此内容没有您所选择的语言版本。

5.4 Technical Notes


Red Hat Enterprise Linux 5

Every Change to Every Package

Edition 4

Logo

Abstract

The Red Hat Enterprise Linux 5.4 Technical Notes list and document the changes made to the Red Hat Enterprise Linux 5 operating system and its accompanying applications between minor release Red Hat Enterprise Linux 5.3 and minor release Red Hat Enterprise Linux 5.4.

Preface

The Red Hat Enterprise Linux 5.4 Technical Notes list and document the changes made to the Red Hat Enterprise Linux 5 operating system and its accompanying applications between minor release Red Hat Enterprise Linux 5.3 and minor release Red Hat Enterprise Linux 5.4.
For system administrators and others planning Red Hat Enterprise Linux 5.4 upgrades and deployments, the Technical Notes provide a single, organized record of the bugs fixed in, features added to, and Technology Previews included with this new release of Red Hat Enterprise Linux.
For auditors and compliance officers, the Red Hat Enterprise Linux 5.4 Technical Notes provide a single, organized source for change tracking and compliance testing.
For every user, the Red Hat Enterprise Linux 5.4 Technical Notes provide details of what has changed in this new release.
The Technical Notes also include, as an Appendix, the Red Hat Enterprise Linux Package Manifest: a listing of every changed package in this release.

Chapter 1.  Package Updates

1.1.  NetworkManager

1.1.1.  RHSA-2009:0361: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0361
Updated NetworkManager packages that fix two security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
NetworkManager is a network link manager that attempts to keep a wired or wireless network connection active at all times.
An information disclosure flaw was found in NetworkManager's D-Bus interface. A local attacker could leverage this flaw to discover sensitive information, such as network connection passwords and pre-shared keys. (CVE-2009-0365)
A potential denial of service flaw was found in NetworkManager's D-Bus interface. A local user could leverage this flaw to modify local connection settings, preventing the system's network connection from functioning properly. (CVE-2009-0578)
Red Hat would like to thank Ludwig Nussel for reporting these flaws responsibly.
Users of NetworkManager should upgrade to these updated packages which contain backported patches to correct these issues.

1.1.2.  RHBA-2009:1389: bug fix update

Updated NetworkManager packages that fix several bugs are now available.
NetworkManager is a network link manager that attempts to keep a wired or wireless network connection active at all times.
These updated NetworkManager packages provide the following fixes:
  • NetworkManager allowed users to create completely insecure ad-hoc wireless networks and indeed, the default security setting for wifi sharing was "none". Because of this default setting and because NetworkManager did not warn users of the potential security risks, users could unwittingly compromise the security of their computers. Now, NetworkManager uses "WEP Passphrase" as the default security option for creating a new wifi network, and allows administrators to disable users' ability to share wifi connections without security in place, or their ability to share wifi connections at all. These measures make it less likely that a user could inadvertently compromise a sensitive system. (BZ#496247)
  • accessing the context (right-click) menu of the NetworkManager GNOME applet could trigger the GNOME Keyring Unlock dialog to appear, after which no X11 applications could receive keyboard or mouse events. Now, NetworkManager closes the context menu before requesting keyring items, and therefore avoids this situation. (BZ#476020)
  • NetworkManager did not export VPN configurations. When a user selected this function, NetworkManager would present an error message: "VPN setting invalid", even for a connection with valid settings. Network manager now exports VPN connections correctly. (BZ#485345)
  • due to faulty logic in the code, nm-applet would choose the lowest signal strength of all APs of the same SSID in the area and display this strength in the menu to represent the signal strength for that SSID. NetworkManager now correctly calculates wireless signal strength when multiple access points with the same SSID are present. (BZ#485477)
  • when NetworkManager fails to connect to a wifi network, it re-prompts the user for the passphrase for that network. Previously, NetworkManager did not retain the original text of the passphrase entered by the user. Therefore, when users selected the "Show password" option so that they could see what they had typed after a failed connection attempt, NetworkManager displayed the passphrase in hexadecimal form. NetworkManager now retains the original text of the passphrase and displays the original passphrase instead of a hexadecimal string when the user selects the "Show password" option. (BZ#466509)
  • NetworkManager has its own internal method of starting loopback devices, and does not use the configuration settings stored in /etc/sysconfig/network-scripts/ifcfg-lo. Previously, NetworkManager would produce an error, alerting users that the configuration settings were ignored. This error message could mislead users to think that a problem had occurred. Now, NetworkManager does not present this error message to the user, and avoids the potential confusion. (BZ#484060)
  • the NetworkManager package requires wpa_supplicant, but previously omitted the Epoch term for the wpa_supplicant package. Consequently, installing NetworkManager did not ensure that a suitable version of wpa_supplicant was installed on the system. Now, the NetworkManager package specifies the epoch for the version of wpa_supplicant that it requires. (BZ#468688)
  • NetworkManager displayed configuration options for VPN even when no VPN software was installed on the system. This could mislead users to think that they could make VPN connections in situations when it was not possible to make these connections. Now, the VPN submenu is hidden if no VPN services are installed on the system, avoiding the potential confusion. (BZ#464604)
Users are advised to upgrade to these updated NetworkManager packages, which provide these fixes.

1.2.  OpenIPMI

1.2.1.  RHEA-2009:1312: bug fix and enhancement update

Updated OpenIPMI packages that fix several bugs and add various enhancements are now available.
OpenIPMI (Intelligent Platform Management Interface) provides graphical and command line tools and utilities to access platform information, thus facilitating system management and monitoring for system administrators.
These updated packages upgrade OpenIPMI to upstream version 2.0.16 and ipmitool to version 1.8.11. (BZ#475542)
These updated OpenIPMI packages provide fixes for the following bugs:
  • some IPMI-enabled hardware makes use of UDP ports 623 (ASF Remote Management and Control Protocol) and 664 (ASF Secure Remote Management and Control Protocol), which corrupts other traffic on these ports, causing symptoms such as autofs mounts hanging. The OpenIPMI package provides a configuration file for xinetd that prevents other services from using these ports, so that they do not interfere with IPMI. On affected systems, the fix has to be enabled manually by setting "disabled = no" for the appropriate port(s) in /etc/xinetd.d/rmcp and (re)starting the xinetd service. (BZ#429329)
  • on the S/390 architecture, running "ipmicmd" to access the internal hash table of open connections caused the utility to segmentation fault. With this update, "ipmicmd" correctly handles the hash table and thus no longer crashes. (BZ#437013 )
  • the "rmcp_ping" utility did not perform checks on the arguments provided to it on the command line, and would accept invalid port numbers and/or start tags. (BZ#437256)
  • the ipmitool utility is shipped in the OpenIPMI-tools packages, and it was not possible to have other packages depend on "ipmitool" directly. These updated packages explicitly provide the "ipmitool" feature so that other packages are now able to reference it. (BZ#442784)
  • several libraries in the OpenIPMI packages contained unnecessary RPATH values, which have not been compiled in to these updated packages. (BZ#466119)
  • the OpenIPMI-devel packages contained manual pages which were already provided by the OpenIPMI packages and have therefore been removed from the OpenIPMI-devel packages. (BZ#466487)
  • the ipmievd daemon listens for events sent by the BMC to the SEL and logs those events to syslog. Previously, the OpenIPMI-tools package did not contain the init script for the "ipmievd" service. This init script is included in these updated packages. (BZ#469979)
  • previously, it was not possible to query "ipmitool" to determine whether SOL payloads were enabled or disabled for specific users. These updated packages introduce a new "ipmitool sol payload status" query that implements the "Gets User Payload Access Command" from the IPMI specification, thus allowing users' SOL payload access privileges to be queried. (BZ#470031)
  • the "ipmitool sel list" command displayed event IDs as hexadecimal numbers. However, it was not possible to then provide these values as parameters to other "ipmitool sel" commands. These packages include an updated ipmitool whose various "ipmitool sel" commands accept both decimal and hexadecimal ID values as parameters. (BZ#470805)
  • it was not possible to specify a Kg key with non-printable characters on the ipmitool command line. With this update, a Kg key can now be specified as a hexadecimal value using the '-y' command line option. (BZ#479252)
  • the "sensor list" section of the ipmitool(1) man page now describes each columnar value of the command "ipmitool sensors list". (BZ#479702)
In addition, these updated packages provide the following enhancements:
  • new in this OpenIPMI 2.0.16 release is the OpenIPMI-gui package, which contains a GUI that provides a tree-structured view of the IPMI domains it is connected to. (BZ#504783)
  • the "ipmitool sol set" command now checks the values of arguments provided on the command line. (BZ#311231)
  • the ipmitool(1) man page has been updated to include descriptions for these commands: spd, picmg, hpm, firewall, fwum and kontronoem. (BZ#438539)
Users are advised to upgrade to these updated OpenIPMI packages, which resolve these issues and add these enhancements.

1.3.  acpid

1.3.1.  RHSA-2009:0474: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0474
An updated acpid package that fixes one security issue is now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
acpid is a daemon that dispatches ACPI (Advanced Configuration and Power Interface) events to user-space programs.
Anthony de Almeida Lopes of Outpost24 AB reported a denial of service flaw in the acpid daemon's error handling. If an attacker could exhaust the sockets open to acpid, the daemon would enter an infinite loop, consuming most CPU resources and preventing acpid from communicating with legitimate processes. (CVE-2009-0798)
Users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

1.3.2.  RHBA-2009:1403: bug fix update

An updated acpid package that fixes a bug is now available.
acpid is a daemon that dispatches ACPI (Advanced Configuration and Power Interface) events to user-space programs.
In some pre-release versions of Red Hat Enterprise Linux 5.4, the Hardware Abstraction Layer (HAL) daemon was initialized before the ACPI daemon. Consequently, this resulted in the HAL daemon preventing the ACPI daemon from accessing /proc/acpi/event. With this update, the acpid package has been updated so the ACPI daemon now starts before the HAL daemon, which resolves this issue. (BZ#503177)
Users should upgrade to this updated package, which resolves these issues.

1.4.  acroread

1.4.1.  RHSA-2009:1109: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1109
Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Adobe Reader allows users to view and print documents in Portable Document Format (PDF).
Multiple security flaws were discovered in Adobe Reader. A specially crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2009-0198, CVE-2009-0509, CVE-2009-0510, CVE-2009-0511, CVE-2009-0512, CVE-2009-0888, CVE-2009-0889, CVE-2009-1855, CVE-2009-1856, CVE-2009-1857, CVE-2009-1858, CVE-2009-1859, CVE-2009-1861, CVE-2009-2028)
All Adobe Reader users should install these updated packages. They contain Adobe Reader version 8.1.6, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.

1.4.2.  RHSA-2009:0478: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0478
Updated acroread packages that fix two security issues are now available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Adobe Reader allows users to view and print documents in Portable Document Format (PDF).
Two flaws were discovered in Adobe Reader's JavaScript API. A PDF file containing malicious JavaScript instructions could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader. (CVE-2009-1492, CVE-2009-1493)
All Adobe Reader users should install these updated packages. They contain Adobe Reader version 8.1.5, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.

1.4.3.  RHSA-2009:0376: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0376
Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Adobe Reader allows users to view and print documents in Portable Document Format (PDF).
Multiple input validation flaws were discovered in the JBIG2 compressed images decoder used by Adobe Reader. A malicious PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader. (CVE-2009-0193, CVE-2009-0658, CVE-2009-0928, CVE-2009-1061, CVE-2009-1062)
All Adobe Reader users should install these updated packages. They contain Adobe Reader version 8.1.4, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.

1.5.  aide

1.5.1.  RHEA-2009:1073: enhancement update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHEA-2009:1073
An enhanced aide package that contains minor adjustments to the aide.conf configuration file to offer improved initial behavior is now available.
Advanced Intrusion Detection Environment (AIDE) is a program that creates a database of files on a system, and then uses that database to ensure file integrity and detect system intrusions.
This updated aide package adds the following enhancement:
  • the /var/run/utmp configuration file is now correctly treated as a log file, and the hidden files (also known as "dot files") located in the root user's home directory are now checked for permission integrity only. These enhancements to AIDE should cause systems to produce fewer false alarms concerning files which have changed. (BZ#476542)
Users of aide are advised to upgrade to this updated package, which adds this enhancement.

1.6.  amanda

1.6.1.  RHBA-2009:1300: bug fix update

Updated amanda packages that fix two bugs are now available.
Amanda is a network-capable tape backup solution.
These updated amanda packages resolve the following issues:
  • the "amtapetype" command had a bug in memory management: an invalid pointer was passed to the free() function. In some circumstances this caused amrecover to fail with a "Extractor child exited with status 2" error. The invalid pointer is no longer passed to free() and amrecover extracts files from a tape backup as expected. (BZ#476971)
  • previously, amanda sub-packages (including amanda-devel, amanda-server and amanda-client) were only required to be the same version as amanda: they did not check that their release was in sync with the base amanda package. This could cause the packages to go out-of-sync and malfunction if an attempt was made to update either the base amanda package or any of amanda's sub-packages. With this update, both the version and release are checked, ensuring all dependent packages remain in sync if either the base package or any sub-packages are updated. (BZ#497111)
Users of amanda should upgrade to these updated packages, which resolves these issues.

1.7.  anaconda

1.7.1.  RHBA-2009:1306: bug fix and enhancement update

Updated anaconda packages that fix several bugs and add various enhancements are now available.
Anaconda is the system installer.
These updated anaconda packages provide fixes for the following bugs:
Anaconda is the system installer.
These updated anaconda packages provide fixes for the following bugs:
  • a write-protected SD card could cause an installation failure even when the mount point was de-selected in the Disk Druid. (BZ#471883)
  • Anaconda occasionally attempted to delete nonexistent snapshots, which caused installation to fail. (BZ#433824)
  • if a boot file was retrieved via DHCP, Anaconda now saves it so that it can later be used to construct the default Kickstart file if the user boots with "ks" as a boot parameter. (BZ#448006)
  • driver disk locations can now be specified using the "dd=[URL]" option, where [URL] is an FTP, HTTP or NFS location. (BZ#454478)
  • the bootloader can now be located in the MBR on a software RAID1 boot partition. (BZ#475973)
  • Anaconda now installs multipath packages so that multipath devices work as expected following first reboot. (BZ#466614)
  • Anaconda prompted for the time zone even when the time zone was correctly specified in the Kickstart file. (BZ#481617)
  • on Itanium systems, the time stamps of installed files and directories were in the future. (BZ#485200)
  • the iSCSI Boot Firmware Table (iBFT) now works with Challenge-Handshake Authentication Protocol (CHAP) and reverse-CHAP setups. (BZ#497438)
  • Anaconda now correctly sets the umask on device nodes. (BZ#383531)
  • following a manual installation during which IPv6 was configured, the /etc/sysconfig/network-scripts/ifcfg-[interface] file (such as ifcfg-eth0) did not contain those IPv6 network details. (BZ#445394)
  • Anaconda now correctly handles LAN channel station (LCS) devices. (BZ#471101)
  • when using autostep mode with a Kickstart configuration file, Anaconda incorrectly prompted for a root password even when the root password was designated as encrypted. (BZ#471122)
  • empty repositories caused installation to fail. (BZ#476182)
  • large numbers of tape drives in the Kickstart file are now handled correctly. (BZ#476186)
  • hyphenated MAC address formats in the Kickstart file (e.g. "ksdevice=00-11-22-33-44-55") are now allowed. (BZ#480309)
  • an unexpected exception during Logical Unit Number (LUN) selection caused installation to fail. (BZ#475271)
  • when installing on a low-memory system or virtual machine over HTTP or FTP, a non-present "lspci" binary caused installation to fail. (BZ#476476)
  • Anaconda now correctly adds the user to the default group, and groups specified by "--groups", when performing a Kickstart installation. (BZ#454418)
  • the "cmdline" option, which specifies a non-Ncurses installation, is now honored in the Kickstart file. (BZ#456325)
  • Kickstart file download from an anonymous FTP site is now possible. (BZ#477536)
In addition, these updated packages provide the following enhancements:
  • default configuration values are now suggested during System z installation. (BZ#475350)
  • hardware device descriptions have been enhanced to reflect expanded hardware support. (BZ#498511)
  • the Mellanox ConnectX mt26448 10Gb/E driver is now supported. (BZ#514971)
  • the mpt2sas driver is now supported. (BZ#475671)
  • the Emulex Tiger Shark converged network adatper is now supported. (BZ#496875)
  • the Marvell RAID bus controller MV64460/64461/64462 and Emulex OneConnect 10GbE NIC devices are now supported. (BZ#493179)
  • the IGB Virtual Function driver is now supported. (BZ#502875)
  • installation on RAID10 devices is now supported. (BZ#467996)
  • non-fatal errors and conditions are now ignored when installing from a Kickstart file. (BZ#455465)
  • stale LVM metadata can now be removed with the "--clearpart" option. (BZ#462615)
  • to aid in identifying the network card, an option to blink its LED for 5 minutes is now present. (BZ#473747)
  • IPv6 address validation on S/390 installations has been improved. (BZ#460579)
Users are advised to upgrade to these updated anaconda packages, which resolve these issues and add these enhancements.
Users are advised to upgrade to these updated anaconda packages, which resolve these issues and add these enhancements.

1.8.  apr

1.8.1.  RHSA-2009:1204: Moderate and apr-util security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1204
Updated apr and apr-util packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It aims to provide a free library of C data structures and routines. apr-util is a utility library used with APR. This library provides additional utility interfaces for APR; including support for XML parsing, LDAP, database interfaces, URI parsing, and more.
Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the way the Apache Portable Runtime (APR) manages memory pool and relocatable memory allocations. An attacker could use these flaws to issue a specially-crafted request for memory allocation, which would lead to a denial of service (application crash) or, potentially, execute arbitrary code with the privileges of an application using the APR libraries. (CVE-2009-2412)
All apr and apr-util users should upgrade to these updated packages, which contain backported patches to correct these issues. Applications using the APR libraries, such as httpd, must be restarted for this update to take effect.

1.9.  apr-util

1.9.1.  RHSA-2009:1107: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1107
Updated apr-util packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
apr-util is a utility library used with the Apache Portable Runtime (APR). It aims to provide a free library of C data structures and routines. This library contains additional utility interfaces for APR; including support for XML, LDAP, database interfaces, URI parsing, and more.
An off-by-one overflow flaw was found in the way apr-util processed a variable list of arguments. An attacker could provide a specially-crafted string as input for the formatted output conversion routine, which could, on big-endian platforms, potentially lead to the disclosure of sensitive information or a denial of service (application crash). (CVE-2009-1956)
Note: The CVE-2009-1956 flaw only affects big-endian platforms, such as the IBM S/390 and PowerPC. It does not affect users using the apr-util package on little-endian platforms, due to their different organization of byte ordering used to represent particular data.
A denial of service flaw was found in the apr-util Extensible Markup Language (XML) parser. A remote attacker could create a specially-crafted XML document that would cause excessive memory consumption when processed by the XML decoding engine. (CVE-2009-1955)
A heap-based underwrite flaw was found in the way apr-util created compiled forms of particular search patterns. An attacker could formulate a specially-crafted search keyword, that would overwrite arbitrary heap memory locations when processed by the pattern preparation engine. (CVE-2009-0023)
All apr-util users should upgrade to these updated packages, which contain backported patches to correct these issues. Applications using the Apache Portable Runtime library, such as httpd, must be restarted for this update to take effect.

1.10.  aspell

1.10.1.  RHBA-2009:1070: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1070
An updated aspell-nl package that fixes a bug is now available.
Aspel-nl provides the word list/dictionaries for Dutch language.
This updated aspell-nl package fixes the following bug:
  • the previous aspell-nl update provided also an empty aspell-nl-debuginfo package. The dictionary packages for Aspell do not require debuginfo packages; this update therefore removes the extraneous aspell-nl-debuginfo package. (BZ#500540)
All Dutch language Aspell users are advised to upgrade to this updated package, which resolves this issue.

1.11.  audit

1.11.1.  RHBA-2009:0475: bug fix and enhancement update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0475
Updated audit packages that fix a bug and add an enhancement are now available.
The audit packages contain user-space utilities for storing and searching the audit records generated by the audit subsystem in the Linux 2.6 kernel.
These updated audit packages fix the following bug:
  • ausearch was unable to interpret tty audit records. tty records are specially-encoded, and the ausearch program could not decode them, which resulted in their being displayed in encoded form. These updated packages enable ausearch to interpret (i.e. decode correctly) TTY records, thus resolving the issue. ( BZ#497518 )
In addition, these updated audit packages provide the following enhancement:
  • The aureport program was enhanced to add a '--tty' report option. This is a new report that was recently added to audit in order to aid in the review of TTY audit events. ( BZ#497518 )
Users are advised to upgrade to these updated audit packages, which resolve this issue and add this enhancement.

1.11.2.  RHBA-2009:0443: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0443
Updated audit packages that resolve several issues are now available.
The audit packages contain user-space utilities for storing and searching the audit records generated by the audit subsystem in the Linux 2.6 kernel.
These updated packages fix the following bugs in the auditd daemon and one of its utilities:
  • when the log_format parameter was set to "NOLOG" in the auditd.conf configuration file, audit events which were queued in the internal message queue were not cleared after being written to dispatchers. This caused the internal message queue to grow over time, causing an auditd memory leak. With these updated packages the audit events in the internal message queue are properly cleared after being written, thus plugging the memory leak.
  • certain audit rules failed parser checks even though they were specified correctly, which prevented those rules from being loaded into the kernel. With this update, all correctly-specified audit rules pass parser checks and can be loaded into the kernel, thus resolving the problem.
All users of audit are advised to upgrade to these updated packages, which resolve these issues.

1.11.3. RHEA-2009:1303: enhancement

Updated audit packages, which includes TTY audit and remote log aggregation updates among other enhancements, are now available.
The audit packages contain user space utilities for storing and searching the audit records generated by the audit subsystem in the Linux 2.6 kernel.
These updated packages upgrade the auditd daemon and its utilities to the newer upstream version 1.7.13 (BZ#483608), which provides the following enhancements and bug fixes over the previous version:
  • the user-space audit tools use ausearch to search audit records. Ausearch does not contain logic to handle event-linked lists and previously, could not find records if they were out of chronological order. The logic to link these lists together and evaluate whether the list is complete is now available in the auparse library. Ausearch now uses auparse to handle these lists so that it can find records even when they are out of order. (BZ#235898)
  • the manual page for ausyscall did not document use of the "--exact" option. A description of "--exact" is now included. (BZ#471383)
  • due to a logic error, the "local_port = any" option for the audisp-remote plugin did not work as described in the manual page. When executed with this option, the plugin would display the error "Value any should only be numbers" and terminate. With the error corrected, the plugin works as documented. (BZ#474466)
  • previously, audisp would read not only its configuration file (in /etc/audisp/plugins.d/) but any files with names simlar to its configuration file found in the same directory, for example, backups of the configuration file. As a result, if a plugin were listed in more than one configuration file, it would be activated multiple times. audisp now reads only its configuration file and therefore avoids activating multiple copies of plugins. (BZ#476189)
  • previously, TTY audit results were reported in ausearch in their raw hexadecimal form. This format was not easily readable by humans, so ausearch now converts the hexadecimal strings and presents them as their corresponding keystrokes. Note that the "--tty" option has now been added to aureport to provide a convenient way of accessing the TTY audit report. (BZ#483086)
  • previously, when setting the output log format to "NOLOG", audit events would be added to the internal message queue but not removed from the queue when written to the dispatchers. The queue would therefore grow to consume available memory. Audit events are now removed from the internal queue to avoid this memory leak. (BZ#487237)
  • due to a logic error, auditctl was not correctly parsing options that included non-numeric characters. For example, the "-F a0!=-1" option would result in an error saying "-F value should be number for a0!=-1". With the error corrected, auditctl parses this rule correctly. (BZ#497542)
Other issues corrected in the rebase include:
  • remote logging is a technology preview item and as such had some bugs. Robustness of this facility was improved.
  • on busy systems, pam had problems communicating with the audit system, which resulted in a timeout and being denied access to the system. We now loop a few times when checking for the event ACK.
  • On biarch system, a warning is emitted if audit rules don't cover both 64 & 32 bit syscalls of the same name.
  • Fix regression where msgtype couldn't be used for a range of types.
  • New aulast program helps analyse login session information.
  • If log rotation fails, auditd now leaves the old log writable.
  • A tcp_wrappers config option was added to auditd for remote logging.
  • Fix problem where negative uids in audit rules on 32 bit systems resulted in the wrong uid and therefore incorrect event logging.
Users of audit are advised to upgrade to these updated packages, which add these enhancements and bug fixes.

1.12.  authconfig

1.12.1.  RHBA-2009:0482: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0482
Updated authconfig packages that fix a bug are now available.
The authconfig packages contain a program with both a command line and a GUI interface for configuring a system to use shadow passwords, or to function as a client for certain network user-information and authentication schemes.
  • when disabling caching using the system-config-authentication graphical interface or with the "authconfig --update --disablecache" command, authconfig did not properly stop ncsd, the name service cache daemon, which could have caused timeouts and delays during authentication or when user information was requested by applications. (BZ#471642)
Users are advised to upgrade to these updated authconfig packages, which resolve this issue.

1.13.  authd

1.13.1.  RHBA-2009:0442: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0442
An updated authd package that fixes various bugs is now available.
The authd package contains a small and fast RFC 1413 ident protocol daemon with both xinetd server and interactive modes that supports IPv6 and IPv4 as well as the more popular features of pidentd.
This updated authd package includes fixes for the following bugs:
  • on 64-bit architectures, a size mismatch between data structures led to an endlessly repeating pattern of output, though no error. This size mismatch has been fixed in this updated package so that authd works as expected.
  • attempting to connect to a Postgresql database using identd authentication resulted in error messages similar to the following in Postgresql's pg_log, where [user] is the username of the user attempting to connect:
    CESTLOG:  invalidly formatted response from Ident server: "49795 ,
    5432 : ERROR :[user]
    
    This authd error has been corrected so that users are now able to log in successfully, thus resolving the issue.
  • previously, installing the authd package resulted in the creation of a user named "ident" with a home directory of /home/ident. With this updated package, the "ident" user is still created, but, by convention, ident's home directory is the root ("/") directory.
All users of authd are advised to upgrade to this updated package, which resolves these issues.

1.14.  autofs

1.14.1.  RHBA-2009:1131: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1131
An updated autofs package that fixes a bug which caused autofs to fail occasionally when accessing an LDAP server while using SASL authentication is now available.
The autofs utility controls the operation of the automount daemon, which automatically mounts, and then unmounts file systems after a period of inactivity. File systems can include network file systems, CD-ROMs, diskettes, and other media.
This updated autofs package fixes the following bug:
  • when connecting to an LDAP server while using SASL authentication, autofs occasionally failed with a segmentation fault, forcing users to restart the autofs service. This failure was caused by a double-free error in the cyrus-sasl module, which has been fixed in this updated package. Connecting to an LDAP server while using SASL authentication now works as expected. (BZ#504566)
All users of autofs are advised to upgrade to this updated package, which resolves this issue.

1.14.2. RHBA-2009:1397: bug fix update

An updated autofs package that fixes various bugs and adds an enhancement is now available.
The autofs utility controls the operation of the automount daemon. The automount daemon automatically mounts file systems when you use them, and unmounts them when they are not busy.
  • Previously, automount did not return its status to its parent while it waited for the autofs daemon to complete its startup. As a result, the init script did not always report success when the service started sucessfully. Automount now returns its status and accurately reports when the service has started. (BZ#244177)
  • Autofs uses "umount -l" to clear active mounts at restart. This method results in getcwd() failing because the point from which the path is constructed has been detached from the mount tree. To resolve this a miscellaneous device node for routing ioctl commands to these mount points has been implemented in the autofs4 kernel module and a library added to autofs. This provides the ability to re-construct a mount tree from existing mounts and then re-connect them. (BZ#452122)
  • Previously, the version of autofs shipped with Red Hat Enterprise Linux 5 used the "-hosts" method as its default way to handle /net mounts. Using this method, it was necessary to reboot the client to release processes if if the connection to the server was lost. Now, autofs uses the "intr" option as its default, which allows the mount to be unmounted forcibly if necessary. (BZ#466673)
  • By default, autofs waits 60 seconds for a server to respond while performing a YP lookup. Previously, repeated attempts to perform lookups for non-existent directories could result in all available ports becoming congested. Autofs now maintains a cache of failed lookups and avoids repeated failures occupying the available ports. (BZ#469387)
  • The %{dist?} tag that is used by rpm spec files is defined in ~/.rpmmacros for the user building the package. However, this is not a reliable method of providing the "Release:" tag in a package, because the {%dist?} tag might not be defined for the user building the package. Previously, autofs relied on the {%dist?} tag to define "Release:" in its spec file, which meant that building it correctly depended on the user's ~/.rpmmacros file being set up appropriately. "Release:" is now defined directly in the autofs file system, which makes it more likely to build correctly on a greater number of systems. (BZ#471385)
  • Previously, the LDAP module lacked the ability to lock the server list. When used in SASL authenticated environments, this could cause autofs to fail if the credential for the connection became stale. The LDAP module can now lock a server list, and autofs refreshes and retries failed SASL connections. Autofs therefore performs more reliably when used in authenticated environments. (BZ#481139)
  • Submounts are detached threads that do not belong to the master map entry list. Previously, autofs did not release mount resources when a mount thread for a submount was terminated. With these resources not released, a segmentation fault during a shutdown or reboot of the system could result. Resources allocated to submounts are now explictly released in the code and the segmentation fault is therefore avoided. (BZ#482988)
  • Previously, autofs contained an an incorrect %token declaration in the master map parser. In some rare cases this could cause the timeout sent from the tokenizer to the parser to always be zero, which is interpreted as "never". As a result, indirect mounts would never expire, no matter how long they had been inactive. The %token declaration is now corrected, meaning that mounts expire as they should. (BZ#487151)
  • Previously, autofs used the select() function to process direct-mount maps and was therefore limited by the file descriptor limit (by default, 1024). As a consequence, autofs was not able to use direct-mount maps with numbers of entries larger than the limit, and would stop responding when it used up all available file descriptors. Now, autofs uses poll() instead of select() and is therefore no longer limited by the available file descriptors. Freed of this limitation, autofs can use large direct-mount maps. (BZ#487653)
  • Previously, autofs reported an incorrect buffer size internally when passing the startup status from the autofs daemon to the parent process. Although no specific consequences of this inaccuracy are known, the buffer size is now reported correctly to avoid any consequences arising in the future. (BZ#487656)
  • Previously, the additive hashing algorithm used by autofs to generate hash values would result in a clustering of values that favoured a small range of hash indexes and led to reduced performance in large maps. Autofs now uses a "one-at-a-time" hash function which gives a better distribution of hash values in large hash tables. Use of the "one-at-a-time" hash function safeguards lookup performance as maps increase to 8,000 entries and beyond. (BZ#487985)
  • Previously, autofs would not always read file maps. If a map had been loaded into cache, autofs would rely on checks to determine whether the map was up to date before reading the map. Because file maps require a linear search through the file, large maps consume significant resources to process. Now, autofs automatically loads file-based maps when it starts, and uses the map file mtime parameter to detemine whether the cache needs to be refresed. This avoids the processing overhead of checking a map before deciding whether to load it. (BZ#487986)
  • Previously, the autofs code contained a logic error that resulted in a crash under conditions of heavy load. When autofs was not able to create a new pthread, it would double free a value. Now, with the error corrected, when heavily loaded, autofs will fail to create a new pthread safely. It reports the failure, but does not crash. (BZ#489658)
  • Previously, autofs could use the LDAP server on a network only if the location of the LDAP server were specified manually. Now, if no LDAP server is specified, autofs can look up domain SRV server records to make LDAP connections. This functionality simplifies the use of autofs on networks where an LDAP server is available. (BZ#490476)
  • Previously, if a name lookup failed while creating a TCP or UDP client, automount would destroy the client, but would not set the rpc client to NULL. Therefore, subsequent lookup attempts would attempt to use the invalid rpc client, which would lead to a segmentation fault. Now, when a name lookup fails, autofs sets the rpc client to NULL, and therefore avoids the segmentation fault on subsequent lookup attempts. (BZ#491351)
  • Previously, in LDAP environments were both Red Hat Enterprise Linux and Solaris were in use, autofs would not correctly interpret master map keys added by Solaris. The auto_master file would therefore contain duplicate entries, where '%' symbols were interspersed between the characters of the map key names. Autofs now correctly parses the Solaris key names and does not create duplicate entries. (BZ#493074)
  • Previously, a stack variable was not initialized on entry to the create_udp_client() or create_tcp_client() functions. During an error exit, the stack variable was checked, and the corresponding file descriptor was closed if the variable had a value other than -1. This could result in incorrectly closing a file descriptor still in use. The stack variable is now initialized and descriptors currently in use should not be closed. (BZ#493223)
  • Due to a number of logic errors in the code, autofs could not remount a direct-mount NFS if the mount had expired following a map reload. The mount request would never complete, and "can't find map entry" would appear in the log. The logic errors are now fixed, and autofs can successfully remount an expired direct-mount NFS after a map reload. (BZ#493791)
  • Previously, thread locking was missing from the st_remove_tasks() function, which meant in turn that its calling function could not get the locks that it required. This could result in a segmentation fault and a crash of autofs. Now, with the thread locking properly in place, the segmentation fault is avoided. (BZ#494319)
  • Previously, when autofs looked up a host name where when one NFS server name was associated with multiple IP adresses, autofs would repeat the query many times. As a consequence of these multiple queries, the mount would take a long time. Now, redundant queries have been removed, so that autofs performs the mount more quickly. (BZ#495895)
  • When connecting to an LDAP server while using SASL authentication, autofs occasionally failed with a segmentation fault, forcing users to restart the autofs service. This failure was caused by a double-free error in the cyrus-sasl module, which has been fixed in this updated package. Connecting to an LDAP server while using SASL authentication now works as expected. (BZ#501612)
  • Previously, the method used by autofs to clean up pthreads was not reliable and could result in a memory leak. If the memory leak occurred, autofs would gradually consume all available memory and then crash. A small semantic change in the code prevents this memory leak from occurring now. (BZ#510530)

1.15.  avahi

1.15.1.  RHBA-2009:1119: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1119
Updated avahi packages that fix log output when invalid packets are received are now available.
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zeroconf Networking. Avahi and Avahi-aware applications allow users to plug a computer into a network and automatically view other people to chat with, see printers to print to, and find shared files on other computers.
If Avahi receives an invalid mDNS packet, then it will write a message to syslog. The log message does not include the originating IP address of the packet, so it is not particularly useful to track down the source of the issue.
This update changes the log message to include the originating IP address of any invalid mDNS packets. This update also fixes some minor spelling errors in other log messages.
Users of avahi are advised to upgrade to these updated packages, which fix these issues.

