- Issued:
- 2010-03-30
- Updated:
- 2010-03-30
RHSA-2010:0178 - Security Advisory
Synopsis
Important: Red Hat Enterprise Linux 5.5 kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix three security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the fifth regular update.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
- a race condition was found in the mac80211 implementation, a framework
used for writing drivers for wireless devices. An attacker could trigger
this flaw by sending a Delete Block ACK (DELBA) packet to a target system,
resulting in a remote denial of service. Note: This issue only affected
users on 802.11n networks, and that also use the iwlagn driver with Intel
wireless hardware. (CVE-2009-4027, Important)
- a flaw was found in the gfs2_lock() implementation. The GFS2 locking code
could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged user
on a system that has a GFS2 file system mounted could use this flaw to
cause a kernel panic. (CVE-2010-0727, Moderate)
- a divide-by-zero flaw was found in the ext4 file system code. A local
attacker could use this flaw to cause a denial of service by mounting a
specially-crafted ext4 file system. (CVE-2009-4307, Low)
These updated packages also include several hundred bug fixes for and
enhancements to the Linux kernel. Space precludes documenting each of these
changes in this advisory and users are directed to the Red Hat Enterprise
Linux 5.5 Release Notes for information on the most significant of these
changes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/
Also, for details concerning every bug fixed in and every enhancement added
to the kernel for this release, refer to the kernel chapter in the Red Hat
Enterprise Linux 5.5 Technical Notes:
http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html
All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which address these vulnerabilities as well as fixing the bugs
and adding the enhancements noted in the Red Hat Enterprise Linux 5.5
Release Notes and Technical Notes. The system must be rebooted for this
update to take effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 250561 - w83627ehf sensor not supported by 2.6.18-8.1.8.el5 kernel
- BZ - 322881 - /proc/self/smaps unreadable after setuid
- BZ - 427709 - dump and large file ops are slow, please implement kernel workaround
- BZ - 446061 - IT87 hwmon module does not support later chipset revisions.
- BZ - 448130 - 50-75 % drop in cfq read performance compared to rhel 4.6+
- BZ - 450121 - RFE: Symbol pci_domain_nr needs to be added the whitelist for ppc64
- BZ - 452129 - memory mapped files not updating timestamps
- BZ - 456181 - Read speed of /sbin/dump command is critically slow with CFQ I/O scheduler
- BZ - 461100 - [PATCH]RHEL5:fix dio write returning EIO due to bh race
- BZ - 461442 - VLAN driver logs excessive messages in kernel message log (dmesg)
- BZ - 461506 - kernel BUG at mm/mempool.c:121! caused by lvcreate
- BZ - 466681 - pygrub uses cached and eventually outdated grub.conf, kernel and initrd
- BZ - 469976 - The EDAC driver not support The Intel 3200 and 3210 Chipsets
- BZ - 473404 - [5.3] Kdump Kernel Hangs on Dell AMD Machines
- BZ - 475457 - [FUJITSU 5.5] More tracepoints support - networking
- BZ - 476075 - use KVM pvclock code to detect/correct lost ticks
- BZ - 481658 - Backport partition table sanity checks to RHEL5
- BZ - 482756 - GFS2: After gfs2_grow, new size is not seen immediately
- BZ - 483646 - bridge: Fix LRO crash with tun (tun_chr_read())
- BZ - 485016 - HP6510b close lid cause system crash
- BZ - 485099 - Inconsistent behaviour in stripping SUID/SGID flags when chmod/chgrp directories
- BZ - 486092 - httpd Sendfile troubles reading from a CIFS share
- BZ - 486975 - kernel: Unable to write to file as non-root user with setuid and setgid bit set
- BZ - 487346 - ifdown bond0 causes a deadlock
- BZ - 487763 - Adding bonding in balance-alb mode to bridge causes host network connectivity to be lost
- BZ - 488161 - (direct_io) __blockdev_direct_IO calls kzalloc for dio struct causes OLTP performance regression
- BZ - 489566 - when booted with P-state limit, limit can never be increased
- BZ - 489774 - AVC denied 0x100000 for a directory with eCryptFS and Apache
- BZ - 489931 - NFS umount deadlock in rpciod with rpc_shutdown_client()
- BZ - 491010 - ip_vs module (LVS) routes demasqueraded packets out wrong interface on multihomed directors
- BZ - 493517 - get_partstats() returns NULL and causes panic
- BZ - 494120 - XEN NMI detection fails on Dell 1950 server
- BZ - 495059 - deadlock with NFSv4 reclaimer thread reconnecting socket
- BZ - 496716 - GFS2 ">>" will not update ctime,mtime after appending to the file
- BZ - 496847 - [Patch] jbd slab cache creation/deletion is racey
- BZ - 497200 - definition of file-nr differs from sysctl/fs.txt to filesystems/proc.txt
- BZ - 497257 - The tmpfs filesystem goes on readonly mode.
