Skip to navigation

Security Advisory Moderate: kernel security and bug fix update

Advisory: RHSA-2013:1449-1
Type: Security Advisory
Severity: Moderate
Issued on: 2013-10-22
Last updated on: 2013-10-22
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2013-0343
CVE-2013-4299
CVE-2013-4345
CVE-2013-4368

Details

Updated kernel packages that fix multiple security issues and one bug are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A flaw was found in the way the Linux kernel handled the creation of
temporary IPv6 addresses. If the IPv6 privacy extension was enabled
(/proc/sys/net/ipv6/conf/eth0/use_tempaddr is set to '2'), an attacker on
the local network could disable IPv6 temporary address generation, leading
to a potential information disclosure. (CVE-2013-0343, Moderate)

* An information leak flaw was found in the way Linux kernel's device
mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data from
disk blocks in free space, which are normally inaccessible. (CVE-2013-4299,
Moderate)

* An off-by-one flaw was found in the way the ANSI CPRNG implementation in
the Linux kernel processed non-block size aligned requests. This could lead
to random numbers being generated with less bits of entropy than expected
when ANSI CPRNG was used. (CVE-2013-4345, Moderate)

* An information leak flaw was found in the way Xen hypervisor emulated the
OUTS instruction for 64-bit paravirtualized guests. A privileged guest user
could use this flaw to leak hypervisor stack memory to the guest.
(CVE-2013-4368, Moderate)

Red Hat would like to thank Fujitsu for reporting CVE-2013-4299, Stephan
Mueller for reporting CVE-2013-4345, and the Xen project for reporting
CVE-2013-4368.

This update also fixes the following bug:

* A bug in the GFS2 code prevented glock work queues from freeing
glock-related memory while the glock memory shrinker repeatedly queued a
large number of demote requests, for example when performing a simultaneous
backup of several live GFS2 volumes with a large file count. As a
consequence, the glock work queues became overloaded which resulted in a
high CPU usage and the GFS2 file systems being unresponsive for a
significant amount of time. A patch has been applied to alleviate this
problem by calling the yield() function after scheduling a certain amount
of tasks on the glock work queues. The problem can now occur only with
extremely high work loads. (BZ#1014714)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-371.1.2.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: a7cb6dde93d78515553e23df9882677c
SHA-256: 814cbb70e85cf0aa2b5f237b12c35fcae2b6ab36f665bdf20b83e50a1ee1a165
 
IA-32:
kernel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d7b51dbbfd97bdf04cb8c8e58dcc8c86
SHA-256: 99d7887ba4a702bb18bf8cc0f744c69f16497494b81d4a8b8293d004a818eb7f
kernel-PAE-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3e2f6a49ce4c31102b0d326d02616620
SHA-256: 39ec8a43c8e75a2f03cdbc85f163e2c3bdbae2f621646611d7fa89875ecb6fba
kernel-PAE-debuginfo-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 787414803d1d02955edb21df29e59d6e
SHA-256: 5bffbc7cf6d6fdd92a55effbe811591502fea3d3d3c1e066c52bbd5adb93e764
kernel-PAE-devel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 71e0469843c239c7cc98954c0765b064
SHA-256: 6a0918b38b6c1a4783bab6d2d4dda47d3d2fcccd9ec1efc71c19162824d92141
kernel-debug-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 119062975752454c12d833b4b60ac6f3
SHA-256: cd15aebf9209008eafbd178d05937ddab8d38d890283e4719a83607528c6f38c
kernel-debug-debuginfo-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 312bbabcbafefa6db08304d6d02d3b8e
SHA-256: e661dfe1acbdd06aa056e68dada993e92d693a4ffdcc2c03699135352008b99d
kernel-debug-devel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: aec94b8bb138b92e863a90d07ba922fe
SHA-256: e1ad1e13548f81198ceb26099a796524da4b44c4db0b481cf25ea6140f14bab8
kernel-debuginfo-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7bb31c9463a2164f94657b9b7a7a5baf
SHA-256: 44cf2c7cd8f524a498765f156ed73d285b30e81061f019bda7a4c4f0117da54a
kernel-debuginfo-common-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: becf7b429ecdb9d4155615973b1a3177
SHA-256: 44b04cfe837787c2ce6584dcfef89fde90c605b8b52061daf6e40fd8ce7d65ea
kernel-devel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a560a4d96180cccdd7a42bb21b8acd37
SHA-256: e19d8782729cb8d7e638f1d5c5a2f7e99eb239f1f2a2adfe0805dd77ec76bdfc
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f140c76f2e194fb2c44e4f2f6e49a1b4
SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: c0e98d1f17a079bc3886ab26ae08eb78
SHA-256: d490c85e0debda2f0b823825b1db35bb686f9583e4f5b8e917ccefb03fca9f4d
kernel-xen-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 783405ca1ea59aad3c227dbe4e8c5d40
SHA-256: 72d4fa60ba251d2284302b93ed73a9b2ffe20258563f2f3b9203941286da0fcd
kernel-xen-debuginfo-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 360a48687a44c53dc3ade12882e51d52
SHA-256: 26838204683b2485ff9cc063b1ca64abd85711aafd0bdb86fbce754d42bdc9f4
kernel-xen-devel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 30301fe7c76e56aff53a1ddc4900c594
SHA-256: e4e4788767ebbe98046d5895f6c8f3e3264c81a27188001d0716374f0636f11c
 