1.16.  bind

1.16.1.  RHSA-2009:1179: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1179
Updated bind packages that fix a security issue are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
[Updated 29th July 2009] The packages in this erratum have been updated to also correct this issue in the bind-sdb package.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
A flaw was found in the way BIND handles dynamic update message packets containing the "ANY" record type. A remote attacker could use this flaw to send a specially-crafted dynamic update packet that could cause named to exit with an assertion failure. (CVE-2009-0696)
Note: even if named is not configured for dynamic updates, receiving such a specially-crafted dynamic update packet could still cause named to exit unexpectedly.
All BIND users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

1.16.2.  RHBA-2009:1137: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1137
Updated bind packages that resolve an issue are now available for Red Hat Enterprise Linux 5.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
These updated bind packages fix the following bug:
  • DNSSEC, the Domain Name System Security Extensions, are a set of specifications used to secure information provided by the domain name system. One of the specifications, DNSSEC Lookaside Validation (DLV), failed to handle unknown algorithms, which caused the name resolution of "gov" and "org" top-level domains to fail. DLV in these updated packages is now able to handle unknown algorithms, and thus the validation and resolution of top-level domains (such as "org" and "gov") succeeds, thus resolving the issue. (BZ#504794)
All users of bind are advised to upgrade to these updated packages, which resolve this issue.

1.16.3. RHBA-2009:1420: bug fix and enhancement update

Updated bind packages that fix several bugs and add various enhancements are now available for Red Hat Enterprise Linux 5.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named), a resolver library (routines for applications to use when interfacing with DNS), and tools for verifying that the DNS server is operating correctly.
This update upgrades the bind packages to upstream version 9.3.6-P1, which contains bug fixes and enhancements over the previous version.
Notably, this updated BIND is able to handle a much larger number of requests simultaneously. (BZ#457036)
These updated bind packages provide fixes for the following bugs:
  • named occasionally crashed due to an assertion failure, and logged this error message to the system log:
    named[PID]: socket.c:1649: INSIST(!sock->pending_recv) failed
    named[PID]: exiting
    
    This crash was caused by sockets being closed too early. With these updated packages, this assertion failure no longer occurs. (BZ#455802)
  • when using the '-4' option with the "host" and "dig" utilities to force them to use an IPv4 transport, the order in which IPv4 and IPv6 nameservers were listed in the /etc/resolv.conf configuration file affected whether the command would fail or succeed. This has been fixed so that these utilities continue to look for an IPv4 address, even past listed IPv6 addresses, when the '-4' option is supplied. (BZ#469441)
  • the "named-checkconf" utility ignored the "check-names" option in the /etc/named.conf configuration file, which caused the named daemon to fail to start, even if the configuration was valid. With these updated packages, "named-checkconf" no longer ignores the "check-names" option, and named starts up as expected. (BZ#491400)
  • the named init script did not handle the named_write_master_zones SELinux boolean or the permissions on the /var/named/ directory as documented. (BZ#494370)
In addition, these updated packages provide the following enhancements:
  • a new configuration directive which informs secondary servers not to send DNS notify messages, "notify master-only", is now supported. (BZ#477651)
  • dynamic loading of database back-ends is now supported with these updated packages. (BZ#479273)
  • the "allow-query-cache" option, which allows control over access to non-authoritative data (such as cached data and root hints), is now supported. (BZ#483708)
  • the sample /etc/named.conf configuration file provided with these packages has been improved. (BZ#485393)
Users are advised to upgrade to these updated bind packages, which resolve these issues and add these enhancements.

1.17.  binutils

1.17.1.  RHBA-2009:0465: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0465
Updated binutils packages that resolve several issues are now available.
binutils is a collection of utilities used for the creation of executable code.
These updated binutils packages provide fixes for the following bugs:
  • the "objdump" and "size" utilities were not recognizing ELF64-i386 object files. Such files are not normally produced on 32-bit x86 architectures. However, the kdump utility does produce such files on Physical Address Extension (PAE)-enabled kernels. With these updated packages, it is now possible to use the objdump and size utilities on ELF64-i386 object files. (BZ#457189)
  • due to a rare linking error, producing certain executables caused multi-megabyte zero-filled gaps in the executables. This did not affect the running of excutables affected by this bug. This linker error has been corrected in these updated packages so that executables do not contain spurious zero-filled gaps. (BZ#458301)
  • the error message for the "strings -n [non-number]" command were less clear than in the previous package release, and therefore has been reverted and clarified. (BZ#480009)
  • the c++filt(1) man page contained a typo when giving the syntax for the recognized '--strip-underscore' option. (BZ#485194)
  • the c++filt(1) man page incorrectly mentioned the '-j' and '--java' options, which are not available when running c++filt. These mentionings have been removed from the man page. (BZ#495196)
All users of binutils are advised to upgrade to these updated packages, which resolve these issues.

1.18.  busybox

1.18.1.  RHBA-2009:1249: bug fix update

Updated busybox packages that resolve several issues are now available.
BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides replacements for most of the utilities you usually find in GNU fileutils, shellutils, etc. BusyBox provides a fairly complete environment for any small or embedded system. This package can also be useful for recovering from certain types of system failures.
These updated busybox packages provide fixes for the following bugs:
  • busybox provides a diff utility that is used extensively during installation. When this diff utility was called using the '-q' option, which reports only whether the files differ and not the details of how they differ, it always exited with an exit status of 0, indicating success. With this busybox update, the command "diff -q" correctly returns an exit status that corresponds to the same exit status returned when calling "diff" without the '-q' option, thus resolving the issue. (BZ#385661)
  • invoking the "uname -p" command resulted in the processor type being listed as "unknown" when it should have been listed, for example, as "x86_64", or "i686". With these updated packages, "uname -p" either prints the processor type if known, or, if it is unknown, then the command is silent. This behavior now corresponds to the behavior of the uname command in coreutils. (BZ#480105)
  • using BusyBox's rpm applet to install an rpm caused busybox to exit due to a segmentation fault caused by a memory corruption error. This has been fixed in these updated packages so that installing rpms using the "busybox rpm" command works as expected and does not fail with a segmentation fault. (BZ#466896)
  • the busybox packages also contained empty debuginfo packages. These have been removed from this update. (BZ#500547)
All users of busybox are advised to upgrade to these updated packages, which resolve these issues.

1.19.  cman

1.19.1.  RHBA-2009:1192: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1192
Updated cman packages that fix various bugs are now available.
The Cluster Manager (cman) utility provides user-level services for managing a Linux cluster.
This update applies the following bug fixes:
  • Removing a node from the cluster using the 'cman_tool leave remove' command now properly reduces the expected_votes and quorum.
  • Quickly starting and stopping the cman service no longer causes the cluster membership to become inconsistent across the cluster.
All cman users should upgrade to these updated packages, which resolve these issues.

1.19.2.  RHBA-2009:1103: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1103
Updated cman packages that fix various bugs are now available.
The Cluster Manager (cman) utility provides user-level services for managing a Linux cluster.
This update applies the following bug fixes:
  • 'group_tool ls fence' no longer exits with return code '1' when the group exists but has an id of zero.
  • Connections to openais are now allowed from an unprivileged CPG clients with the user 'ais' or an initial login group of 'ais'.
All cman users should upgrade to these updated packages, which resolve this issue.

1.19.3.  RHBA-2009:0416: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0416
Updated cman packages that fix a bug are now available.
The Cluster Manager (cman) utility provides user-level services for managing a Linux cluster.
This update applies the following bug fix:
  • Nodes are no longer ejected from the cluster that were quorate on their own if they do not have a state.
All cman users should upgrade to these updated packages, which resolve this issue.

1.19.4.  RHSA-2009:1341: Low security, bug fix, and enhancement update

Updated cman packages that fix several security issues, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5.
This update has been rated as having low security impact by the Red Hat Security Response Team.
The Cluster Manager (cman) utility provides services for managing a Linux cluster.
Multiple insecure temporary file use flaws were found in fence_apc_snmp and ccs_tool. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities (typically root) with the output of the utilities via a symbolic link attack. (CVE-2008-4579, CVE-2008-6552)
Bug fixes:
  • a buffer could overflow if cluster.conf had more than 52 entries per block inside the <cman> block. The limit is now 1024.
  • the output of the group_tool dump subcommands were NULL padded.
  • using device="" instead of label="" no longer causes qdiskd to incorrectly exit.
  • the IPMI fencing agent has been modified to time out after 10 seconds. It is also now possible to specify a different timeout value with the '-t' option.
  • the IPMI fencing agent now allows punctuation in passwords.
  • quickly starting and stopping the cman service no longer causes the cluster membership to become inconsistent across the cluster.
  • an issue with lock syncing caused 'receive_own from' errors to be logged to '/var/log/messages'.
  • an issue which caused gfs_controld to segfault when mounting hundreds of file systems has been fixed.
  • the LPAR fencing agent now properly reports status when an LPAR is in Open Firmware mode.
  • the LPAR fencing agent now works properly with systems using the Integrated Virtualization Manager (IVM).
  • the APC SNMP fencing agent now properly recognizes outletStatusOn and outletStatusOff return codes from the SNMP agent.
  • the WTI fencing agent can now connect to fencing devices with no password.
  • the rps-10 fencing agent now properly performs a reboot when run with no options.
  • the IPMI fencing agent now supports different cipher types with the '-C' option.
  • qdisk now properly scans devices and partitions.
  • cman now checks to see if a new node has state to prevent killing the first node during cluster setup.
  • 'service qdiskd start' now works properly.
  • the McData fence agent now works properly with the McData Sphereon 4500 Fabric Switch.
  • the Egenera fence agent can now specify an SSH login name.
  • the APC fence agent now works with non-admin accounts when using the 3.5.x firmware.
  • fence_xvmd now tries two methods to reboot a virtual machine.
  • connections to OpenAIS are now allowed from unprivileged CPG clients with the user and group of 'ais'.
  • groupd no longer allows the default fence domain to be '0', which previously caused rgmanager to hang. Now, rgmanager no longer hangs.
  • the RSA fence agent now supports SSH enabled RSA II devices.
  • the DRAC fence agent now works with the Integrated Dell Remote Access Controller (iDRAC) on Dell PowerEdge M600 blade servers.
  • fixed a memory leak in cman.
  • qdisk now displays a warning if more than one label is found with the same name.
  • the DRAC5 fencing agent now shows proper usage instructions for the '-D' option.
  • cman no longer uses the wrong node name when getnameinfo() fails.
  • the SCSI fence agent now verifies that sg_persist is installed.
  • the DRAC5 fencing agent now properly handles modulename.
  • QDisk now logs warning messages if it appears its I/O to shared storage is hung.
  • fence_apc no longer fails with a pexpect exception.
  • removing a node from the cluster using 'cman_tool leave remove' now properly reduces the expected_votes and quorum.
  • a semaphore leak in cman has been fixed.
  • 'cman_tool nodes -F name' no longer segfaults when a node is out of membership.
Enhancements:
  • support for: ePowerSwitch 8+ and LPAR/HMC v3 devices, Cisco MDS 9124 and MDS 9134 SAN switches, the virsh fencing agent, and broadcast communication with cman.
  • fence_scsi limitations added to fence_scsi man page.
Users of cman are advised to upgrade to these updated packages, which resolve these issues and add these enhancements.

1.20.  cmirror

1.20.1.  RHEA-2009:1340: bug-fix update

Updated cmirror packages that fix several bugs are now available.
The cmirror packages provide user-level utilities for managing cluster mirroring.
This update applies the following bug fixes:
  • Copy percentage of corelog mirror no longer hangs due to stale checkpoint data.
  • A segfault in clogd was fixed; the segfault was caused by mirrors being suspended too quickly after being started.
  • The large number of dm-log-clustered timeouts generated by a pvmove no longer causes a cluster deadlock.
  • Remnants of a moved device no longer remain in a volume group.
  • Device-mapper userspace logs now have a local unique identifier to prevent issues when two logs have the same UUID.
Users of cmirror are advised to upgrade to these updated packages, which resolve these issues.

1.21.  cmirror-kmod

1.21.1.  RHBA-2009:1367: bug fix update

Updated cmirror-kmod packages that fix a bug are now available.
The cmirror-kmod packages provide kernel-level interface for using cluster mirroring.
This update applies the following bug fix:
  • kmod-cmirror packages now use symbols that are on the kernel ABI whitelist. (BZ#481689)
All users requiring cmirror-kmod should install these newly released packages, which resolve this issue.

1.22.  conga

1.22.1.  RHBA-2009:0381: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0381
Updated conga packages that fix a bug are now available.
The conga packages contain a web-based administration tool for remote cluster and storage management.
These updated packages apply the following bug fix:
  • A bug that prevented Microsoft Internet Explorer from working correctly with the Luci server has been fixed.

1.22.2.  RHBA-2009:1381: bug-fix and enhancement update

Updated conga packages that fix several bugs and add enhancements are now available.
The conga packages contain a web-based administration tool for remote cluster and storage management.
This update applies the following bug fixes:
  • A bug that caused some operations to fail when accessing Conga via Microsoft Internet Explorer was fixed.
  • A bug that caused quorum disk heuristics to be lost after changing quorum disk main properties was fixed.
  • A bug that made it impossible to set failover domains for virtual machine services was fixed.
  • A bug that required that a fence device password be provided when a password script has been defined was fixed.
  • A bug that caused the "run exclusive" cluster service attribute to always be shown as having been selected was fixed.
  • A bug that caused adding existing Red Hat Enterprise Linux 4 clusters to the management interface to fail was fixed.
  • A bug that caused updating existing fence devices to fail in some circumstances was fixed.
  • A bug that caused the ricci storage module to fail to read mdadm device information was fixed.
This update adds the following enhancements:
  • Support for configuration of LPAR fencing.
  • Support for configuring NFS locking workarounds for cluster services.
  • Support for choosing between the Xen and KVM hypervisors for virtual machine services.
Users of conga are advised to upgrade to these updated packages, which resolve these issues and add these enhancements.

1.23.  coreutils

1.23.1.  RHBA-2009:1262: bug fix update

An updated coreutils package that fixes several bugs and adds various enhancements is now available.
The coreutils package contains the core GNU utilities. It is the combination of the old GNU fileutils, sh-utils, and textutils packages.
This updated package fixes the following bugs:
  • previously, it was not possible to compile coreutils without SELinux support. This has been fixed so that removing the "--enable-selinux" option from the spec file allows coreutils to compile successfully. (BZ#488730)
  • the "join" utility, which joins two text files, or a file and standard input, on a line-by-line basis, could experience a segmentation fault when running under a multibyte locale. In addition, multibyte locales could cause "join" to produce unexpected results. With this updated package, these coding errors have been corrected so that "join" completes correctly and successfully when run under a multibyte locale. (BZ#497368)
  • the "df" utility reports the disk usage of a directory within a file system. Using "df" on a directory which contained autofs mount points under it did not cause autofs to mount those directories, which resulted in "df" not factoring in the disk usage of those automount directories. With this update, invoking the "df" command does trigger automount, which in turn results in a correct disk usage count. (BZ#497830)
  • several other utilities in the coreutils package possessed undocumented options, which could have led to user confusion. Those undocumented options have been removed from their respective utilities, thus reducing the possibility for confusion. (BZ#468030)
  • the "chmod", "chown" and "chgrp" commands all take the following options, which have the same effect: "-f", "--silent" and "--quiet". These flags cause the command to suppress most error messages. However, calling the command with one of these options on a non-existent file caued the command to output the following message: "No such file or directory". These options now suppress error messages when called on non-existent files. (BZ#474220)
  • the tail(1) man page contained a formatting error and a typo, both of which have been rectified. (BZ#470788)
  • the rm(1) man page stated that the "rm" command possessed a "--directory" ('-d') option, whose purpose was to allow the removal of directories, including non-empty directories. However, invoking "rm --directory [dir]" always resulted in the following error message: "rm: cannot remove `some_dir': Is a directory". The rm(1) man page has been corrected and no longer lists "--directory" as an option. The recommended switch for recursively removing a directory and its contents is "--recursive" ('-r'). (BZ#473472)
  • the coreutils package's locale directories were not owned by the coreutils package. This has been corrected by ensuring that all locale directories are owned by the package. (BZ#481804)
In addition, this updated package provides the following enhancements:
  • the '-v' option of the "ls" command sorts directory listings based upon version numbers. However, "ls -v" did not sort vmlinuz-[version] files from the /boot/ directory in the correct order. This updated coreutils package enhances both "ls -v" and "sort -V" so that they are now able to sort /boot/vmlinuz-[version] files correctly. (BZ#253817)
  • the "install" command now supports the "--compare" ('-c') flag, which causes "install" to compare each pair of source and destination files and, if the destination file's content is identical to the source (and disregarding any discrepancy between the owner, group, permissions and possibly SELinux context) then the destination file is not modified and the modification time is left unchanged. (BZ#453447)
  • the "cp" and "mv" utilities now support the preservation of extended attributes on files and directories. In addition, Access Control Lists (ACLs) are now preserved when copying or moving files (with "cp" or "mv") to or from NFSv4-mounted file systems. (BZ#454072)
All coreutils users are advised to upgrade to this updated package, which resolves these issues.

1.24.  cpio

1.24.1.  RHBA-2009:0379: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0379
An updated cpio package that fixes various bugs is now available.
GNU cpio copies files into or out of a cpio or Tar archive.
This updated cpio package includes fixes for the following bugs:
  • when called with the "--pass-through" ('-p') option, which enables copy-pass mode, cpio did not always set the permissions of copied directories correctly. In certain circumstances, cpio always created directories with a permissions mode of 700 and did not respect the system umask. With this updated package, cpio copies directories while honoring the umask setting when using copy-pass mode, which resolves the issue.
  • cpio was unable to write to a file on a remote system when using the "-O [archive]" option along with "--rsh-command". With this update, cpio is once again able to write files to remote systems. Note that the default remote shell is defined as /usr/bin/rsh.
All users of cpio are advised to upgrade to this updated package, which resolves these issues.

1.25.  cpuspeed

1.25.1.  RHBA-2009:0424: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0424
An updated cpuspeed package that fixes various bugs is now available.
The cpuspeed package provides CPU frequency scaling support.
This updated package fixes the following bugs:
  • the cpuspeed init script loaded the speedstep-centrino driver on Intel systems, even when the acpi-cpufreq driver had already loaded successfully. With both these drivers loaded, the system would not handle P-states correctly. The cpuspeed init script now attempts to load the speedstep-centrino driver only as a fallback for situations where it has not been able to load the acpi-cpufreq driver. Intel systems that can use the acpi-cpufreq driver no longer load the speedstep-centrino driver, and now handle P-states correctly. (BZ#485480)
  • a development version of this package attempted to make cpuspeed run reliably on Xen kernels by only allowing cpuspeed to start on Xen kernels if the number of virtual CPUs in dom0 equalled the number of physical CPUs in the system. However, this condition can never be true until xend starts, and xend starts after cpuspeed. Therefore, cpuspeed would only run properly on Xen kernels if cpuspeed were restarted after the system completed the boot process. The restriction that cpuspeed can only start if the number of virtual and physical kernels are equal has therefore been removed, allowing cpuspeed to start on Xen kernels even when xend has not yet started. (BZ#488924 , BZ#498406 , BZ#492139)

1.26.  crash

1.26.1.  RHBA-2009:0049: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0049
Updated crash packages are now available.
Crash is a self-contained tool that can be used to investigate live systems, kernel core dumps created from the netdump, diskdump and kdump packages from Red Hat Linux, the mcore kernel patch offered by Mission Critical Linux, or the LKCD kernel patch.
This updated package includes the following bug fix:
  • The bt command displays a task's kernel-stack backtrace. When running this command against an x86 Xen kernel vmcore, crash did not correctly handle the transition from the IRQ stack back to the process stack, leading to a segmentation fault. The version of crash provided with this advisory contains a patch that corrects this issue, allowing users to analyze a vmcore file from a system with an x86 Xen kernel.
All users of crash should upgrade to this updated package.

1.26.2.  RHBA-2009:1283: bug fix update

Updated crash packages that resolve several issues are now available.
The crash packages are used to investigate live systems and kernel core dumps created from the netdump, diskdump and kdump facilities.
These updated crash packages are rebased to upstream version 4.0-8.9 (BZ#494028) and provide fixes for the following bugs:
  • if entered alone on the command line, the "set" command would cause a segmentation violation, because there is no concept of a "context" in the Xen hypervisor. Crash now prompts the user to provide an option with "set", and provides more meaningful error messages if the option selected is not applicable. (BZ#462819)
  • crash would indicate "irq: invalid structure size: gate_struct" and dump a stack trace leading to x86_64_display_idt_table() when the "irq -d" option was run on AMD64 and Intel 64 Xen kernels. Now it will indicate that the -d option is not applicable. (BZ#464116)
  • the "bt" command did not work correctly when running against the Xen hypervisor binary. The "bt -o" option, and setting it to run by default with "bt -O", would fail with the vmlinux-specific error message "bt: invalid structure size: desc_struct" with a stack trace leading to read_idt_table(). Now, it will display the generic error message "bt: -o option not supported or applicable on this architecture or kernel". The "bt -e" or "bt -E" will also display the same error message, as opposed to the command usage message. Lastly, the "bt -R" option would cause a segmentation violation; it has been fixed to work as it was designed. (BZ#464288)
  • when run on a Xen hypervisor in which the backtrace leads to either "process_softirqs" or "page_fault", the "bt" command backtrace would indicate: "bt: cannot resolve stack trace". The recovery code would then terminate the command with the nonsensical error message: "bt: invalid structure size: task_struct". The command now properly terminates the backtrace. (BZ#474712 , BZ#466724)
  • when run against the Xen hypervisor where the number of physical cpus outnumber the MAX_VIRT_CPUS value for the processor type, the "bt -a" command would fail after displaying backtraces for the first 32 (MAX_VIRT_CPUS) pcpus with the the error message: "bt: invalid vcpu". The command now shows backtraces for all pcpus. (BZ#471790)
  • the "mod -[sS]" command would fail with the error message: "mod: cannot find or load object file for <name> module" if the target module object filename contains both underscore and dash characters. Crash now parses these filenames correctly. (BZ#480136)
  • an existing Itanium INIT and MCA handler bug incorrectly writes the pseudo task's command name in its comm[] name string such that the CPU number may not be part of the string. The "bt" command could not link back to a PID 0 swapper task that was interrupted by an Itanium INIT or MCA exception, and displayed the error message: "bt: unwind: failed to locate return link (ip=0x0)!" Crash now uses a different method to obtain the CPU number for the interrupted task, and the backtrace correctly transitions back to the interrupted task. (BZ#487429)
  • the starting backtrace location of active, non-crashing, xen dom0 tasks are not available in kdump dumpfiles, nor is there anything that can be searched for in their respective stacks. Therefore, for these tasks, the "bt" command would show either an empty backtrace or an invalid backtrace starting at the last location where schedule() had been called. Instead, the "bt" command now provides an error message for these tasks that indicated "bt: starting backtrace locations of the active (non-crashing) xen tasks cannot be determined: try -t or -T options". (BZ#495586)
  • Running the "bt" command against an x86 Xen kernel vmcore, the transition from the IRQ stack back to the process stack led to a segmentation fault. (BZ#478904)
The upstream changelog referenced below details additional bug fixes and enhancements provided by the rebase of this package.
All users of crash are advised to upgrade to these updated packages, which resolve these issues.

1.27.  cryptsetup-luks

1.27.1.  RHBA-2009:1349: bug fix update

Updated cryptsetup-luks packages that fix various bugs are now available.
The cryptsetup-luks packages provide a utility for setting up encrypted devices using Device Mapper and the dm-crypt target.
This update provides the following bug fixes:
  • the cryptsetup luksFormat command now properly wipes old filesystem signatures. (BZ#468910)
  • the exit code for cryptsetup status command is no longer incorrect. (BZ#439191)
  • the cryptsetup password entry message now includes the device name for which the user is being prompted. (BZ#437261)
All users of cryptsetup-luks should upgrade to these updated packages, which resolve these issues.

1.28.  cscope

1.28.1.  RHSA-2009:1102: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1102
An updated cscope package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
cscope is a mature, ncurses-based, C source-code tree browsing tool.
Multiple buffer overflow flaws were found in cscope. An attacker could create a specially crafted source code file that could cause cscope to crash or, possibly, execute arbitrary code when browsed with cscope. (CVE-2004-2541, CVE-2009-0148)
All users of cscope are advised to upgrade to this updated package, which contains backported patches to fix these issues. All running instances of cscope must be restarted for this update to take effect.

1.29.  cups

1.29.1. RHBA-2009:1360: bug fix update

Updated cups packages that fix several bugs are now available.
The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX and Unix-like operating systems.
These updated packages address the following bugs:
  • the libcups library's HTTP state machine could get into a busy loop when a connection was closed at an unexpected point. (BZ#474323)
  • web interface template files and translated template files were not marked as configuration files so local modifications to them would be lost when applying updates. This update will also cause local modifications to those files to be lost, but will prevent the same situation occurring with future updates. (BZ#474769)
  • the "compression" job option was encoded with the wrong IPP tag, preventing the "document-format" job option from overriding automatic MIME type detection of compressed job files . (BZ#474814)
  • the "mailto" CUPS notifier used the wrong line ending when transferring messages to an SMTP server, causing it not to send any notifications. (BZ#474920)
  • automatic MIME type detection would fail when the document name was required by the relevant rule but only one file was present in the job. MIME detection would also fail with some rules using "+" (e.g. application/x-shell). (BZ#479635)
  • incorrect web interface URLs would be given when the server's domain name resolved to a local loopback address on the server. (BZ#479809)
  • the CUPS configuration file directive "Satisfy Any" was not correctly implemented, causing access to be restricted in situations where it should not have been. (BZ#481303)
  • an optimization in the libcups library for fetching details of a print queue when its name is known caused problems with obtaining the name of the default printer when "lpoptions" files listed a non-existent queue as the default. (BZ#481481)
  • RPM verification would fail on configuration files even though content changes were expected. (BZ#487161)
  • the CUPS scheduler requires an updated version of the krb5 package in order to function correctly but this was not an RPM dependency. (BZ#489714)
  • the text-only filter would not send form-feed characters correctly. (BZ#491190)
  • incorrect IPP-Get-Jobs requests, accepted by CUPS in current versions of Red Hat Enterprise Linux but rejected in newer versions of the upstream package, were generated by the cupsGetJobs2() API function and by the lpstat and lpq commands. (BZ#497529)
All cups users should upgrade to these updated packages, which resolve these issues.

1.29.2.  RHSA-2009:1082: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1082
Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The Common UNIX® Printing System (CUPS) provides a portable printing layer for UNIX operating systems. The Internet Printing Protocol (IPP) allows users to print and manage printing-related tasks over a network.
A NULL pointer dereference flaw was found in the CUPS IPP routine, used for processing incoming IPP requests for the CUPS scheduler. An attacker could use this flaw to send specially-crafted IPP requests that would crash the cupsd daemon. (CVE-2009-0949)
Red Hat would like to thank Anibal Sacco from Core Security Technologies for reporting this issue.
Users of cups are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the cupsd daemon will be restarted automatically.

1.29.3.  RHSA-2009:0429: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0429
Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The Common UNIX® Printing System (CUPS) provides a portable printing layer for UNIX operating systems.
Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the "lp" user if the file was printed. (CVE-2009-0147, CVE-2009-1179)
Multiple buffer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the "lp" user if the file was printed. (CVE-2009-0146, CVE-2009-1182)
Multiple flaws were found in the CUPS JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the "lp" user if the file was printed. (CVE-2009-0166, CVE-2009-1180)
Multiple input validation flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the "lp" user if the file was printed. (CVE-2009-0800)
An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, "imagetops" and "imagetoraster". An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the "lp" user if the file was printed. (CVE-2009-0163)
Multiple denial of service flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash when printed. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183)
Red Hat would like to thank Aaron Sigel, Braden Thomas and Drew Yao of the Apple Product Security team, and Will Dormann of the CERT/CC for responsibly reporting these flaws.
Users of cups are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the cupsd daemon will be restarted automatically.

1.30.  curl

1.30.1.  RHSA-2009:1209: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1209
Updated curl packages that fix security issues are now available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict servers, using any of the supported protocols. cURL is designed to work without user interaction or any kind of interactivity.
Scott Cantor reported that cURL is affected by the previously published "null prefix attack", caused by incorrect handling of NULL characters in X.509 certificates. If an attacker is able to get a carefully-crafted certificate signed by a trusted Certificate Authority, the attacker could use the certificate during a man-in-the-middle attack and potentially confuse cURL into accepting it by mistake. (CVE-2009-2417)
cURL users should upgrade to these updated packages, which contain a backported patch to correct these issues. All running applications using libcurl must be restarted for the update to take effect.

1.30.2.  RHSA-2009:0341: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0341
Updated curl packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict servers, using any of the supported protocols. cURL is designed to work without user interaction or any kind of interactivity.
David Kierznowski discovered a flaw in libcurl where it would not differentiate between different target URLs when handling automatic redirects. This caused libcurl to follow any new URL that it understood, including the "file://" URL type. This could allow a remote server to force a local libcurl-using application to read a local file instead of the remote one, possibly exposing local files that were not meant to be exposed. (CVE-2009-0037)
Note: Applications using libcurl that are expected to follow redirects to "file://" protocol must now explicitly call curl_easy_setopt(3) and set the newly introduced CURLOPT_REDIR_PROTOCOLS option as required.
cURL users should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using libcurl must be restarted for the update to take effect.

1.31.  cvs

1.31.1.  RHBA-2009:1370: bug fix update

An updated CVS package that fixes two bugs is now available.
Concurrent Version System (CVS) is a version control system that can record the history of your files.
This updated package fixes the following two bugs:
  • mismatches between hosts sometimes caused the CVS client to present incorrect credentials to servers with gserver authentication. This update ensures the correct credentials are supplied by confirming the IP address of the currently-connected server so that host mismatch does not occur. (BZ#473245)
  • attempting to process large numbers of files with long names caused problems with some scripts due to lengthy command line arguments. This problem has been resolved by adding the possibility of passing arguments through standard input. (BZ#462062)
All users of cvs are advised to upgrade to this updated package, which resolves these issues.

1.32.  cyrus-imapd

1.32.1.  RHSA-2009:1116: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1116
Updated cyrus-imapd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.
It was discovered that the Cyrus SASL library (cyrus-sasl) does not always reliably terminate output from the sasl_encode64() function used by programs using this library. The Cyrus IMAP server (cyrus-imapd) relied on this function's output being properly terminated. Under certain conditions, improperly terminated output from sasl_encode64() could, potentially, cause cyrus-imapd to crash, disclose portions of its memory, or lead to SASL authentication failures. (CVE-2009-0688)
Users of cyrus-imapd are advised to upgrade to these updated packages, which resolve this issue. After installing the update, cyrus-imapd will be restarted automatically.