- BZ - 498461 - I/O scheduler setting via elevator kernel option not picked up by Xen guest
- BZ - 498489 - blktrace stops working after a trace-file-directory replacement
- BZ - 498510 - don't OOM kill task during fresh huge page allocation
- BZ - 498532 - RHEL5 cmirror tracker: multiple device failure of fully synced cmirror causes corruption
- BZ - 498976 - GFS2 - probably lost glock call back
- BZ - 499019 - CRM 1908390 - BUG: warning at fs/inotify.c:181/set_dentry_child_flags()
- BZ - 499063 - [RHEL5] undefined reference to `__udivdi3'
- BZ - 499253 - kernel leaves initrd in vmalloc space
- BZ - 499884 - A bond's preferred primary setting is lost after bringing down and up of the primary slave.
- BZ - 500346 - Please update mlx4_en driver for performance improvements and bug fixes
- BZ - 500653 - NFS: problems with virtual IP and locking
- BZ - 500838 - CIFS update for RHEL5.5
- BZ - 501030 - Need to display the current settings of the options bits in st driver.
- BZ - 501075 - soft lockups with software RAID6 create and re-sync'
- BZ - 502491 - rtl8139 doesn't work with bonding in alb mode
- BZ - 502531 - GFS2: smbd proccess hangs with flock() call.
- BZ - 502572 - cat stop responding after 1st cat and CTRL+C interrupt.
- BZ - 502822 - OOPS in "inet_select_addr" on ICMP when "icmp_errors_use_inbound_ifaddr" is turned on
- BZ - 502826 - [RHEL-5 Xen]: F-11 Xen 64-bit domU cannot be started with > 2047MB of memory
- BZ - 502927 - dm-raid1 can return write request as finished and later revert the data
- BZ - 502965 - Snapshot creation in VG with 1k extent size can fail
- BZ - 503837 - [Intel 5.4 Bug] Function dependency link calculated incorrectly for integrated endpoint
- BZ - 505331 - GFS2: genesis stuck writing to unlinked file
- BZ - 506200 - ahci: add device ID for 82801JI sata controller
- BZ - 506217 - Implement blkdev_releasepage() to release the buffer_heads and pages after we release private data belonging to a mounted filesystem.
- BZ - 506799 - Serial ports don't function on 4838-310 without pnpacpi=off boot option
- BZ - 506899 - timeout with physical cdrom on a PV guest
- BZ - 507159 - Cannot increase open file limit greater then 1024 * 1024 (1048576)
- BZ - 507549 - Bug in lockd prevents a locks being freed.
- BZ - 509625 - kernel: fd leak if pipe() is called with an invalid address [rhel-5.4]
- BZ - 509713 - getdents() reports /proc/1/task/1/ as DT_UNKNOWN.
- BZ - 509809 - Host panic when try to run kvm guest on a host which restored from suspend.
