
504156 - rtl8139 doesn't work with bonding in alb mode [rhel-4.9]
504279 - [RHEL 4] Lookups due to infinite loops in posix_locks_deadlock
504593 - LRO patch to 4.7 breaks SANGOMA WANPIPE drivers build
504778 - FEAT RHEL4.9: Support new PCI IDS to support VX800 in via82cxxx
504988 - [RHEL4 Xen]: i386 Guest crash when host has >= 64G RAM
505081 - [RHEL4.8 Xen]: Xenbus warnings in a FV guest on shutdown
505122 - Make Aborted Command (internal target failure) retryable at SCSI layer (sense B 44 00)
505506 - RHEL4.8: crash in do_cciss_request()
505591 - Bug in lockd prevents a locks being freed.
506875 - kernel: ptrace: don't use REMOVE_LINKS/SET_LINKS for reparenting [rhel-4.9]
507527 - NFSD returns NFS4_OK when the owner opens a file with permission set to 000
507847 - Balloon driver gives up too easily when ballooning up under memory pressure
507951 - [4.8]Kernel can not increase the counter of Icmp6OutDestUnreachs when forwarding packet with address unreachable.
509220 - i386 rhel4.8 kvm guests crashes in virtio during installation
509627 - kernel: fd leak if pipe() is called with an invalid address [rhel-4.9]
509816 - cciss: spinlock deadlock causes NMI on HP systems
510184 - NFSD returns NFS4_OK(0) when OPEN with access==read/write on a read-denied/write-denied file
510395 - num_mtt settings of 2097152 fails in RHEL with infiniband HCA
510454 - [IPv6] No fragment header in ICMPv6 reply after packet_too_big message
511183 - kernel: build with -fno-delete-null-pointer-checks [rhel-4.9]
512641 - kernel: security: implement mmap_min_addr infrastructure [rhel-4.9]
514684 - NFS: mounted NFSv4/krb5 export inaccessible following an NFS server reboot
515274 - /proc/net/dev sometimes contains bogus values (BCM5706)
516076 - netconsole on e1000 cause "Badness in local_bh_enable at kernel/softirq.c:141"
516742 - CIFS - crash in small_smb_init
517162 - cthon test5 failing on nfsv4 with rhel6 client vs. rhel4 server
517329 - [RHEL4.8] igb driver doesn't allocate enough buffer for ethtool_get_strings()
517523 - get_partstats() returns NULL and causes panic
520018 - statfs on NFS partition always returns 0
520299 - kernel: ipv4: make ip_append_data() handle NULL routing table [rhel-4.9]
522000 - [RFE ] Connlimit kernel module support [rhel-4.9]
523983 - kernel: ipt_recent: sanity check hit count [rhel-4.9]
524884 - reading from /proc/net/ip_conntrack returns ENOSPC
525398 - RHEL4: Unable to write to file as non-root user with setuid and setgid bit set
525941 - OOM on i686 kernel-smp
527656 - bnx2x fails when iptables is on
528066 - [Cisco/LSI 4.9 bug] mptctl module dereferences a userspace address, triggering a crash
529063 - qla2xxx flash programming changes in 4.8 broke diskdump
531914 - [4.6] TCP conntrack doesn't handle half-open state connection correctly
532045 - SCTP Messages out of order
532593 - Upgrade from RHEL4U7 to U8 fails to bring up networking with forcedeth driver. [simple patch]
532858 - IBM HS22: SOL drops on bnx2 driver load
533299 - scsi device add/remove panic at sysfs_hash_and_remove
537475 - Write barrier operations not working for libata and general SCSI disks
539506 - [4.7] wait4 blocks on non-existing pid
541538 - [RHEL4 Xen]: PV guest crash on poweroff
543823 - [RHEL4]: A new xenfb thread is created on every save/restore
546251 - [RHEL4.5] select() cannot return in UDP/UNIX domain socket
546324 - TCP receive window clamping problem
547213 - ext2online resize hangs
548496 - [Emulex 4.9 bug] lpfc driver doesn't acquire lock when searching hba for target
552953 - "forcedeth" driver issue: eth0 fails to get ip address on boot with RHEL4 kernel
557122 - No output of xmit_hash_policy on IEEE 802.3ad Bonding
557380 - Kernel panic due to recursive lock in 3c59x driver.
558607 - e1000e: wol is broken in kernel 2.6.9-89.19
561108 - platform:ahern:rmmod hangs at 100% cpu removing usbnet module
562949 - problems with aliased dentries and case-insensitivity in CIFS readdir code
563920 - Please implement upstream fix for potential filesystem corruption bug
568271 - [QLogic 4.9 bug] qla2xxx: Fix srb cache destroy issue on driver unload and FDMI registration issue (8.02.10.01.04.09-d)
569668 - [RHEL4] boot hangs if scsi read capacity fails on faulty non system drive
577178 - megaraid_sas: fix physical disk handling
577378 - NFSv3 file attributes are not updated by READDIRPLUS reply
585430 - Add log message for unhandled sense error REPORTED_LUNS_DATA_CHANGED
589897 - Lost the network in a KVM VM on top of 4.9
591938 - cifs: busy file renames across directories should fail with error
594633 - kernel: security: testing the wrong variable in create_by_name() [rhel-4.9]
604786 - second cifs mount to samba server fails when samba using security=ADS
605455 - EXT3-fs error: do_get_write_access: OOM for frozen_buffer
607261 - Read from /proc/xen/xenbus does not honor O_NONBLOCK
607533 - Vhost:Fail to transfer file between two guests in same vlan
610236 - [4u8] Bonding in ALB mode sends ARP in loop
614559 - sky2 issue with 4.8 kernel
620485 - system crashes due to corrupt net_device_wrapper structure
621209 - [4u9] bonding: fix a race condition in calls to slave MII ioctls
623265 - bnx2: panic in bnx2_poll_work()
624117 - recording fails when usb audio device is connected to EHCI controller (ehci_hcd)
624713 - [RHEL4] Problems with aacraid - File system going into read-only.
629143 - Assertion failure in ext3_put_super() at fs/ext3/super.c:426: "list_empty(&sbi->s_orphan)"
630564 - kernel: additional stack guard patches [rhel-4.9]
634632 - nfs4_reclaim_open_state: unhandled error -5. Zeroing state
637556 - Bonded interface doesn't issue IGMP report (join) on slave interface during failover
637658 - [RHEL 4.8] 32-bit pvhvm guest on 64-bit host crash w/xm mem-set
640803 - [RHEL4.8.z] soft lockup on vlan with bonding in balance-alb mode
641112 - bonding does not switch to slave
643992 - Kernel maintainer's bz for spec file changes
645220 - [RFE] kernel: modules: sysctl to block module loading [rhel-4.9]
645633 - temporary loss of path to SAN results in persistent EIO with msync
647187 - [netfront] ethtool -i should return proper information for netfront device
647196 - RFE: Virtio nic should support "ethtool -i virtio nic"
651334 - RHEL4.9: EHCI: AMD periodic frame list table quirk
653252 - kernel: restrict unprivileged access to kernel syslog [rhel-4.9]
653505 - [4.9 Regression] network is lost after balloon-up fails
658824 - The USB storage cannot use >2TB.
662839 - [REG][4.9] Filesystem corruption happens on ext2 filesystem
667615 - CVE-2010-4527 kernel: buffer overflow in OSS load_mixer_volumes
672398 - CVE-2011-0521 kernel: av7110 negative array offset
672428 - CVE-2010-4655 kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/