1.32.2.  RHBA-2009:1120: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1120
Updated cyrus-imapd packages that fix several bugs are now available.
The cyrus-imapd package contains a high-performance mail server with IMAP, POP3, NNTP and SIEVE support.
These updated cyrus-imapd packages provide fixes for the following bugs:
  • attempting to connect to the update server failed and resulted in the following error messages being logged to /var/log/maillog:
    connect(192.168.11.110) failed: Invalid argument
    couldn't connect to MUPDATE server
    [IP address]: no connection to server
    FATAL: error connecting with MUPDATE server
    
    These updated packages correct this problem so that connecting to the update server now works as expected. (BZ#326511)
  • on systems with 64-bit architectures, cyrus-imapd experienced a segmentation fault when replication was enabled. (BZ#484377)
In addition, these updated cyrus-imapd packages provide the following enhancement:
  • more detailed information has been added to the ctl_cyrusdb(8) man page, which explains how to perform operations common to Cyrus databases. (BZ#463230)
Users are advised to upgrade to these updated cyrus-imapd packages, which resolve these issues and add this enhancement.

1.33.  cyrus-sasl

1.33.1.  RHBA-2009:1330: bug fix update

Updated cyrus-sasl packages that fix various bugs are now available.
The cyrus-sasl packages contain the Cyrus implementation of SASL. SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols.
This errata fixes the following bugs:
  • the shadow authentication method was not working properly on 64 bit architectures. The saslauthd might randomly crash if it was configured to authenticate against the shadow file. (BZ#433583)
  • the rimap authentication method was not working properly when user passwords contain double quote characters. The saslauthd process would hang when it was configured to authenticate with the rimap method and user password contained such characters. (BZ#438533)
  • the saslauthd init script did not support a reload command although it was mentioned in the init script usage instructions. The reload is now implemented as a conditional restart of the saslauthd daemon. (BZ#448154)
  • the pluginviewer command did not display plugins which were not statically linked into it. The pluginviewer command is now linked dynamically so it can display any cyrus-sasl plugins which are installed on the system. (BZ#473197)
  • the ldap authentication method had very long timeout for network failure detection. The saslauthd now sets a network failure timeout based on the ldap_timeout configuration option. (BZ#475726)
All Cyrus users are advised to install this updated package, which addresses these issues.

1.34.  db4

1.34.1.  RHBA-2009:0390: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0390
Updated db4 packages that resolve an issue are now available.
The Berkeley Database (Berkeley DB) is a programmatic toolkit that provides embedded database support for both traditional and client/server applications.
  • These updated db4 packages fix a bug which, in certain circumstances, could have caused database environment recovery to fail.
All users of db4 are advised to upgrade to these updated packages, which resolve this issue.

1.35.  device-mapper

1.35.1.  RHBA-2009:1392: bug-fix and enhancement update

Updated device-mapper packages that include various bug fixes and enhancements are now available.
The device-mapper packages provide a library required by logical volume management utilities such as LVM2 and dmraid.
This update applies the following bug fixes:
  • Fixes crash when dmsetup -U, -G, and -M options are used.
  • Enforces device name length and character limitations.
This update adds the following enhancements:
  • Adds "all" field to "-o fields" option, expanding to all fields of report type. That is, you can add -o <field_name> to specify which fields to print in certain commands; "-o all" expands to all possible fields known to report.
  • Library now exports dm_tree_node_size_changed function and correctly propagates table size change up the device tree.
  • Prints warning message if application releases the library and a memory pool is still in use (indicating a possible memory leak).
  • Library is now compiled from merged device-mapper LVM2 tree (device-mapper library is now part of LVM2 source code tree).
All users of device-mapper should upgrade to these updated packages, which resolve these issues and include these enhancements.

1.36.  device-mapper-multipath

1.36.1.  RHBA-2009:0432: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0432
Updated device-mapper-multipath packages that resolve an issue are now available.
The device-mapper multipath packages provide tools to manage multipath devices by issuing instructions to the device-mapper multipath kernel module, and by managing the creation and removal of partitions for device-mapper devices.
These updated device-mapper-multipath packages fix the following bug:
  • there was a race condition in the shutdown code for multipathd wherein a lock could be destroyed before all threads were finished using it. This could cause the machine to become unresponsive on multipathd shutdown. The multipathd daemon now waits for all threads to finish using the lock before destroying it, thus removing the race and resolving the issue.
  • when adding a new multipath-capable block device, a race condition existed between the multipathd daemon and udev to multipath the new device. If udev--through multipath--updated the multipath devices first, then the multipathd daemon would not use the device-specific configurations for the device when it started monitoring the path. With this update, multipathd now correctly configures the device, even when udev notices it first, thus resolving the issue.
All users of device-mapper-multipath are advised to upgrade to these updated packages, which resolve this issue.

1.36.2.  RHSA-2009:0411: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0411
Updated device-mapper-multipath packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
The device-mapper multipath packages provide tools to manage multipath devices by issuing instructions to the device-mapper multipath kernel module, and by managing the creation and removal of partitions for device-mapper devices.
It was discovered that the multipathd daemon set incorrect permissions on the socket used to communicate with command line clients. An unprivileged, local user could use this flaw to send commands to multipathd, resulting in access disruptions to storage devices accessible via multiple paths and, possibly, file system corruption on these devices. (CVE-2009-0115)
Users of device-mapper-multipath are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. The multipathd service must be restarted for the changes to take effect.
Important: the version of the multipathd daemon in Red Hat Enterprise Linux 5 has a known issue which may cause a machine to become unresponsive when the multipathd service is stopped. This issue is tracked in the Bugzilla bug #494582; a link is provided in the References section of this erratum. Until this issue is resolved, we recommend restarting the multipathd service by issuing the following commands in sequence:
# killall -KILL multipathd
# service multipathd restart

1.36.3.  RHBA-2009:0283: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0283
Updated device-mapper-multipath packages that fix a bug are now available.
The device-mapper-multipath packages provide tools to manage multipath devices by giving the device-mapper multipath kernel module instructions on what to do, as well as by managing the creation and removal of partitions for device-mapper devices.
  • multipath must be able to open a file descriptor for each path that it monitors, plus 32 other file descriptors. By default, multipath can open 1024 file descriptors, which is sufficient for it to monitor 992 paths. If multipath is not able to open all the file descriptors that it needs, the multipath daemon will not function correctly, and in Red Hat Enterprise Linux 5.3, this situation exposes a kernel memory leak that can cause a system to stop responding. Previously, multipath would not warn users that it could not open enough file descriptors. Now, when multipath runs out of file descriptors, it prints an error message. System administrators can allow multipath to open more file descriptors by setting "max_fds" in the multipath.conf file to a sufficiently high number, or by setting "max_fds" to "max" to allow multipath to open as many file descriptors as the system allows.
Users are advised to upgrade to these updated device-mapper-multipath packages, which resolve this issue.

1.36.4.  RHEA-2009:1377: bug-fix and enhancement update

Updated device-mapper-multipath packages that fix several bugs and add various enhancements are now available.
The device-mapper-multipath packages provide tools to manage multipath devices using the device-mapper multipath kernel module.
This update applies the following bug fixes:
  • Occasionally multipathd was ignoring a device's hardware type when configuring it after a path was added.
  • Multiple documentation errors were fixed.
  • Multipathd would occasionally hang or crash while shutting down.
  • Multipath would always return a failure exit code when removing a device with multipath -f/-F.
  • Multipathd wouldn't free its resources when it failed to execute a callout.
  • Multipathd would always return a success exit code for interactive commands, even if the command failed or was invalid.
  • The mpath_prio_alua pritority callout was failing on some setups because a buffer was too small.
  • Multipathd was holding mount points in the /etc directory busy, even after they were unmounted.
  • Multipath and multipathd were racing to create the mulitpath devices for newly added block devices. This was causing device creation to take a long time on some systems, and could even cause devices to have incorrect configurations.
This update adds the following enhancements:
  • Default configurations were added for the Compellent Storage Center and the IBM DS3200, DS3300, DS4700, and DS5000.
  • It is now possible to set the verbosity level for the multipath and multipathd commands in /etc/multipath.conf.
  • The TUR path checker retries on more transient errors, so that multipathd will not fail a path due to a transient error.
  • There is a new priority callout mpath_prio_intel to support the Intel Modular Server.
  • There is now a multipath.conf.5 man page that explains the /etc/multipath.conf configuration file.
All users are advised to upgrade to these updated packages, which resolve these issues and add these enhancements.

1.37.  dhcp

1.37.1.  RHBA-2009:1331: bug fix update

A dhcp update that fixes several bugs is now available.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp package provides a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
This update applies the following updates:
  • Supplying an interface name (on the command line) that was longer than the size declared by the IFNAMSIZ macro caused an unexpected segmentation fault. This update contains an added process that properly checks the validity of interface names, which resolves this issue. (BZ#441524)
  • This update corrects a bug in the way the dhclient-script file processed the $localClockFudge variable. In previous releases, this bug caused the NTPD daemon to restart unexpectedly at times. (BZ#450301)
  • dhclient now retains relay agent options when it enters the INIT and REBIND states. (BZ#450545)
  • A bug in the network shutdown code prevented dhclient from correctly honoring the PEERNTP and PEERDNS variables in /etc/sysconfig/network-scripts/ifcfg-* files. This caused dhcp to replace a modified /etc/ntp.conf file with a default version during a network service restart. This update fixes the bug, ensuring that dhclient-script no longer replaces the /etc/ntp.conf file upon network service restart if PEERNTP and PEERDNS are both set to 'yes'. (BZ#471543)
  • The dhcpd and dhcrelay init scripts do not support the 'try-restart' and 'reload' arguments. In previous releases, however, using these arguments did not output any error messages to inform the user that the restart/reload attempt failed. With this release, using the unsupported 'try-restart' or 'reload' arguments with the dhcpd or dhcrelay init scripts will correctly display the usage screen and exit the script with a status code 3. (BZ#491868)
Users of dhcp are advised to apply this update.

1.38.  dhcpv6

1.38.1.  RHBA-2009:1409: bug fix update

Updated dhcpv6 packages that resolve an issue are now available.
The dhcpv6 packages implement the Dynamic Host Configuration Protocol (DHCP) for Internet Protocol version 6 (IPv6) networks, in accordance with RFC 3315: Dynamic Host Configuration Protocol for IPv6 (DHCPv6). DHCP is a protocol that allows individual devices on an IP network to get their own network configuration information. It consists of: dhcp6c(8), the DHCPv6 client daemon; dhcp6s(8), the DHCPv6 server daemon; and dhcp6r(8), the DHCPv6 relay agent.
Previously, DHCPv6 was not able to be chosen as the IPv6 configuration method in anaconda. Choosing DHCPv6 instead of the default 'Automatic neighbor discovery' may have caused the installer to crash, returning a stack trace to the terminal. With this update, the libdhcp6client library code has been updated, and DHCPv6 can now be chosen as the IPv6 configuration method in the installer, which resolves this issue. (BZ#506722)
All users of dhcpv6 are advised to upgrade to these updated packages, which resolve this issue.

1.39.  dmidecode

1.39.1.  RHBA-2009:1324: enhancement update

An updated dmidecode package that fixes a bug and adds enhancements is now available.
The dmidecode package provides utilities for extracting x86 and ia64 hardware information from the system BIOS or EFI, according to the SMBIOS/DMI standard. This information typically includes system manufacturer, model name, serial number, BIOS version, asset tag as well as a lot of other details of varying level of interest and reliability depending on the manufacturer.
This will often include usage status for the CPU sockets, expansion slots (e.g. AGP, PCI, ISA) and memory module slots, and the list of I/O ports (e.g. serial, parallel, USB).
This updated package adds the following enhancement:
  • the previous version of the dmidecode package was based on upstream version 2.7 and lacked support for a variety of newer hardware. The package now provides version 2.9, which:
    • updates support for SMBIOS specification version 2.5
    • decodes slot IDs of AGP 8x and PCIE slots
    • decodes newer processor characteristics (multi-core, multi-thread, 64-bit)
    • supports newer types of chassis, processor, socket, connector and memory device
    • supports x86 EFI
    ( BZ#459048 )
This updated package fixes the following bug:
  • the default method used by dmidecode to retrieve entries from the DMI table produces unaligned access errors when used on Itanium systems. When built for the Itanium architecture, this version of the package includes a workaround that avoids these errors. ( BZ#459048 ).
Users of dmidecode are advised to upgrade to this updated package, which adds this enhancements and fixes this bug.

1.40.  dmraid

1.40.1.  RHBA-2009:1347: bug-fix and enhancement update

Updated dmraid packages that fix several bugs and add enhancements are now available.
The dmraid packages contain the ATARAID/DDF1 activation tool that supports RAID device discovery, RAID set activation, and displays properties for ATARAID/DDF1 formatted RAID sets on Linux kernels using device-mapper.
This update applies the following bug fixes:
  • The dmraid logwatch-based email reporting feature has been moved from the dmraid-events package into the new dmraid-events-logwatch package. Consequently, systems that use this dmraid feature need to complete the following manual procedure: 1. Ensure the new 'dmraid-events-logwatch' package is installed. 2. Un-comment the functional portion of the "/etc/cron.d/dmeventd-logwatch" crontab file.
  • The sgpio and dmevent_tool applications get installed with the dmraid package now.
  • The drive order for isw RAID01 sets is now identical with the OROM order.
  • Various issues with wrong LED rebuild and metadata states have been fixed.
This update adds the following enhancements:
  • Device Failure Monitoring, using the tools dmraid and dmevent_tool, is now included in Red Hat Enterprise Linux 5.4 as a Technology Preview. Device Failure Monitoring provides the ability to watch and report device failures on component devices of RAID sets.
  • dmraid now automatically activates device event monitoring for the isw metadata format (Intel IMSM). The dmevent_tool is still available to allow for manual (de)registration.
  • dmraid now supports an "--rm_partitions" option to allow for removing partition devices for RAID set component devices.
  • Activation of isw RAID sets on disks with long serial numbers is now supported.
All dmraid users should upgrade to these updated packages, which resolve these issues and add these enhancements.

1.41.  dos2unix

1.41.1.  RHBA-2009:0276: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0276
Updated dos2unix packages that resolve two bugs are now available.
The dos2unix utility converts DOS or MAC format text files to UNIX format.
This updated package provides fixes for the following bugs:
  • dos2unix did not allow for instances where a user specified the -c option without a conversion mode name following it. An input in this format would therefore result in a segmentation fault. Dos2unix now exits safely with a message to the user that option -c requires an argument.
  • when dos2unix created a new file as the output of its conversion (when run with the -n option), the new file would always have its permission mode set as 600, regardless of the permission mode of the original file. Dos2unix now sets the permission mode for the new file to be the same as the mode of the old file, filtered through the user's umask.
Users of dos2unix should upgrade to this updated package, which resolves these issues.

1.42.  dump

1.42.1.  RHBA-2009:0425: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0425
Updated dump packages that resolve several issues are now available.
The dump package contains both dump and restore commands. The dump command examines files in a file system, determines which ones need to be backed up, and copies those files to a specified disk, tape, or other storage medium. The restore command performs the inverse function of dump; it can restore a full backup of a file system. Subsequent incremental backups can then be layered on top of the full backup. Single files and directory subtrees may also be restored from full or partial backups.
These updated dump packages provide fixes for the following bugs:
  • when running the dump command without specifying a dump level, then neither did dump's output indicate the dump level, as in the following example output:
    DUMP: Date of this level  dump: Thu Apr  2 09:05:09 2009
    DUMP: Date of this level  dump: Thu Apr  2 09:05:09 2009
    
    This has been corrected in these updated packages so that the dump level is no longer missing in output in which it is shown.
  • When the dump command was called without a default dump level specified on the command line, then the dump level defaulted to 0, while the dump(8) man page stated that the default level was 9. The actual default dump level that is used when this is not specified in arguments to dump is 0, and the man page has been changed to reflect this.
  • the restore(8) man page, as well as the program's help information, incorrectly implied that the '-P [file]' option could be used in conjunction with the '-A [archive_file]', which is not the case. Attempting to use both options results in the following error message: "restore: A option is not valid for P command". The restore(8) man page and restore's help has been corrected so that it is clear that the '-A' and '-P' options cannot be used together.
  • several typos in the dump(8) man page were corrected.
All users of dump are advised to upgrade to these updated packages, which resolve these issues.

1.43.  dvd+rw-tools

1.43.1.  RHBA-2009:1072: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1072
An updated dvd+rw-tools package that addresses a bug and corrects a typo is now available for Red Hat Enterprise Linux 5.
The dvd+rw-tools package is a collection of tools to master DVD+RW/+R media.
  • on some systems with manually-operated DVD drive trays (ie drives that cannot be closed mechanically, such as most slim-line drive trays), burning data to DVD media would produce an erroneous "Error writing to disk" alert. The data was, in fact, successfully burnt to the DVD and the newly burnt DVD was then ejected. The inability of the drive tray to close mechanically, however, caused dvd+rw-tools to return an "unable to reload tray" message which, in turn, caused the 'writing to disk' error to present. With this update, dvd+rw-tools treats the underlying "START_STOP_UNIT" message properly and, consequently, the misleading alert does not present. (BZ#390961)
  • a typo in the dvd+rw-tools.spec file was corrected. The "%{dist}" tag on the "Release" line was corrected to "%{?dist}". The correction ensures an rpm can be built from the dvd+rw-tools source even if a distribution is not defined in either the Makefile or your local ~/.rpmmacros file. (BZ#440621)
All dvd+rw-tools users should upgrade to this updated package, which resolves these issues.

1.44.  e2fsprogs

1.44.1.  RHBA-2009:1291: bug fix and enhancement update

An updated e2fsprogs package that fixes various bugs and adds an enhancement is now available.
The e2fsprogs package contains a number of utilities that create, check, modify, and correct inconsistencies in second extended (ext2) file systems. e2fsprogs contains e2fsck (which repairs file system inconsistencies after an unclean shutdown), mke2fs (which initializes a partition to contain an empty ext2 file system), tune2fs (which modifies file system parameters), and most of the other core ext2fs file system utilities.
This updated version of e2fsprogs addresses the following issues:
  • when mke2fs or resize2fs was run on a device of exactly 2^32 file system blocks (16 terabytes for 4 kilobit blocks), these commands would fail with a "File too large" error, because the maximum file system size was 2^32-1 blocks. mke2fs and resize2fs now round down by one block to allow the commands to succeed for devices of exactly 2^32 blocks, and the error no longer presents. ( BZ#241285 )
  • the German localization of an e2fsprogs process contained a typographical error. This has been corrected and the correct line now displays. (BZ#488960)
  • the e2fsck method, pass3, would use a pointer regardless of whether it contained a null value. This would result in a segfault. The method has been corrected and the problem no longer presents. ( BZ#505110 )
  • the ismounted method was set to use two arguments when it required three. This has been corrected, and the method now works as expected. ( BZ#505110 )
  • the debugfs method, logdump, performed a call to fclose without checking that the value being passed was not null. This would result in segfault. The method now checks for a null before attempting to pass the value, and does not call fclose if a null is present. (BZ#505110)
  • a typographical error in the uuidd initscript that caused an incorrect status to me set has been corrected. (BZ#506080)
The updated package also includes the following enhancement:
  • running mke2fs on devices larger than 8 terabytes required the "-F" (force) option to succeed. This update removes that requirement. (BZ#241285)
All users should upgrade to this updated package, which resolves the listed issues and adds the noted enhancement.

1.45. e4fsprogs

1.45.1. RHBA-2009:1413: bug fix update

An updated e4fsprogs package that fixes a bug is now available.
The e4fsprogs package contains a number of utilities for creating, checking, modifying, and correcting inconsistencies in ext4 and ext4dev file systems. e4fsprogs contains e4fsck (used to repair file system inconsistencies after an unclean shutdown), mke4fs (used to initialize a partition to contain an empty ext4 file system), tune4fs (used to modify file system parameters), and most other core ext4fs file system utilities.

Important

this package is now designed and intended to be installed alongside the original e2fsprogs package in Red Hat Enterprise Linux. As such, certain binaries in the e4fsprogs package have been given new names. For example, the utility that checks ext4 file systems for consistency has been renamed to "e4fsck", thus allowing the original "e2fsck" program from the e2fsprogs package to coexist on the same system. (BZ#485316)
Notably, this updated e4fsprogs package includes a fix for the following bug:
  • invoking the "stats" command while at the "debuge4fs" prompt could cause "debuge4fs" to segmentation fault due to a missing check to see whether the file system was currently open. This has been fixed in this updated package so that calling "stats" is now safe. (BZ#482894)
All users of e4fsprogs are advised to upgrade to this updated package, which resolves this issue.

1.46.  ecryptfs-utils

1.46.1.  RHSA-2009:1307: Low security, bug fix, and enhancement update

Updated ecryptfs-utils packages that fix a security issue, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5.
This update has been rated as having low security impact by the Red Hat Security Response Team.
eCryptfs is a stacked, cryptographic file system, transparent to the underlying file system and provides per-file granularity.
eCryptfs is released as a Technology Preview for Red Hat Enterprise Linux 5.4. These updated ecryptfs-utils packages have been upgraded to upstream version 75, which provides a number of bug fixes and enhancements over the previous version. In addition, these packages provide a graphical program to help configure and use eCryptfs. To start this program, run the command:
ecryptfs-mount-helper-gui
Important: the syntax of certain eCryptfs mount options has changed. Users who were previously using the initial Technology Preview release of ecryptfs-utils are advised to refer to the ecryptfs(7) man page, and to update any affected mount scripts and /etc/fstab entries for eCryptfs file systems.
A disclosure flaw was found in the way the "ecryptfs-setup-private" script passed passphrases to the "ecryptfs-wrap-passphrase" and "ecryptfs-add-passphrase" commands as command line arguments. A local user could obtain the passphrases of other users who were running the script from the process listing. (CVE-2008-5188)
These updated packages provide various enhancements, including a mount helper and supporting libraries to perform key management and mounting functions.
Notable enhancements include:
  • a new package, ecryptfs-utils-gui, has been added to this update. This package depends on the pygtk2 and pygtk2-libglade packages and provides the eCryptfs Mount Helper GUI program. To install the GUI, first install encryptfs-utils and then issue the following command:
    yum install ecryptfs-utils-gui
    
  • the "ecryptfs-rewrite-file" utility is now more intelligent when dealing with non-existent files and with filtering special files such as the "." directory. In addition, the progress output from "ecryptfs-rewrite-file" has been improved and is now more explicit about the success status of each target. (BZ#500813)
  • descriptions of the "verbose" flag and the "verbosity=[x]" option, where [x] is either 0 or 1, were missing from a number of eCryptfs manual pages, and have been added. Refer to the eCryptfs man pages for important information regarding using the verbose and/or verbosity options. (BZ#470444)
These updated packages also fix the following bugs:
  • mounting a directory using the eCryptfs mount helper with an RSA key that was too small did not allow the eCryptfs mount helper to encrypt the entire key. When this situation occurred, the mount helper did not display an error message alerting the user to the fact that the key size was too small, possibly leading to corrupted files. The eCryptfs mount helper now refuses RSA keys which are to small to encrypt the eCryptfs key. (BZ#499175)
  • when standard input was redirected from /dev/null or was unavailable, attempting to mount a directory with the eCryptfs mount helper caused it to become unresponsive and eventually crash, or an "invalid value" error message, depending on if the "--verbosity=[value]" option was provided as an argument, and, if so, its value. With these updated packages, attempting to mount a directory using "mount.ecryptfs" under the same conditions results in either the mount helper attempting to use default values (if "verbosity=0" is supplied), or an "invalid value" error message (instead of the mount helper hanging) if standard input is redirected and "--verbosity=1" is supplied, or that option is omitted entirely. (BZ#499367)
  • attempting to use the eCryptfs mount helper with an OpenSSL key when the keyring did not contain enough space for the key resulted in an unhelpful error message. The user is now alerted when this situation occurs. (BZ#501460)
  • the eCryptfs mount helper no longer fails upon receiving an incorrect or empty answer to "yes/no" questions. (BZ#466210)
Users are advised to upgrade to these updated ecryptfs-utils packages, which resolve these issues and add these enhancements.

1.47.  efax

1.47.1.  RHBA-2009:1113: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1113
An updated efax package that fixes a bug is now available.
The efax program is a small ANSI C/POSIX utility that sends and receives faxes using any Class 1, 2 or 2.0 fax modem.
This updated efax package fixes a bug which caused a segmentation fault when attempting to send a fax due to the incorrect use of an internal efax function.
All users of efax are advised to upgrade to this updated package, which resolves this issue.

1.48.  esc

1.48.1.  RHBA-2009:1310: bug fix update

An updated esc package that fixes various bugs is now available.
The esc package contains the "Smart Card Manager" GUI tool, which allows the user to manage security smart cards. The primary function of the tool is to enroll smart cards, so that they can be used for common cryptographic operations, such as secure email and website access.
This updated package fixes the following bugs:
  • If a smart card were inserted when the esc daemon was already running then there could be odd behaviors when the ESC GUI was opened. For example, if the smart card was blank, then the Phone Home configuration dialog would not open. When the smart card was removed, then esc could crash. (BZ#496410)
  • If a user attempted to re-enroll a formatted token when the RE_ENROLL value was set to NO, then the ESC wrongly gave an error that the token was suspended, not that re-enrollment wasn't allowed. This message has been corrected. (BZ#494981)
This update also includes enhancements for smart card management:
  • Certificate System previously supported re-enrollment for tokens, which allows a formatted token to be re-formatted with new certificates. This enhancement also allows smart cards to have renewal operations, so existing certificates can have renewed.
  • This release includes enhancements to streamline the security officer mode for ESC. Security officer mode allows designated users to perform in-person token enrollments, as added security. This simplifies launching the ESC GUI in security officer mode.
Users of esc are advised to upgrade to this updated package, which resolves these issues.

1.49.  ethtool

1.49.1.  RHEA-2009:1408: enhancement update

An enhanced ethtool package that adds support for GRO options is now available.
Ethtool allows querying and changing of ethernet card settings, such as speed, port, autonegotiation, and PCI locations.
This updated package adds the following enhancement:
  • generic receive offload (GRO) has been added to some network drivers in Red Hat Enterprise Linux 5.4. GRO aggregates packets before they're processed by the rest of the stack. This allows TCP performance to be greatly enhanced at high speeds. In particular, it's crucial for good 10GbE performance. With GRO enabled, you should observe higher throughput, lower CPU utilization of network traffic, or both; especially with smaller message sizes.
    The kernel in Red Hat Enterprise Linux 5.4 allows users to manually control whether GRO is enabled for supported ethernet adapters. This updated ethtool provides a command-line interface -- "ethtool -k" -- for setting and querying that flag. (BZ#509398)
All ethtool users should upgrade to this updated package which adds this capability.

1.50.  evince

1.50.1.  RHBA-2009:1404: bug fix update

An updated evince package that fixes a printing bug is now available.
evince is a GNOME-based document viewer.
This update fixes a flaw in evince versions prior to 0.6.0-8 discovered by Jonathan Peatfield:
  • when printing "n" copies of a non-postscript document, "n times n" copies were printed instead. (That is, if two copies were requested, four copies -- 2 x 2 -- were printed.) This flaw has been corrected. Note: the underlying cause of this problem also influenced collated printing, reversed printing and printing of sets of pages. (BZ#439937)
All Evince users are advised to upgrade to this updated package, which resolves these issues.

1.51.  evolution

1.51.1.  RHBA-2009:1260: bug fix update

Updated evolution packages that fix several bugs and add various enhancements are now available.
Evolution is the GNOME collection of personal information management (PIM) tools.
These updated evolution packages provide fixes for the following bugs:
  • when adding a new Exchange account, a Mailbox name separate from the user name can now be specified. (BZ#205787)
  • pasting text into an event summary by issuing the Ctrl+V control code did not work as expected. (BZ#208356)
  • running Evolution in a different language caused it to not display certain translations such as "On This Computer", "Personal" and specific calendar and address book names. (BZ#210858)
  • when attempting to import a certificate from the Edit Preferences -> Certificates menu, the subsequent Trust dialog box appeared below the file selector window, forcing users to manually move both windows in order to accomplish the task. (BZ#212206)
  • Evolution crashed due to a segmentation fault when reading certain email messages when accessibility was enabled. (BZ#212481)
  • attempting to import a vCard File containing contacts into a new address book created during the import process failed, and no contacts were imported. All contacts imported in this way are now present in the new address book. (BZ#215470)
  • selecting the "On This Computer" folder and then clicking Folder -> Properties produced no result. The "Properties" menu item is now correctly grayed-out. (BZ#215479)
  • Evolution did not honor the selected day when adding a memo while in calendar view: the user had to manually alter the memo's date afterward. (BZ#217541)
  • searching an address book using the "any field" option when no results were found caused Evolution to display all contacts instead of none. This behavior is now more intuitive: no contacts are displayed when none are found. (BZ#217714)
  • while in Mail view, deselecting a previously-selected group of messages by clicking on one of those selected did not result in that message being shown in the preview pane. (BZ#227710)
  • when accessibility was enabled, specific combinations of calender-viewing actions caused Evolution to crash. (BZ#428817)
  • when starting Evolution for the first time with a German (de_DE) locale, the setup wizard window was too large for some monitors to display. (BZ#432322)
  • dragging-and-dropping messages into the "Personal Folders" caused those messages to be irretrievably lost. Dropping messages into "Personal Folders" is now disallowed. (BZ#437768)
  • Evolution's account editor did not strip whitespace characters in hostnames, which caused a failure to connect when attempting to retrieve email. (BZ#446945)
  • sorting email by subject did not always result in the expected alphabetical sorting. (BZ#449797)
  • the Contact Quick-Add window allowed users to click "OK" without selecting an address book, which did not result in the contact being added to any address book. (BZ#449983)
  • attempting to download Exchange messages for offline use caused Evolution to segmentation fault. Evolution no longer crashes, and downloading Exchange messages works as expected, allowing for offline use. (BZ#472872)
  • it was not possible to create a new folder from the New Search Folder dialog box and related menus. Also, attempting to name a new folder and then clicking the "Create" button caused Evolution to crash under certain circumstances. (BZ#473024)
  • moving an Exchange folder containing subfolders to a different location resulted in the loss of all subfolders and their emails. With this update, all subfolders and their contents are copied or moved correctly and without any loss of data. (BZ#480849)
In addition, these updated packages provide the following enhancements:
  • improved support for CalDAV. (BZ#484252)
  • the cursor now conveniently moves to the new rule when it is created in the "Add Rule" dialog box. (BZ#218539)
Users are advised to upgrade to these updated evolution packages, which resolve these issues and add these enhancements.

1.52.  evolution-connector

1.52.1.  RHBA-2009:1261: bug fix update

An updated evolution-connector package that fixes various bugs is now available.
The evolution-connector package is an add-on to Evolution, an e-mail, calendar and information management client, that gives it the ability to interact with a Microsoft® Exchange Server.
This updated evolution-connector package includes fixes for the following bugs:
  • when adding a new Exchange account, a Mailbox name separate from the user name can now be specified. (BZ#205787)
  • a memory leak related to using Exchange accounts has been plugged. (BZ#393761)
  • dragging-and-dropping messages into the "Personal Folders" caused those messages to be irretrievably lost. Dropping messages into "Personal Folders" is now disallowed. (BZ#437768)
  • incoming mail filters had no effect on messages received by Exchange-based email accounts. This has been fixed in this updated package so that incoming mail filters work as expected with Exchange accounts. (BZ#446095)
  • in certain situations, notifications were not shown for calendar events stored on an Exchange Server. With this updated package, notifications work correctly as long as Evolution is configured to remember Exchange Server passwords. Otherwise, notifications fail to be shown. (BZ#480164)
  • moving an Exchange folder containing subfolders to a different location resulted in the loss of all subfolders and their emails. With this update, all subfolders and their contents are copied or moved correctly and without any loss of data. (BZ#480849)
All users of evolution-connector are advised to upgrade to this updated package, which resolves these issues.