- BZ - 509866 - [RHEL5.3] Even if a process have received data but schedule() in select() cannot return
- BZ - 509962 - RHEL 5.4 Beta fails to activate sw raid devices, unable to install to sw raid
- BZ - 510225 - Segfault/Infinite loop in TLS double access
- BZ - 510257 - allow more flexibility for read_ahead_kb store
- BZ - 510686 - xen does not build on gcc 4.4
- BZ - 510746 - BUG: warning at kernel/softirq.c:138/local_bh_enable() (Tainted: G )
- BZ - 510814 - CPU hotplug notifiers for KVM (for suspend and cpu hotplug support)
- BZ - 510818 - cxgb3 driver fixes
- BZ - 511170 - [NetApp 5.5 bug] nfs_readdir() may fail to return all the files in the directory
- BZ - 511211 - cpuspeed behave strangely after suspend/resume on intel machine hp-dl580g5-01.rhts.bos.redhat.com
- BZ - 511278 - /proc/self/exe reports wrong path after fstat on NFSv4
- BZ - 511374 - ExpressCards should be detected and useful
- BZ - 512006 - [LTC 5.5 FEAT] AF_IUCV SOCK_SEQPACKET support [201885]
- BZ - 512013 - [LTC 5.5 FEAT] Support ACPI S3/S4 Sleeping States [201941]
- BZ - 512203 - [LTC 5.5 FEAT] Update ibmvscsi driver with upstream multipath enhancements [201916]
- BZ - 512361 - Server should return NFS4ERR_ATTRNOTSUPP if attribute 'ACL' is not supported
- BZ - 512552 - Can't write to XFS mount during raid5 resync
- BZ - 513136 - [RHEL5.4 Snapshot1] File write performance degradation in RHEL5.4 Snapshot1 compared to RHEL5.3 GA
- BZ - 513203 - system fails to go into s4
- BZ - 513410 - cifs: panic when mounting DFS referral with hostname that can't be resolved
- BZ - 513692 - ifdown on nVidia CK804 (rev f3) NIC doesn't work
- BZ - 513827 - Out of SW-IOMMU space: External hard disk inaccessible
- BZ - 514141 - mlx4_core fails to load on systems with32 cores
- BZ - 514147 - TCP traffic for VLAN interfaces fails over mlx4_en parent interface.
- BZ - 514250 - e100: return PCI_ERS_RESULT_DISCONNECT on permanent failure
- BZ - 514256 - igb: return PCI_ERS_RESULT_DISCONNECT on permanent failure
- BZ - 514589 - r8169 stopping all activity until the link is reset
- BZ - 514654 - nfsv4-server return NFS4ERR_BAD_STATEID, but return NFS4ERR_EXPIRED when it has invalid stateID
- BZ - 515176 - scsi_transport_fc: fc_user_scan can loop forever, needs mutex with rport list changes
- BZ - 515252 - CIFS multiuser mount fails to locate smbid
- BZ - 515312 - [Broadcom 5.5 feat] Update tg3 and add support for 5717/5718 and 57765 asic revs
- BZ - 515405 - [PATCH RHEL5.5] :NFS Handle putpubfh operation correctly.
- BZ - 515408 - Code under CONFIG_X86_VSMP incorrect after an incorrect patch pull from upstream
- BZ - 515529 - ENOSPC during fsstress leads to filesystem corruption on ext2, ext3, and ext4
- BZ - 515716 - [Broadcom 5.5 FEAT] Update bnx2x to 1.52.1-5
- BZ - 515753 - kdump corefile cannot be backtraced in IA64
- BZ - 515812 - [Emulex 5.5 feat] Three scsi_nl APIs should be added to kabi_whitelist
- BZ - 515863 - FEAT RHEL5.5: Make MegaRAID SAS driver legacy I/O port free
- BZ - 516541 - [NetApp 5.5 bug] Emulex FC ports on RHEL 5.4 GA offlined during target controller faults
- BZ - 516589 - Kernel netlink neighbor updates not sent to multicast group (RTMGRP_NEIGH)
- BZ - 516833 - [QLogic 5.5 feat] netxen - P3 updates
- BZ - 516881 - [Promise 5.5 feat] Update stex driver to version 4.6.0102.4
- BZ - 517238 - [RHEL5 Xen]: Fix for array out-of-bounds in blkfront
- BZ - 517377 - [Broadcom 5.5 FEAT] Update bnx2 to 2.0.2
- BZ - 517378 - [Broadcom 5.5 FEAT] Update bnx2i and cnic drivers
- BZ - 517454 - Add Support for Huawei EC1260 to the RHEL5 kernel
- BZ - 517504 - SCTP Messages out of order
- BZ - 517893 - [QLogic 5.5 bug] qlge - fix hangs and read perfromance
- BZ - 517922 - [QLogic 5.5 bug] qla2xxx - allow use of MSI when MSI-X disabled.
- BZ - 517928 - bare-metal and xen: /proc/cpuinfo does not list all CPU flags presented by CPU
- BZ - 518103 - VTD IOMMU 1:1 mapping performance and bug fixes
- BZ - 518106 - [RFE] GFS2: New mount option: -o errors=withdraw|panic
- BZ - 518496 - Add kernel (scsi_dh_rdac) support for Sun 6540 storage arrays.