IA-64:
kernel-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 30e5ec73ff6ae8532bdb18d8ce84863e
SHA-256: cfb7f509b68128012d105a395ef9b5fb15f49d4cf7492953751abf030cb9b0fd
kernel-debug-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 21544725b427d3bf07de51702feb7877
SHA-256: f5ba5aba6ecd566054ab1de5db54a20ea4f0e5100ddebfc6e7689c7bd8b9818b
kernel-debug-debuginfo-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: dc5df952b93bdd9719a46df21ffd2763
SHA-256: cb09b5245fe45f74b95eb4d3eea0385c4da73b30157566654bbd8026faec8c99
kernel-debug-devel-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b9c2904a45b63de4ca872f4e8ebb0f91
SHA-256: ffcb391c6b2e3a832f7193a8750dc7945403ae60021c241f2d0af91ba7bb7284
kernel-debuginfo-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0aeb3656409278060e637b5fa17322dd
SHA-256: 8596b8acaa674935d2bdd9bc9ab3bfd96eae2c2be55c806334067f98f74ee959
kernel-debuginfo-common-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f33fb5d57c253b1a230f425dbc2e3644
SHA-256: f1416fd35adad521ed7addbda5ae9dc6338d36b775ec70a6569335958536b7d5
kernel-devel-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8fb5f28d0b0520be75d91aca3199822c
SHA-256: 532bf0e1777e18d60532d644a5fa927c261edf493ff88407f23a7ea8e8b52a86
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f140c76f2e194fb2c44e4f2f6e49a1b4
SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9b998597d3aaac11767cee3bd3264abe
SHA-256: 7ed7b9b80804bac6d576719321e24f5d58c7297b83a477513cf69cc394e20c9b
kernel-xen-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 95054d46fcef73f3ace641d67b45cccc
SHA-256: e90668871313203a807f59c9dd33fb8d439f68ba3f4d6712290a696c3dc104a8
kernel-xen-debuginfo-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8574e25a84406573f4382588a45c5aca
SHA-256: 382d34fd3e49709263437546954a2364bc66951ffc96133f672117b5d9dc7c4f
kernel-xen-devel-2.6.18-371.1.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 709328ae51912a23763a5de16ce20ed0
SHA-256: fe271bf780e26ea5bb16b0c2a4f88d2b0c1a30ac9b94b2c24edc715a576e0fed
 