1.53.  evolution-data-server

1.53.1.  RHSA-2009:0354: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0354
Updated evolution-data-server and evolution28-evolution-data-server packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
Evolution Data Server provides a unified back-end for applications which interact with contacts, task, and calendar information. Evolution Data Server was originally developed as a back-end for Evolution, but is now used by multiple other applications.
Evolution Data Server did not properly check the Secure/Multipurpose Internet Mail Extensions (S/MIME) signatures used for public key encryption and signing of e-mail messages. An attacker could use this flaw to spoof a signature by modifying the text of the e-mail message displayed to the user. (CVE-2009-0547)
It was discovered that Evolution Data Server did not properly validate NTLM (NT LAN Manager) authentication challenge packets. A malicious server using NTLM authentication could cause an application using Evolution Data Server to disclose portions of its memory or crash during user authentication. (CVE-2009-0582)
Multiple integer overflow flaws which could cause heap-based buffer overflows were found in the Base64 encoding routines used by Evolution Data Server. This could cause an application using Evolution Data Server to crash, or, possibly, execute an arbitrary code when large untrusted data blocks were Base64-encoded. (CVE-2009-0587)
All users of evolution-data-server and evolution28-evolution-data-server are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of Evolution Data Server and applications using it (such as Evolution) must be restarted for the update to take effect.

1.53.2.  RHBA-2009:1259: bug fix update

Updated evolution-data-server packages that resolve several issues are now available.
The evolution-data-server package provides a unified back end for applications which interact with contacts, task and calendar information. Evolution Data Server was originally developed as a back end for Evolution, but is now used by multiple other applications.
These updated evolution-data-server packages provide fixes for the following bugs:
  • occasionally, a "?" appeared as the last result of the list obtained when viewing the "Select Contacts from Address Book" dialog. With these updated packages, this incorrect entry no longer occurs in the dialog window when selecting contacts. (BZ#220431)
  • The IMAP mail protocol distinguishes between messages which are "new" on the server and messages which are "new" for a mail client. This dichotomy led Evolution Data Server to only apply filters to one of the "new" groups and not to the other, which meant that email filters were not applied to certain messages. With these updated packages, filters now apply to all IMAP messages which are new for the client, with the result that all messages can now be successfully filtered. (BZ#247779)
  • when attempting to connect to an Exchange 2007 server, the server's response sometimes caused Evolution to segmentation fault. Although the possibility of an Exchange 2007 server's response causing Evolution to crash has been fixed with these updated packages, it is still not possible for Evolution to communicate successfully with an Exchange 2007 server. (BZ#433648)
  • when Evolution was configured with two IMAP accounts, deleting one of those accounts could have caused Evolution to segmentation fault. These updated packages fix a variable referencing error with the result that disabling a mail account no longer causes Evolution to crash. (BZ#437758)
  • Evolution Data Server could segmentation fault when provided a malformed CalDAV calendar URL. With these updated packages, Evolution performs better error-checking on calendar URLs, which prevents this issue from occurring. (BZ#440232)
  • the Exchange connector for Evolution Data Server contained several memory leaks which have been plugged in these updated packages. (BZ#460669)
  • when adding a new Exchange account, a Mailbox name separate from the user name can now be specified. (BZ#460671)
  • when reading a calendar via the CalDAV protocol, Evolution failed to correctly adjust the time of events based on timezone information. (BZ#462007)
  • improved support for CalDAV. (BZ#484232)
  • attempting to download Exchange messages for offline use caused Evolution to segmentation fault. Evolution no longer crashes, and downloading Exchange messages works as expected, allowing for offline use. (BZ#489869)
  • Evolution incorrectly switched to Daylight Saving Time (DST) one week later than the time when DST should have started. With these updated packages, DST now takes effect at the correct time. (BZ#490218)
  • Evolution did not provide notifications for events located on a foreign Exchange calendar. This update ensures that Evolution is able to notify based on foreign Exchange calendar events in the same way as for local calendars. (BZ#494847)
All users of evolution-data-server are advised to upgrade to these updated packages, which resolve these issues.

1.54.  file

1.54.1.  RHBA-2009:0456: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0456
An updated file package that fixes a bug is now available.
The file command is used to identify a particular file according to the type of data contained in the file.
This updated file package provides fixes for the following bug:
  • A core file, which is created when a program crashes, contains the name of the crashed program. The file command did not report the correct program name on some core files. The file command reports the correct name with this updated package.
Users are advised to upgrade to this updated file package, which resolves this issue.

1.55.  findutils

1.55.1.  RHEA-2009:1410: enhancement update

An enhanced findutils package is now available.
The findutils package contains programs for locating files. The find utility searches for files matching a certain set of criteria. The xargs utility builds and executes command lines from standard input arguments.
This updated findutils package adds the following enhancement:
  • when using the "find" utility to search a directory hierarchy which contained autofs mounts, it dutifully triggered the aufofs mounts so that they could be searched, even when "find" had been directed to exclude NFS shares. With these updated packages, "find" possesses an additional exclusionary flag, "-xautofs", that prevents "find" from searching all autofs direct mounts in the searched directory hierarchy. (BZ#485672)
Users of findutils are advised to upgrade to this updated package, which adds this enhancement.

1.56.  fipscheck

1.56.1.  RHEA-2009:1266: enhancement update

An updated fipscheck package which contains enhancements necessary for FIPS validation is now available.
FIPSCheck is a library used to verify the integrity of modules validated under FIPS-140-2. The fipscheck package provides helper binaries for creating and verifying HMAC-SHA256 checksum files.
These updated fipscheck packages add the following enhancements:
  • previously, the fipscheck libraries and binaries were installed in / (root). However, because they are not required by anything in /, they are now relocated to /usr. (BZ#475800)
  • previously, the fipscheck libraries were packaged in the main fipscheck package. This would lead to a file conflict when installing fipscheck on architectures with multilib support. The fipscheck libraries are now shipped in fipscheck-lib subpackages for each architecture, therefore avoiding the file conflict. (BZ#502676)
  • fipscheck now includes a runtime integrity self-test which is necessary for FIPS 140-2 level 1 validation of Red Hat Enterprise Linux 5 cryptography modules.
  • the FIPSCHECK_DEBUG environment variable adds improved debugging. Error messages can be saved to the syslog or sent to stderr.
  • fipscheck can now compute HMACs on multiple files at the same time.
Users of fipscheck are advised to upgrade to these updated packages, which add these enhancements.

1.57.  firefox

1.57.1.  RHSA-2009:1162: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1162
Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox.
Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-2462, CVE-2009-2463, CVE-2009-2464, CVE-2009-2465, CVE-2009-2466, CVE-2009-2467, CVE-2009-2469, CVE-2009-2471)
Several flaws were found in the way Firefox handles malformed JavaScript code. A website containing malicious content could launch a cross-site scripting (XSS) attack or execute arbitrary JavaScript with the permissions of another website. (CVE-2009-2472)
For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 3.0.12. You can find a link to the Mozilla advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.12, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.

1.57.2.  RHSA-2009:1095: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1095
Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox.
Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1837, CVE-2009-1838, CVE-2009-1841)
Multiple flaws were found in the processing of malformed, local file content. If a user loaded malicious, local content via the file:// URL, it was possible for that content to access other local data. (CVE-2009-1835, CVE-2009-1839)
A script, privilege elevation flaw was found in the way Firefox loaded XML User Interface Language (XUL) scripts. Firefox and certain add-ons could load malicious content when certain policy checks did not happen. (CVE-2009-1840)
A flaw was found in the way Firefox displayed certain Unicode characters in International Domain Names (IDN). If an IDN contained invalid characters, they may have been displayed as spaces, making it appear to the user that they were visiting a trusted site. (CVE-2009-1834)
A flaw was found in the way Firefox handled error responses returned from proxy servers. If an attacker is able to conduct a man-in-the-middle attack against a Firefox instance that is using a proxy server, they may be able to steal sensitive information from the site the user is visiting. (CVE-2009-1836)
For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 3.0.11. You can find a link to the Mozilla advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.11, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.

1.57.3.  RHSA-2009:0449: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0449
Updated firefox packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox.
A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1313)
For technical details regarding this flaw, refer to the Mozilla security advisory for Firefox 3.0.10. You can find a link to the Mozilla advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.10, which corrects this issue. After installing the update, Firefox must be restarted for the change to take effect.

1.57.4.  RHSA-2009:0436: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0436
Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox.
Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1302, CVE-2009-1303, CVE-2009-1304, CVE-2009-1305)
Several flaws were found in the way malformed web content was processed. A web page containing malicious content could execute arbitrary JavaScript in the context of the site, possibly presenting misleading data to a user, or stealing sensitive information such as login credentials. (CVE-2009-0652, CVE-2009-1306, CVE-2009-1307, CVE-2009-1308, CVE-2009-1309, CVE-2009-1310, CVE-2009-1312)
A flaw was found in the way Firefox saved certain web pages to a local file. If a user saved the inner frame of a web page containing POST data, the POST data could be revealed to the inner frame, possibly surrendering sensitive information such as login credentials. (CVE-2009-1311)
For technical details regarding these flaws, refer to the Mozilla security advisories for Firefox 3.0.9. You can find a link to the Mozilla advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.9, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.

1.57.5.  RHSA-2009:0397: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0397
Updated firefox packages that fix two security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Mozilla Firefox is an open source Web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox.
A memory corruption flaw was discovered in the way Firefox handles XML files containing an XSLT transform. A remote attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1169)
A flaw was discovered in the way Firefox handles certain XUL garbage collection events. A remote attacker could use this flaw to crash Firefox or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-1044)
For technical details regarding these flaws, refer to the Mozilla security advisories. You can find a link to the Mozilla advisories in the References section of this errata.
Firefox users should upgrade to these updated packages, which resolve these issues. For Red Hat Enterprise Linux 4, they contain backported patches to the firefox package. For Red Hat Enterprise Linux 5, they contain backported patches to the xulrunner packages. After installing the update, Firefox must be restarted for the changes to take effect.

1.57.6.  RHSA-2009:0315: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0315
An updated firefox package that fixes various security issues is now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Mozilla Firefox is an open source Web browser.
Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-0040, CVE-2009-0771, CVE-2009-0772, CVE-2009-0773, CVE-2009-0774, CVE-2009-0775)
Several flaws were found in the way malformed content was processed. A website containing specially-crafted content could, potentially, trick a Firefox user into surrendering sensitive information. (CVE-2009-0776, CVE-2009-0777)
For technical details regarding these flaws, please see the Mozilla security advisories for Firefox 3.0.7. You can find a link to the Mozilla advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.7, and which correct these issues. After installing the update, Firefox must be restarted for the changes to take effect.

1.57.7.  RHSA-2009:0256: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0256
An updated firefox package that fixes various security issues is now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
Mozilla Firefox is an open source Web browser.
Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2009-0352, CVE-2009-0353, CVE-2009-0356)
Several flaws were found in the way malformed content was processed. A website containing specially-crafted content could, potentially, trick a Firefox user into surrendering sensitive information. (CVE-2009-0354, CVE-2009-0355)
A flaw was found in the way Firefox treated HTTPOnly cookies. An attacker able to execute arbitrary JavaScript on a target site using HTTPOnly cookies may be able to use this flaw to steal the cookie. (CVE-2009-0357)
A flaw was found in the way Firefox treated certain HTTP page caching directives. A local attacker could steal the contents of sensitive pages which the page author did not intend to be cached. (CVE-2009-0358)
For technical details regarding these flaws, please see the Mozilla security advisories for Firefox 3.0.6. You can find a link to the Mozilla advisories in the References section.
All Firefox users should upgrade to these updated packages, which contain Firefox version 3.0.6, which corrects these issues. After installing the update, Firefox must be restarted for the changes to take effect.

1.58.  flash-plugin

1.58.1.  RHSA-2009:1188: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1188
An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
Multiple security flaws were found in the way Flash Player displayed certain SWF content. An attacker could use these flaws to create a specially-crafted SWF file that would cause flash-plugin to crash or, possibly, execute arbitrary code when the victim loaded a page containing the specially-crafted SWF content. (CVE-2009-1862, CVE-2009-1863, CVE-2009-1864, CVE-2009-1865, CVE-2009-1866, CVE-2009-1868, CVE-2009-1869)
A clickjacking flaw was discovered in Flash Player. A specially-crafted SWF file could trick a user into unintentionally or mistakenly clicking a link or a dialog. (CVE-2009-1867)
A flaw was found in the Flash Player local sandbox. A specially-crafted SWF file could cause information disclosure when it was saved to the hard drive. (CVE-2009-1870)
All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.0.32.18.

1.58.2.  RHSA-2009:0332: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0332
An updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The flash-plugin package contains a Firefox-compatible Adobe Flash Player Web browser plug-in.
Multiple input validation flaws were found in the way Flash Player displayed certain SWF (Shockwave Flash) content. An attacker could use these flaws to create a specially-crafted SWF file that could cause flash-plugin to crash, or, possibly, execute arbitrary code when the victim loaded a page containing the specially-crafted SWF content. (CVE-2009-0520, CVE-2009-0519)
It was discovered that Adobe Flash Player had an insecure RPATH (runtime library search path) set in the ELF (Executable and Linking Format) header. A local user with write access to the directory pointed to by RPATH could use this flaw to execute arbitrary code with the privileges of the user running Adobe Flash Player. (CVE-2009-0521)
All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.0.22.87.

1.59.  foomatic

1.59.1.  RHBA-2009:1240: bug fix update

An updated foomatic package that fixes two bugs is now available.
Foomatic is a comprehensive, spooler-independent database of printers, printer drivers, and driver descriptions. An interactive version of this database is available at http://www.linuxfoundation.org/en/OpenPrinting/Database/DatabaseIntro
Foomatic provides utilities to generate driver description files and printer queues for CUPS, LPD, LPRng, and PDQ from the database. As well, foomatic makes it possible to read PJL-options out of PJL-capable laser printers and take them into account when driver description files are generated.
The package also includes spooler-independent command line interfaces to manipulate queues (foomatic-configure) and to print files and manipulate print jobs (foomatic printjob).
This updated package addresses the following issues:
  • previously, PostScript Printer Descriptions (PPDs) created for printers for which no page margin information was available used ImageableArea settings that equated to zero-width margins (ie, foomatic over-optimistically assumed edge-to-edge printing capability in the absence of specific information to the contrary). With this update, PPDs created for printers with no included margin information are set to 127mm (36 points or 0.5") by default. This avoids problems with print jobs being cropped at the edges of the page. (BZ#244348)
  • spooler auto-detection is not part of foomatic and, previously, foomatic did not set a default spooler. Consequently, the foomatic-configure command failed to detect that CUPS was present if a default spooler was not set in /etc/foomatic/defaultspooler (which was not created by default during foomatic installation). With this update, /etc/foomatic/defaultspooler is created during installation and the default spooler is set to CUPS, ensuring foomatic-configure is aware of CUPS. (BZ#454684)
All foomatic users should upgrade to this updated package, which resolves these issues.

1.60.  freetype

1.60.1.  RHSA-2009:1061: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1061
Updated freetype packages that fix various security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. These packages provide the FreeType 2 font engine.
Tavis Ormandy of the Google Security Team discovered several integer overflow flaws in the FreeType 2 font engine. If a user loaded a carefully-crafted font file with an application linked against FreeType 2, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2009-0946)
Users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. The X server must be restarted (log out, then log back in) for this update to take effect.

1.61.  gcc

1.61.1.  RHBA-2009:1376: bug fix update

A gcc update that resolves several GFortran compiler bugs (along with several other bugs) is now available.
The gcc packages include C, C++, Java, Fortran, Objective C, and Ada 95 GNU compilers, along with related support libraries.
This update applies the following bug fixes:
  • 64-bit multiplication by constant on the x86 platform caused unexpected aborts when compiling code that used 'unsigned long long' variables. This was because the compiler did not check whether CONST_DOUBLE_LOW was positive when multiplying constants. With this update, the compiler now check if CONST_DOUBLE_LOW is positive, ensuring that 'unsigned long long' variables are processed correctly during compiles. (BZ#465807)
  • A bug in the way the GFortran compiler processed unique symtrees could have prevented some valid GFortran code from compiling if the code contained symbols defined by USE and ONLY clauses. Whenever this occurred, the compile attempt would fail with a segmentation fault. This update adds a special function that correctly reconciles symbols with unique symtrees, which resolves this bug. (BZ#483845)
  • Using the -fabi-version=1 option prevented some valid C++ code from compiling. This was because Version 1 of the C++ ABI did not properly substitute template parameters. This release corrects this behavior, adding a function that correctly sets the processing_template_decl to 0 when performing substitutions. (BZ#492011)
  • A bug in the way gcc optimized code could have prevented some samples of valid C code from compiling (resulting in an internal compiler error) whenever the -O1 option was used. This was because during optimized compiles, the C compiler did not properly process bounds; this resulted in incorrect computations for loop iterations. With this update, the compiler now processes bounds correctly, ensuring that valid C code compiles correctly with the -O1 option set. (BZ#490513)
  • The GFortran compiler did not handle FMT= character array arguments properly. This prevented some samples of valid GFortran code from compiling; whenever this occurred, the compile attempt would fail with a segmentation fault. This update adds new functions to correct how FMT= character array arguments are handled, thereby resolving this bug. (BZ#492209)
  • The expand_expr_real_1() function of the C compiler did not handle TRUTH_ANDIF_EXPR and TRUTH_ORIF_EXPR cases correctly. As a result, a compile attempt could fail with an internal compiler error on the PowerPC platform. This update applies an upstream fix for this issue. (BZ#495469)
Users are advised to upgrade to this gcc update, which applies these fixes.

1.62.  gcc44

1.62.1.  RHBA-2009:1375: bug fix and enhancement update

The GNU Compiler Collection (GCC) version 4.4.0 is now available as Technology Preview.
The gcc44 packages provide the GNU Compiler Collection (GCC), which includes GNU compilers and related support libraries for C, C++, and Fortran programming languages. These packages also include libgomp, the GNU implementation of the OpenMP Application Programming Interface for multi-platform shared-memory parallel programming.
These new gcc43 packages provide a snapshot release of GCC version 4.4.0 as a Technology Preview. The libgomp version included in this release supports OpenMP version 3.0, a backward-compatible update to the OpenMP 2-series. (BZ#494563)
This release also features the following bug fixes:
  • GFortran provided improper DWARF definitions for array parameters (i.e. missing upper bounds). This was caused by a bug in gcc/fortran/trans-decl.c that provided incorrect debugging information for variable-length, non-desc Fortran arrays. With this release, Gfortran now provides proper DWARF definitions for arrays parameters. (BZ#459374)
  • A bug in GFortran made it possible for an internal compiler error to incorrectly escalate to a segmentation fault (instead of terminating the compilation gracefully). An upstream fix for this bug is now included with this release. (BZ#466928)
  • Whenever gcc is used with the option -march=z9-ec or -march=z10, hardware decimal floating point (DFP) support is used by default. (BZ#474367)
  • An improper option (i.e. %global _use_internal_dependency_generator 0) used during the build of libgomp in previous releases disabled "file coloring". This caused RPM to erroneously detect a file conflict on /usr/lib/libgomp.so.1.0.0 when installing libgomp from the Itanium compatibility layer. This release includes a properly-built libgomp, which resolves this issue. (BZ#503725)

Note

the -fgnu89-inline option instructs GCC to use traditional GNU semantics for inline functions when in C99 mode. In this Technology Preview, -fgnu89-inline is used by default. This is necessary because the Red Hat Enterprise Linux 5 header files expect GNU inline semantics instead of ISO C99 semantics. Further, these header files have not been adjusted to request inline settings through attributes. (BZ#493929)
All users interested in testing gcc44 as a Technology Preview are advised to install these packages. Note that this release replaces the gcc43 Technology Preview packages provided in previous releases.

1.63.  gdb

1.63.1.  RHBA-2009:1361: bug fix update

A gdb update that fixes several bugs and improves gfortran debugging is now available.
The GNU Project debugger (normally referred to as GDB) debugs programs written in C, C++, and other languages by executing them in a controlled fashion, and then printing out their data.
This update applies the following bug fixes:
  • Normally, static variables always have the same debugging information for each possible constructor/destructor implementation kind, which allows the compiler to keep their DIE (debugging information entry) only in the single abstract instance of the constructor. However, GDB did not automatically inherit whole DIEs from the abstract instances to the concrete instances. As such, the static variables in C++ constructors were not visible from GDB. With this update, GDB now inherits whole DIEs to ensure that static variables do not become inaccessible. (BZ#445912)
  • GDB now supports the use of 64-bit ELF files for 32-bit platforms (i.e. elf64-i386). (BZ#457187)
  • It was possible for GDB to print an error when trying to access an allocatable or otherwise dynamic array or string variable in Fortran. This was because GDB did not account for the fact that the lower bound for Fortran arrays was 1 (rather than 0). This made it possible for array size calculations to result in invalid values (i.e. too high) when allocating unbound or dynamically-bound Fortran arrays. This release corrects the way GDB processes Fortran arrays; it also adds functions to verify the validity of a calculated array size first before attempting to allocate it. (BZ#459380)
  • Variables imported from Fortran modules can be now accessed from GDB with the same scope as the program being debugged. (BZ#466118 , BZ #457793)
  • Variables shared by Fortran "common blocks" can be now accessed from GDB with the same scope as the program being debugged. Further, common blocks valid in the current program scope can be printed using the GDB command 'info common'. (BZ#459762)
  • Allocatable arrays, objects with assumed size, and pointers to objects can be now accessed from GDB in the same manner that they are accessed from the program being debugged. (BZ#460250 , BZ#459952 , BZ#465301 , BZ#505333)
  • Variables of type 'logical (kind=8)' can be now accessed from GDB. (BZ#465310)
  • For external references, GCC does not produce DWARF debug information. As a result, GDB could not access Thread Local Storage (TLS) variables from a local source file if those variables were defined in a different source file. This made it possible for certain memory addresses to become unaccessible to GDB. With this release, GDB can now process TLS variables using ELF structures instead of DWARF; as such, GDB can now access TLS variables regardless of where those variables were defined. (BZ#494412)
  • Running gcore (or any 'attach' or 'detach' command sequence) on a multi-threaded process that was halted with 'kill -STOP' could unexpectedly resume some of that process's threads. This behavior was caused by a kernel bug (present in upstream version 2.6.29) that remained unfixed in Red Hat Enterprise Linux 5 kernels to maintain backward compatibility. While this update does not fix the kernel bug, it applies a GDB workaround that ensures threads from a halted multi-threaded process do not unexpectedly resume. (BZ#498595)
This update also implements various parts of Fortran language support. With this implementation, gfortran44 (not gfortran) is now used to compile Fortran programs. The gfortran44 compiler is provided by the gcc44 update (included in this release as a Technology Preview).
GDB users are advised to apply this update.

1.64.  gdm

1.64.1.  RHSA-2009:1364: Low security and bug fix update

Updated gdm packages that fix a security issue and several bugs are now available for Red Hat Enterprise Linux 5.
This update has been rated as having low security impact by the Red Hat Security Response Team.
The GNOME Display Manager (GDM) is a configurable re-implementation of XDM, the X Display Manager. GDM allows you to log in to your system with the X Window System running, and supports running several different X sessions on your local machine at the same time.
A flaw was found in the way the gdm package was built. The gdm package was missing TCP wrappers support, which could result in an administrator believing they had access restrictions enabled when they did not. (CVE-2009-2697)
This update also fixes the following bugs:
  • the GDM Reference Manual is now included with the gdm packages. The gdm-docs package installs this document in HTML format in "/usr/share/doc/". (BZ#196054)
  • GDM appeared in English on systems using Telugu (te_IN). With this update, GDM has been localized in te_IN. (BZ#226931)
  • the Ctrl+Alt+Backspace sequence resets the X server when in runlevel 5. In previous releases, however, repeated use of this sequence prevented GDM from starting the X server as part of the reset process. This was because GDM sometimes did not notice the X server shutdown properly and would subsequently fail to complete the reset process. This update contains an added check to explicitly notify GDM whenever the X server is terminated, ensuring that resets are executed reliably. (BZ#441971)
  • the "gdm" user is now part of the "audio" group by default. This enables audio support at the login screen. (BZ#458331)
  • the gui/modules/dwellmouselistener.c source code contained incorrect XInput code that prevented tablet devices from working properly. This update removes the errant code, ensuring that tablet devices work as expected. (BZ#473262)
  • a bug in the XOpenDevice() function prevented the X server from starting whenever a device defined in "/etc/X11/xorg.conf" was not actually plugged in. This update wraps XOpenDevice() in the gdk_error_trap_pop() and gdk_error_trap_push() functions, which resolves this bug. This ensures that the X server can start properly even when devices defined in "/etc/X11/xorg.conf" are not plugged in. (BZ#474588)
All users should upgrade to these updated packages, which resolve these issues. GDM must be restarted for this update to take effect. Rebooting achieves this, but changing the runlevel from 5 to 3 and back to 5 also restarts GDM.

1.65.  gfs-kmod

1.65.1.  RHBA-2009:1212: bug-fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1212
Updated gfs-kmod packages that fix a bug are now available for Red Hat Enterprise Linux 5.
The gfs-kmod packages contain modules that provide the ability to mount and use GFS file systems.
This update applies the following bug fix:
  • A bug which did not flush the journal after a fsync to a stuffed inode has been fixed.
All gfs-kmod users should upgrade to these updated packages, which resolve this issue.

1.65.2.  RHBA-2009:1338: bug-fix update

Updated gfs-kmod packages which fix several bugs are now available.
The gfs-kmod packages contain kernel modules that provide the functionality to mount and use GFS file systems.
These updated packages apply the following bug fixes:
  • A potential deadlock causing gfs to hang in 'wait_for_completion' was fixed by prefaulting buffer pages.
  • Applications using sendfile on files with the inherit_jdata flag are now notified that sendfile will not work on those files instead of failing.
  • A bug that could potentially cause a page allocation failure has been fixed.
  • A bug that caused fsyncs to stuffed inodes fail to flush the journal has been fixed.
Users are advised to upgrade to these latest gfs-kmod packages, which resolve these issues.

1.66.  gfs-utils

1.66.1.  RHBA-2009:1336: bug fix update

Updated gfs-utils packages that fix various bugs are now available.
The gfs-utils packages provide the user-level tools necessary to mount and use GFS file systems.
These updated gfs-utils packages apply the following bug fixes:
  • An issue was fixed which caused gfs_fsck to attempt to fix the wrong bitmap.
  • gfs_fsck's ability to fix damaged resource groups has been improved.
  • A human readable option has been added to to gfs_tool df.
  • Fixed an issue which could potentially cause gfs_fsck to remove everything in a corrupt filesystem.
  • gfs_grow performance has been improved on 1k block size filesystems.
  • Fix a segfault in gfs_fsck when fixing a 'EA leaf block type' problem.
  • The gfs service is no longer disabled after an upgrade.
All users of gfs-utils should upgrade to these updated packages, which resolve these issues.

1.67.  gfs2-utils

1.67.1.  RHBA-2009:0477: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0477
Updated gfs2-utils packages that fix a bug are now available.
The gfs2-utils packages provide the user-space tools necessary to mount, create, maintain, and test GFS2 file systems.
The updated gfs2-utils packages apply the following bug fix:
  • A segfault was fixed in gfs2_fsck which can be triggered by a stuffed directory inode block also being listed as a data block.
All users of gfs2-utils should upgrade to these updated packages, which resolve this issue.

1.67.2.  RHBA-2009:0418: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0418
Updated gfs2-utils packages that fix a bug are now available.
The gfs2-utils packages provide the user-space tools necessary to mount, create, maintain, and test GFS2 file systems.
The updated gfs2-utils packages apply the following bug fix:
  • In certain cases a conversion between gfs1 and gfs2 filesystem could cause corruption; this bug has been fixed.
All users of gfs2-utils should upgrade to these updated packages, which resolve these issues.

1.67.3.  RHBA-2009:0280: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0280
Updated gfs2-utils packages that fix various bugs are now available.
The gfs2-utils packages provide the user-space tools necessary to mount, create, maintain and test GFS2 file systems.
The updated gfs2-utils packages apply the following bug fixes:
  • Other mount options will now be properly recognized when using 'noatime' or 'nodiratime'.
  • gfs2_grow now works with block sizes other than 4k.
All users of gfs2-utils should upgrade to these updated packages, which resolve these issues.

1.67.4.  RHSA-2009:1337: Low security and bug fix update

An updated gfs2-utils package that fixes multiple security issues and various bugs is now available for Red Hat Enterprise Linux 5.
This update has been rated as having low security impact by the Red Hat Security Response Team.
The gfs2-utils package provides the user-space tools necessary to mount, create, maintain, and test GFS2 file systems.
Multiple insecure temporary file use flaws were discovered in GFS2 user level utilities. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities (typically root) with the output of the utilities via a symbolic link attack. (CVE-2008-6552)
This update also fixes the following bugs:
  • gfs2_fsck now properly detects and repairs problems with sequence numbers on GFS2 file systems.
  • GFS2 user utilities now use the file system UUID.
  • gfs2_grow now properly updates the file system size during operation.
  • gfs2_fsck now returns the proper exit codes.
  • gfs2_convert now properly frees blocks when removing free blocks up to height 2.
  • the gfs2_fsck manual page has been renamed to fsck.gfs2 to match current standards.
  • the 'gfs2_tool df' command now provides human-readable output.
  • mounting GFS2 file systems with the noatime or noquota option now works properly.
  • new capabilities have been added to the gfs2_edit tool to help in testing and debugging GFS and GFS2 issues.
  • the 'gfs2_tool df' command no longer segfaults on file systems with a block size other than 4k.
  • the gfs2_grow manual page no longer references the '-r' option, which has been removed.
  • the 'gfs2_tool unfreeze' command no longer hangs during use.
  • gfs2_convert no longer corrupts file systems when converting from GFS to GFS2.
  • gfs2_fsck no longer segfaults when encountering a block which is listed as both a data and stuffed directory inode.
  • gfs2_fsck can now fix file systems even if the journal is already locked for use.
  • a GFS2 file system's metadata is now properly copied with 'gfs2_edit savemeta' and 'gfs2_edit restoremeta'.
  • the gfs2_edit savemeta function now properly saves blocks of type 2.
  • 'gfs2_convert -vy' now works properly on the PowerPC architecture.
  • when mounting a GFS2 file system as '/', mount_gfs2 no longer fails after being unable to find the file system in '/proc/mounts'.
  • gfs2_fsck no longer segfaults when fixing 'EA leaf block type' problems.
All gfs2-utils users should upgrade to this updated package, which resolves these issues.

1.68.  ghostscript

1.68.1.  RHSA-2009:0421: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0421
Updated ghostscript packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files.
It was discovered that the Red Hat Security Advisory RHSA-2009:0345 did not address all possible integer overflow flaws in Ghostscript's International Color Consortium Format library (icclib). Using specially-crafted ICC profiles, an attacker could create a malicious PostScript or PDF file with embedded images that could cause Ghostscript to crash or, potentially, execute arbitrary code when opened. (CVE-2009-0792)
A buffer overflow flaw and multiple missing boundary checks were found in Ghostscript. An attacker could create a specially-crafted PostScript or PDF file that could cause Ghostscript to crash or, potentially, execute arbitrary code when opened. (CVE-2008-6679, CVE-2007-6725, CVE-2009-0196)
Red Hat would like to thank Alin Rad Pop of Secunia Research for responsibly reporting the CVE-2009-0196 flaw.
Users of ghostscript are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

1.68.2.  RHSA-2009:0345: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0345
Updated ghostscript packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
Ghostscript is a set of software that provides a PostScript(TM) interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files.
Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript's International Color Consortium Format library (icclib). Using specially-crafted ICC profiles, an attacker could create a malicious PostScript or PDF file with embedded images which could cause Ghostscript to crash, or, potentially, execute arbitrary code when opened by the victim. (CVE-2009-0583, CVE-2009-0584)
All users of ghostscript are advised to upgrade to these updated packages, which contain a backported patch to correct these issues.

1.68.3.  RHBA-2009:1257: bug fix update

A ghostscript update that fixes several bugs is now available.
The Ghostscript suite provides a PostScript(TM) interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language), and an interpreter for PDF files. Ghostscript translates PostScript code into many common, bitmapped formats, like those understood by most printers and displays. This enables users to display PostScript files and print them on non-PostScript printers.
This update applies the following fixes:
  • an incorrect offset computation that occurred when handling subglyphs made it possible for ghostscript to read uninitialized data. When this occurred, ghostscript would crash with a segmentation fault. This update corrects the offset computation, preventing ghostscript from reading uninitialized data. (BZ#450717)
  • the way that the Ghostscript source code used pointer aliasing could produce unexpected results when strict aliasing optimizations are in use. To avoid problems, this ghostscript update was built using the -fno-strict-aliasing option, which disables strict aliasing optimization. (BZ#465960)
  • a typographical error in the gsiparam.h header file made it possible for some PDF files to cause ghostscript to fall into an infinite loop. This update fixes the error. (BZ#473889)
  • the gdevpsu.c source file incorrectly defined the point size of A3 pages, which sometimes resulted in incorrect document page sizes. This update fixes the point size definition error , ensuring that A3 pages are always printed with the correct size. (BZ#480978)
  • this update corrects how the cvrs PostScript operator performs sign extensions. This fix prevents range errors from occurring on 64-bit platforms. (BZ#488127)
  • this update also fixes ColorSpace initialization in the InkJet Server (IJS) driver, which is used by hpijs and gimp-print drivers in some configurations. In previous releases, print jobs that did not initialize ColorSpace failed whenever they used Ghostscript to render and print PDFs on devices that used the ijs driver. (BZ#504254)
Users of ghostscript are advised to apply this update.