- BZ - 519049 - GFS2 Filesystem Withdrawal: fatal: invalid metadata block
- BZ - 519076 - Update for HighPoint RocketRAID hptiop driver in RHEL 5.5 kernel
- BZ - 519086 - [Cisco 5.5 FEAT] Include/Update support for enic version 1.1.0.100
- BZ - 519091 - [Cisco 5.5 FEAT] Update fnic to version x.y.z
- BZ - 519112 - statfs on NFS partition always returns 0
- BZ - 519184 - nfsnobody == 4294967294 causes idmapd to stop responding
- BZ - 519447 - [QLogic 5.5 bug] qla2xxx - updates and fixes from upstream or testing.
- BZ - 519453 - [QLogic 5.5 bug] qlge - updates and fixes from upstream or testing.
- BZ - 519771 - pvclock return bogus wallclock values
- BZ - 520192 - kernel panics from list corruption when using a tape drive connected through cciss adapter
- BZ - 520297 - kernel: ipv4: make ip_append_data() handle NULL routing table [rhel-5.5]
- BZ - 520867 - glibc should call pselect() and ppoll() on ia64 kernel
- BZ - 521081 - [RHEL5.4 RC2] KMP for xen kernel cannot be applied
- BZ - 521093 - Cluster hangs after node rejoins from simulated network outage
- BZ - 521203 - Update arcmsr driver
- BZ - 521345 - vlan with sky2 is not possible anymore with kernel-xen 2.6.18-164
- BZ - 521865 - Xen fails to boot on ia64 with > 128GB memory
- BZ - 522600 - bnx2x: increase coalescing granularity to 4us instead of 12us
- BZ - 522629 - [LTC 5.5 FEAT] Provide balloon driver for KVM guests [202025]
- BZ - 522745 - thinkpad_acpi: CMOS NVRAM (7) and EC (5) do not agree on display brightness level
- BZ - 522846 - Nehalem Turbo Boost "ida" flag not present in Xen kernel's /proc/cpuinfo output
- BZ - 523335 - sound no longer works after upgrade to RHEL 5.4
- BZ - 523450 - cpu1 didn't come online in a kvm i686 guest
- BZ - 523888 - [RFE] Add qcserial module to RHEL 5 kernel
- BZ - 523982 - kernel: ipt_recent: sanity check hit count [rhel-5.5]
- BZ - 524052 - Boot hang when installing HVM DomU
- BZ - 524129 - LVS master and backup director - Synchronised connections on backup director have unsuitable timeout value
- BZ - 524335 - [LSI 5.5 feat] update rdac scsi device handler to upstream
- BZ - 524651 - Lost the network in a KVM VM on top of 5.4
- BZ - 524702 - kvm_clock patches are slowing guests' shutdown to unusable levels
- BZ - 524787 - cannot compile kernel with CONFIG_ACPI_DEBUG=y
- BZ - 525100 - resize2fs online resize hangs
- BZ - 525390 - FEAT: RHEL 5.5 - update ALSA HDA audio driver from upstream
- BZ - 525467 - Xen panic in msi_msg_read_remap_rte with acpi=off
- BZ - 526043 - Implement smp_call_function_[single|many] in x86_64 and i386
- BZ - 526092 - rw_semaphore bug
- BZ - 526259 - [Cisco 5.5 feat] libfc bug fixes and improvements
- BZ - 526481 - bnx2: panic in bnx2_poll_work()
- BZ - 526612 - kernel: BUG: soft lockup with dcache_lock
- BZ - 526751 - xset b as well as setterm -bfreq set beep to wrong pitch with CONFIG_HDA_INPUT_BEEP
- BZ - 526819 - system crashes in audit_update_watch()
- BZ - 526888 - NFSv4 reclaimer thread in an infinite loop
- BZ - 527424 - igb driver does not work with kexec
- BZ - 527496 - pci_dev->is_enabled is not set in RHEL5.4
- BZ - 527748 - /proc/net/dev sometimes contains bogus values (BCM5706)
- BZ - 528054 - ext4: tech preview refresh
- BZ - 528070 - skip inodes without pages to free in drop_pagecache_sb()
- BZ - 528153 - scsi: export symbol scsilun_to_int
- BZ - 529431 - Update to 2.6.18-164.el5PAE causes working CIFS mount to fail
- BZ - 529796 - GFS2: Enhance statfs and quota usability
- BZ - 530537 - dlm_recv deadlock under memory pressure while processing GFP_KERNEL locks.