PPC:
kernel-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 49c23d0d17be51510b415e2429b43356
SHA-256: e14d947d64d3f30ba00a8668e9f17bcc78782ca241cd1692fe76a30c3745dc0d
kernel-debug-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 864f32473283392d2b1d46b75df94a54
SHA-256: ef3e8683ae1948f79ffcbeeeb733efa642a45ae62bf75b9cb68ede07ff493c56
kernel-debug-debuginfo-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: aeb78f1218db4c19d28b3e2f433ae3ee
SHA-256: 1bf8563058ff1f3949938d80f6a31336ee07f59ced5677bb0504f0a1b32a6495
kernel-debug-devel-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 946b2a50f5a58668ab58595a2d45e110
SHA-256: 1dabb0e7acd418cbc3ad7f9447d82d27aa319d8392a069d11c6970f5bd2aac88
kernel-debuginfo-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5c1a51b3c258b3fca590f8d1eecd33c8
SHA-256: a029621fdee58335212db088a91b735c077247137298e85dda55f4a57b308e6c
kernel-debuginfo-common-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 235cf29f4041044f9f9ffef550ccc91d
SHA-256: 241bb2d5beda7cd46b8277a50763a011cf9f04db3cee6df302740d7e7bb51160
kernel-devel-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 97953779435f91f934ab67a697423d01
SHA-256: 7cd1d3637187f2b0c0e12e4c21bbc68fc87b221690d33add8aa0613329847f3a
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f140c76f2e194fb2c44e4f2f6e49a1b4
SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 039ec3dfb1c0b4b589ce86bfbedc1888
SHA-256: 8918db9c3d8dbfd360d55a3262f968ecbab15fb93209e0e8e45131a5bc9b2a9b
kernel-headers-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d7ee26ce23561190ea0f21b03effa835
SHA-256: 4aa4cd8bf9c3e6b73e6504b679c2af546071e0bf57a0dc1895cd85d57686e870
kernel-kdump-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1572cb3f894d51debcdc018216626817
SHA-256: aafc2a8b19596ab614e56c338c93dcb4da9f5408f305fa725f117dd3958b381a
kernel-kdump-debuginfo-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a5fa208355dd0b5b934bc370043962dc
SHA-256: 391713e4329cb281f67ccec3a51757239dc796c23ba50273b004c9ecff2f38d6
kernel-kdump-devel-2.6.18-371.1.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a8036d0dd6a59224426a46387097203b
SHA-256: a57ea2eab3770d64d2d815c0720c7f5b2c076f283cbcaeaaf9310eafb4d07c7d
 
s390x:
kernel-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6c86e190ff98c2316e6468bbecac01cc
SHA-256: 6b81fe50a8660f65c0a1df51de009d8085b6eb8890a3732757733c741462618f
kernel-debug-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0196dc3b8053a6544e74212da0ae3e9d
SHA-256: a601db5cbcaf5815b81d8d8e030defdcf8cae12b71b9db3bec42a3a9fc979e90
kernel-debug-debuginfo-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 05fbeca3e063d6442e0d747245529d93
SHA-256: 0ebf0700d07fcb9d4bdd62e15302f34d91200611a2ee4c53e652b61331e405ba
kernel-debug-devel-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: ec2fe7a57b4e69a3b10a7b9a3544024a
SHA-256: e75499b51d9cf295c4e9e038d029455a02920822f15ec4bcdd7f8bce2efba1ea
kernel-debuginfo-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0b76f76d8f74e928a0c5e1667bfa3105
SHA-256: 23d4cd8adb04063bcd1cc7f9bcff2c926b586809f2427ba6af68826020e1bcae
kernel-debuginfo-common-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 444b8073856457e49cdc955b84f5b1d7
SHA-256: 7c870001400c85277454e7616151a4e889fdf09275bda2eb57b42563e7a92490
kernel-devel-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: bd00a7d771c852a282df693004232a97
SHA-256: 4b0ed5974244828c4bccc4a56dbdc9f2fe16478d7b0abef96ef9931547b9f5e0
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f140c76f2e194fb2c44e4f2f6e49a1b4
SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 51285b7c9b2cf079b448dd02d88f35cd
SHA-256: ff7c4c559cee4a21dd97277505e5b544a4a1c8e4b67b511ef8ad0e9817a0538a
kernel-kdump-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: bc15bce010d8029d665b3944833731be
SHA-256: 8c8920dde6372c3dbf3aaf5b89e109bdcdd001b4601fb1c094ab6c8455b8ca0f
kernel-kdump-debuginfo-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: e66af4f3a19d5bb313f2d0d7da39ceba
SHA-256: af398e08c29b4c88aaea2dc3e1f547eb876bd071d6185fac30570629a708e7c0
kernel-kdump-devel-2.6.18-371.1.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: eb83d29c6d50ec3cd859f0f2df62c805
SHA-256: 617169f96b239c3e87332e4d875fcd817372dd47fc112f5ab139d9110d97be49
 