1.69.  giflib

1.69.1.  RHSA-2009:0444: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0444
Updated giflib packages that fix several security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The giflib packages contain a shared library of functions for loading and saving GIF image files. This library is API and ABI compatible with libungif, the library that supported uncompressed GIF image files while the Unisys LZW patent was in effect.
Several flaws were discovered in the way giflib decodes GIF images. An attacker could create a carefully crafted GIF image that could cause an application using giflib to crash or, possibly, execute arbitrary code when opened by a victim. (CVE-2005-2974, CVE-2005-3350)
All users of giflib are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. All running applications using giflib must be restarted for the update to take effect.

1.70.  glib2

1.70.1.  RHSA-2009:0336: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0336
Updated glib2 packages that fix several security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
GLib is the low-level core library that forms the basis for projects such as GTK+ and GNOME. It provides data structure handling for C, portability wrappers, and interfaces for such runtime functionality as an event loop, threads, dynamic loading, and an object system.
Diego Pettenò discovered multiple integer overflows causing heap-based buffer overflows in GLib's Base64 encoding and decoding functions. An attacker could use these flaws to crash an application using GLib's Base64 functions to encode or decode large, untrusted inputs, or, possibly, execute arbitrary code as the user running the application. (CVE-2008-4316)
Note: No application shipped with Red Hat Enterprise Linux 5 uses the affected functions. Third-party applications may, however, be affected.
All users of glib2 should upgrade to these updated packages, which contain backported patches to resolve these issues.

1.71.  glibc

1.71.1. RHBA-2009:1415: bug fix and enhancement update

Updated glibc packages that fix various bugs and implement a technology preview of per-thread memory pooling are now available.
The glibc packages contain the standard C libraries used by multiple programs on the system. These packages contains the standard C and the standard math libraries. Without these two libraries, the Linux system cannot function properly.
This update applies the following bug fixes:
  • A strcmp() call in the setlocale() function could cause a segmentation fault (SIGSEGV) to occur in multi-threaded applications. This was caused by an improper free() call, which freed _nl_global_locale.__names[category] around the same time strcmp() tried to access it. As such, it was possible for strcmp() to access _nl_global_locale.__names[category] after it was freed (i.e. no longer available), resulting in a segmentation fault. To fix this, this update adds a return() call to make _nl_global_locale.__names[category] available when strcmp() accesses it. (BZ#455580)
  • The getifaddrs() function listed invalid IPv6 interface names for Infiniband devices. This was because Infiniband names are 20 bytes long, while glibc only prepares an 8-byte string array (i.e. sll_addr) for interface names. When getifaddrs() copied the 20-byte string into sll_addr, the result was a corrupted, invalid interface name. To prevent this, this update expands the field size from 8 bytes to 24 bytes, allowing getifaddrs() to copy 20-byte Infiniband names to the sll_addr string array. (BZ#463252)
  • A previous update to glibc resulted in a performance regression with mutex() calls. This was caused by the addition of mutual exclusion (mutex) types tested by pthread_mutex_lock() and pthread_mutex_unlock(). To alleviate the problem, this update optimizes the pthread_mutex_lock() and pthread_mutex_unlock() for the most common mutex types, which improves the performance of mutex() calls in most common user scenarios. (BZ#467316)
  • dl_runtime_profile on the IBM System Z incorrectly used the instruction lr to remove stack frames, which could result in corrupted stacks in rare cases. With this update, dl_runtime_profile uses the correct instruction (lgr) to remove stack frames instead. (BZ#470300)
  • An improper break statement in the getgrouplist() function caused searches to abort prematurely. This resulted in a bug that prevented getgrouplist() from retrieving group definitions from LDAP. As such, applications that used getgrouplist() to authenticate group details could not honor supplementary group credentials defined in LDAP. This update removes the improper break statement in getgrouplist(), enabling proper retrieval of group definitions from LDAP. (BZ#470768)
  • The /var/run/utmp file keeps track of all log-ins and log-outs to the system. All attempts to open it with read-write permission are denied and audited. The setutent_file() function call always attempted to open the /var/run/utmp with read-write permissions, resulting in the audit system logging a large volume of denial records. With this update, setutent_file() now only attempts to open /var/run/utmp with read-only permissions, thereby reducing the volume of audited records. (BZ#475332)
  • The elf/dl-load.c source file did not properly free allocated memory before dlclose() function calls. This made it possible for some dlopen() and dlclose() calls to result in a memory leak. This update corrects the elf/dl-load.c source file by instructing it to free all allocated memory, thereby preventing a memory leak whenever dlopen() or dlclose() are used. (BZ#476725) .
  • The getent command no longer incorrectly uses a comma to delimit aliases when displaying network map entries. As such, running getent networks now only displays network map entries using spaces or tabs as delimiters. (BZ#484082)
  • This update now includes the RUSAGE_THREAD definition in the glibc headers. This allows the getrusage() function call to retrieve information about the resource usage of a thread. (BZ#484214).
  • The inet6_opt_init() function incorrectly counted the first octet when computing the length of extension headers (i.e. extlen). This was contrary to the definition of extension header lengths as per RFC 2460. With this update, inet6_opt_init() now subtracts 1 octet unit when computing for extlen. (BZ#488748)
  • As per RFC3493, getnameinfo() should return EAI_NONAME when both nodename and servname variables are set to NULL while the NI_NAMEREQD flag is set. However, getnameinfo() returned 0 in this situation. This update adds an if statement to getnameinfo() to correct its behavior as per RHC3493. (BZ#489419).
  • The nscd paranoia mode instructs nscd to restart periodically. However, whenever nscd attempted to restart itself in this mode, it incorrectly used the system call execv("/proc/self/exe", argv). As a result, nscd would restart with an process name of exe instead of nscd. To correct this, the nscd paranoia mode now instructs nscd to restart using readlink("/proc/self/exe", target, 255), which allows nscd to preserve its process name upon restart. Note that nscd will still use execv("/proc/self/exe", argv) if the attempt to use readlink() fails. (BZ#490010)
  • The sysconf() function call used an obsolete const attribute. This caused the gcc compiler to incorrectly return errno when it attempted to compile code while using some optimization options. With this update, sysconf() no longer uses the obsolete const, ensuring that optimization works as expected at compile time. (BZ#490821)
  • The inet6_rth_reverse() function produced an incorrect return order of addresses in the routing header. This was caused by an incorrect identifier (ip6r0_segleft instead of ip6r0_len) in the inet/inet6_rth.c source code. This update corrects the identifier, ensuring that inet6_rth_reverse() returns the correct output. (BZ#494849)
  • The inet6_rth_add() function incorrectly returned 0 even when the routing header did not have enough space to store an address. This was caused by a lack of error checking routines to verify routing header size. This update applies an additional if statement to verify the routing header size. (BZ#494850).
  • Previous versions of glibc coded malloc() in a way that was not thread-safe. This could have led to unexpected program crashes in some cases. This release revises the malloc() code to ensure better thread safety, as well as to adhere to C standards. (BZ#502901)
  • This update removes an extra comma at the end of the dlfcn.h header file's enumerator list. This typographical error caused dlfcn.h to fail g++ pedantic tests in previous releases. (BZ#504704)
  • A bug in the nptl/pthread_mutex_lock.c code prevented pthread_mutex calls from honoring some types of private futex attributes. This update applies a patch that corrects this behavior, ensuring that pthread_mutex calls honor all types of private futex attributes for PI mutexes.(BZ#495955).
  • Applications that performed a large number of directory reads ran much slower on 64-bit Red Hat Enterprise Linux 5 compared to 64-bit Red Hat Enterprise Linux 4. This was partly because while Red Hat Enterprise Linux 5 uses the system call getdents() to retrieve directory entries for both 32-bit and 64-bit platforms, Red Hat Enterprise Linux 4 used getdents64() for 64-bit platforms. Because of this, the opendir() function did not allocate more memory for directory reads on 64-bit platforms, resulting in much slower reads on Red Hat Enterprise Linux 5. To resolve this, opendir() now has an increased default buffer size; if memory allocation fails (as it would on 32-bit applications), it retries the memory allocation with a smaller buffer size. This improves the performance of directory reads on 64-bit platforms, while ensuring that opendir() still works on 32-bit platforms. (BZ#484440)
  • An incorrect parameter in the MALLOC_COPY() function of the libc/malloc/malloc.c source file could supply an incorrect size_t value for realloc(). With this update, MALLOC_COPY() is now fixed, ensuring that it always supplies the correct size_t information for realloc(). (BZ#478499)
  • With this update, users can now run fork() safely in one thread while a pthread stack cache updates in another thread. Doing so no longer causes the process created by fork() to crash. (BZ#477705)
  • This update also applies several upstream fixes to nscd. These fixes prevent nscd from crashing due to segmentation faults in some cases. (BZ#464918 and 483636)
  • This update also includes the ability to enable (and configure) per-thread memory pools. This capability enables higher scalability accross many sockets and cores, and is included in this release as a technology preview. The environmental variable MALLOC_PER_THREAD=1 enables per-thread memory pools, while MALLOC_ARENA_MAX and MALLOC_ARENA_TEST control the amount of additional memory used for the memory pools (if any). MALLOC_ARENA_MAX sets a maximum number of memory pools used, regardless of the number of cores; MALLOC_ARENA_TEST specifies that the number of cores should be tested once it reaches a set value. Note that once per-thread memory pooling becomes fully supported, it will also become the default behavior; this will render the MALLOC_PER_THREAD option obsolete then. (BZ#494758)
Users are advised to upgrade to this version of glibc.

1.71.2.  RHBA-2009:1202: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1202
Updated glibc packages that fix a bug are now available.
The glibc packages contain the standard C libraries used by multiple programs on the system. These packages contains the standard C and the standard math libraries. Without these two libraries, the Linux system cannot function properly.
These updated glibc packages fix the following bug:
  • previous versions of glibc coded the malloc() function in a way that was not thread-safe, which could have led to unexpected program crashes in some cases. With these updated packages, the malloc() code has been revised to ensure better thread safety, as well as to adhere to C standards. (BZ#502901)
All users of glibc are advised to upgrade to these updated packages, which resolve this issue.

1.72.  gnome-python2-desktop

1.72.1.  RHBA-2009:0405: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0405
An updated gnome-python2-desktop package that fixes a bug in the GNOME Keyring bindings is now available.
The gnome-python2-desktop package contains additional Python bindings for GNOME. It should be used together with gnome-python2.
This update fixes the following bug:
  • The gnomekeyring.find_items_sync() function was returning a list of long integers representing the addresses of GnomeKeyringFound instances. These addresses are not useful in Python, however, and this update adds Python bindings for GnomeKeyringFound. IT also changes find_items_sync() to return a list of GnomeKeyringFound instances. (BZ#479280)
All gnome-python2-desktop users should install this update which addresses this issue.

1.73.  gnome-session

1.73.1.  RHBA-2009:1079: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1079
An updated gnome-session package that fixes a bug is now available.
gnome-session manages a GNOME desktop session. It starts up the other core GNOME components and handles logout and saving the session.
This updated gnome-session package fixes the following bug:
  • gnome-session, also referred to as the GNOME Session Manager, remembers information such as which applications were open at the time of logout (among other session details), and restores these applications upon logging in again. A bug prevented gnome-session from restoring two applications when both of them were named the same, such as could happen with GKrellM system monitors, multiple instances of the KDE Konsole, and potentially other applications with multiple instances. With this updated package, gnome-session is able to restore all same-named application instances which were saved in the previous session, thus resolving the problem. (BZ#484431)
All users of gnome-session are advised to upgrade to this updated package, which resolves this issue.

1.74.  grep

1.74.1.  RHBA-2009:0481: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0481
An updated grep package that fixes various bugs is now available.
Grep searches through textual input for lines matching a regular expression.
This updated grep package includes fixes for the following bugs:
  • while searching certain immense binary files in which the newline character did not appear for large expanses (for hundreds of megabytes of text, for instance), grep may have missed a subsequent match. Because the grep utility is not intended to process arbitrarily-long files in this manner, this updated version now exits with a "line too long" error message and an appropriate error code under these conditions. (BZ#483073)
  • when operating on particular multi-byte character sets (but not, notably, UTF-8), grep could enter an infinite loop and become unresponsive. This has been fixed in this updated package so that grep is once again able to process these multi-byte character sets without hanging. (BZ#479151)
  • certain output control option combinations could cause the grep tool to segmentation fault. With this updated package, these combinations work as expected and no longer cause a segmentation fault. (BZ#452127)
  • the example attached to the "--label" option description was not illustrative enough: as documented, the option actually had no effect. The updated package contains an improved example that shows the "--label" option's utility, both in the manual and info pages. (BZ#484366)
All users of grep are advised to upgrade to this updated package, which resolves these issues.

1.75.  grub

1.75.1.  RHBA-2009:1388: bug fix and enhancement update

An updated grub package that fixes a bug and adds an enhancement is now available.
The GRUB utility is responsible for booting the operating system kernel.
This update addresses the following bug:
  • current GCC defaults mean grub is compiled without writable string support. On systems with an XFS file system present on the same controller as the boot disk, this could cause the grub shell to segfault and crash. With this update grub no longer assumes constant strings in the XFS file system driver are writable, obviating the error. (BZ#496949)
And adds the following enhancement:
  • previously, grub-install did not support installing on virtio_blk devices. When attempted it printed the error message "[device path] does not have any corresponding BIOS drive." With this update, support has been added for installing to virtio devices. (BZ#498388)
All grup users are advised to install this updated package, which resolves this issue and adds this enhancement.

1.76.  gstreamer-plugins-base

1.76.1.  RHSA-2009:0352: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0352
Updated gstreamer-plugins-base packages that fix a security issue are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
GStreamer is a streaming media framework based on graphs of filters which operate on media data. GStreamer Base Plug-ins is a collection of well-maintained base plug-ins.
An integer overflow flaw which caused a heap-based buffer overflow was discovered in the Vorbis comment tags reader. An attacker could create a carefully-crafted Vorbis file that would cause an application using GStreamer to crash or, potentially, execute arbitrary code if opened by a victim. (CVE-2009-0586)
All users of gstreamer-plugins-base are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, all applications using GStreamer (such as Totem or Rhythmbox) must be restarted for the changes to take effect.

1.77.  gstreamer-plugins-good

1.77.1.  RHSA-2009:1123: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1123
Updated gstreamer-plugins-good packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
GStreamer is a streaming media framework, based on graphs of filters which operate on media data. GStreamer Good Plug-ins is a collection of well-supported, good quality GStreamer plug-ins.
Multiple integer overflow flaws, that could lead to a buffer overflow, were found in the GStreamer Good Plug-ins PNG decoding handler. An attacker could create a specially-crafted PNG file that would cause an application using the GStreamer Good Plug-ins library to crash or, potentially, execute arbitrary code as the user running the application when parsed. (CVE-2009-1932)
All users of gstreamer-plugins-good are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. After installing the update, all applications using GStreamer Good Plug-ins (such as some media playing applications) must be restarted for the changes to take effect.

1.77.2.  RHSA-2009:0271: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0271
Updated gstreamer-plugins-good packages that fix several security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
GStreamer is a streaming media framework, based on graphs of filters which operate on media data. GStreamer Good Plug-ins is a collection of well-supported, GStreamer plug-ins of good quality released under the LGPL license.
Multiple heap buffer overflows and an array indexing error were found in the GStreamer's QuickTime media file format decoding plugin. An attacker could create a carefully-crafted QuickTime media .mov file that would cause an application using GStreamer to crash or, potentially, execute arbitrary code if played by a victim. (CVE-2009-0386, CVE-2009-0387, CVE-2009-0397)
All users of gstreamer-plugins-good are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, all applications using GStreamer (such as totem or rhythmbox) must be restarted for the changes to take effect.

1.78.  gtk-vnc

1.78.1.  RHBA-2009:1301: bug fix update

An updated gtk-vnc package that fixes several bugs is now available.
gtk-vnc is a VNC viewer widget for GTK. It is built using co-routines allowing it to be completely asynchronous while remaining single threaded.
This update addresses the following issues:
  • the handling of the virtual mouse pointer could result in the pointer getting stuck against an invisible wall, unable to move into some areas of the virtual machine display area. (BZ#487560)
  • handling of non-US layout keyboards had flaws making it impossible to type certain key sequences, for example Shift+Tab. (BZ#357491)
  • the gtk-vnc package was re-based to version 0.3.8, from version 0.3.2, to address problems with virtual mouse pointer movement handling and the conversion of "keysyms" for non-US layout keyboards. The update also improves interoperability with VNC servers and extensions. (BZ#489326)
All gtk-vnc users should install this updated package which addresses these issues.

1.79. hal

1.79.1. RHBA-2009:1359: bug fix and enhancement update

An updated hal package that fixes various bugs and adds several enhancements is now available.
HAL is daemon for collection and maintaining information from several sources about the hardware on the system. It provides a live device list through D-BUS.
Bugs fixed in these updated packages include:
  • hal now detects blank optical media correctly on buggy hardware. (BZ#488265)
  • if a device identifier was not well formed, the error message the presented was not correctly formatted. This has been fixed. (BZ#471004)
  • if an error occurrs the correct hal-device code is now returned. (BZ#462453)
  • permissions on the directory /usr/lib/hal were incorrect. hal now owns this directory, as expected. (BZ#481806)
  • hal no longer tries to close shared DBus connections to avoid printing a warning. (BZ#472199)
  • the hal daemon now starts earlier in the boot sequence, allowing other services to use HAL. (BZ#500577)
  • another ID match was added to fix suspending on Lenovo X61s type 7667 notebooks. (BZ#456277)
  • the number of brightness levels is now reported correctly for newer laptops using the ibm-acpi driver. (BZ#475850)
  • storage devices on the cciss bus are now detected. (BZ#489982)
As well, this update includes the following enhancements:
  • new man pages for the installed binaries. (BZ#217644)
  • the child-timeout can now be set for machines with a large number of devices. (BZ#463128)

1.80.  htdig

1.80.1.  RHBA-2009:0291: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0291
Updated htdig packages that resolve several issues are now available.
The ht://Dig system is a complete World Wide Web indexing and searching system for a small domain or intranet. This system is not meant to replace the need for powerful Internet-wide search systems like Lycos, Infoseek, Webcrawler and AltaVista. Instead, it is intended to cover the search needs for a single company, campus, or even a particular subsection of a website. As opposed to some WAIS-based or web server-based search engines, ht://Dig can span several web servers at a site, as long as they understand the HTTP 1.0 protocol.
These updated htdig packages provide fixes for the following bugs:
  • updating the htdig packages incorrectly removed configuration files, which were written over with the original configuration files. This no longer occurs with these updated packages.
  • in cases where htdig attempted to run the parser configured in the "external_parsers" attribute in the htdig.conf configuration file, and running that parser failed, then htdig could attempt to parse its own error messages. With this update, htdig is prevented from parsing data incorrectly in such a manner, exits from such a situation correctly, and displays an improved error message when running the external parser fails.
  • running "htfuzzy soundex" after indexing with htdig resulted in spurious error messages when the "allow_numbers" attribute of the htdig.conf configuration file was set to set to true.
  • calling either the "htstat" or "htfuzzy" command when the database contained zero words resulted in a segmentation fault, which has been fixed in these updated packages.
All users of htdig are advised to upgrade to these updated packages, which resolve these issues.

1.81.  httpd

1.81.1.  RHSA-2009:1148: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1148
Updated httpd packages that fix two security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The Apache HTTP Server is a popular Web server.
A denial of service flaw was found in the Apache mod_proxy module when it was used as a reverse proxy. A remote attacker could use this flaw to force a proxy process to consume large amounts of CPU time. (CVE-2009-1890)
A denial of service flaw was found in the Apache mod_deflate module. This module continued to compress large files until compression was complete, even if the network connection that requested the content was closed before compression completed. This would cause mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)
All httpd users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

1.81.2.  RHSA-2009:1075: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1075
Updated httpd packages that fix two security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
The Apache HTTP Server is a popular and freely-available Web server.
A flaw was found in the handling of compression structures between mod_ssl and OpenSSL. If too many connections were opened in a short period of time, all system memory and swap space would be consumed by httpd, negatively impacting other processes, or causing a system crash. (CVE-2008-1678)
Note: The CVE-2008-1678 issue did not affect Red Hat Enterprise Linux 5 prior to 5.3. The problem was introduced via the RHBA-2009:0181 errata in Red Hat Enterprise Linux 5.3, which upgraded OpenSSL to the newer 0.9.8e version.
A flaw was found in the handling of the "Options" and "AllowOverride" directives. In configurations using the "AllowOverride" directive with certain "Options=" arguments, local users were not restricted from executing commands from a Server-Side-Include script as intended. (CVE-2009-1195)
All httpd users should upgrade to these updated packages, which contain backported patches to resolve these issues. Users must restart httpd for this update to take effect.

1.81.3.  RHBA-2009:1380: bug fix update

Updated httpd packages that fix various bugs are now available.
The Apache HTTP Server is a popular and freely-available Web server.
These updated httpd packages provide fixes for the following bugs:
  • Apache's mod_mime_magic module attempts to determine the MIME type of files using heuristic tests. However, the "magic" file used by the mod_mime_magic module was unable to detect PNG images correctly as being of MIME type "image/png", which this update corrects. (BZ#240844)
  • when using a reverse-proxy configuration with the mod_nss module being used in place of the usual mod_ssl module, the mod_proxy module failed to pass the hostname, which resulted in this error message: "Requested domain name does not match the server's certificate". The hostname is now passed correctly so that secure HTTP (https) connections no longer fail due to this error. (BZ#479410)
  • the "mod_ssl" module placed a hard-coded 128K limit on the amount of request body data which would be buffered if an SSL renegotiation was required in a Location or Directory context. This could occur if a POST request was made to a Directory or Location which required client certificate authentication. The limit on the amount of data to buffer is now configurable using the "SSLRenegBufferSize" directive. (BZ#479806)
  • when configuring a reverse proxy using an .htaccess file (instead of httpd.conf) by using a "RewriteRule" to proxy requests using the "[P]" flag, space characters in URIs would not be correctly escaped in remote server requests, resulting in "404 Not Found" response codes. This has been fixed so that .htaccess-configured reverse proxies perform proper character-escaping. (BZ#480604)
  • if an error occurred when invoking a CGI script, the "500 Internal Server Error" error document was not generated. (BZ#480932)
  • the mod_speling module attempts to correct misspellings of URLs. When the "AcceptPathInfo" directive was not enabled, then mod_speling did not handle and correct misspelled directory names. This has been fixed so that directory names are always handled, and possibly corrected, by the mod_speling module, regardless of the value that "AcceptPathInfo" is set to. (BZ#485524)
  • if request body data was buffered when an SSL renegotiation was required in a Location or Directory context, then the buffered data was discarded if an internal redirect occurred. (BZ#488886)
  • the httpd init script did not reference the process ID stored by a running daemon, and invocations could affect other httpd processes running on the system. (BZ#491135)
  • during a graceful restart, a spurious "Bad file descriptor" error message was sometimes logged. The error, though harmless, occurred because the socket on which the server called the accept() function was immediately closed in child processes upon receipt of the graceful restart signal. This error message is no longer logged. (BZ#233955)
  • during a graceful restart, the following spurious error messages were logged by the mod_rewrite module if the "RewriteLog" directive was configured: "apr_global_mutex_lock(rewrite_log_lock) failed". (BZ#493023)
  • Apache's mod_ext_filter module sometimes logged this spurious error message if an input filter was configured and an error response was sent: "Bad file descriptor: apr_file_close(child input)". (BZ#479463)
  • the "%p" format option in the "CustomLog" directive, used to log a port number in a request, did not respect the "remote" and "local" specifiers. (BZ#493070)
  • the httpd package inappropriately obsoleted the "mod_jk" package; it no longer does so. (BZ#493592)
  • an invalid HTTP status code—such as 70007—was logged to the access log if a timeout or other input error occurred while reading the request body during processing of a CGI script. (BZ#498170)
  • a security issue fix (CVE-2009-1195) in Server-Side Include (SSI) Options-handling inadvertently broke backwards-compatibility with the mod_perl module. (BZ#502998)
Users are advised to upgrade to these updated packages, which resolve these issues.

1.82.  hwbrowser

1.82.1.  RHBA-2009:0277: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0277
An updated hwbrowser package that fixes a bug is now available.
Hwbrowser is a browser for the current hardware configuration.
This updated package contains the following bug fix:
  • both hal-device-manager and hwbrowser used the same name ("Hardware") in the System>Administration menu, as well as the same icon (hwbrowser.png). The existence of two apparently identical entries in the menu that launch two different applications could be confusing to users. Since hwbrowser is now a legacy tool, it no longer creates a menu item upon installation, thus eliminating the potential confusion. Users can still run hwbrowser from the command line.
Users should upgrade to this updated package, which resolves this issue.

1.83.  hwdata

1.83.1.  RHEA-2009:1348: enhancement update

An updated hwdata package that adds enhancements is now available.
The hwdata package contains tools for accessing and displaying hardware identification and configuration data.
This updated package includes the following additional entries to the Red Hat Enterprise Linux 5.4 pci.ids and usb.ids databases:
  • LSI Fusion-MPT SAS-2 controllers (BZ#475674)
  • ASPEED Technology AST2000 updated to reflect product name revision in hal-device-manager. AST2000 should now display ASPEED Graphics Family. (BZ#480560)
  • Emulex OneConnect 10Gb NIC, Emulex OneConnect 10Gb FCoE Initiator and Emulex OneConnect 10Gb iSCSI Initiator (BZ#496877 , BZ#502907)
  • Mellanox Technologies ConnectX EN 10GigE (BZ#501955)
  • Intel IGB Virtual Function devices (BZ#502873)
  • QLogic Corp. 10GbE Converged Network Adapters (BZ#504035)
Users of hwdata are advised to upgrade to this updated package, which adds these enhancements.

1.84.  ia32el

1.84.1.  RHBA-2009:1271: bug fix and enhancement update

An ia32el update that features a new release of ia32el, adds support for SSE4.2 instructions, and fixes several bugs is now available.
The ia32el package contains the IA-32 Execution Layer platform, which allows emulation of IA-32 binaries on Intel Itanium processors.
This updated package fixes the following bugs:
  • if SELinux is in Enforcing mode, the 'allow_unconfined_execmem_dyntrans', 'allow_execmem' and 'allow_execstack' booleans must be enabled in order for the IA-32 Execution Layer (i.e. the ia32el service) to operate correctly. If only the 'allow_execmem' or 'allow_execstack' booleans are enabled, the ia32el service can still support emulation; however, SELinux might issue an AVC denial to the service. In previous releases, whenever SELinux issued an AVC denial to ia32el, users were not informed that these booleans needed to be enabled first. This release provides proper documentation (in the README file) for this requirement, and revises the init script to warn the user if any of these boolean requirements are not met at runtime. (BZ#474152)
  • this update also fixes a bug that caused the fcntl system call to fail whenever the 'flock' structure was filled with values exceeding 2GB. (BZ#494004)
With this update, the IA-32 Execution Layer is now at version V7:
  • this adds support for the latest system calls and SSE4.2 instructions. In addition, this update also applies several fixes from upstream to improve performance, compatibility, and robustness. (BZ#472843)
Users of the IA-32 Execution Layer should upgrade to this update.

1.85.  icu

1.85.1.  RHSA-2009:1122: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1122
Updated icu packages that fix a security issue are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
A flaw was found in the way ICU processed certain, invalid byte sequences during Unicode conversion. If an application used ICU to decode malformed, multibyte character data, it may have been possible to bypass certain content protection mechanisms, or display information in a manner misleading to the user. (CVE-2009-0153)
All users of icu should upgrade to these updated packages, which contain backported patches to resolve this issue.

1.85.2.  RHSA-2009:0296: Moderate security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0296
Updated icu packages that fix a security issue are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
A flaw was found in the way ICU processed certain, invalid, encoded data. If an application used ICU to decode malformed, multibyte, character data, it may have been possible to bypass certain content protection mechanisms, or display information in a manner misleading to the user. (CVE-2008-1036)
All users of icu should upgrade to these updated packages, which contain backported patches to resolve these issues.

1.86.  initscripts

1.86.1. RHBA-2009:1344: bug fix update

The initscripts package contains system scripts to boot your system, change runlevels, activate and deactivate most network interfaces, and shut the system down cleanly.
  • previously, when using the disk encryption feature to encrypt the root filesystem, the following error message was returned on the console when shutting down the system:
    		Stopping disk encryption [FAILED]
    
    with this update, this message is no longer displayed.(BZ#471944)
  • previously, if a vlan device was a member of a bridge, and the vlan device was removed from the bridge the vlan interface was not removed. With this update, the ifdown script has been updated to remove vlan interfaces if the device is removed from the bridge. (BZ#481557, BZ#463325)
  • in some cases, when network service failed to restart, the /etc/init.d/network initscript would return an incorrect status of "0". With this update, /etc/init.d/network has been modified to return 1 if the service fails to start or if any NIC fails to get an address. (BZ#481002)
  • a bonding device cannot be added to a bridge until at least one slaved ethernet interface has been added to the bridge. Previously, the order of commands in ifup-eth script attempted to add a bonding device prior to the ethernet interface being added. With this update, this issue has been resolved. (BZ#463014)
  • previously, if a suspend or hibernate action did not complete, the "/.suspended" file may have persisted thorough a reboot. Consequently, if the system is rebooted, and another suspend or hibernate action is invoked, the system would fall back to a virtual terminal display. With this update, the rc.sysinit script now removes the "/.suspended" file during the boot sequence, which resolves this issue. (BZ#270861)
  • previously, the ifup-ipsec initscript did not allow the Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols to be initialized independently. With this update, configuration parameters are now implemented in ifup-ipsec, allowing these protocols to be activated seperately. (BZ#251494)
  • previously, support for raw devices in the upstream kernel was deprecated. However, this support has been returned to the kernel. Consequently, in Red Hat Enterprise Linux 5.4, support for raw devices has also been returned. In this update, the initscripts packages have been updated, allowing rawdevices to again be configured by editing /etc/sysconfig/rawdevices. (BZ#472891)
  • previously, the rc.sysinit script incorrectly handled the clean-up of sub-directories in "/var/run/libvirt/". Consequently, rc.sysinit could not remove the "/var/run/libvirt/network/" and "/var/run/libvirt/qemu/" directories. With this update rc.sysinit now correctly removes these directories. (BZ#505600)
  • previously, the /etc/init.d/network script initialized ipsec tunnels before vlan interfaces. Consequently, route handling traffic was not created between tunneled networks as the tunneled network was not yet configured. With this update, this issue has been resolved. (BZ#481733)
  • The documentation for the /etc/sysconfig/ directory (located at /usr/share/doc/initscript-<version>/sysconfig.txt) has been updated with information about BONDING_OPS. (BZ#472480)
  • previously, ctc and netiucv devices may not have been initialized automatically during boot. With this update, the ifup-ctc and ifup-iucv initscripts have been changed to resolve this issue.(BZ#475721)
  • systems that have both an NFS server and a client with NFS shares mounted, running the "service netfs stop" command will correctly unmount the NFS shares. Previously, however, this command also unmounted "/proc/fs/nfsd", which is required by the NFS server. Consequently, after running this command to unmount NFS shares, clients would be unable to mount shares on the NFS server based on that machine. With this update, the netfs initscript has been updated, resolving this issue. (BZ#481794)
  • previously netfs initialized multiple device (MD) arrays (using the mdadm command) before LVM was initialized. Consequently, an MD array of iSCSI devices would not initialize automatically. With this update, the netfs script has been updated, resolving this issue. (BZ#480627)
  • previously, if a GFS2 filesystem is listed in /etc/fstab, rc.sysinit would fail when attempting to mount the filesystem, as the cluster services had not been not started yet. With this update, the initscripts have been updated to resolve this issue. (BZ#494963)
  • the ifup initscript has been updated to ensure HiperSocket VLAN support is initialized correctly during boot. (BZ#490584)
  • previously, adding networking routes using the system-config-network-gui resulted in the following error message being displayed:
    		/lib/udev/ccw_init: line 31: echo: write error: Operation not permitted
    
    With this update the initscripts have been fixed, allowing the use of system-config-networking-gui to add network routes. (BZ#484411)
Users are advised to upgrade to this updated package, which resolves these issues.

