Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2010:0147-1
Type: Security Advisory
Severity: Important
Issued on: 2010-03-16
Last updated on: 2010-03-16
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.4.z server)
CVEs (cve.mitre.org): CVE-2009-4308
CVE-2010-0003
CVE-2010-0007
CVE-2010-0008
CVE-2010-0415
CVE-2010-0437

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* a NULL pointer dereference flaw was found in the sctp_rcv_ootb() function
in the Linux kernel Stream Control Transmission Protocol (SCTP)
implementation. A remote attacker could send a specially-crafted SCTP
packet to a target system, resulting in a denial of service.
(CVE-2010-0008, Important)

* a missing boundary check was found in the do_move_pages() function in
the memory migration functionality in the Linux kernel. A local user could
use this flaw to cause a local denial of service or an information leak.
(CVE-2010-0415, Important)

* a NULL pointer dereference flaw was found in the ip6_dst_lookup_tail()
function in the Linux kernel. An attacker on the local network could
trigger this flaw by sending IPv6 traffic to a target system, leading to a
system crash (kernel OOPS) if dst->neighbour is NULL on the target system
when receiving an IPv6 packet. (CVE-2010-0437, Important)

* a NULL pointer dereference flaw was found in the ext4 file system code in
the Linux kernel. A local attacker could use this flaw to trigger a local
denial of service by mounting a specially-crafted, journal-less ext4 file
system, if that file system forced an EROFS error. (CVE-2009-4308,
Moderate)

* an information leak was found in the print_fatal_signal() implementation
in the Linux kernel. When "/proc/sys/kernel/print-fatal-signals" is set to
1 (the default value is 0), memory that is reachable by the kernel could be
leaked to user-space. This issue could also result in a system crash. Note
that this flaw only affected the i386 architecture. (CVE-2010-0003,
Moderate)

* missing capability checks were found in the ebtables implementation, used
for creating an Ethernet bridge firewall. This could allow a local,
unprivileged user to bypass intended capability restrictions and modify
ebtables rules. (CVE-2010-0007, Low)

Bug fixes:

* a bug prevented Wake on LAN (WoL) being enabled on certain Intel
hardware. (BZ#543449)

* a race issue in the Journaling Block Device. (BZ#553132)

* programs compiled on x86, and that also call sched_rr_get_interval(),
were silently corrupted when run on 64-bit systems. (BZ#557684)

* the RHSA-2010:0019 update introduced a regression, preventing WoL from
working for network devices using the e1000e driver. (BZ#559335)

* adding a bonding interface in mode balance-alb to a bridge was not
functional. (BZ#560588)

* some KVM (Kernel-based Virtual Machine) guests experienced slow
performance (and possibly a crash) after suspend/resume. (BZ#560640)

* on some systems, VF cannot be enabled in dom0. (BZ#560665)

* on systems with certain network cards, a system crash occurred after
enabling GRO. (BZ#561417)

* for x86 KVM guests with pvclock enabled, the boot clocks were registered
twice, possibly causing KVM to write data to a random memory area during
the guest's life. (BZ#561454)

* serious performance degradation for 32-bit applications, that map (mmap)
thousands of small files, when run on a 64-bit system. (BZ#562746)

* improved kexec/kdump handling. Previously, on some systems under heavy
load, kexec/kdump was not functional. (BZ#562772)

* dom0 was unable to boot when using the Xen hypervisor on a system with a
large number of logical CPUs. (BZ#562777)

* a fix for a bug that could potentially cause file system corruption.
(BZ#564281)

* a bug caused infrequent cluster issues for users of GFS2. (BZ#564288)

* gfs2_delete_inode failed on read-only file systems. (BZ#564290)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-164.15.1.el5.src.rpm
File outdated by:  RHBA-2011:0956
    MD5: 527bef9c605d21d49acff623eb4e99ff
SHA-256: c97c1cff09219ca5d53322481ee819344fcea7efafe9e97616f06c77039189b5
 