- BZ - 531016 - NFS: stale nfs_fattr passed to nfs_readdir_lookup()
- BZ - 531268 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour
- BZ - 531488 - [scsi] Fix inconsistent usage of max_lun
- BZ - 531552 - threads on pthread_mutex_lock wake in fifo order, but posix specifies by priority
- BZ - 531593 - [QLogic 5.5 bug] qla2xxx - enable MSI-X and correct/cleanup irq request code
- BZ - 531784 - ipoib: null tx/rx_ring skb pointers on free
- BZ - 532701 - dprintk macro in NFS code doesn't work in some files
- BZ - 533489 - [Cisco 5.5 feat] Need scsi and libfc symbols to be added to whitelist_file
- BZ - 533496 - xen server crashes when used with network bonding modes 5 or 6
- BZ - 534018 - kernel: sysctl: require CAP_SYS_RAWIO to set mmap_min_addr [rhel-5.5]
- BZ - 534158 - Updates for mlx4 drivers
- BZ - 537514 - [LSI 5.5 feat] make scsi_dh_activate asynchronous to address the slower lun failovers with large number of luns
- BZ - 537734 - Backporting MSI-X mask bit acceleration
- BZ - 537876 - Kernel panic when using GRO through ixgbe driver and xen bridge
- BZ - 538407 - PCI AER code introduced a compile problem in powerpc
- BZ - 538484 - gfs2 rename rgrp lock issue
- BZ - 539240 - glock_workqueue -- glock ref count via gfs2_glock_hold
- BZ - 539521 - Call trace error display when resume from suspend to disk (ide block) - pvclock related
- BZ - 540811 - [RHEL5 Xen]: PV guest crash on poweroff
- BZ - 541149 - CVE-2009-4026 CVE-2009-4027 kernel: mac80211: fix spurious delBA handling
- BZ - 541213 - Possible access to invalid memory
- BZ - 541325 - [RHEL5]: A new xenfb thread is created on every save/restore
- BZ - 541953 - kernel panic when doing cpu offline/online frequently on hp-dl785g5-01.rhts.eng.bos.redhat.com
- BZ - 541956 - kernel: sleeping vfs_check_frozen in called in atomic context from do_wp_page [rhel-5.5]
- BZ - 542593 - recursive lock of devlist_mtx
- BZ - 542746 - [QLogic 5.5 feat] netxen P3 - updates from 2.6.32
- BZ - 542834 - [QLogic 5.5 bug] qla2xxx - further testing updates for 5.5
- BZ - 543057 - [QLogic 5.5 bug] qla2xxx - testing updates #3
- BZ - 543270 - Fix deadlock in multipath when removing a device
- BZ - 543307 - Lock snapshot while reporting status
- BZ - 544138 - PTRACE_KILL hangs in 100% cpu loop
- BZ - 544349 - RHEL5: fallocate on XFS returns incorrect value on ENOSPC
- BZ - 544417 - cifs: possible NULL pointer dereference in mount-time DFS referral chasing code
- BZ - 544448 - Strange vm performance degradation moving 32 bit app from RHEL 4.6 32bit to 5.4 64bit
- BZ - 545121 - possible null pointer dereference in ieee80211_change_iface
- BZ - 545135 - [Broadcom 5.5 feat] Add support for 57765 asic revs
- BZ - 545612 - Please implement upstream fix for potential filesystem corruption bug
- BZ - 545899 - rtl8180 shows 0% signal strength while connected
- BZ - 546281 - wireless: report reasonable bitrate for MCS rates through wext
- BZ - 546326 - bnx2: panic in bnx2_free_tx_skbs() because of wrong frags index
- BZ - 546624 - RFE: Add debug to bonding driver as module option
- BZ - 547251 - CVE-2009-4307 kernel: ext4: avoid divide by zero when trying to mount a corrupted file system
- BZ - 547762 - PCI AER: HEST FIRMWARE FIRST support
- BZ - 547980 - [SR-IOV] VF can not be enabled in Dom0
- BZ - 548079 - [RHEL5.4][REGRESSION] iptables --reject-with tcp-reset doesn't work
- BZ - 548565 - aio: eventfd support introduced a 0.5% performance regression
- BZ - 549397 - I/O errors while accessing loop devices or file-based Xen images from GFS volume after Update from RHEL 5.3 to 5.4
- BZ - 549460 - [Emulex 5.5 bug] Multiple bug fixes for be2net
- BZ - 549465 - Cannot run NVIDIA display driver on 32-bit RHEL 5.3 or 5.4
- BZ - 549750 - audit rule with directory auditing crashes the kernel
- BZ - 549763 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63 FC/FCoE
- BZ - 550014 - khungtaskd not stopped during suspend
- BZ - 550148 - [Cisco 5.5 bug] Update enic driver to version 1.1.0.241a
- BZ - 552675 - ipmi_watchdog deadlock
- BZ - 553324 - [RHEL5 Xen]: Cpu frequency scaling is broken on Intel