1.87. iptables

1.87.1. RHBA-2009:1414: bug fix and enhancement update

Updated iptables packages that fix several bugs and add an enhancement are now available.
The iptables utility controls the network packet filtering code in the Linux kernel.
These updated iptables packages provide the following enhancement:
  • while its IPv4 counterpart was present, the Differentiated Services Code Point (DSCP) match target for IPv6 was missing. Two new modules, one for iptables and a separate one for the Linux kernel, now enable this functionality.

    Note

    along with this iptables update, the kernel update for Red Hat Enterprise Linux 5.4 must be installed, and the system must be rebooted, in order to enable Differentiated Services Code Point (DSCP) match target functionality for IPv6. (BZ#480371)
In addition, these updated iptables packages provide fixes for the following bugs:
  • the init scripts for iptables and ip6tables sometimes exited with incorrect or invalid exit statuses. (BZ#242457)
  • the Internet Control Message Protocol (ICMP) '--reject-with' types did not always work as expected. This has been fixed in these updated packages. (BZ#253014)
  • the iptables-restore(8) man page did not contain descriptions of some of the options that were listed in the program's help information. These information sources for the utility's options have now been synchronized. (BZ#474847)
  • the "ROUTE" section of the iptables(8) man page contained misleading information on certain features that do not exist in the iptables packages. (BZ#485834)
  • the iptables-devel package did not include certain header files, which are now included in the updated package. (BZ#487649)
  • the spec file contained a typo on the the Release line. (BZ#440622)

1.88.  iproute

1.88.1.  RHBA-2009:0404: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0404
An updated iproute package that fixes a bug is now available.
The iproute package contains networking utilities such as ip and rtmon, which use the advanced networking capabilities of the Linux 2.4 and 2.6 kernels.
This updated iproute package fixes a bug which resulted in stack corruption when the command "ip maddr show" was used with an InfiniBand address. This occurred because the length of an InfiniBand address did not fit into the 16-byte field in which it was stored. With this update, the InfiniBand address is stored correctly, thus preventing possible stack corruption.
All users of iproute are advised to upgrade to this updated package, which resolves this issue.

1.89.  iprutils

1.89.1.  RHBA-2009:1246: bug fix and enhancement update

An iprutils update that fixes a buffer alignment bug and improves the performance of supported SSDs is now available.
The iprutils package provides a suite of utilities to manage and configure SCSI devices supported by the ipr SCSI storage device driver.
This update addresses the following bug and adds the following enhancement:
  • a buffer alignment problem prevented iprconfig from updating disk microcode during I/O. In the block layer, iprconfig incorrectly used malloc() for memory allocation; as a result, buffers in the scatter/gather list were not 512-byte aligned. With this update, iprconfig uses posix_memalign() to properly execute memory allocation, which corrects the buffer alignment problem. This update also applies several other improvements to help ensure that iprconfig can perform disk microcode updates even during heavy I/O. (BZ#452312)
  • this update also applies a firmware enhancement to support dual-shared Active/Active multiplex on SAS adapters. This improves the performance of supported solid-state disks (SSD). (BZ#475362)
Users of iprutils and the ipr driver are advised to apply this update.

1.90.  ipsec-tools

1.90.1.  RHSA-2009:1036: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1036
An updated ipsec-tools package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The ipsec-tools package is used in conjunction with the IPsec functionality in the Linux kernel and includes racoon, an IKEv1 keying daemon.
A denial of service flaw was found in the ipsec-tools racoon daemon. An unauthenticated, remote attacker could trigger a NULL pointer dereference that could cause the racoon daemon to crash. (CVE-2009-1574)
Multiple memory leak flaws were found in the ipsec-tools racoon daemon. If a remote attacker is able to make multiple connection attempts to the racoon daemon, it was possible to cause the racoon daemon to consume all available memory. (CVE-2009-1632)
Users of ipsec-tools should upgrade to this updated package, which contains backported patches to correct these issues. Users must restart the racoon daemon for this update to take effect.

1.91.  iputils

1.91.1.  RHBA-2009:1090: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1090
An updated iputils package that fixes a bug is now available.
The iputils package contains basic utilities for monitoring a network, including ping.
This updated iputils package fixes the following bug:
  • it is the rdisc utility which is called at boot time to populate the network routing tables with default routes. This bug caused rdisc to fail during initialization when more than one IP address was assigned to a single interface. This has been solved so that when rdisc encounters two or more IP addresses assigned to the same interface, it continues working as expected. (BZ#470498)
All users of iputils are advised to upgrade to this updated package, which resolves this issue.

1.92.  ipvsadm

1.92.1.  RHBA-2009:1398: bug fix update

Updated ipvsadm packages that fix several bugs are now available.
ipvsadm is a utility to administer the IP Virtual Server services offered by the Linux kernel.
This update fixes the following bugs:
  • running "service ipvsadm status" returned the status code "0" (for "service is running") even when ipvsadm was stopped. The ipvsadm init script has been updated and ipvsadm now only returns "0" when it is, in fact, running. (BZ#232335)
  • ipvsadm's previous start priority, 08, meant it loaded before network. If the ipvsadm rule set contained virtual services using fwmarks, these rules did not load properly. ipvsadm's start priority is now 11, ensuring it loads after network and ensuring virtual services load after real network services. (BZ#472425)
  • previously you could install the debuginfo packages but, because the makefile stripped the symbol table, they contained no data. The ipvsadm makefile no longer strips the symbol table and installing the debuginfo packages adds ipvsadm.debug and the debugging source as expected. (BZ#500601)
Users of ipvsadm are advised to upgrade to these updated packages, which resolve these issues.

1.93.  irqbalance

1.93.1.  RHBA-2009:1265: bug fix update

An updated irqbalance package that fixes various bugs is now available.
irqbalance is a daemon that evenly distributes IRQ load across multiple CPUs for enhanced performance.
This updated package addresses several minor bugs:
  • multiple instances of irqbalance could be started when changing between run levels. A universal exit is now run on existing instances so that only one will operate at a time. (BZ#471574)
  • several errors in set_interrupt_count and investigate interaction caused irqbalance to ignore IRQBALANCE_BANNED_INTERRUPTS. The two now work discretely and the problem no longer presents. (BZ#479459)
  • documentation has been improved in order to clarify the meaning and use of some of the configuration settings in irqbalance. (BZ#479856)
Users are advised to upgrade to this updated irqbalance package, which resolves these issues.

1.94.  iscsi-initiator-utils

1.94.1.  RHBA-2009:1099: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1099
An updated iscsi-initiator-utils package that fixes a bug is now available.
The iscsi-initiator-utils package provides the server daemon for the iSCSI protocol, as well as the utility programs used to manage it. iSCSI is a protocol for distributed disk access using SCSI commands sent over Internet Protocol networks.
This updated iscsi-initiator-utils package fixes the following bug:
  • attempting to log in to targets which used the iSCSI protocol's login redirect feature failed due to a coding error in the IPv6 address parser. This bug has been fixed in this updated package so that address parsing succeeds as expected, and logging in to targets over IPv6 is once again possible. (BZ#501737)
All users using IPv6 with LUN targets which employ login redirect, such as EqualLogic targets, should upgrade to this updated package, which resolves this issue.

1.94.2.  RHBA-2009:1368: bug fix update

An updated iscsi-initiator-utils package that fixes various bugs and adds support for Chelsio and Broadcom iSCSI cards is now available
The iscsi package provides the server daemon for the iSCSI protocol, as well as the utility programs used to manage it. iSCSI is a protocol for distributed disk access using SCSI commands sent over Internet Protocol networks.
Bugs fixed and enhancements added in this updated package include:
  • iscsi-initiator-utils now includes support for Broadcom bnx2 and bnx2x network interface cards. (BZ#442418)
  • iscsi-initiator-utils has been rebased to upstream version 2.0-870. Among many other changes, this version supports the offload feature of Broadcom and Chelsio cards. Refer to the changelog included in the package for a full list of bug fixes and enhancements in this version. Section 5.1.2 of /usr/share/docs/iscsi-initiator-utils-$version/README contains instructions to set up ifaces for use with offload cards. (BZ#458203)
  • the iscsi-initiator-utils packages place files in the /etc/iscsi directory but previously, did not list that directory for creation. The /etc/iscsi directory would therefore be created during the installation process, but would remain unowned. /etc/iscsi is now listed for creation and are therefore owned by iscsi-initiator-utils. (BZ#481807)
  • when a user-space iSCSI tool invokes an option that is not supported in the kernel, the tool returns "Iferror -38". Previously, this error message was presented to users and could mislead them to think that a problem existed with their iSCSI configuration. The iSCSI tools no longer present this type of error to users and therefore do not create this potential misunderstanding. Note that certain combinations of new tools with old kernels might still present a related "-22" error. (BZ#497940)
  • the iSCSI protocol allows targets to redirect initiators during the login phase. Previously, the code used by the iscsi initiator to parse IPv6 addresses contained faulty logic that caused it to fail to recognize IPv6 addresses as valid when redirected. As a consequence, when operating in an IPv6 environment, the initiator could not log into targets that use the login redirect feature, such as Dell EqualLogic targets. The initiator now parses IPv6 addresses correctly, enabling use of these targets in IPv6 environments. (BZ#500102)
  • previously, the cxgb3i driver for Chelsio host bus adapters (HBAs) was not listed in the iscsi init script. Therefore, iscsi would not load this driver and therefore could not use the Chelsio HBAs that need this driver. The cxgb3i driver is now included in the iscsi init script, which enables the use of these devices. (BZ#505958)
  • the iscsi code contained a bad cast of a data structure. This would lead to a segmentation fault while logging in or out of an iSCSI target. With the logic now corrected, these segmentation faults do not occur. (BZ#508782)
  • iscsiadm obtains its information about the boot environment from the iSCSI boot firmware table (IBFT). However, this information does not include the target portal group tag (TPGT) associated with the boot target. Iscsiadm would assume that the relevant TPGT should be "1". In cases where this was correct, the boot process would continue as intended. In all other cases, iscsiadm would be unable to find the target necessary for the boot to proceed. This made it impossible to automate the installation of Red Hat Enterprise Linux in environments with multiple portals on targets and where the portal used for boot did not have TPGT=1. Iscsiadm no longer assumes a value for the TPGT for the boot portal and instead relies on the information that it finds in the /var/lib/iscsi record. This enables iscsiadm to find the correct target automatically, and therefore makes automated installations possible. (BZ#515806)
Users should upgrade to this updated package, which resolves these issues.

1.95.  isdn4k-utils

1.95.1.  RHBA-2009:1112: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1112
Updated isdn4k-utils packages that resolve several issues are now available.
The isdn4k-utils packages contain a collection of utilities needed for configuring an ISDN subsystem.
These updated isdn4k-utils packages provide fixes for the following bugs:
  • the init scripts for the "capi" and "isdn" programs sometimes exited with incorrect or invalid exit statuses. These init scripts have been updated for compliance with Linux Standard Base (LSB) guidelines. The "capi" and "isdn" programs now exit with exit status 5 (program is not installed) or 6 (program is not configured), as appropriate. The improved init scripts also check for correct privileges and exit with exit status 4 (user has insufficient privileges) when appropriate. (BZ#237831)
  • the isdn4k-utils packages contained spurious CVS files; they have been removed in these updated packages. (BZ#481569)
  • the divaload, divalog, divalogd and ipppd executable binaries, which were located in the /sbin directory, depend on libraries located in the /usr/lib directory. In certain situations such as when located on a separate partition, the /usr directory may not be mounted and available when the executables are called. For this reason, divaload, divalog, divalogd and ipppd have all been moved to the /usr/sbin directory, which solves this potential problem. (BZ#503910)
All users of isdn4k-utils are advised to upgrade to these updated packages, which resolve these issues.

1.96.  iwl3945-firmware

1.96.1.  RHEA-2009:1253: enhancement update

An enhanced iwl3945-firmware package is now available.
The iwl3945-firmware package provides the iwl3945 wireless driver with the firmware it requires in order to function correctly with iwl3945 hardware.
This updated iwl3945-firmware package adds the following enhancement:
  • The iwl3945 driver and the iwl3945 firmware work together to provide proper wireless functionality. It is best to pair equivalent versions of these components in order to provide maximum compatibility between them, which this updated package provides.
Users of wireless devices using the iwl3945 driver are advised to upgrade to this updated package, which adds this enhancement.

1.97.  iwl4965-firmware

1.97.1.  RHEA-2009:1252: enhancement update

An enhanced iwl4965-firmware package is now available.
The iwl4965-firmware package provides the iwlagn wireless driver with the firmware it requires in order to function correctly with iwlagn hardware.
This updated iwl4965-firmware package adds the following enhancement:
  • the iwlagn driver and the iwl4965 firmware work together to provide proper wireless functionality. It is best to pair equivalent versions of these components in order to provide maximum compatibility between them, which this updated package provides. (BZ#476869)
Users of wireless devices which use iwl4965 firmware are advised to upgrade to this updated package, which adds this enhancement.

1.98.  jadetex

1.98.1.  RHBA-2009:0378: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0378
An updated jadetex package that fixes several bugs is now available.
The jadetex package contains high-level TeX macros which can be used to produce DVI, PostScript and/or Portable Document Format (PDF) output.
This updated jadetex package includes fixes for the following bugs:
  • several jadetex files which were installed in the /usr/share/texmf/web2c/ directory had the wrong SELinux context. This updated package corrects the SELinux context of these files.
  • previously, installing the jadetex package led to the creation of two unnecessary log files that were not owned by the package in the /usr/share/texmf/web2c/ directory. This updated package no longer creates these log files, thus resolving the issue.
All users of jadetex are advised to upgrade to this updated package, which resolves this issue.

1.99.  java-1.4.2-ibm

1.99.1.  RHSA-2009:0445: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0445
Updated java-1.4.2-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The IBM® 1.4.2 SR13 Java™ release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. These vulnerabilities are summarized on the IBM "Security alerts" page listed in the References section. (CVE-2008-2086, CVE-2008-5339, CVE-2008-5340, CVE-2008-5342, CVE-2008-5343, CVE-2008-5344, CVE-2008-5345, CVE-2008-5346, CVE-2008-5348, CVE-2008-5350, CVE-2008-5351, CVE-2008-5353, CVE-2008-5354, CVE-2008-5359, CVE-2008-5360)
All users of java-1.4.2-ibm are advised to upgrade to these updated packages, which contain the IBM 1.4.2 SR13 Java release. All running instances of IBM Java must be restarted for the update to take effect.

1.100.  java-1.5.0-ibm

1.100.1.  RHEA-2009:1208: enhancement update

Note

This update has already been released (prior to the GA of this release) as errata RHEA-2009:1208
Updated java-1.5.0-ibm packages that comprise IBM's Java 1.5.0 SR10 release are now available.
The following packages comprise IBM's 1.5.0 SR10 Java release:
java-1.5.0-ibm java-1.5.0-ibm-demo java-1.5.0-ibm-devel java-1.5.0-ibm-javacomm java-1.5.0-ibm-jdbc java-1.5.0-ibm-plugin java-1.5.0-ibm-src
These packages include the IBM Java 5 Runtime Environment and the IBM Java 5 Software Development Kit.
The Java 5 Runtime Environment (JRE) consists of the Java virtual machine, the Java platform core classes and supporting files, and includes a Web browser plug-in for running Java applets. It is the runtime section of the Java 5 SDK, but without the development tools such as compilers and debuggers.
The Java 5 Software Development Kit (SDK) is a development environment for building applications, applets, and components that can be deployed on the Java platform. The Java 5 SDK software includes tools useful for developing and testing programs written in the Java programming language. The Java 5 SDK software also includes a JDBC/ODBC bridge for Java applications that need to communicate with a database.
These updated packages comprise the IBM Java 5 SR10 release.
Users of java-1.4.2-ibm may install these new 1.5.0 packages in parallel and switch between the new and old Java environments using the alternatives tool.

1.100.2.  RHSA-2009:1038: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1038
Updated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. These vulnerabilities are summarized on the IBM "Security alerts" page listed in the References section. (CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101, CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107)
All users of java-1.5.0-ibm are advised to upgrade to these updated packages, containing the IBM 1.5.0 SR9-SSU Java release. All running instances of IBM Java must be restarted for this update to take effect.

1.101.  java-1.5.0-sun

1.101.1.  RHSA-2009:1199: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1199
Updated java-1.5.0-sun packages that correct several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment and the Sun Java 5 Software Development Kit.
This update fixes several vulnerabilities in the Sun Java 5 Runtime Environment and the Sun Java 5 Software Development Kit. These vulnerabilities are summarized on the "Advance notification of Security Updates for Java SE" page from Sun Microsystems, listed in the References section. (CVE-2009-2475, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676, CVE-2009-2689)
Users of java-1.5.0-sun should upgrade to these updated packages, which correct these issues. All running instances of Sun Java must be restarted for the update to take effect.

1.101.2.  RHSA-2009:0394: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0394
Updated java-1.5.0-sun packages that correct several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment and the Sun Java 5 Software Development Kit.
This update fixes several vulnerabilities in the Sun Java 5 Runtime Environment and the Sun Java 5 Software Development Kit. These vulnerabilities are summarized on the "Advance notification of Security Updates for Java SE" page from Sun Microsystems, listed in the References section. (CVE-2006-2426, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1103, CVE-2009-1104, CVE-2009-1107)
Users of java-1.5.0-sun should upgrade to these updated packages, which correct these issues. All running instances of Sun Java must be restarted for the update to take effect.

1.102.  java-1.6.0-ibm

1.102.1.  RHSA-2009:1198: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1198
Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. These vulnerabilities are summarized on the IBM "Security alerts" page listed in the References section. (CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101, CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107)
All users of java-1.6.0-ibm are advised to upgrade to these updated packages, containing the IBM 1.6.0 SR5 Java release. All running instances of IBM Java must be restarted for the update to take effect.

1.102.2.  RHSA-2009:0369: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0369
Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The IBM® 1.6.0 Java™ release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. These vulnerabilities are summarized on the IBM "Security alerts" page listed in the References section. (CVE-2008-5340, CVE-2008-5341, CVE-2008-5342, CVE-2008-5343, CVE-2008-5351, CVE-2008-5356, CVE-2008-5357, CVE-2008-5358)
All users of java-1.6.0-ibm are advised to upgrade to these updated packages, containing the IBM 1.6.0 SR4 Java release. All running instances of IBM Java must be restarted for the update to take effect.

1.103.  java-1.6.0-openjdk

1.103.1.  RHSA-2009:1201: Important security and bug fix update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1201
Updated java-1.6.0-openjdk packages that fix several security issues and a bug are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE) contains the software and tools that users need to run applications written using the Java programming language.
A flaw was found in the way the XML Digital Signature implementation in the JRE handled HMAC-based XML signatures. An attacker could use this flaw to create a crafted signature that could allow them to bypass authentication, or trick a user, applet, or application into accepting untrusted content. (CVE-2009-0217)
Several potential information leaks were found in various mutable static variables. These could be exploited in application scenarios that execute untrusted scripting code. (CVE-2009-2475)
It was discovered that OpenType checks can be bypassed. This could allow a rogue application to bypass access restrictions by acquiring references to privileged objects through finalizer resurrection. (CVE-2009-2476)
A denial of service flaw was found in the way the JRE processes XML. A remote attacker could use this flaw to supply crafted XML that would lead to a denial of service. (CVE-2009-2625)
A flaw was found in the JRE audio system. An untrusted applet or application could use this flaw to gain read access to restricted System properties. (CVE-2009-2670)
Two flaws were found in the JRE proxy implementation. An untrusted applet or application could use these flaws to discover the usernames of users running applets and applications, or obtain web browser cookies and use them for session hijacking attacks. (CVE-2009-2671, CVE-2009-2672)
An additional flaw was found in the proxy mechanism implementation. This flaw allowed an untrusted applet or application to bypass access restrictions and communicate using non-authorized socket or URL connections to hosts other than the origin host. (CVE-2009-2673)
An integer overflow flaw was found in the way the JRE processes JPEG images. An untrusted application could use this flaw to extend its privileges, allowing it to read and write local files, as well as to execute local applications with the privileges of the user running the application. (CVE-2009-2674)
An integer overflow flaw was found in the JRE unpack200 functionality. An untrusted applet or application could extend its privileges, allowing it to read and write local files, as well as to execute local applications with the privileges of the user running the applet or application. (CVE-2009-2675)
It was discovered that JDK13Services grants unnecessary privileges to certain object types. This could be misused by an untrusted applet or application to use otherwise restricted functionality. (CVE-2009-2689)
An information disclosure flaw was found in the way private Java variables were handled. An untrusted applet or application could use this flaw to obtain information from variables that would otherwise be private. (CVE-2009-2690)
Note: The flaws concerning applets in this advisory, CVE-2009-2475, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2689, and CVE-2009-2690, can only be triggered in java-1.6.0-openjdk by calling the "appletviewer" application.
This update also fixes the following bug:
  • the EVR in the java-1.6.0-openjdk package as shipped with Red Hat Enterprise Linux allowed the java-1.6.0-openjdk package from the EPEL repository to take precedence (appear newer). Users using java-1.6.0-openjdk from EPEL would not have received security updates since October 2008. This update prevents the packages from EPEL from taking precedence. (BZ#499079)
All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.

1.103.2.  RHSA-2009:0377: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0377
Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE) contains the software and tools that users need to run applications written using the Java programming language.
A flaw was found in the way that the Java Virtual Machine (JVM) handled temporary font files. A malicious applet could use this flaw to use large amounts of disk space, causing a denial of service. (CVE-2006-2426)
A memory leak flaw was found in LittleCMS (embedded in OpenJDK). An application using color profiles could use excessive amounts of memory, and possibly crash after using all available memory, if used to open specially-crafted images. (CVE-2009-0581)
Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in the way LittleCMS handled color profiles. An attacker could use these flaws to create a specially-crafted image file which could cause a Java application to crash or, possibly, execute arbitrary code when opened. (CVE-2009-0723, CVE-2009-0733)
A null pointer dereference flaw was found in LittleCMS. An application using color profiles could crash while converting a specially-crafted image file. (CVE-2009-0793)
A flaw in the Java API for XML Web Services (JAX-WS) service endpoint handling could allow a remote attacker to cause a denial of service on the server application hosting the JAX-WS service endpoint. (CVE-2009-1101)
A flaw in the way the Java Runtime Environment initialized LDAP connections could allow a remote, authenticated user to cause a denial of service on the LDAP service. (CVE-2009-1093)
A flaw in the Java Runtime Environment LDAP client could allow malicious data from an LDAP server to cause arbitrary code to be loaded and then run on an LDAP client. (CVE-2009-1094)
Several buffer overflow flaws were found in the Java Runtime Environment unpack200 functionality. An untrusted applet could extend its privileges, allowing it to read and write local files, as well as to execute local applications with the privileges of the user running the applet. (CVE-2009-1095, CVE-2009-1096)
A flaw in the Java Runtime Environment Virtual Machine code generation functionality could allow untrusted applets to extend their privileges. An untrusted applet could extend its privileges, allowing it to read and write local files, as well as execute local applications with the privileges of the user running the applet. (CVE-2009-1102)
A buffer overflow flaw was found in the splash screen processing. A remote attacker could extend privileges to read and write local files, as well as to execute local applications with the privileges of the user running the java process. (CVE-2009-1097)
A buffer overflow flaw was found in how GIF images were processed. A remote attacker could extend privileges to read and write local files, as well as execute local applications with the privileges of the user running the java process. (CVE-2009-1098)
Note: The flaws concerning applets in this advisory, CVE-2009-1095, CVE-2009-1096, and CVE-2009-1102, can only be triggered in java-1.6.0-openjdk by calling the "appletviewer" application.
All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.

1.104.  java-1.6.0-sun

1.104.1.  RHSA-2009:1200: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1200
Updated java-1.6.0-sun packages that correct several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit.
This update fixes several vulnerabilities in the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. These vulnerabilities are summarized on the "Advance notification of Security Updates for Java SE" page from Sun Microsystems, listed in the References section. (CVE-2009-0217, CVE-2009-2475, CVE-2009-2476, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2674, CVE-2009-2675, CVE-2009-2676, CVE-2009-2690)
Users of java-1.6.0-sun should upgrade to these updated packages, which correct these issues. All running instances of Sun Java must be restarted for the update to take effect.

1.104.2.  RHBA-2009:1093: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1093
Updated java-1.6.0-sun packages are now available for Red Hat Enterprise Linux 5.3 Supplementary.
The java-1.6.0-sun packages include the Sun Java 6 Runtime Environment, Sun Java 6 Software Development Kit (SDK), the source code for the Sun Java class libraries, the Sun Java browser plug-in and Web Start, the Sun JDBC/ODBC bridge driver, and demonstration files for the Sun Java 6 SDK.
These updated java-1.6.0-sun packages upgrade Sun's Java 6 SDK from version 1.6.0_13 to version 1.6.0_14, which provides fixes for a number of bugs. To view the release notes for the bug fixes included in this update, refer to the URL provided in the "References" section of this errata. (BZ#505075)
All users of java-1.6.0-sun are advised to upgrade to these updated packages, which resolve these issues.

1.104.3.  RHSA-2009:0392: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0392
Updated java-1.6.0-sun packages that correct several security issues are now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit.
This update fixes several vulnerabilities in the Sun Java 6 Runtime Environment and the Sun Java 6 Software Development Kit. These vulnerabilities are summarized on the "Advance notification of Security Updates for Java SE" page from Sun Microsystems, listed in the References section. (CVE-2006-2426, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101, CVE-2009-1102, CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107)
Users of java-1.6.0-sun should upgrade to these updated packages, which correct these issues. All running instances of Sun Java must be restarted for the update to take effect.

1.104.4.  RHEA-2009:0284: enhancement update

Note

This update has already been released (prior to the GA of this release) as errata RHEA-2009:0284
Updated java-1.6.0-sun packages are now available for Red Hat Enterprise Linux 5.3.
The java-1.6.0-sun packages include the Sun Java 6 Runtime Environment, Sun Java 6 Software Development Kit (SDK), the source code for the Sun Java class libraries, the Sun Java browser plug-in and Web Start, the Sun JDBC/ODBC bridge driver, and demonstration files for the Sun Java 6 SDK.
These updated java-1.6.0-sun packages upgrade Sun's Java 6 SDK from version 1.6.0_11 to version 1.6.0_12, which provides fixes for a number of bugs. As well, this update includes a 64-bit Java Plug-In for web browsers. To view the release notes for the bug fixes included in this update, refer to the URL provided in the "References" section of this errata.
Users of java-1.6.0-sun are advised to upgrade to these updated packages, which resolve these issues.

1.105.  kdebase

1.105.1.  RHBA-2009:1277: bug fix update

Updated kdebase packages that fix various bugs are now available.
The K Desktop Environment (KDE) is a graphical desktop environment for the X Window System. The kdebase packages include core applications for the K Desktop Environment.
These updated packages fix the following bugs:
  • version 0.5 of the Hardware Abstraction Layer (HAL) creates child device objects only when a file system is mounted. In cases where a storage device cannot be polled (for example, a floppy drive or IDE Zip drive), HAL adds mount methods to the device itself rather than the volume. Previously, this meant that when used in conjunction with HAL 0.5, KDE 3 would not allow users to mount file systems on devices which the HAL could not poll. KDE now includes a modified HAL back end that allows users to mount and unmount volumes through the storage devices detected by the HAL. (BZ#469723)
  • previously, when KDE refreshed desktop icons, it did not refresh the list of icons that it should display on the desktop. As a consequence, icons could appear on the desktop even when the file that they represented had been deleted, and refreshing the desktop would not remove these icons. This situation could arise, for example, when viewing files on an NFS share. When KDE refreshes its view of the desktop, it now updates the list of icons first and therefore avoids drawing icons for non-existent files. (BZ#472295)
All KDE users are advised to upgrade to these updated packages, which resolve these issues.

1.106.  kdegraphics

1.106.1.  RHSA-2009:1130: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1130
Updated kdegraphics packages that fix two security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The kdegraphics packages contain applications for the K Desktop Environment (KDE). Scalable Vector Graphics (SVG) is an XML-based language to describe vector images. KSVG is a framework aimed at implementing the latest W3C SVG specifications.
A use-after-free flaw was found in the KDE KSVG animation element implementation. A remote attacker could create a specially-crafted SVG image, which once opened by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1709)
A NULL pointer dereference flaw was found in the KDE, KSVG SVGList interface implementation. A remote attacker could create a specially-crafted SVG image, which once opened by an unsuspecting user, would cause memory corruption, leading to a denial of service (Konqueror crash). (CVE-2009-0945)
All users of kdegraphics should upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.

1.106.2.  RHSA-2009:0431: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0431
Updated kdegraphics packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The kdegraphics packages contain applications for the K Desktop Environment, including KPDF, a viewer for Portable Document Format (PDF) files.
Multiple integer overflow flaws were found in KPDF's JBIG2 decoder. An attacker could create a malicious PDF file that would cause KPDF to crash or, potentially, execute arbitrary code when opened. (CVE-2009-0147, CVE-2009-1179)
Multiple buffer overflow flaws were found in KPDF's JBIG2 decoder. An attacker could create a malicious PDF file that would cause KPDF to crash or, potentially, execute arbitrary code when opened. (CVE-2009-0146, CVE-2009-1182)
Multiple flaws were found in KPDF's JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause KPDF to crash or, potentially, execute arbitrary code when opened. (CVE-2009-0166, CVE-2009-1180)
Multiple input validation flaws were found in KPDF's JBIG2 decoder. An attacker could create a malicious PDF file that would cause KPDF to crash or, potentially, execute arbitrary code when opened. (CVE-2009-0800)
Multiple denial of service flaws were found in KPDF's JBIG2 decoder. An attacker could create a malicious PDF that would cause KPDF to crash when opened. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183)
Red Hat would like to thank Braden Thomas and Drew Yao of the Apple Product Security team, and Will Dormann of the CERT/CC for responsibly reporting these flaws.
Users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.

1.107.  kdelibs

1.107.1.  RHSA-2009:1127: Critical security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1127
Updated kdelibs packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red Hat Security Response Team.
The kdelibs packages provide libraries for the K Desktop Environment (KDE).
A flaw was found in the way the KDE CSS parser handled content for the CSS "style" attribute. A remote attacker could create a specially-crafted CSS equipped HTML page, which once visited by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1698)
A flaw was found in the way the KDE HTML parser handled content for the HTML "head" element. A remote attacker could create a specially-crafted HTML page, which once visited by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1690)
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the KDE JavaScript garbage collector handled memory allocation requests. A remote attacker could create a specially-crafted HTML page, which once visited by an unsuspecting user, could cause a denial of service (Konqueror crash) or, potentially, execute arbitrary code with the privileges of the user running Konqueror. (CVE-2009-1687)
Users should upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.

1.108.  kdenetwork

1.108.1.  RHBA-2009:0452: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:0452
Updated kdenetwork packages that resolve an issue are now available.
The kdenetwork packages provide a collection of networking applications for the K Desktop Environment (KDE).
These updated kdenetwork packages fix the following bug:
  • the krfb command is a VNC-compatible server for sharing KDE desktops. The desktop can be shared by running krfb from the command line. krfb would fail if a user accessed the shared desktop from a web browser using the address http://hostname:5800 (where hostname is a valid address or hostname). The updated kdenetwork packages no longer have this issue and shared desktops can be accessed normally.
All users of kdenetwork are advised to upgrade to these updated packages, which resolve this issue.

1.109.  kdepim

1.109.1.  RHBA-2009:1057: bug fix update

Note

This update has already been released (prior to the GA of this release) as FASTRACK errata RHBA-2009:1057
Updated kdepim packages that fix a bug are now available.
The K Desktop Environment (KDE) is a graphical desktop for the X Window System. The KDE Personal Information Management (kdepim) suite helps you to organize your mail, tasks, appointments, and contacts.
This update includes the following fix:
  • kdepim.spec used "%{prefix}/share/doc" in the %install section but had no "Prefix:" header line. Consequently, the symlinks created in this section were not relative (contrary to the included comment). With this update "%{prefix}/share/doc" has been replaced with "%{_docdir}", ensuring the created symlinks are relative, as expected.
All kdepim users should upgrade to these updated packages, which resolve this issue.