x86_64:
kernel-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e956e1a2ed6b71b2a93479f520f973f0
SHA-256: e4fc226eed77107b6fc1bd15ac1126f63e0b919d0434966a86fb8ebebc72fe91
kernel-debug-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4344050db0687a3538487206318596aa
SHA-256: f2426af446d7a18ac950d37c1945228c408ca017dbd54d1dd0892cda5ca35686
kernel-debug-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f44b85ed7e156636387f45b0fbcafba8
SHA-256: 9112b232cb365b66564328fa01057bb9f5ab7d654a7a708dff892452b4789d80
kernel-debug-devel-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 33a6327f304bb1e0d1b4535f0e36d077
SHA-256: 19ae0d8b065fe3fa19d58084d2c53969ee370f73cdb624fd33f4154800d5a81a
kernel-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5889becc5465fc5a840228c6f7591032
SHA-256: 92177e0d4b1a7527a27bf2906eef5915639df18e68a4656228503c8351c17664
kernel-debuginfo-common-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 993ec1618d4d7d1aeb58599eb5faba09
SHA-256: 7965a4d05ade3486def7abca74dd4e59051141d8936f7ee81bd4d35741ebdec9
kernel-devel-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c7f1d4c8bfb5f41aef9582a1a63c2f33
SHA-256: b817b69507bc3e7ce1a3de17b9494cb0e60e70837c771b4f8444b48201cda7f6
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f140c76f2e194fb2c44e4f2f6e49a1b4
SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1956e4a8f934e6d948cc1007b147e0b8
SHA-256: cdb7c69698d5e8fa50c1900782de58ad7349c34dccb9159d331a8a2edfa70d8d
kernel-xen-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f9395b5e42fa73e29749d2d303ab563e
SHA-256: 97fcbdac529b31c1ffefd57c9cb9f3027a42257000703b9d700aa2f2a73cfccb
kernel-xen-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3e5d8e38c466eb841272bff59c92c838
SHA-256: 21b34f07da477376ed6f515b8f5ed6d8b0320a6fe8443fae8b2d3c8d9a73f3f5
kernel-xen-devel-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9accb315a4c078e8a1abc7520301c24b
SHA-256: bd9cf49a5691a1fb664f0d95055dcfc2a25b7284c281e69ec5975d044ed3d1f5
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-371.1.2.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: a7cb6dde93d78515553e23df9882677c
SHA-256: 814cbb70e85cf0aa2b5f237b12c35fcae2b6ab36f665bdf20b83e50a1ee1a165
 
IA-32:
kernel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d7b51dbbfd97bdf04cb8c8e58dcc8c86
SHA-256: 99d7887ba4a702bb18bf8cc0f744c69f16497494b81d4a8b8293d004a818eb7f
kernel-PAE-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3e2f6a49ce4c31102b0d326d02616620
SHA-256: 39ec8a43c8e75a2f03cdbc85f163e2c3bdbae2f621646611d7fa89875ecb6fba
kernel-PAE-debuginfo-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 787414803d1d02955edb21df29e59d6e
SHA-256: 5bffbc7cf6d6fdd92a55effbe811591502fea3d3d3c1e066c52bbd5adb93e764
kernel-PAE-devel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 71e0469843c239c7cc98954c0765b064
SHA-256: 6a0918b38b6c1a4783bab6d2d4dda47d3d2fcccd9ec1efc71c19162824d92141
kernel-debug-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 119062975752454c12d833b4b60ac6f3
SHA-256: cd15aebf9209008eafbd178d05937ddab8d38d890283e4719a83607528c6f38c
kernel-debug-debuginfo-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 312bbabcbafefa6db08304d6d02d3b8e
SHA-256: e661dfe1acbdd06aa056e68dada993e92d693a4ffdcc2c03699135352008b99d
kernel-debug-devel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: aec94b8bb138b92e863a90d07ba922fe
SHA-256: e1ad1e13548f81198ceb26099a796524da4b44c4db0b481cf25ea6140f14bab8
kernel-debuginfo-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7bb31c9463a2164f94657b9b7a7a5baf
SHA-256: 44cf2c7cd8f524a498765f156ed73d285b30e81061f019bda7a4c4f0117da54a
kernel-debuginfo-common-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: becf7b429ecdb9d4155615973b1a3177
SHA-256: 44b04cfe837787c2ce6584dcfef89fde90c605b8b52061daf6e40fd8ce7d65ea
kernel-devel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a560a4d96180cccdd7a42bb21b8acd37
SHA-256: e19d8782729cb8d7e638f1d5c5a2f7e99eb239f1f2a2adfe0805dd77ec76bdfc
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f140c76f2e194fb2c44e4f2f6e49a1b4
SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: c0e98d1f17a079bc3886ab26ae08eb78
SHA-256: d490c85e0debda2f0b823825b1db35bb686f9583e4f5b8e917ccefb03fca9f4d
kernel-xen-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 783405ca1ea59aad3c227dbe4e8c5d40
SHA-256: 72d4fa60ba251d2284302b93ed73a9b2ffe20258563f2f3b9203941286da0fcd
kernel-xen-debuginfo-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 360a48687a44c53dc3ade12882e51d52
SHA-256: 26838204683b2485ff9cc063b1ca64abd85711aafd0bdb86fbce754d42bdc9f4
kernel-xen-devel-2.6.18-371.1.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 30301fe7c76e56aff53a1ddc4900c594
SHA-256: e4e4788767ebbe98046d5895f6c8f3e3264c81a27188001d0716374f0636f11c
 