- BZ - 553447 - GFS2: fatal: filesystem consistency error in gfs2_ri_update
- BZ - 553670 - filesystem mounted with ecryptfs_xattr option could not be written
- BZ - 554078 - Lost the network in a KVM VM on top of 5.4
- BZ - 554545 - [Emulex 5.5 bug] Update be2iscsi driver for bugfixes
- BZ - 555120 - dm-raid1: dmsetup stuck at suspending failed mirror device
- BZ - 555171 - dm-raid1: kernel panic when bio on recovery failed region is released
- BZ - 555604 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.1p FC/FCoE
- BZ - 557095 - kvm pvclock on i386 suffers from double registering
- BZ - 557109 - [5.4] VLAN performance issue with 10gbE Mellanox NICs
- BZ - 557172 - inserting w83627hf kernel module results in panic
- BZ - 557792 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.2p FC/FCoE
- BZ - 557974 - e1000e: wol is broken on 2.6.18-185.el5
- BZ - 558809 - e1000 & e1000e: Memory corruption/paging error when tx hang occurs
- BZ - 559329 - [sky2] initial carrier state is always on
- BZ - 559410 - posix_fadvise() handles its arguments incorrectly in 32-bit compat mode.
- BZ - 559711 - Add wireless fixes from 2.6.32.y tree
- BZ - 560944 - kernel panic during modprobe smsc47m1
- BZ - 561076 - igb: fix warning in drivers/net/igb/igb_ethtool.c:2090
- BZ - 561322 - [Emulex 5.5 bug] be2net bug fixes for be3 hardware from Alpha testing
- BZ - 561578 - [Broadcom 5.5 feat] Update bnx2 firmware
- BZ - 562006 - WARNING: APIC timer calibration may be wrong
- BZ - 562947 - late breaking CIFS patches for RHEL5.5
- BZ - 564145 - [Emulex 5.5 bug] Fix scsi eh callouts and add support for new chip to be2iscsi driver
- BZ - 564399 - f71805f hwmon driver passes '&sio_data' to platform_device_add_data()
- BZ - 564506 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.3p FC/FCoE
- BZ - 565494 - "dmraid -ay" panics kernel
- BZ - 565594 - [Cisco 5.5 bug] Update fnic to 1.4.0.98 to fix FIP crash/hang issues
- BZ - 565964 - [Broadcom 5.5 bug] tg3: 5717 and 57765 asic revs can panic under load
- BZ - 565965 - [Broadcom 5.5 bug] tg3: Race condition - performance / panic with 57765 devices
- BZ - 566016 - [Broadcom 5.5 bug] tg3: 57765 LED does not work correctly
- BZ - 566221 - GFS2: Use correct GFP for alloc page on write
- BZ - 566696 - iwl5000/5300 fail to transmit data on N-only netwrok
- BZ - 567718 - [Emulex 5.5 bug] be2net bug fixes for be3 hardware from Alpha testing
- BZ - 568040 - network does not work with rhel 5.5 snap1 x64 server, xen kernel, and r8169 driver
- BZ - 568153 - ixgbe: stop unmapping DMA buffers too early
- BZ - 569610 - GFS2 - fiemap - Kernel BUG at fs/gfs2/bmap.c:433
- BZ - 570814 - Disk performance regression in CFQ
- BZ - 570863 - CVE-2010-0727 bug in GFS/GFS2 locking code leads to dos
- BZ - 571818 - Iozone Outcache testing has a greater than 5 % performance regression on reads
- BZ - 573098 - [5.4] VLAN performance issue with 10gbE Mellanox NICs
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kernel-2.6.18-194.el5.src.rpm | SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f |
x86_64 | |
kernel-2.6.18-194.el5.x86_64.rpm | SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95 |
kernel-debug-2.6.18-194.el5.x86_64.rpm | SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0 |
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8 |
kernel-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.x86_64.rpm | SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a |
kernel-xen-2.6.18-194.el5.x86_64.rpm | SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915 |
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782 |
ia64 | |
kernel-2.6.18-194.el5.ia64.rpm | SHA-256: 54601729cc3bfe1f9a26e15249e3f11e4b62241b9e4be2a9bfca71b816085f42 |
kernel-debug-2.6.18-194.el5.ia64.rpm | SHA-256: 8fa8326f79d5223862880793a239fadb742beee7b43199227bd6ddd76679b70a |
kernel-debug-devel-2.6.18-194.el5.ia64.rpm | SHA-256: dd842c74761b4dc73573e1ecb444d7abab2d521a7b4af8a37ca99f6c77248ebd |