1.110.  kernel

1.110.1.  RHSA-2010:0147: Important security and bug fix update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2010:0147 .
Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security fixes:
  • a NULL pointer dereference flaw was found in the sctp_rcv_ootb() function in the Linux kernel Stream Control Transmission Protocol (SCTP) implementation. A remote attacker could send a specially-crafted SCTP packet to a target system, resulting in a denial of service. (CVE-2010-0008, Important)
  • a missing boundary check was found in the do_move_pages() function in the memory migration functionality in the Linux kernel. A local user could use this flaw to cause a local denial of service or an information leak. (CVE-2010-0415, Important)
  • a NULL pointer dereference flaw was found in the ip6_dst_lookup_tail() function in the Linux kernel. An attacker on the local network could trigger this flaw by sending IPv6 traffic to a target system, leading to a system crash (kernel OOPS) if dst->neighbour is NULL on the target system when receiving an IPv6 packet. (CVE-2010-0437, Important)
  • a NULL pointer dereference flaw was found in the ext4 file system code in the Linux kernel. A local attacker could use this flaw to trigger a local denial of service by mounting a specially-crafted, journal-less ext4 file system, if that file system forced an EROFS error. (CVE-2009-4308, Moderate)
  • an information leak was found in the print_fatal_signal() implementation in the Linux kernel. When /proc/sys/kernel/print-fatal-signals is set to 1 (the default value is 0), memory that is reachable by the kernel could be leaked to user-space. This issue could also result in a system crash. Note that this flaw only affected the i386 architecture. (CVE-2010-0003, Moderate)
  • missing capability checks were found in the ebtables implementation, used for creating an Ethernet bridge firewall. This could allow a local, unprivileged user to bypass intended capability restrictions and modify ebtables rules. (CVE-2010-0007, Low)
Bug fixes:
  • a bug prevented Wake on LAN (WoL) being enabled on certain Intel hardware. (BZ#543449)
  • a race issue in the Journaling Block Device. (BZ#553132)
  • Prior to this update, user data corruption could occur when a 64-bit system was in the 32-bit compatibility mode. Specifically, programs compiled on an x86 system that called sched_rr_get_interval() were silently corrupted. This was due to the kernel filling data beyond the end of a timespec structure because the size of the structure is different between 32-bit and 64-bit systems. With this update, this issue has been fixed by calling sys32_sched_rr_get_interval() instead of sys_sched_rr_get_interval() when sched_rr_get_interval() is called, and user data corruption no longer occurs. (BZ#557684)
  • the RHSA-2010:0019 update introduced a regression, preventing WoL from working for network devices using the e1000e driver. (BZ#559335)
  • adding a bonding interface in mode balance-alb to a bridge was not functional. (BZ#560588)
  • some KVM (Kernel-based Virtual Machine) guests experienced slow performance (and possibly a crash) after suspend/resume. (BZ#560640)
  • on some systems, VF cannot be enabled in dom0. (BZ#560665)
  • on systems with certain network cards, a system crash occurred after enabling GRO. (BZ#561417)
  • for x86 KVM guests with pvclock enabled, the boot clocks were registered twice, possibly causing KVM to write data to a random memory area during the guest's life. (BZ#561454)
  • serious performance degradation for 32-bit applications, that map (mmap) thousands of small files, when run on a 64-bit system. (BZ#562746)
  • improved kexec/kdump handling. Previously, on some systems under heavy load, kexec/kdump was not functional. (BZ#562772)
  • dom0 was unable to boot when using the Xen hypervisor on a system with a large number of logical CPUs. (BZ#562777)
  • a fix for a bug that could potentially cause file system corruption. (BZ#564281)
  • a bug caused infrequent cluster issues for users of GFS2. (BZ#564288)
  • gfs2_delete_inode failed on read-only file systems. (BZ#564290)
Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

1.110.2.  RHSA-2009:1193: Important security and bug fix update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1193
Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security fixes:
  • the possibility of a timeout value overflow was found in the Linux kernel high-resolution timers functionality, hrtimers. This could allow a local, unprivileged user to execute arbitrary code, or cause a denial of service (kernel panic). (CVE-2007-5966, Important)
  • a flaw was found in the Intel PRO/1000 network driver in the Linux kernel. Frames with sizes near the MTU of an interface may be split across multiple hardware receive descriptors. Receipt of such a frame could leak through a validation check, leading to a corruption of the length check. A remote attacker could use this flaw to send a specially-crafted packet that would cause a denial of service or code execution. (CVE-2009-1385, Important)
  • Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in the Linux kernel. This driver allowed interfaces using this driver to receive frames larger than could be handled, which could lead to a remote denial of service or code execution. (CVE-2009-1389, Important)
  • the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a setuid or setgid program was executed. A local, unprivileged user could use this flaw to bypass the mmap_min_addr protection mechanism and perform a NULL pointer dereference attack, or bypass the Address Space Layout Randomization (ASLR) security feature. (CVE-2009-1895, Important)
  • Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs implementation. A local attacker with permissions to perform an eCryptfs mount could modify the metadata of the files in that eCrypfts mount to cause a buffer overflow, leading to a denial of service or privilege escalation. (CVE-2009-2406, CVE-2009-2407, Important)
  • Konstantin Khlebnikov discovered a race condition in the ptrace implementation in the Linux kernel. This race condition can occur when the process tracing and the process being traced participate in a core dump. A local, unprivileged user could use this flaw to trigger a deadlock, resulting in a partial denial of service. (CVE-2009-1388, Moderate)
Bug fixes:
  • possible host (dom0) crash when installing a Xen para-virtualized guest while another para-virtualized guest was rebooting. (BZ#497812)
  • no audit record for a directory removal if the directory and its subtree were recursively watched by an audit rule. (BZ#507561)
  • page caches in memory can be freed up using the Linux kernel's drop_caches feature. If drop_pagecache_sb() and prune_icache() ran concurrently, however, a missing test in drop_pagecache_sb() could cause a kernel panic. For example, running echo 1 > /proc/sys/vm/drop_caches or sysctl -w vm.drop_caches=1 on systems under high memory load could cause a kernel panic or system hang. With this update, the missing test has been added and the drop_caches feature frees up page caches properly. Consequently these system failures no longer occur, even under high memory load. (BZ#503692)
  • on 32-bit systems, core dumps for some multithreaded applications did not include all thread information. (BZ#505322)
  • a stack buffer used by get_event_name() was not large enough for the nul terminator sprintf() writes. This could lead to an invalid pointer or kernel panic. (BZ#506906)
  • when using the aic94xx driver, a system with SATA drives may not boot due to a bug in libsas. (BZ#506029)
  • incorrect stylus button handling when moving it away then returning it to the tablet for Wacom Cintiq 21UX and Intuos tablets. (BZ#508275)
  • CPU "soft lockup" messages and possibly a system hang on systems with certain Broadcom network devices and running the Linux kernel from the kernel-xen package. (BZ#503689)
  • on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL timer and that were also compiled for 64-bit systems (this caused such programs to abort). (BZ#510018)
  • write operations could be blocked even when using O_NONBLOCK. (BZ#510239)
  • enabling MSI on systems with VIA VT3364 chipsets caused a kernel panic or system hang during installation of Red Hat Enterprise Linux or subsequent booting of the operating system. MSI was enabled by default during boot and the "pci=nomsi" boot option to disable MSI was required on Red Hat Enterprise Linux 5.2 and later to avoid this bug. With this update, the kernel automatically disables MSI on VIA VT3364 chipsets during boot. The "pci=nomsi" boot option is no longer required to install or boot Red Hat Enterprise Linux successfully. (BZ#507529)
  • shutting down, destroying, or migrating Xen guests with large amounts of memory could cause other guests to be temporarily unresponsive. (BZ#512311)
Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

1.110.3.  RHBA-2009:1151: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1151
Updated kernel packages that fix an issue with HugeTLBfs are now available for Red Hat Enterprise Linux 5.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
These updated kernel packages fix the following bug:
  • HugeTLBFS (Translation Look-Aside Buffer File System) allows much larger page sizes than standard 4-kilobyte pages. The kernel's virtual memory subsystem uses these pages to map between real and virtual memory address spaces, and HugeTLBFS allows for significant performance increases for memory-intensive applications under heavy load. When a file existing on the HugeTLB file system was accessed simultaneously by two separate processes, the system become unresponsive and eventually a soft lockup occurred. These updated packages correct this issue so that simultaneous access of a single file on a HugeTLB file system is no longer problematic. (BZ#510235)
Red Hat Enterprise Linux 5 users are advised to upgrade to these updated packages, which resolve these issues.

1.110.4.  RHBA-2009:1133: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:1133
Updated kernel packages that fix several bugs are now available for Red Hat Enterprise Linux 5.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
These updated packages addresses the following bugs:
  • RHSA-2009-1106 included a fix for a rare race condition (BZ#486921). This earlier race condition occurred if an application performed multiple O_DIRECT reads per virtual memory page and also performed fork(2). Unfortunately, the fix included with RHSA-2009-1106 introduced a new, very small, race condition which presented if the system was swapping heavily or heavily reproducing the conditions that were the cause of BZ#48692. With this update, the parent pte is not set to writable if the src pte is unmapped by the VM, preventing the race condition from occurring. (BZ#507297)
  • the copy_hugetlb_page_range() function assumed it was safe to drop the source mm->page_table_lock before calling hugetlb_cow(). As a consequence a kernel panic occurred when a particular multi-threaded application did Direct IO on a HUGEPAGE-mapped file region and created new processes. With this update, copy_hugetlb_page_range() calls hugetlb_cow() with the locks held, ensuring the panic does not occur. (BZ#508030)
Red Hat Enterprise Linux 5 users are advised to upgrade to these updated packages, which resolve these issues.

1.110.5.  RHSA-2009:1106: Important security and bug fix update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1106
Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security fixes:
  • several flaws were found in the way the Linux kernel CIFS implementation handles Unicode strings. CIFS clients convert Unicode strings sent by a server to their local character sets, and then write those strings into memory. If a malicious server sent a long enough string, it could write past the end of the target memory region and corrupt other memory areas, possibly leading to a denial of service or privilege escalation on the client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)
  • the Linux kernel Network File System daemon (nfsd) implementation did not drop the CAP_MKNOD capability when handling requests from local, unprivileged users. This flaw could possibly lead to an information leak or privilege escalation. (CVE-2009-1072, Moderate)
  • Frank Filz reported the NFSv4 client was missing a file permission check for the execute bit in some situations. This could allow local, unprivileged users to run non-executable files on NFSv4 mounted file systems. (CVE-2009-1630, Moderate)
  • a missing check was found in the hypervisor_callback() function in the Linux kernel provided by the kernel-xen package. This could cause a denial of service of a 32-bit guest if an application running in that guest accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)
  • a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and agp_generic_alloc_pages() functions did not zero out the memory pages they allocate, which may later be available to user-space processes. This flaw could possibly lead to an information leak. (CVE-2009-1192, Low)
Bug fixes:
  • a race in the NFS client between destroying cached access rights and unmounting an NFS file system could have caused a system crash. "Busy inodes" messages may have been logged. (BZ#498653)
  • nanosleep() could sleep several milliseconds less than the specified time on Intel Itanium®-based systems. (BZ#500349)
  • LEDs for disk drives in AHCI mode may have displayed a fault state when there were no faults. (BZ#500120)
  • ptrace_do_wait() reported tasks were stopped each time the process doing the trace called wait(), instead of reporting it once. (BZ#486945)
  • epoll_wait() may have caused a system lockup and problems for applications. (BZ#497322)
  • missing capabilities could possibly allow users with an fsuid other than 0 to perform actions on some file system types that would otherwise be prevented. (BZ#497271)
  • on NFS mounted file systems, heavy write loads may have blocked nfs_getattr() for long periods, causing commands that use stat(2), such as ls, to hang. (BZ#486926)
  • in rare circumstances, if an application performed multiple O_DIRECT reads per virtual memory page and also performed fork(2), the buffer storing the result of the I/O may have ended up with invalid data. (BZ#486921)
  • when using GFS2, gfs2_quotad may have entered an uninterpretable sleep state. (BZ#501742)
  • with this update, get_random_int() is more random and no longer uses a common seed value, reducing the possibility of predicting the values returned. (BZ#499783)
  • the "-fwrapv" flag was added to the gcc build options to prevent gcc from optimizing away wrapping. (BZ#501751)
  • a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)
  • using the Broadcom NetXtreme BCM5704 network device with the tg3 driver caused high system load and very bad performance. (BZ#502837)
  • "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes able to use the ptrace() call on a given process; however, certain information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used to reconstruct memory maps. (BZ#499546)
Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

1.110.6.  RHSA-2009:0473: Important security and bug fix update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0473
Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following security issues:
  • a logic error was found in the do_setlk() function of the Linux kernel Network File System (NFS) implementation. If a signal interrupted a lock request, the local POSIX lock was incorrectly created. This could cause a denial of service on the NFS server if a file descriptor was closed before its corresponding lock request returned. (CVE-2008-4307, Important)
  • a deficiency was found in the Linux kernel system call auditing implementation on 64-bit systems. This could allow a local, unprivileged user to circumvent a system call audit configuration, if that configuration filtered based on the "syscall" number or arguments. (CVE-2009-0834, Important)
  • the exit_notify() function in the Linux kernel did not properly reset the exit signal if a process executed a set user ID (setuid) application before exiting. This could allow a local, unprivileged user to elevate their privileges. (CVE-2009-1337, Important)
  • a flaw was found in the ecryptfs_write_metadata_to_contents() function of the Linux kernel eCryptfs implementation. On systems with a 4096 byte page-size, this flaw may have caused 4096 bytes of uninitialized kernel memory to be written into the eCryptfs file headers, leading to an information leak. Note: Encrypted files created on systems running the vulnerable version of eCryptfs may contain leaked data in the eCryptfs file headers. This update does not remove any leaked data. Refer to the Knowledgebase article in the References section for further information. (CVE-2009-0787, Moderate)
  • the Linux kernel implementation of the Network File System (NFS) did not properly initialize the file name limit in the nfs_server data structure. This flaw could possibly lead to a denial of service on a client mounting an NFS share. (CVE-2009-1336, Moderate)
This update also fixes the following bugs:
  • the enic driver (Cisco 10G Ethernet) did not operate under virtualization. (BZ#472474)
  • network interfaces using the IBM eHEA Ethernet device driver could not be successfully configured under low-memory conditions. (BZ#487035)
  • bonding with the "arp_validate=3" option may have prevented fail overs. (BZ#488064)
  • when running under virtualization, the acpi-cpufreq module wrote "Domain attempted WRMSR" errors to the dmesg log. (BZ#488928)
  • NFS clients may have experienced deadlocks during unmount. (BZ#488929)
  • the ixgbe driver double counted the number of received bytes and packets. (BZ#489459)
  • the Wacom Intuos3 Lens Cursor device did not work correctly with the Wacom Intuos3 12x12 tablet. (BZ#489460)
  • on the Itanium® architecture, nanosleep() caused commands which used it, such as sleep and usleep, to sleep for one second more than expected. (BZ#490434)
  • a panic and corruption of slab cache data structures occurred on 64-bit PowerPC systems when clvmd was running. (BZ#491677)
  • the NONSTOP_TSC feature did not perform correctly on the Intel® microarchitecture (Nehalem) when running in 32-bit mode. (BZ#493356)
  • keyboards may not have functioned on IBM eServer System p machines after a certain point during installation or afterward. (BZ#494293)
  • using Device Mapper Multipathing with the qla2xxx driver resulted in frequent path failures. (BZ#495635)
  • if the hypervisor was booted with the dom0_max_vcpus parameter set to less than the actual number of CPUs in the system, and the cpuspeed service was started, the hypervisor could crash. (BZ#495931)
  • using Openswan to provide an IPsec virtual private network eventually resulted in a CPU soft lockup and a system crash. (BZ#496044)
  • it was possible for posix_locks_deadlock() to enter an infinite loop (under the BKL), causing a system hang. (BZ#496842)
Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

1.110.7.  RHSA-2009:0326: Important security and bug fix update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0326
Updated kernel packages that fix several security issues and several bugs are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security fixes:
  • memory leaks were found on some error paths in the icmp_send() function in the Linux kernel. This could, potentially, cause the network connectivity to cease. (CVE-2009-0778, Important)
  • Chris Evans reported a deficiency in the clone() system call when called with the CLONE_PARENT flag. This flaw permits the caller (the parent process) to indicate an arbitrary signal it wants to receive when its child process exits. This could lead to a denial of service of the parent process. (CVE-2009-0028, Moderate)
  • an off-by-one underflow flaw was found in the eCryptfs subsystem. This could potentially cause a local denial of service when the readlink() function returned an error. (CVE-2009-0269, Moderate)
  • a deficiency was found in the Remote BIOS Update (RBU) driver for Dell systems. This could allow a local, unprivileged user to cause a denial of service by reading zero bytes from the image_type or packet_size files in "/sys/devices/platform/dell_rbu/". (CVE-2009-0322, Moderate)
  • an inverted logic flaw was found in the SysKonnect FDDI PCI adapter driver, allowing driver statistics to be reset only when the CAP_NET_ADMIN capability was absent (local, unprivileged users could reset driver statistics). (CVE-2009-0675, Moderate)
  • the sock_getsockopt() function in the Linux kernel did not properly initialize a data structure that can be directly returned to user-space when the getsockopt() function is called with SO_BSDCOMPAT optname set. This flaw could possibly lead to memory disclosure. (CVE-2009-0676, Moderate)
  • the ext2 and ext3 file system code failed to properly handle corrupted data structures, leading to a possible local denial of service when read or write operations were performed on a specially-crafted file system. (CVE-2008-3528, Low)
  • a deficiency was found in the libATA implementation. This could, potentially, lead to a local denial of service. Note: by default, the "/dev/sg*" devices are accessible only to the root user. (CVE-2008-5700, Low)
Bug fixes:
  • a bug in aic94xx may have caused kernel panics during boot on some systems with certain SATA disks. (BZ#485909)
  • a word endianness problem in the qla2xx driver on PowerPC-based machines may have corrupted flash-based devices. (BZ#485908)
  • a memory leak in pipe() may have caused a system deadlock. The workaround in Section 1.5, Known Issues, of the Red Hat Enterprise Linux 5.3 Release Notes Updates, which involved manually allocating extra file descriptors to processes calling do_pipe, is no longer necessary. (BZ#481576)
  • CPU soft-lockups in the network rate estimator. (BZ#481746)
  • bugs in the ixgbe driver caused it to function unreliably on some systems with 16 or more CPU cores. (BZ#483210)
  • the iwl4965 driver may have caused a kernel panic. (BZ#483206)
  • a bug caused NFS attributes to not update for some long-lived NFS mounted file systems. (BZ#483201)
  • unmounting a GFS2 file system may have caused a panic. (BZ#485910)
  • a bug in ptrace() may have caused a panic when single stepping a target. (BZ#487394)
  • on some 64-bit systems, notsc was incorrectly set at boot, causing slow gettimeofday() calls. (BZ#488239)
  • do_machine_check() cleared all Machine Check Exception (MCE) status registers, preventing the BIOS from using them to determine the cause of certain panics and errors. (BZ#490433)
  • scaling problems caused performance problems for LAPI applications. (BZ#489457)
  • a panic may have occurred on systems using certain Intel WiFi Link 5000 products when booting with the RF Kill switch on. (BZ#489846)
  • the TSC is invariant with C/P/T states, and always runs at constant frequency from now on. (BZ#489310)
All users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

1.110.8.  RHSA-2009:0264: Important security update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:0264
Updated kernel packages that resolve several security issues are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update addresses the following security issues:
  • a memory leak in keyctl handling. A local user could use this flaw to deplete kernel memory, eventually leading to a denial of service. (CVE-2009-0031, Important)
  • a buffer overflow in the Linux kernel Partial Reliable Stream Control Transmission Protocol (PR-SCTP) implementation. This could, potentially, lead to a denial of service if a Forward-TSN chunk is received with a large stream ID. (CVE-2009-0065, Important)
  • a flaw when handling heavy network traffic on an SMP system with many cores. An attacker who could send a large amount of network traffic could create a denial of service. (CVE-2008-5713, Important)
  • the code for the HFS and HFS Plus (HFS+) file systems failed to properly handle corrupted data structures. This could, potentially, lead to a local denial of service. (CVE-2008-4933, CVE-2008-5025, Low)
  • a flaw was found in the HFS Plus (HFS+) file system implementation. This could, potentially, lead to a local denial of service when write operations are performed. (CVE-2008-4934, Low)
In addition, these updated packages fix the following bugs:
  • when using the nfsd daemon in a clustered setup, kernel panics appeared seemingly at random. These panics were caused by a race condition in the device-mapper mirror target.
  • the clock_gettime(CLOCK_THREAD_CPUTIME_ID, ) syscall returned a smaller timespec value than the result of previous clock_gettime() function execution, which resulted in a negative, and nonsensical, elapsed time value.
  • nfs_create_rpc_client was called with a "flavor" parameter which was usually ignored and ended up unconditionally creating the RPC client with an AUTH_UNIX flavor. This caused problems on AUTH_GSS mounts when the credentials needed to be refreshed. The credops did not match the authorization type, which resulted in the credops dereferencing an incorrect part of the AUTH_UNIX rpc_auth struct.
  • when copy_user_c terminated prematurely due to reading beyond the end of the user buffer and the kernel jumped to the exception table entry, the rsi register was not cleared. This resulted in exiting back to user code with garbage in the rsi register.
  • the hexdump data in s390dbf traces was incomplete. The length of the data traced was incorrect and the SAN payload was read from a different place then it was written to.
  • when using connected mode (CM) in IPoIB on ehca2 hardware, it was not possible to transmit any data.
  • when an application called fork() and pthread_create() many times and, at some point, a thread forked a child and then attempted to call the setpgid() function, then this function failed and returned and ESRCH error value.
Users should upgrade to these updated packages, which contain backported patches to correct these issues. Note: for this update to take effect, the system must be rebooted.

1.110.9.  RHSA-2009:1222: Important security and bug fix update

Important

This update has already been released (prior to the GA of this release) as the security errata RHSA-2009:1222
Updated kernel packages that fix two security issues and a bug are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
These updated packages fix the following security issues:
  • a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This macro did not initialize the sendpage operation in the proto_ops structure correctly. A local, unprivileged user could use this flaw to cause a local denial of service or escalate their privileges. (CVE-2009-2692, Important)
  • a flaw was found in the udp_sendmsg() implementation in the Linux kernel when using the MSG_MORE flag on UDP sockets. A local, unprivileged user could use this flaw to cause a local denial of service or escalate their privileges. (CVE-2009-2698, Important)
Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google Security Team for responsibly reporting these flaws.
These updated packages also fix the following bug:
  • in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was not freed in the error exit path. This bug led to a memory leak and an unresponsive system. A reported case of this bug occurred after running "cman_tool kill -n [nodename]". (BZ#515432)
Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