IA-32:
kernel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2d2a5e650ef8e75282cd0885f04f3d2c
SHA-256: 2ff3581d16e35dcf8ff843e0cc3d48e1975e0e5527ecd3af10e45f7851952385
kernel-PAE-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 35e4d18f3d00149c11b520e61c5a4023
SHA-256: f1a12fa2c7bf92432c55fd144198fac47048cc4a01b9e218aaf37f7bc3c1210f
kernel-PAE-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ed83544cba57eb20c8aa5bd2223c2057
SHA-256: d00d5ee589e9af23ee3c2c1af34fe22914b71970053638c335fb037f8802bbe0
kernel-debug-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: db57e9aa2947e4b6def12f11583da453
SHA-256: 41592042f52d39d2dd327ba36d5fd6006ffd0ef66c3bae91158a7d9099c16f62
kernel-debug-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8585dc9741af3adc387879a5a8137972
SHA-256: b152d86167ad729e88af188087778e8c8484f85b7fd878ff212bbbe16103195f
kernel-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 54e6c7d438635b08c626775308d328b0
SHA-256: d8b9bf4112d0d420f9700241415a35f4a7d3081f0062bf3be80f17ac6cb6152c
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7dcbd62e038ab0140040a807a3c3c249
SHA-256: e77d4d430e263c8bc1fe75fc3a121b8710848cf8e20f421fb1012495a8637262
kernel-xen-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b3eb0d2e223bc81726767740eb76541d
SHA-256: 47e168f6507a15b1a83b72ddefdf681c3a683e9739b341bc29e400342fbb2830
kernel-xen-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5afbc0ad9e9a0fe446a4b75c276497ad
SHA-256: f36fb7402c9812a70c9d581b33c7d12faeffabbee8f05e8c5d3cfa1d46e18a62
 
IA-64:
kernel-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d2cc4795c7db16921869ebc457a3080
SHA-256: 6a9960add33a6a572e63f5b6afe1ae88bb18255cb3b6d27f23d54cd913cea33a
kernel-debug-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 480e102f3dcf202dd4ce583460a9551b
SHA-256: 5a5df20b7ba9182522fc6f2bd95deb4f23107f1d53695bbe26141aa539462f0f
kernel-debug-devel-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c19d5b759e5fa53ad24de0dcd8c1917d
SHA-256: 2332f298c7ed115e42d790aa0da74e3964ae8179331b0059ded0dae662174c04
kernel-devel-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5fbe3d4a4da28f4c297f4d332f179ff7
SHA-256: c55fd2ea16474f52db122215f62336b1acb45947c4167827c953ee4ee86dedff
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 491654a2db74753e430c752d70e4121e
SHA-256: cb5ec3d3071eb3784918a821a74120df1bd4e399c8d5b707bf3498d9125fe685
kernel-xen-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: fb9252d556aafd66b079b880603c82e5
SHA-256: 79cea7e4da509a9c3a313d0583c89e5975184c5997e5b2829aae428f0a9787ef
kernel-xen-devel-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b240bcde37f6a463d3005a6965db8463
SHA-256: ac8e33ee8c9fcca4d4fd33db109fb05d09c56772d80eaea6350e4fcb55c203f8
 
PPC:
kernel-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3f8d89a7e135bfdc3ca2cd2962f17179
SHA-256: 6b5f2a54eba3b24fbb3bc5f248271c12d4f9d45cd517d6322e9776e9a9164696
kernel-debug-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 75081ca5be42790970dc03c6b90ea7b7
SHA-256: 8f26143afd2c79c042be74413d936af000a3b3cbacb19ee09efbdc0e378cd9ee
kernel-debug-devel-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 616e16c14e73fae0ad272d3e0a2b75c4
SHA-256: 4ccb59f6a63d8beb6c9dd05ad5d7a10cc20aa8a31806de2356ba4843bba33213
kernel-devel-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 918b5c4cec8a011924b46fdc4225258c
SHA-256: fdc26be94ba2423f7e16c73ace8e75c660d49d2d9ccc6f4682966ae255f2170e
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 679ce3806875a1246f37ccc619516a31
SHA-256: c00732077893ec3af7025f7d3ed47aa41b050b9b23608737eca4b54d687b32d7
kernel-headers-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 864f96f5237c96373da2bf6f9cb5b578
SHA-256: dc3b3c1b0d2b8206fad48d19f5f82a0414005e8dfdf66608cd476bc4e05eeef6
kernel-kdump-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: be8d663ddc63592c97944f52070deb79
SHA-256: e140dedd4cdfc3b3e15c91f332dd74f7b8f2d72394ffec8d8d4afe1d38ce2d47
kernel-kdump-devel-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8cf52bf820748f3d2001a69171bf01c5
SHA-256: 9ae49a9863cc4d3980977e48c1654ff18dd373b17a75038b1270452c0b36c59e
 