kernel-devel-2.6.18-194.el5.ia64.rpm | SHA-256: fb05a88d78de9696b52433cc8fe05288a14331b5ded414ef4e65e87e7419ffa7 |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.ia64.rpm | SHA-256: 1b17403282e0daef28a3a57fcccef5e306d16ecf67a6fefde24a1a783e597867 |
kernel-xen-2.6.18-194.el5.ia64.rpm | SHA-256: 1dd9064dbefb78fc9ee83b4f07db23a15bdd26a124198e5dae7dd129254d0548 |
kernel-xen-devel-2.6.18-194.el5.ia64.rpm | SHA-256: 21b19915293be9f7d33a2c2d8a2af091f9dfa0f8838e41a653b6909b903f1ca7 |
i386 | |
kernel-2.6.18-194.el5.i686.rpm | SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c |
kernel-PAE-2.6.18-194.el5.i686.rpm | SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2 |
kernel-PAE-devel-2.6.18-194.el5.i686.rpm | SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7 |
kernel-debug-2.6.18-194.el5.i686.rpm | SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f |
kernel-debug-devel-2.6.18-194.el5.i686.rpm | SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc |
kernel-devel-2.6.18-194.el5.i686.rpm | SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5 |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.i386.rpm | SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4 |
kernel-xen-2.6.18-194.el5.i686.rpm | SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a |
kernel-xen-devel-2.6.18-194.el5.i686.rpm | SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kernel-2.6.18-194.el5.src.rpm | SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f |
x86_64 | |
kernel-2.6.18-194.el5.x86_64.rpm | SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95 |
kernel-debug-2.6.18-194.el5.x86_64.rpm | SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0 |
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8 |
kernel-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.x86_64.rpm | SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a |
kernel-xen-2.6.18-194.el5.x86_64.rpm | SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915 |
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782 |
i386 | |
kernel-2.6.18-194.el5.i686.rpm | SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c |
kernel-PAE-2.6.18-194.el5.i686.rpm | SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2 |
kernel-PAE-devel-2.6.18-194.el5.i686.rpm | SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7 |
kernel-debug-2.6.18-194.el5.i686.rpm | SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f |
kernel-debug-devel-2.6.18-194.el5.i686.rpm | SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc |
kernel-devel-2.6.18-194.el5.i686.rpm | SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5 |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.i386.rpm | SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4 |
kernel-xen-2.6.18-194.el5.i686.rpm | SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a |
kernel-xen-devel-2.6.18-194.el5.i686.rpm | SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
kernel-2.6.18-194.el5.src.rpm | SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f |
x86_64 | |
kernel-2.6.18-194.el5.x86_64.rpm | SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95 |
kernel-debug-2.6.18-194.el5.x86_64.rpm | SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0 |
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8 |
kernel-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.x86_64.rpm | SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a |
kernel-xen-2.6.18-194.el5.x86_64.rpm | SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915 |
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782 |
i386 | |
kernel-2.6.18-194.el5.i686.rpm | SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c |
kernel-PAE-2.6.18-194.el5.i686.rpm | SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2 |
kernel-PAE-devel-2.6.18-194.el5.i686.rpm | SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7 |
kernel-debug-2.6.18-194.el5.i686.rpm | SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f |
kernel-debug-devel-2.6.18-194.el5.i686.rpm | SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc |
kernel-devel-2.6.18-194.el5.i686.rpm | SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5 |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.i386.rpm | SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4 |