1.110.10. RHSA-2009:1243

Updated kernel packages that fix security issues, address several hundred bugs and add numerous enhancements are now available as part of the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
1.110.10.1. General Kernel Support
An outline of general kernel updates.
  • KVM guest-smp tlb flushing without mmu-notifiers could corrupt memory as a kernel-based virtual machine (KVM) may add pages to the kernel freelist while another vcpu may still be writing to them through guest mode. This update adds mmu-notifier support to the kernel and also corrects a bug found in an earlier patch wherein mm_struct was grown by existing drivers and caused a failed kABI check. This bug has been corrected by using an index that resides in an unused padding hole to avoid expanding the structure size.(BZ#485718)
  • Pointer and signed arithmetic overflow wrapping has not previously been defined in the Linux kernel. This could cause GCC (GNU C Compiler) to assume that wrapping does not occur and attempt to optimize the arithmetic that the kernel may require for overflow testing. This update adds the -fwrapv variable to GCC CFLAGS in order to define wrapping behavior.(BZ#491266)
  • An issue of contention between processes vying for the same memory space in high end systems was recently identified by TPC-C (Transaction Processing Council) benchmarking. This update includes fast-gup patches which use direct IO and provide a significant (up to 9-10%) performance improvement. This update has been tested thoroughly and is used in the 5.4 kernel to improve scalability. For further information, see this article. (BZ#474913)
  • A new parameter has been added to this kernel, allowing system administrators to change the maximum number of modified pages kupdate writes to disk per iteration each time it runs. /proc/sys/vm/max_writeback_pages defaults to 1024 or 4MB so that a maximum of 1024 pages get written out by each iteration of kupdate. (BZ#479079).
  • A new option (CONFIG_TASK_IO_ACCOUNTING=y) has been added to kernel to assist in monitoring IO statistics per process. This assists with troubleshooting in a production environment. (BZ#461636)
  • In previous kernels, back-up processes were deteriorating DB2 server responsiveness. This was caused by /proc/sys/vm/dirty_ratio preventing processes writing to pagecache memory when more than half of the unmapped pagecache memory was dirty (even if dirty_ratio was set to 100%). A change made in this kernel update overrides this limiting behavior. Now, when the dirty_ratio is set to 100%, the system will no longer limit writing to pagecache memory. (BZ#295291)
  • The rd_blocksize option found in the previous kernel's ramdisk driver was causing data corruption when using large ramdisks under a reasonable system load. This update removes this unnecessary option and resolves the data corruption issues. (BZ#480663)
  • The function getrusage is used to examine the resource usage of a process. It is useful in diagnosing problems and gathering data on resource usage. However, in instances where a process was spawning child threads, getrusage's results would be in incorrect as it would examine only the parent process and not interrogate its children. This update implements rusadge_thread to allow for accurate resource usage results in these instances. (BZ#451063)
  • The header /usr/include/linux/futex.h would previously interfere with compiling C source code files, resulting in an error. This update includes a patch which corrects problematic kernel only definitions and resolves the compiling error. (BZ#475790)
  • In previous kernels the kernel version was not identified in panic or oops output messages. This update adds the kernel version details to these outputs. (BZ#484403)
  • During release 2.6.18, the kernel was configured to provide kernel-headers for the package glibc. That process caused various files to be improperly marked for inclusion. The serial_reg.h file was incorrectly marked and not included in the kernel_headers rpm. This, in turn, caused problems with building other rpms. This update adds the serial_reg.h file and corrects the problem. (BZ#463538)
  • In some circumstances upcrund, the process manager in HP's Unified Parallel C (UPC) product, returned an ESRCH result and failed when calling setpgid() for a child process forked by a sub-thread. This update includes a patch to fix for this problem. (BZ#472433)
  • Functionality has been added to sysrq-t to display backtrace information about running processes. This will assist in debugging hung systems. (BZ#456588)
1.110.10.2. Debugging
Updates specifically related to debugging tasks.
  • Independent software vendors and developers often use hugepage to avoid unnecessary memory reclaim. The previous kernel didn't take coredump from hugepage area. This made the debugging of software difficult. This update includes a feature to assist debugging by making the kernel take a hugepage coredump. (BZ#470411)
  • This update includes a feature addition to recover kernel panic messages. The option -M has been added to the makedumpfile command which allows a user to dump dmesg log data from vmcore into a user-specified log file (makedumpfile -M /proc/vmcore /path/to/log/file). (BZ#485308)
  • In this update various tracepoints have been implemented as a "Technology Preview". These interfaces add static probe points into the kernel subsystem such as 'Page Cache', 'NFS' and 'Networking' stack, for use with tools such as SystemTap. (Bugzilla #493444, #499008, #493454, #475719)
  • This kernel update adds the 'success' value to sched_wakeup and sched_wakeup_new tracepoints to track successful schedule wakes. (BZ#497414)
  • This update includes a new dropstat script to monitor and locate packets that are dropped within the host machine. (BZ#470539)
  • The new systemtap direct kernel tracepoint support requires access to the trace/*.h header files within the kernel-devel package. This update includes /trace/*.h headers in the kernel-devel package. (BZ#489096)
1.110.10.3. Security
Updates specifically related to security concerns.
  • This update increases the maximum length of the kernel key field from the arbitrary 32 character length set in previous kernels to 255 characters. (BZ#475145)
  • In keeping with Federal Information Processing Standardization 140 (FIPS140) certification requirements, this update includes:
    • Self-testing for; ansi_cprng (BZ#497891), ctr(aes) mode (BZ#497888), Hmac-sha512 (BZ#499463) and rfc4309(ccm(aes)) (BZ#472386).
    • Code to produce a signature file that GRUB performs a checksum against during the boot process. (BZ#444632)
    • Code to change the DSA key from 512 bit to 1024 bit for module signing. (BZ#413241)
1.110.10.4. Filesystems
Filesystem Updates.
  • Support for the FIEMAP file extent mapping system has been included in this kernel update. (BZ#296951)
  • The ext4 file system code (included in Red Hat Enterprise Linux as a Technology Preview) was rebased for this release. (BZ#485315)
  • This kernel update corrects performance issues with the Common Internet File System (CIFS) (a protocol that defines a standard for remote file access) including difficulties mounting certain Windows file systems or symlink files. (BZ#465143)
  • Kernel support for the XFS high-performance file system has been added to this Red Hat Enterprise Linux release. In this initial implementation the functionality is limited to specific customers on a use-case basis.(BZ#470845)
  • This release includes kernel support for the FUSE userspace file system. (BZ#457975)
  • Tunable parameters that control the number of NFSD socket connections have been added to this kernel release. TCP connections have previously been capped at 80, regardless of the number of NFS threads that were open. (BZ#468092)
  • This kernel update includes FIEMAP support for ]GFS2 (Global FIle System). (BZ#476626)
  • This kernel update adds a UUID (Universal Unique IDentifier) field to the file system super block. (BZ#242696)
  • This update includes a patch to allow access to files on a GFS2 file system from client machines running the older (and previously incompatible) NFS v2 file sharing protocol. (BZ#497954)
1.110.10.5. Networking
Kernel updates that relate to Networking issues
  • A new module has been added to this kernel version to enable DSCP (Differentiated Services Code Point) setting in systems using IPv6 netfilter. (BZ#481652)
  • In order to boost virtualization performance on 10 Gigabyte Ethernet cards (and 10GbE performance in general), Generic Receive Offload (GRO) support (analogous to GSO support on egress) has been added to the IPv4 and IPv6 protocols in this kernel release. (BZ#499347)
  • This kernel update includes new code to improve UDP port randomization. Previous versions of the randomization code could allow a security weakness by providing sub-optimal randomizing, as well as producing CPU drag while scanning for port numbers. This update corrects these behaviors. (BZ#480951)
  • When using setsockopt() with option IPV6_MULTICAST_IF and optval set to 0, the previous kernel would return a result of ENODEV. This release updates setsockopt(IPV6_MULTICAST_IF) to report the correct value and not the error. (BZ#484971)
  • This update includes numerous critical fixes for the NetXen device driver. These patches have been tested and implemented in the kernel upstream. A complete list of the changes and their effects can be found at BZ#485381.
1.110.10.6. General Platform Support
Platform support updates:
  • ACPI Performance and Throttling state (P- and T-state) change notifications were not being handled correctly by the OSPM (Operating System-directed Power Management) driver. This affected the Intel® Node Manager's ability to monitor and manage CPU power usage. The kernel's processor_core code has been update to correct this issue. (BZ#487567)
  • Problems were encountered with the Lenovo X61 (and other laptops which have a docking station with a CD/DVD drive); if the machine was undocked after a CD/DVD had been mounted in the docking station optical drive it would not be present when the machine was re-docked. The docking driver has been updated in this release to correct the problem. (BZ#485181)
1.110.10.7. Architecture Specific Support
Updates specific to particular computer architectures.
1.110.10.7.1. i386
Kernel updates for i386 architectures.
  • In a virtual environment, timekeeping for Red Hat Enterprise Linux 64-bit kernels can be problematic, since time is kept by counting timer interrupts. De- and re-scheduling the virtual machine can cause a delay in these interrupts, resulting in a timekeeping discrepancy. This kernel release reconfigures the timekeeping algorithm to keep time based on a time-elapsed counter. (BZ#463573)
  • It was found that, if their stacks exceed the combined size of ~4GB, 64-bit threaded applications slowed down drastically in pthread_create(). This is because glibc uses MAP_32BIT to allocate those stacks. As the use of MAP_32BIT is a legacy implementation, this update adds a new flag (MAP_STACK mmap) to the kernel to avoid constraining 64-bit applications. (BZ#459321)
  • The update includes a feature bit that encourages Time Stamp Clocks (TSCs) to keep running in deep-C states. This bit NONSTOP_TSC acts in conjunction with CONSTANT_TSC. CONSTANT_TSC indicates that the TSC runs at constant frequency irrespective of P/T- states, and NONSTOP_TSC indicates that TSC does not stop in deep C-states. (BZ#474091)
  • This update includes a patch to include asm-x86_64 headers in kernel-devel packages built on or for i386, i486, i586 and i686 architectures. (BZ#491775)
  • This update includes a fix to ensure that specifying memmap=X$Y as a boot parameter on i386 architectures yields a new BIOS map. (BZ#464500)
  • This update adds a patch to correct a problem with the Non-Maskable Interrupt (NMI) that appeared in previous kernel releases. The problem appeared to affect various Intel® processors and caused the system to report the NMI watchdog was 'stuck'. New parameters in the NMI code correct this issue. (BZ#500892)
  • This release re-introduces PCI Domain support for HP xw9400 and xw9300 systems. (BZ#474891)
  • Functionality has been corrected to export module powernow-k8 parameters to /sys/modules. This information was previously not exported.(BZ#492010)
1.110.10.7.2. x86_64
Kernel updates for x86_64 architectures.
  • An optimization error was found in linux-2.6-misc-utrace-update.patch. When running 32-bit processes on a 64-bit machine systems didn't return ENOSYS errors on missing (out of table range) system calls. This kernel release includes a patch to correct this. (BZ#481682)
  • Some cluster systems where found to boot with an unstable time source. It was determined that this was a result of kernel code not checking for a free performance counter (PERFCTR) when calibrating the TSC (Time Stamp Clock) during the boot process. This resulted, in a small percentage of cases, in the system defaulting to a busy PERFCTR and getting unreliable calibrations.
    A fix was implemented to correct this by ensuring the system checked for a free PERFCTR before defaulting (BZ#467782). This fix, however, cannot satisfy all possible contingencies as it is possible that all PERFCTRs will be busy when required for TSC calibration. Another patch has been included to initiate a kernel panic in the unlikely event (fewer than 1% of cases) that this scenario occurs. (BZ#472523).
1.110.10.7.3. PPC
Kernel updates for PowerPC architectures.
  • This kernel release includes various patches to update the spufs (Synergistic Processing Units file system) for Cell processors. (BZ#475620)
  • An issue was identified wherein /proc/cpuinfo would list logical PVR Power7 processor architecture as "unknown" when show_cpuinfo() was run. This update adds a patch to have show_cpuinfo() identify Power7 architectures as Power6. (BZ#486649)
  • This update includes several patches that are required to add/improve MSI-X (Message Signaled Interrupts) support on machines using System P processors. (BZ#492580)
  • A patch has been added to this release to enable the functionality of the previously problematic power button on Cell Blades machines. (BZ#475658)
1.110.10.7.4. S390
Kernel updates for S390 architectures.
  • Utilizing Named Saved Segments (NSS), the z/VM hypervisior makes operating system code in shared real memory pages available to z/VM guest virtual machines. With this update, Multiple Red Hat Enterprise Linux guest operating systems on the z/VM can boot from the NSS and be run from a single copy of the Linux kernel in memory. (BZ#474646)
  • Device driver support has been added in this update for the new IBM System z PCI cryptography accelerators, utilizing the same interfaces as prior versions. (BZ#488496)
  • Control Program Identification (CPI) descriptive data is used to identify individual systems on the Hardware Management Console (HMC). With this update, CPI data can now be associated with a Red Hat Enterprise Linux instance. (BZ#475820)
  • Fibre Channel Protocol (FCP) performance data can now be measured on Red Hat Enterprise Linux instances on the IBM System z platform. (BZ#475334). Metrics that are collected and reported n include:
    • Performance relevant data on stack components such as Linux devices, Small Computer System Interface (SCSI) Logical Unit Numbers (LUNs) and Host Bus Adapter (HBA) storage controller information.
    • Per stack component: current values of relevant measurements as throughput, utilization and other applicable measurements.
    • Statistical aggregations (minimum, maximum, averages and histogram) of data associated with I/O requests including size, latency per component and totals.
  • Support has been added to the kernel to issue EMC Symmetrix Control I/O. This update provides the ability to manage EMC Symmetrix storage arrays with Red Hat Enterprise Linux on the IBM System z platform. (BZ#461288)
  • Hardware that supports the configuration topology facility passes the system CPU topology information to the scheduler, allowing it to make load balancing decisions. On machines where I/O interrupts are unevenly distributed, CPUs that are grouped together and get more I/O interrupts than others will tend to have a higher average load, creating performance issues in some cases.
    Previously, CPU topology support was enabled by default. With this update, CPU topology support is disabled by default, and the kernel parameter "topology=on" has been added to allow this feature to be enabled.(BZ#475797)
  • This update provides new kernel code to implement a client and server for a TTY (teletype) terminal server under z/VM using IUCV (Inter-User Communications Vehicle) as communication vehicle. Also, as part of this update, the hvc_console has been upgraded. (BZ#475551)
  • This update includes functionality that allows users to add new kernel options using the IPL command without modifying the content of the CMS parmfile. The entire boot command line can be replaced with the VM parameter string and new Linux Named Saved Systems (NSS) can also be created on the CP/CMS command line. (BZ#475530)
  • Crypto Device Driver use of Thin Interrupts (BZ#474700)
  • This update adds a patch to configure shared kernel support via the CONFIG_SHARED_KERNEL parameter. (BZ#506947)
1.110.10.8. Miscellaneous Driver Updates
Details about driver updates.
  • This release adds the final branding strings and the latest EagleLake graphics to the graphics driver (predominantly for the G41 chipset). (BZ#474513)
  • This release updates the ALSA HDA audio driver to enable or improve support for new chipsets and HDA audio codecs. (BZ#483594)
  • This update adds a new EDAC driver for Intel® 5000x and 5400 MCH processors. (BZ#462895)
  • This release includes an updated version of the SMBUS (System Management Bus) driver that adds support for the AMD SB800 series of products and improves handling of SB400, SB600 and SB700 products. (BZ#488746)
  • A new PCI ID has been added to this release to enable support for the Broadcom® HT1100 chipset. (BZ#474240)
  • This kernel release incorporates a series of updates that add support for Chelsio® Communications' Terminator 3 Ethernet adapters. These changes include support for XRC queues and updates of the cxgb3, iw_nes NES iWARP, mthca and qlgc_vnic drivers, the rdma headers and SDP and SRP protocols to the OpenFabrics Enterprise Distribution (OFED) 1.4.1 versions. (BZ#476301)
  • Support has been added for Mellanox ConnectX based 10GigE Ethernet cards. This support required updates of the mlx4, mlx4_ib and mlx4_core drivers as well as the inclusion of the hybrid mlx4_en driver. (BZ#477065 and BZ#456525)
  • Problems with connectivity (using eHCA adapters) and various scripting issues have been rectified with updates to eHCA and IPoIB drivers in this release. (BZ#466086)
  • Infiniband driver updates, incorporated with the OFED 1.4.1 release upgrade, have rectified kernel panic issues encountered when removing ib_ipath module while running HXT HCAs (BZ#230035). This upgrade also resolved failed RDMA latencytest and perftest processes run with QLogic IB. (BZ#480696)
  • This update includes a patch that corrects a network port ordering problem encountered on systems using HP ProLiant or xw460c blade processors. (BZ#490068)
  • A comprehensive series of patches have been included in this update to add and/or improve virtualization features. A complete list (including explanatory notes) can be found at BZ#493152.
  • Several bugfixes and updates available for HP's Integrated Lights-Out (hpilo) product have been ported into this kernel release. A complete list can be found here; BZ#488964.
  • PCI device drivers enable devices using pci_enable(), which enables regions probed by the device's Base Address Register (BAR). On larger servers I/O port resources may not be assigned to all the PCI devices due to coded limitations and base register fragmentation. This update adds, removes and refines multiple functions so as to improve resource allocation around free I/O ports. (BZ#442007)
  • Three new patches have been added to this kernel to improve the passing of PCI devices between a virtual machine and its host. These patches first bind the device in question to a dummy driver (pcistub.ko) to prevent the host machine using it. Then, once the guest is finished with the device, drivers_probe prompts the kernel to re-load the true driver for that device and remove_id removes the relevant entry from the dynamic ID list. These new features operate successfully in both KVM and Xen virtualization environments. (BZ#491842)
  • An updated driver for the Davicom DM9601 Ethernet Adaptor has been included in this release. The new driver corrects previous unreliability using this device and other devices using the same chipset. (BZ#471800)
  • This kernel release includes a patch to improve Huawei EC121 USB 3G modem support. (BZ#485182)
  • The driver for Apple Intel® hardware configurations (efifb) has been updated, providing various performance improvements when running this release on these machines. (BZ#488820)
1.110.10.9. Network Driver Updates
Updates to Network-related drivers:
  • This update adds a feature to support bonding over IPoIB interfaces. A new ib-bond package has been added to the kernel to allow multiple link HA and improve load balancing and aggregation performance. (BZ#430758)
  • Two new drivers (cnic and bnx2i) have been added to the kernel to introduce iSCSI support for Broadcom® BNX2 and BNX2x Network Interface Cards (NICs). (BZ#441979)
  • A new device driver igbvf) for SR/IOV enabled Intel® NICs has been added to this kernel release. This driver provides a significant performance improvement for virtualization using SR/IOV cards.(BZ#480524)
  • Generic Receive Offload (GRO) support has been implemented in this update, both. The GRO system increases the performance of inbound network connections by reducing the amount of processing done by the Central Processing Unit (CPU). GRO implements the same technique as the Large Receive Offload (LRO) system, but can be applied to a wider range of transport layer protocols. GRO support has also been added to a several network device drivers, including the igb driver for Intel® Gigabit Ethernet Adapters and the ixgbe driver for Intel® 10 Gigabit PCI Express network devices. (BZ#499347)
  • The cxgb3 driver, which supports the Chelsio® 10Gb RNIC adapter, has been updated in order to enable iSCSI TOE support. (BZ#439518)
  • This kernel updates the enic Cisco® 10Gi Ethernet driver to version 1.0.0.933. (BZ#484824)
  • This kernel updates the Atheros® ath5k driver. This upgrade resolves a problem encountered by Atheros® users wherein the kernel reported an inability to wake up the MAC chip. Setting the call to ath5k_set_pcie() to execute earlier in the initialization process corrects this issue. (BZ#479049)
  • Support for the Crystal Beach 3 I/O AT (Acceleration Technology) device has been included in this kernel update. (BZ#436039, BZ#436048)
  • This update upgrades the bnx2 driver for Broadcom® network devices. The update fixes multiple performance issues, including a kernel panic occurrence (when attempting to unload the driver while in use) and a non-responsiveness issue (caused by call-traces initiated by network certification processes). (BZ#475567, BZ#476897, BZ#489519)
  • This release updates the Broadcom® bnx2x driver to version 1.48.105. (BZ#475481)
  • The igb driver has been updated to correct a stability issue (when encountered when setting the mtu parameter to less than 1K) and improve support for Intel® 82576 based devices. (BZ#484102, BZ#474881)
  • In this update the bonding driver has been updated to the latest upstream version. This update, however has introduced symbol/ipv6 module dependency capabilities. Therefore, if bonding has been previously disabled (by inserting the install ipv6 /bin/false line in the /etc/modprobe.conf file) this upgrade to the bonding driver will result in the bonding kernel module failing to load. The install ipv6 /bin/false line needs to be replaced with install ipv6 disable=1 for the module to load properly. (BZ#462632)
  • The ixgbe driver has been updated to version 2.0.8-k2 and support the 82599 (Niantic) device has been added. (BZ#472547)
  • System freezes encountered when performing multiple remote copy programs to a system using the Nvidia® nForce chipset has been corrected by updating the forcedeth driver to version 0.62. (BZ#479740)
  • The sky2 Ethernet driver has been updated to support the Marvell® 88E8070 NIC. (BZ#484712)
  • The tg3 driver has been updated to version 3.96. This update corrects problems with sluggish performance (on systems with BCM5704 NICs) and adds full support for Broadcom® 5785 NICs. (BZ#481715 BZ#469772)
1.110.10.10. Storage Driver Updates
Driver updates for Storage devices
  • The SCSI tape driver (st) has been enhanced with support for the Suppress Incorrect Length Indicator (SILI) bit in variable block mode. If SILI is set, reading a block shorter than the byte count does not result in CHECK CONDITION. The length of the block is determined using the residual count from the HBA. Avoiding the REQUEST SENSE command for every block speeds up some applications considerably. The SILI bit is set to off by default. It must only be set this if the tape drive supports SILI and the HBA correctly returns transfer residuals.

    Note

    The current version of the mt-st management utility does not have a keyword for the SILI bit. It must be set explicitly with:
    	mt -f /dev/nst0 stsetoptions 0x4000
    
  • The bnx2 driver now supports iSCSI. The bnx2i driver will access the bnx2 driver through the cnic module to provide iSCSI offload support. (BZ#441979 and BZ#441979)

    Note

    The bnx2i version included in this release does not support IPv6.
  • The md driver has been updated to provide support for bitmap merging. This feature eliminates the need for full resync when performing data replication. (BZ#481226)
  • The scsi driver now includes the upstream scsi_dh_alua module. This adds explicit asymmetric logical unit access (ALUA) support with this release. To utilize the scsi_dh_alua module when using dm-multipath, specify alua as the hardware_handler type in multipah.conf. (BZ#482737)

    Note

    For EMC Clariion devices, using only scsi_dh_alua or dm-emc alone is supported. Using both scsi_dh_alua and dm-emc is not supported.
  • A bug in the retry logic of the scsi driver is now fixed. This bug made it possible for some failovers to execute properly in multipathed environments.(BZ#489582)
  • The rdac_dev_list structure now includes md3000 and md3000i entries. This allows users to benefit from the advantages provided by the iscsi_dh_rdac module. (BZ#487293)
  • This release includes the new mpt2sas driver. This driver supports the SAS-2 family of adapters from LSI Logic. SAS-2 increases the maximum data transfer rate from 3Gb/s to 6Gb/s.
    The mpt2sas driver is located in the drivers/scsi/mpt2sas directory, as opposed to the older mpt drivers that are located in drivers/message/fusion directory. (BZ#475665)
  • The aacraid driver has now been updated to version 1.1.5-2461. This update applies several upstream fixes for bugs affecting queued scans, controller boot problems, and other issues. (BZ#475559)
  • The aic7xxx driver now features an increased maximum I/O size. This allows supported devices (such as SCSI tape devices) to perform writes with larger buffers. (BZ#493448)
  • The cciss driver has been updated to apply upstream fixes for bugs affecting memory BAR discovery, the rebuild_lun_table and the MSA2012 scan thread. This update also applies several configuration changes to cciss. (BZ#474392)
  • The fnic driver has been updated to version 1.0.0.1039. This applies several upstream bug fixes, updates the libfc and fcoe modules, and adds a new module parameter that controls debug logging at runtime. (BZ#484438)
  • The ipr driver now supports MSI-X interrupts. (BZ#475717)
  • A bug that caused iSCSI iBFT installations to panic during disk formatting is now fixed. (BZ#436791). Also, a bug in the iscsi_r2t_rsp struct that caused kernel panics during iSCSI failovers in some multipathed environments is now fixed. (BZ#484455)
  • The lpfc driver has been updated to version 8.2.0.48. This enables hardware support for upcoming OEM programs. (BZ#476738 and BZ#509010)
  • The MPT fusion driver is now updated to version 3.04.07rh v2. This applies several bug fixes.(BZ#475455)
  • The megaraid_sas driver is now updated to version 4.08-RH1. This update applies the following upstream enhancements and fixes (among others):(BZ#475574)
    • This update adds a polling mode to the driver.
    • A bug affecting supported tape drives is now fixed. With this release, the pthru timeout value is now set to the O/S layer timeout value for commands sent to tape drives.
  • The mvsas driver is now updated to version 0.5.4. This applies several fixes and enhancements from upstream, and adds support for Marvell RAID bus controllers MV64460, MV64461, and MV64462. (BZ#485126)
  • The qla2xxx driver has been updated to version 8.03.00.10.05.04-k, and now supports Fibre Channel over Convergence Enhanced Ethernet adapters. With this release, qla2xxx also applies several bug fixes from upstream, including: (BZ#471900, BZ#480204, BZ#495092, BZ#495094 and BZ#496126)
    • Discrepancies detected during OVERRUN handling on 4GB and 8GB adapters are now corrected.
    • All vports are now alerted of any asynchronous events.
    • A bug that caused kernel panics with the QLogic 2472 card is now fixed.
    • The stop_firmware command is no longer retried if the first attempt results in a times out.
    • The sector mask value is no longer based on the fixed optrom size.
    • A bug that caused frequent path failures during I/O on multipathed devices is now fixed. (BZ#244967)
    • The driver source code is now kABI-compliant.
    • dcbx pointers are now set to NULL after freeing memory.
  • The qla4xxx driver now features improved driver fault recovery. This update fixes a bug in the driver that prevented adapter recovery if there were outstanding commands detected on the host adapter. (BZ#497478)
1.110.10.11. Miscellaneous Updates
  • This update removes the kfree function from kret_probelock's scope so as to avoid a deadlock that could occur if kretprobe_flush_task() probes the kfree function while holding kretprobe_lock spinlock. In addition, the kprobe functionality has been disallowed on the atomic_notifier_call_chain function to avoid numerous recursive faults occurring when it is called by kprobe after a re-entry. (BZ#210555)
  • PCI devices would disappear in Xen Paravirtual guest system upon reboot or reset. This was identified as a problem with information about PCI devices being removed from xenstore before xend was able to create a configuration for the rebooted domain. Code has been amended in xenbus.c to correct this behavior. (BZ#233801)
  • A kernel crash occurred when a Xen user specified the mem= (or highmem=) command via the command line on either the host or guest systems. This was caused by the array allocated to the p2m table being too small which resulted in a page fault during the subsequent memcpy(). This update decreases the memory reservation and only copies the appropriate number of entries into the p2m table.(BZ#240429)
  • RAID 0, RAID 1, RAID 10 and RAID 5 configurations have previously set q->merge_bvec_fn (a function that asks a device driver if the next vector entry will fit into a bio constructed by a process) in a way that rejects bios crossing its stripe. A device mapper will accept a bio that has two or more vector entries and a size equal to or less than a page that crosses a stripe boundary, but the underlying RAID device will not.
    This update configures the device mapper to set a one-page maximum request size and set its own q->merge_bvec_fn to reject any bios with multiple vector entries that span more pages. This fix precludes the generation of bios that will be rejected by a q->merge_bvec_fn controlled by RAID 0, 1, 10 or 5. BZ#223947)
  • This update includes numerous patches to enable Gigabyte pagetable support. (BZ#251982).
    • 0002-hugetlb-multiple-hstates-for-multiple-page-sizes.patch
    • 0003-hugetlbfs-per-mount-huge-page-sizes.patch
    • 0004-hugetlb-new-sysfs-interface.patch
    • 0005-hugetlb-abstract-numa-round-robin-selection.patch
    • 0006-mm-introduce-non-panic-alloc_bootmem.patch
    • 0007-mm-export-prep_compound_page-to-mm.patch
    • 0008-hugetlb-support-larger-than-MAX_ORDER.patch
    • 0009-hugetlb-support-boot-allocate-different-sizes.patch
    • 0010-hugetlb-printk-cleanup.patch
    • 0011-hugetlb-introduce-pud_huge.patch
    • 0012-x86-support-GB-hugepages-on-64-bit.patch
    • 0013-x86-add-hugepagesz-option-on-64-bit.patch
    • 0014-hugetlb-override-default-huge-page-size.patch
  • DCA (Direct Cache Access) is a method for warming the cache in the CPU. As part of Intel®'s I/OAT technology, it minimizes performance-limiting bottlenecks. This release updates the kernel I/O AT code and includes support for DCA for Intel®'s 82572 Gigabit Ethernet adapter family (BZ#252949)
  • The early GFS2 (Global File System) versions contained two system processes, gfs2_glockd and gfs2_scand which were responsible for scanning the in-core glock structures and freeing them if they were unused.
    In this release these processes have been replaced by a shrinker which frees glocks based on cues from the VM system. This results in a better use of memory and better response to low memory conditions (reducing the likelihood of "out of memory" issues). As a side effect, this update reduces the processing load produced by GFS2 under certain workloads. (BZ#273001)
  • In order to enable new features (as discussed in Bugzillas #252949 and #436048) I/O AT (Advanced Technology) code has been updated and problems with kABI breakages have been corrected. (BZ#273441)
  • This update corrects code that produced bad mpa messages on the restoration or migration of para-virtualized guest system. (BZ#288511)
  • Problems caused by Message Signaled Interrupts on Hyper-Transport based machines using (some) Nvidia cards have been resolved by porting an upstream driver. (BZ#290701)
  • Some versions of pSeries firmware fail to set up a dma-window property for PCI slots that are unoccupied. As a result, the loop searching for this propery, in iommu_dev_setup_pSeriesLP(), can run to the end, resulting in a NULL pointer dereference later in the routine. This patch prevents the crash and prints a warning message. (BZ#393241)
  • The existing 10 second delay waiting for frontend devices to connect was found to be insufficient under some load conditions. This update increases timeout for device connection on boot to 30 seconds. (BZ#396621)
  • In previous kernels the tuntap device send path did not have any packet accounting. This meant that the user-space sender could pin down arbitrary amounts of kernel memory by continuing to send data to an end-point that was congested. This update adds packet accounting to the tun driver so that virtio-net gets congestion feedback which is necessary to prevent packet loss for protocols lacking congestion control (such as UDP) when used in a guest. (BZ#495863)
  • This update adds the virtualization feature VT-d. This feature provides hardware support for directly assigning physical devices to Xen fully virtualized (HVM) guests or KVM guests. The principal benefit of the feature is to improve device access performance to be close to native speeds. Please refer to the Red Hat Knowledgebase before using PCI device assignment with this technology to avoid possible system instability issues. (BZ#500901)
    VT-d support is disabled by default. To enable VT-d one must add intel_iommu=on to the kernel commandline. Enabling VT-d is required to assign a host's PCI device to a KVM guest. (BZ#504363)
    Additionally, only the assignment of NIC devices from host to guest is supported. Assigning a block device (hard disk) to a guest is not supported. On hardware platforms that support IOMMU passthrough it is recommended to also use the iommu=pt kernel commandline option as this will improve the performance of I/O devices in the host. This parameter has no effect on performance for devices assigned to guests.
    When the iommu=pt mode, if a device is assigned to (and then de-assigned from) a guest, it can no longer be used in the host until the host has been rebooted. PCI hotplug devices can not be used in iommu=pt mode
  • This update includes a fix for kernel panic encountered when attempting to run a kdump process on hardware virtual machine (HVM) in an ia64 architecture environment. (BZ#418591)
  • This update corrects softlockup issues encountered when booting earlier kernel versions in a virtual environment and setting the clocksource to read from the system's Programmable Interval Timer (PIT). (BZ#427588)
  • A problem identified with Xen kernels manifested with meminfo reporting an incorrect LowTotal of 4Tb. A patch applied to the driver alters how highmem pages are handled and corrects the error. (BZ#428892)
  • When users set LPFC HBA storage to reset in a loop the system would attempt to rediscover SCSI devices and some of these processes would time-out. The issue was found to be code paths deleting SCSI devices without setting the device state to SDEV_DEL. A patch included in this update corrects this behavior(BZ#430170)
  • The Xen kernel does not currently support the suspend functionality. A fix has been applied to this release to remove the "Suspend" option from graphical user interface menus. (BZ#430928)
  • This update fixes a race condition when queuing incoming iucv messages by spreading the message queue spinlock in the message_pending callback across the entire callback function.This resolves the race condition and enhances system stability. (BZ#499626)
  • This feature fixes hexdump data in s390dbf traces, allowing Red Hat Enterprise Linux to have complete registered state change notification (RSCN) traces (up to 1024 bytes). (BZ#470618)
  • This update adds support for the connlimit module to limit to the number of TCP connections accepted by specific ports. This feature reduces the risk of incidental DoS scenarios.(BZ#483588)
  • This update modifies the DASDFMT (Direct Access Storage Device ForMaT) command to operate in the same way as similar IBM tools (such as CPFMTXA for zLinux/VM and ICKDSF for MVS).. (BZ#484836)
  • This feature includes stability enhancements to the CPU hotplug kernel module. (BZ#485412)
  • When using previous x86_64 Xen kernels installed on Promise internal RAID disk the SuperTrak EX (stex) inbox-driver would fail, causing a kernel panic and failure to load. The cause was found to be the allocation of contiguous memory space. Relevant code sections have been rewritten to lower the amount of memory demanded by the driver (Note: This reduces the RAID Migration feature set). (BZ#486466)

    Note

    Lowering memory demands reduces the RAID Migration feature set.
  • Infiniband driver updates, incorporated with the OFED 1.4.1 release upgrade, have rectified poor TCP transer rate performance when running Infiniband IPoIB in heterogeneous environments (that is, between Intel 32bit to PPC64bit or similar). (BZ#434779)
  • This update adds support for machines using Intel®'s Calpella chipset. (BZ#438469)
  • This update includes a patch to fix an interrupt storm (several thousand interrupts) encountered after boot with CD/DVD drive connected to IDE of Enterprise South Bridge 2 (ESB2). (BZ#438979)
  • Pre-release testing has assessed the ipr and iprutil drivers as supporting the SAS paddle card on pBlade extensions. (BZ#439566)
  • An upstream change to the e1000 and bnx2 driver removed the functionality to generate entropy, causing applications requesting random data from /dev/random to hang or produce an error message. This update reintroduces the functionality. (BZ#439898)
  • Problems with ioctl SG_IO calls to tape devices failing have been resolved with an upstream patch that address this and numerous other iscsi module issues. (BZ#440411)
  • An update in this release changes page locking code to avoid a deadlock between mmap/munmap and journaling (ext3). (BZ#445433)
  • This kernel release includes a bug to correct a crash encountered when attempting to format a DVD in a system booted to run libata and ata-piix IDE accelerators. (BZ#446086)
  • This update includes a fix to prevent para-virtualized guest systems crashing when run in a host machine with 64G RAM or more. (BZ#448115)
  • Patches from the upstream kernel that improve gettimeofday performance on hypervisors have been incorporated in this release. With these changes serialization for gettimeofday is switched from CPUID to MFENCE/LFENCE. (BZ#448588)
  • A bug that initiated a system reboot after a kernel panic despite /proc/sys/kernel/panic being set to -1 (which should prevent a reboot) has been fixed in this update. (BZ#446120)
  • Previous kernels were found to contain a bug that saw the E1000 driver enable TSOv6 functionality for hardware that doesn't support it. A patch included in this update corrects this behavior.(BZ#449175)
  • When booting fully virtualized guests on on earlier 32-bit kernel hosts, it was found that guest systems with more than one virtual cpu could pause or even hang at the "starting udev" portion of the boot sequence. This bug was caused by one VCPU of an HVM guest missing timer ticks and Xen not re-delivering those missed ticks. This behavior caused a clock skew between VCPUs inside an HVM guest. These issues have been resolved with the backport of the AIO disk handling code and upstream Xen 'no missed-tick accounting' timer code. (BZ#449346)
  • This update changes code that allowed scsi_add_host() to return a success even if the relevant work_q was not created. (BZ#450862)
  • A bug in previous kernels allowed a ptrace process (ptrace(PTRACE_CONT, application_pid, 0, SIGUSR1) to terminate the specified application even if the SIGUSR1 flag was blocked (which is sufficient to prevent a kill command from acting on the application). ptrace_induce_signal() is now used to set the blocked signal to pending, to be raised and executed only when the signal mask is cleared. (Bugzilla #451849)
  • This update enables raw device support for IBM System z platforms. (Bugzilla #452534)
  • This release updates the ext3 filesystem code to prevent kernel panic in dx_probe. (Bugzilla #454942)
  • This kernel update removes the linux-2.6-ipmi-legacy-ioport-setup-changes.patch which was causing keyboard lockups (on IBM p-series, 7028 and 7029 models) during the installation process. (Bugzilla #455232)
  • Messages being reported by zfcp testing processes have been removed from the message log in this kernel release. The tests in question were run when the local link was removed during heavy I/O loads, prompting zfcp to test remote ports. There is no need to include these details the message log as the tests cannot be influenced by a user and all relevant information is available using zfcp traces.(BZ#455260)
  • This update removes the inclusion of the "Breaking affinity for irq XX" message in dmesg output. This message, reported when an XM migrate was performed, is not necessary and could negatively impact a user if observed in dmesg output. (BZ#456095)
  • A patch has been included in this release to fix ACPI error flooding encountered when waking a Lenovo Thinkpad T61 (running the x86 kernel) from a suspended state. (BZ#456302)
  • This release corrects how the powernow driver in the xen-kernel identifies the number of processors in guest systems. The original driver counted the number of processor cores in the machine causing it to identify dual-core processors as two distinct CPUs and return an incorrect processor count. (BZ#456437)
1.110.10.12. Further Updates
  • Global File System 2 feature request improves performance of page_mkwrite(). (BZ#315191)
  • A problem returning "Operation not supported" messages when setting an ACL from an NFSv4 system has been resolved. (BZ#403021)
  • Fixes have been included in this release that prevent a kernel panic encountered when kprobes attempted boosting on exception addresses in x86_32 kernels. (BZ#493088)
  • Various fixes and updates have been applied to the Xen Credit Scheduler and Xen Latency processes. (BZ#432700)
  • An error encountered when attempting an online resize of an ext3 filesystem using resize2fs is being investigated. The error returns "Invalid argument While trying to add group #15625" and can be avoided by doing resizes offline.(BZ#443541)
  • This release included updated kernel code that resolves NFS connectathon test #12.1 problems. Processes are now called in a different scheduling order which avoids a race conflict. (BZ#448929)
  • The CPUID driver has been updated to support cpuid.4 and cpuid.0xb instruments. (Bugzilla #454981)
  • This release contains an update to the copy_user code which fixes problems encountered when running LTP read02 tests. (BZ#456682)
  • Kernel code has been updated to fix an error in compiling a custom kernel that includes the snd-sb16.ko module. (BZ#456698)
  • Various patches have been implemented in this release to resolve an issue with calltrace outputs showing on-screen during the shutdown of a Para-Virtualized domain. These outputs no longer appear during shutdown.(BZ#456893)
  • An update in this release resolves system stalls that occurred when attempting to execute a kdump using the NMI key-combination. (BZ#456934)
  • A patch has been applied to this kernel to prevent soft lockups occasionally encountered during boot on RX600S4 server systems. (BZ#456938)
  • After booting from the HMC (load from file), it is now possible to reboot from an alternate device. (BZ#458115)

1.111.  kexec-tools

1.111.1.  RHBA-2009:0467: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0467
An updated kexec-tools package that fixes a bug is now available.
kexec-tools provides /sbin/kexec binary that allows a new kernel to boot using the kernel's kexec feature either on a normal or panic reboot. This package also contains the ancillary utilities that together form the user-space component of the kernel's kexec feature.
This updated kexec-tools package fixes the following bug:
  • when kdump required mounting a file system which had reached its maximum mount count, fsck, the file system repair utility, was run automatically. However, because fsck was run in interactive mode by default, when it encountered a file system error the dump process paused until the user intervened. This prevented successful capture of the dump and subsequent system reboot. With this update, fsck is run in non-interactive mode, which allows the dump to complete successfully.
All users of kexec-tools are advised to upgrade to this updated package, which resolves this issue.

1.111.2.  RHBA-2009:0048: bug fix update

Note

This update has already been released (prior to the GA of this release) as errata RHBA-2009:0048
An updated kexec-tools package that fixes a bug is now available
kexec-tools provides /sbin/kexec binary that facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. This package contains the /sbin/kexec binary and ancillary utilities that together form the userspace component of the kernel's kexec feature.
This updated package provides a fix for the following bug:
  • Kernels booted under the kexec system failed to map regions in the system E820 map which were marked as reserved. As some hardware vendors use these regions for various configuration data, some systems experienced various failures during boot up. This update enables the mapping of all regions marked as reserved in the system E820 map and therefore allows these systems to boot correctly.
Users of kexec-tools should upgrade to this updated package, which resolves this issue.

1.111.3.  RHBA-2009:1258: bug fix and enhancement update

An updated kexec-tools package that fixes various bugs and adds enhancements is now available.
kexec-tools provides the /sbin/kexec binary that facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. This package contains the /sbin/kexec binary and ancillary utilities that together form the userspace component of the kernel's kexec feature.
Bugs fixed in and enhancements added to this updated package include:
  • the addition of reserved memory regions in kdump to improve booting on various systems. (BZ#475843)
  • various other system-specific boot aids. (BZ#473730 , BZ#494782 and BZ#277531)
  • a fix to handle network config files that are lacking an ending newline. (BZ#476063)
  • improved the ability to detect md arrays. (BZ#479211 and BZ#490818)
  • fixed some bad status messages when using the ssh dump target. (BZ#466450)
  • fixed an issue in which sata_nv was not included in the initramfs. (BZ#476368)
  • enhanced our dump filtering with the ability to dump dmesg logs. (BZ#475414)
  • added a condrestart directive to the service initscript. (BZ#494483)
  • updated the initramfs for kdump to use hostnames instead of ip addresses. (BZ#493690)
  • cleaned up a few erroneous error messages. (BZ#496965 , BZ#506652  and BZ#509947)
  • improved kdump documentation. (BZ#494473)
  • fixed a bug in which kdump tried to unmount an un-mounted file system. (BZ#495601)
  • improved kdump so that fsck operations were n