s390x:
kernel-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 604358f432865d83bad06f6147e0f74c
SHA-256: 65629ea5672a04486d6a48ba2b876ed309bfc812dfe11d812f8129f9fb95a575
kernel-debug-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3c7bb4640769c7159981317da4f4304e
SHA-256: c00dc8ba9475ae4a5627d45501abbbf2d8f094b820e08a80ad36ede8055a0a44
kernel-debug-devel-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 07c2e7602125cf0a1b2af580ce151182
SHA-256: 8892430503041979b66ea54a4b7148db9048e4e0d2653f7033c938dab3322a52
kernel-devel-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 44ef66efa459c9865fdd1c7aac67cc63
SHA-256: 31c1e841b603c38947a81adab07ce3f982f07ae907fcd0847048133cc3767535
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: f54b2aab4b479a480be4a8812b909b2b
SHA-256: 7f868ebbda1b229b3687ad0fe197c52627db89f15d77e07a478374aade905954
kernel-kdump-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 59de0b2a87012f788036010d04c34b4c
SHA-256: 292e26509358c1b5a672f6eaeef79b95b7c383840158aa87fa7742dedc47eb08
kernel-kdump-devel-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: c7a3b3407a88b607cba077d596df429d
SHA-256: 8683201d242de4c39fc5b9c32724f9e81f47399828ba83cbc65b8ca61f78606b
 
x86_64:
kernel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0e79b31629cc7a28e8907c21fadfa157
SHA-256: 2ea1a5d87c0b620b10c3a8c9d7a0cf770a5b028b1243ff8dbee6f00e8975f5c5
kernel-debug-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d6d8c22a7797201932b4c1cedcceba59
SHA-256: fd01bbeb208a1f4e59ea3ac6ad689b2a67cff01db1d632e566fa16887df034a6
kernel-debug-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 56c99d81415415cfb901f41264136a85
SHA-256: f75ea06e44665afe43fdbf6885862b23e6e87bb541abfea585cbd39b3ed7ffc0
kernel-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5bc95dbe0b21fe97a9e3d33eedfaca49
SHA-256: 541de9fddef48ce5112733aed162f0c288c6a54f26873a4ab41e178f108345a4
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 41d7ee05e57ce85e0b8b9cdb6425e722
SHA-256: 54ce501c24a9a021f3ea21637858c5f910a57d86cc41a3ffd2e614caa38c1107
kernel-xen-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 85ea6b7eff85ac3760469c7d5f096893
SHA-256: 40b92a200ab28ae4fb984bed2c5706a180df5f9f509e0e0ad8d7677112f80cf3
kernel-xen-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5dfa12b0d4feea49f195dd6fc25bbc4
SHA-256: f950195841d30041965f64bbf08ea117ed87e8c7f129756ac4635d5693a07fcc
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-164.15.1.el5.src.rpm
File outdated by:  RHBA-2011:0956
    MD5: 527bef9c605d21d49acff623eb4e99ff
SHA-256: c97c1cff09219ca5d53322481ee819344fcea7efafe9e97616f06c77039189b5
 
IA-32:
kernel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2d2a5e650ef8e75282cd0885f04f3d2c
SHA-256: 2ff3581d16e35dcf8ff843e0cc3d48e1975e0e5527ecd3af10e45f7851952385
kernel-PAE-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 35e4d18f3d00149c11b520e61c5a4023
SHA-256: f1a12fa2c7bf92432c55fd144198fac47048cc4a01b9e218aaf37f7bc3c1210f
kernel-PAE-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ed83544cba57eb20c8aa5bd2223c2057
SHA-256: d00d5ee589e9af23ee3c2c1af34fe22914b71970053638c335fb037f8802bbe0
kernel-debug-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: db57e9aa2947e4b6def12f11583da453
SHA-256: 41592042f52d39d2dd327ba36d5fd6006ffd0ef66c3bae91158a7d9099c16f62
kernel-debug-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8585dc9741af3adc387879a5a8137972
SHA-256: b152d86167ad729e88af188087778e8c8484f85b7fd878ff212bbbe16103195f
kernel-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 54e6c7d438635b08c626775308d328b0
SHA-256: d8b9bf4112d0d420f9700241415a35f4a7d3081f0062bf3be80f17ac6cb6152c
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7dcbd62e038ab0140040a807a3c3c249
SHA-256: e77d4d430e263c8bc1fe75fc3a121b8710848cf8e20f421fb1012495a8637262
kernel-xen-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b3eb0d2e223bc81726767740eb76541d
SHA-256: 47e168f6507a15b1a83b72ddefdf681c3a683e9739b341bc29e400342fbb2830
kernel-xen-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5afbc0ad9e9a0fe446a4b75c276497ad
SHA-256: f36fb7402c9812a70c9d581b33c7d12faeffabbee8f05e8c5d3cfa1d46e18a62
 