x86_64:
kernel-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e956e1a2ed6b71b2a93479f520f973f0
SHA-256: e4fc226eed77107b6fc1bd15ac1126f63e0b919d0434966a86fb8ebebc72fe91
kernel-debug-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4344050db0687a3538487206318596aa
SHA-256: f2426af446d7a18ac950d37c1945228c408ca017dbd54d1dd0892cda5ca35686
kernel-debug-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f44b85ed7e156636387f45b0fbcafba8
SHA-256: 9112b232cb365b66564328fa01057bb9f5ab7d654a7a708dff892452b4789d80
kernel-debug-devel-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 33a6327f304bb1e0d1b4535f0e36d077
SHA-256: 19ae0d8b065fe3fa19d58084d2c53969ee370f73cdb624fd33f4154800d5a81a
kernel-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5889becc5465fc5a840228c6f7591032
SHA-256: 92177e0d4b1a7527a27bf2906eef5915639df18e68a4656228503c8351c17664
kernel-debuginfo-common-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 993ec1618d4d7d1aeb58599eb5faba09
SHA-256: 7965a4d05ade3486def7abca74dd4e59051141d8936f7ee81bd4d35741ebdec9
kernel-devel-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c7f1d4c8bfb5f41aef9582a1a63c2f33
SHA-256: b817b69507bc3e7ce1a3de17b9494cb0e60e70837c771b4f8444b48201cda7f6
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f140c76f2e194fb2c44e4f2f6e49a1b4
SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1956e4a8f934e6d948cc1007b147e0b8
SHA-256: cdb7c69698d5e8fa50c1900782de58ad7349c34dccb9159d331a8a2edfa70d8d
kernel-xen-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f9395b5e42fa73e29749d2d303ab563e
SHA-256: 97fcbdac529b31c1ffefd57c9cb9f3027a42257000703b9d700aa2f2a73cfccb
kernel-xen-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3e5d8e38c466eb841272bff59c92c838
SHA-256: 21b34f07da477376ed6f515b8f5ed6d8b0320a6fe8443fae8b2d3c8d9a73f3f5
kernel-xen-devel-2.6.18-371.1.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9accb315a4c078e8a1abc7520301c24b
SHA-256: bd9cf49a5691a1fb664f0d95055dcfc2a25b7284c281e69ec5975d044ed3d1f5
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1004233 - CVE-2013-4299 kernel: dm: dm-snapshot data leak
1007690 - CVE-2013-4345 kernel: ansi_cprng: off by one error in non-block size request
1012550 - CVE-2013-4368 xen: information leak through outs instruction emulation (XSA-67)
914664 - CVE-2013-0343 kernel: handling of IPv6 temporary addresses


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/