kernel-xen-2.6.18-194.el5.i686.rpm | SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a |
kernel-xen-devel-2.6.18-194.el5.i686.rpm | SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
kernel-2.6.18-194.el5.src.rpm | SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f |
s390x | |
kernel-2.6.18-194.el5.s390x.rpm | SHA-256: fb3efedad26d2f5df192eeb856dd112765209a4168843584ed8dab548f689e2b |
kernel-debug-2.6.18-194.el5.s390x.rpm | SHA-256: 843c6266765bf325a694dc41b9bb0016a5b47e6a1ec315685c1184cdd94855a9 |
kernel-debug-devel-2.6.18-194.el5.s390x.rpm | SHA-256: a9dea16a8f865a7b3a1c4f0d9d1ee6b8c25e787eacf732f16de209706766b7e0 |
kernel-devel-2.6.18-194.el5.s390x.rpm | SHA-256: 9ecefc25bd450878f25139f671f06dd469ab8d0c4711179988b074ea2ef687b4 |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.s390x.rpm | SHA-256: 7c214912866394379e28562cdd74c2356414a5fd5785aa4eb3b517d30e33df43 |
kernel-kdump-2.6.18-194.el5.s390x.rpm | SHA-256: c233a3025d505384f0f3b3672dfbfe65f224ed38fcf0488d020c3e4ce9a2798c |
kernel-kdump-devel-2.6.18-194.el5.s390x.rpm | SHA-256: f8f24af1ad75b215c85a2b005450dff93ce08d4dbe20e96fbce25a386c649d16 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
kernel-2.6.18-194.el5.src.rpm | SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f |
ppc | |
kernel-2.6.18-194.el5.ppc64.rpm | SHA-256: de34cc79c204d99c6a234e1c2a67c3522a924b5e8e95511a0de5275eefb40ab8 |
kernel-debug-2.6.18-194.el5.ppc64.rpm | SHA-256: 858b4e187da982bea23774730de79e24e53bf19ce6ac3136014dc93b915eaa2d |
kernel-debug-devel-2.6.18-194.el5.ppc64.rpm | SHA-256: fe4b9afeec455d8d95953237f8f84211d05070965a60fc0f2975a8d8505e3233 |
kernel-devel-2.6.18-194.el5.ppc64.rpm | SHA-256: 5105802dea90e7db86361d8f3e2b3f18564ad90eb905694beaf385acc6d5a311 |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.ppc.rpm | SHA-256: 4c6756cf6b87b8fd41902d0d3c04bd290b45f44bc97b46ae0ee86a6f6bb290ff |
kernel-headers-2.6.18-194.el5.ppc64.rpm | SHA-256: ab56e79999f460c09bf3394cce48a5a96e0c50e00e7193341ebb7186820054b6 |
kernel-kdump-2.6.18-194.el5.ppc64.rpm | SHA-256: 10ecb1f69c83bdb147151d997d8b16563addfb7d20255e12a2a84a8df1cc8352 |
kernel-kdump-devel-2.6.18-194.el5.ppc64.rpm | SHA-256: 595fd31a236366d00dcaa9894593f92bef5ec895de86b8f032ec6af4a955fa55 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
kernel-2.6.18-194.el5.src.rpm | SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f |
x86_64 | |
kernel-2.6.18-194.el5.x86_64.rpm | SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95 |
kernel-debug-2.6.18-194.el5.x86_64.rpm | SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0 |
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8 |
kernel-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.x86_64.rpm | SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a |
kernel-xen-2.6.18-194.el5.x86_64.rpm | SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915 |
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm | SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782 |
i386 | |
kernel-2.6.18-194.el5.i686.rpm | SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c |
kernel-PAE-2.6.18-194.el5.i686.rpm | SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2 |
kernel-PAE-devel-2.6.18-194.el5.i686.rpm | SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7 |
kernel-debug-2.6.18-194.el5.i686.rpm | SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f |
kernel-debug-devel-2.6.18-194.el5.i686.rpm | SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc |
kernel-devel-2.6.18-194.el5.i686.rpm | SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5 |
kernel-doc-2.6.18-194.el5.noarch.rpm | SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4 |
kernel-headers-2.6.18-194.el5.i386.rpm | SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4 |
kernel-xen-2.6.18-194.el5.i686.rpm | SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a |
kernel-xen-devel-2.6.18-194.el5.i686.rpm | SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.