x86_64:
kernel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0e79b31629cc7a28e8907c21fadfa157
SHA-256: 2ea1a5d87c0b620b10c3a8c9d7a0cf770a5b028b1243ff8dbee6f00e8975f5c5
kernel-debug-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d6d8c22a7797201932b4c1cedcceba59
SHA-256: fd01bbeb208a1f4e59ea3ac6ad689b2a67cff01db1d632e566fa16887df034a6
kernel-debug-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 56c99d81415415cfb901f41264136a85
SHA-256: f75ea06e44665afe43fdbf6885862b23e6e87bb541abfea585cbd39b3ed7ffc0
kernel-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5bc95dbe0b21fe97a9e3d33eedfaca49
SHA-256: 541de9fddef48ce5112733aed162f0c288c6a54f26873a4ab41e178f108345a4
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 41d7ee05e57ce85e0b8b9cdb6425e722
SHA-256: 54ce501c24a9a021f3ea21637858c5f910a57d86cc41a3ffd2e614caa38c1107
kernel-xen-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 85ea6b7eff85ac3760469c7d5f096893
SHA-256: 40b92a200ab28ae4fb984bed2c5706a180df5f9f509e0e0ad8d7677112f80cf3
kernel-xen-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5dfa12b0d4feea49f195dd6fc25bbc4
SHA-256: f950195841d30041965f64bbf08ea117ed87e8c7f129756ac4635d5693a07fcc
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
kernel-2.6.18-164.15.1.el5.src.rpm
File outdated by:  RHBA-2011:0956
    MD5: 527bef9c605d21d49acff623eb4e99ff
SHA-256: c97c1cff09219ca5d53322481ee819344fcea7efafe9e97616f06c77039189b5
 
IA-32:
kernel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 2d2a5e650ef8e75282cd0885f04f3d2c
SHA-256: 2ff3581d16e35dcf8ff843e0cc3d48e1975e0e5527ecd3af10e45f7851952385
kernel-PAE-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 35e4d18f3d00149c11b520e61c5a4023
SHA-256: f1a12fa2c7bf92432c55fd144198fac47048cc4a01b9e218aaf37f7bc3c1210f
kernel-PAE-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: ed83544cba57eb20c8aa5bd2223c2057
SHA-256: d00d5ee589e9af23ee3c2c1af34fe22914b71970053638c335fb037f8802bbe0
kernel-debug-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: db57e9aa2947e4b6def12f11583da453
SHA-256: 41592042f52d39d2dd327ba36d5fd6006ffd0ef66c3bae91158a7d9099c16f62
kernel-debug-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 8585dc9741af3adc387879a5a8137972
SHA-256: b152d86167ad729e88af188087778e8c8484f85b7fd878ff212bbbe16103195f
kernel-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 54e6c7d438635b08c626775308d328b0
SHA-256: d8b9bf4112d0d420f9700241415a35f4a7d3081f0062bf3be80f17ac6cb6152c
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.i386.rpm
File outdated by:  RHBA-2011:0956
    MD5: 7dcbd62e038ab0140040a807a3c3c249
SHA-256: e77d4d430e263c8bc1fe75fc3a121b8710848cf8e20f421fb1012495a8637262
kernel-xen-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: b3eb0d2e223bc81726767740eb76541d
SHA-256: 47e168f6507a15b1a83b72ddefdf681c3a683e9739b341bc29e400342fbb2830
kernel-xen-devel-2.6.18-164.15.1.el5.i686.rpm
File outdated by:  RHBA-2011:0956
    MD5: 5afbc0ad9e9a0fe446a4b75c276497ad
SHA-256: f36fb7402c9812a70c9d581b33c7d12faeffabbee8f05e8c5d3cfa1d46e18a62
 
IA-64:
kernel-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 9d2cc4795c7db16921869ebc457a3080
SHA-256: 6a9960add33a6a572e63f5b6afe1ae88bb18255cb3b6d27f23d54cd913cea33a
kernel-debug-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 480e102f3dcf202dd4ce583460a9551b
SHA-256: 5a5df20b7ba9182522fc6f2bd95deb4f23107f1d53695bbe26141aa539462f0f
kernel-debug-devel-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: c19d5b759e5fa53ad24de0dcd8c1917d
SHA-256: 2332f298c7ed115e42d790aa0da74e3964ae8179331b0059ded0dae662174c04
kernel-devel-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 5fbe3d4a4da28f4c297f4d332f179ff7
SHA-256: c55fd2ea16474f52db122215f62336b1acb45947c4167827c953ee4ee86dedff
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 491654a2db74753e430c752d70e4121e
SHA-256: cb5ec3d3071eb3784918a821a74120df1bd4e399c8d5b707bf3498d9125fe685
kernel-xen-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: fb9252d556aafd66b079b880603c82e5
SHA-256: 79cea7e4da509a9c3a313d0583c89e5975184c5997e5b2829aae428f0a9787ef
kernel-xen-devel-2.6.18-164.15.1.el5.ia64.rpm
File outdated by:  RHBA-2011:0956
    MD5: b240bcde37f6a463d3005a6965db8463
SHA-256: ac8e33ee8c9fcca4d4fd33db109fb05d09c56772d80eaea6350e4fcb55c203f8
 
PPC:
kernel-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 3f8d89a7e135bfdc3ca2cd2962f17179
SHA-256: 6b5f2a54eba3b24fbb3bc5f248271c12d4f9d45cd517d6322e9776e9a9164696
kernel-debug-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 75081ca5be42790970dc03c6b90ea7b7
SHA-256: 8f26143afd2c79c042be74413d936af000a3b3cbacb19ee09efbdc0e378cd9ee
kernel-debug-devel-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 616e16c14e73fae0ad272d3e0a2b75c4
SHA-256: 4ccb59f6a63d8beb6c9dd05ad5d7a10cc20aa8a31806de2356ba4843bba33213
kernel-devel-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 918b5c4cec8a011924b46fdc4225258c
SHA-256: fdc26be94ba2423f7e16c73ace8e75c660d49d2d9ccc6f4682966ae255f2170e
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.ppc.rpm
File outdated by:  RHBA-2011:0956
    MD5: 679ce3806875a1246f37ccc619516a31
SHA-256: c00732077893ec3af7025f7d3ed47aa41b050b9b23608737eca4b54d687b32d7
kernel-headers-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 864f96f5237c96373da2bf6f9cb5b578
SHA-256: dc3b3c1b0d2b8206fad48d19f5f82a0414005e8dfdf66608cd476bc4e05eeef6
kernel-kdump-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: be8d663ddc63592c97944f52070deb79
SHA-256: e140dedd4cdfc3b3e15c91f332dd74f7b8f2d72394ffec8d8d4afe1d38ce2d47
kernel-kdump-devel-2.6.18-164.15.1.el5.ppc64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 8cf52bf820748f3d2001a69171bf01c5
SHA-256: 9ae49a9863cc4d3980977e48c1654ff18dd373b17a75038b1270452c0b36c59e
 
s390x:
kernel-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 604358f432865d83bad06f6147e0f74c
SHA-256: 65629ea5672a04486d6a48ba2b876ed309bfc812dfe11d812f8129f9fb95a575
kernel-debug-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 3c7bb4640769c7159981317da4f4304e
SHA-256: c00dc8ba9475ae4a5627d45501abbbf2d8f094b820e08a80ad36ede8055a0a44
kernel-debug-devel-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 07c2e7602125cf0a1b2af580ce151182
SHA-256: 8892430503041979b66ea54a4b7148db9048e4e0d2653f7033c938dab3322a52
kernel-devel-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 44ef66efa459c9865fdd1c7aac67cc63
SHA-256: 31c1e841b603c38947a81adab07ce3f982f07ae907fcd0847048133cc3767535
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: f54b2aab4b479a480be4a8812b909b2b
SHA-256: 7f868ebbda1b229b3687ad0fe197c52627db89f15d77e07a478374aade905954
kernel-kdump-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: 59de0b2a87012f788036010d04c34b4c
SHA-256: 292e26509358c1b5a672f6eaeef79b95b7c383840158aa87fa7742dedc47eb08
kernel-kdump-devel-2.6.18-164.15.1.el5.s390x.rpm
File outdated by:  RHBA-2011:0956
    MD5: c7a3b3407a88b607cba077d596df429d
SHA-256: 8683201d242de4c39fc5b9c32724f9e81f47399828ba83cbc65b8ca61f78606b
 
x86_64:
kernel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 0e79b31629cc7a28e8907c21fadfa157
SHA-256: 2ea1a5d87c0b620b10c3a8c9d7a0cf770a5b028b1243ff8dbee6f00e8975f5c5
kernel-debug-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: d6d8c22a7797201932b4c1cedcceba59
SHA-256: fd01bbeb208a1f4e59ea3ac6ad689b2a67cff01db1d632e566fa16887df034a6
kernel-debug-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 56c99d81415415cfb901f41264136a85
SHA-256: f75ea06e44665afe43fdbf6885862b23e6e87bb541abfea585cbd39b3ed7ffc0
kernel-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 5bc95dbe0b21fe97a9e3d33eedfaca49
SHA-256: 541de9fddef48ce5112733aed162f0c288c6a54f26873a4ab41e178f108345a4
kernel-doc-2.6.18-164.15.1.el5.noarch.rpm
File outdated by:  RHBA-2011:0956
    MD5: fc05f60714598c5ce53a8095a9e7a95e
SHA-256: b79628b89e6c0351202547e25502b7b7823eab3242902dc43d88a97661d146a9
kernel-headers-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 41d7ee05e57ce85e0b8b9cdb6425e722
SHA-256: 54ce501c24a9a021f3ea21637858c5f910a57d86cc41a3ffd2e614caa38c1107
kernel-xen-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: 85ea6b7eff85ac3760469c7d5f096893
SHA-256: 40b92a200ab28ae4fb984bed2c5706a180df5f9f509e0e0ad8d7677112f80cf3
kernel-xen-devel-2.6.18-164.15.1.el5.x86_64.rpm
File outdated by:  RHBA-2011:0956
    MD5: f5dfa12b0d4feea49f195dd6fc25bbc4
SHA-256: f950195841d30041965f64bbf08ea117ed87e8c7f129756ac4635d5693a07fcc
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

547255 - CVE-2009-4308 kernel: ext4: Avoid null pointer dereference when decoding EROFS w/o a journal
553132 - [Patch] jbd slab cache creation/deletion is racey [rhel-5.4.z]
554578 - CVE-2010-0003 kernel: infoleak if print-fatal-signals=1
555238 - CVE-2010-0007 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN
555658 - CVE-2010-0008 kernel: sctp remote denial of service
557684 - [5.4] sched_rr_get_interval() destroys user data in 32-bit compat mode. [rhel-5.4.z]
559335 - e1000e: wol is broken on 2.6.18-185.el5 [rhel-5.4.z]
560588 - Adding bonding in balance-alb mode to bridge causes host network connectivity to be lost [rhel-5.4.z]
560640 - Call trace error display when resume from suspend to disk (ide block) - pvclock related [rhel-5.4.z]
560665 - [SR-IOV] VF can not be enabled in Dom0 [rhel-5.4.z]
561417 - Kernel panic when using GRO through ixgbe driver and xen bridge [rhel-5.4.z]
561454 - kvm pvclock on i386 suffers from double registering [rhel-5.4.z]
562582 - CVE-2010-0415 kernel: sys_move_pages infoleak
562746 - Strange vm performance degradation moving 32 bit app from RHEL 4.6 32bit to 5.4 64bit [rhel-5.4.z]
562772 - 5.5 - cciss backport some upstream bits to improve kexec/kdump [rhel-5.4.z]
562777 - [RHEL5 Xen] EXPERIMENTAL EX/MC: Dom0 soft lockups on >64-way system from hard-virt patches [rhel-5.4.z]
563781 - CVE-2010-0437 kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference
564281 - Please implement upstream fix for potential filesystem corruption bug [rhel-5.4.z]
564288 - GFS2 Filesystem Withdrawal: fatal: invalid metadata block [rhel-5.4.z]
564290 - 1916556 - GFS2 gfs2_delete_inode failing on RO filesystem [rhel-5.4.z]


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/