Skip to navigation

Security Advisory Important: kernel security update

Advisory: RHSA-2009:0264-9
Type: Security Advisory
Severity: Important
Issued on: 2009-02-10
Last updated on: 2009-02-10
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2008-4933
CVE-2008-4934
CVE-2008-5025
CVE-2008-5713
CVE-2009-0031
CVE-2009-0065

Details

Updated kernel packages that resolve several security issues are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update addresses the following security issues:

* a memory leak in keyctl handling. A local user could use this flaw to
deplete kernel memory, eventually leading to a denial of service.
(CVE-2009-0031, Important)

* a buffer overflow in the Linux kernel Partial Reliable Stream Control
Transmission Protocol (PR-SCTP) implementation. This could, potentially,
lead to a denial of service if a Forward-TSN chunk is received with a large
stream ID. (CVE-2009-0065, Important)

* a flaw when handling heavy network traffic on an SMP system with many
cores. An attacker who could send a large amount of network traffic could
create a denial of service. (CVE-2008-5713, Important)

* the code for the HFS and HFS Plus (HFS+) file systems failed to properly
handle corrupted data structures. This could, potentially, lead to a local
denial of service. (CVE-2008-4933, CVE-2008-5025, Low)

* a flaw was found in the HFS Plus (HFS+) file system implementation. This
could, potentially, lead to a local denial of service when write operations
are performed. (CVE-2008-4934, Low)

In addition, these updated packages fix the following bugs:

* when using the nfsd daemon in a clustered setup, kernel panics appeared
seemingly at random. These panics were caused by a race condition in
the device-mapper mirror target.

* the clock_gettime(CLOCK_THREAD_CPUTIME_ID, ) syscall returned a smaller
timespec value than the result of previous clock_gettime() function
execution, which resulted in a negative, and nonsensical, elapsed time value.

* nfs_create_rpc_client was called with a "flavor" parameter which was
usually ignored and ended up unconditionally creating the RPC client with
an AUTH_UNIX flavor. This caused problems on AUTH_GSS mounts when the
credentials needed to be refreshed. The credops did not match the
authorization type, which resulted in the credops dereferencing an
incorrect part of the AUTH_UNIX rpc_auth struct.

* when copy_user_c terminated prematurely due to reading beyond the end of
the user buffer and the kernel jumped to the exception table entry, the rsi
register was not cleared. This resulted in exiting back to user code with
garbage in the rsi register.

* the hexdump data in s390dbf traces was incomplete. The length of the data
traced was incorrect and the SAN payload was read from a different place
then it was written to.

* when using connected mode (CM) in IPoIB on ehca2 hardware, it was not
possible to transmit any data.

* when an application called fork() and pthread_create() many times and, at
some point, a thread forked a child and then attempted to call the
setpgid() function, then this function failed and returned and ESRCH error
value.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. Note: for this update to take effect, the
system must be rebooted.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-128.1.1.el5.src.rpm
File outdated by:  RHBA-2012:1356
    MD5: a13070a257b44a0640c101b379ed4173
 
IA-32:
kernel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3eb93bd43fd2c07ea82dce1fd51d7913
kernel-PAE-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1ba2698d1ea84f1432229fb440bcf192
kernel-PAE-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6cccdb5f190bfbd853e942883d97a67d
kernel-debug-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 069c22b344cebe8fe3af8eee4e029b39
kernel-debug-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bdfafb84d3d0307d783afdd2c420e1a7
kernel-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 10bd2a9e7989ab63f886699d5f25fb8c
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2e45e687b2b10bcfd912396ff64e5db8
kernel-xen-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 25b062cd152e1dc1c1dc35ed9aca4637
kernel-xen-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 295dfc47421177013d808cfb2dee5ba0
 
IA-64:
kernel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e511049ea0b8b5ec14e95357af7ef2ed
kernel-debug-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1919535ff3f7f3f8cfac09f3923b175c
kernel-debug-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 18ea7397837696dc1c65363fd6ad5d30
kernel-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ef1263d20c303c589bded6b99acec6e5
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e2cbe25201378315c4acdf675f5633da
kernel-xen-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 98c467d1e1ac55841fe13b02141fd26c
kernel-xen-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 381211767f09f33be4243c0855beb2d9
 
PPC:
kernel-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b5d9c8b30c385290c5893ae58a773330
kernel-debug-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e7d17bbd9913d5c0ad3fce1429a7030c
kernel-debug-devel-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cb99aae75c086fb025086551298dceec
kernel-devel-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 720efcc118f1395efc74070797a21cca
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: a06aef1a20c53f843966679caa5ca4ff
kernel-headers-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 66c5dcb7abadf9fab76deeeae785e5ea
kernel-kdump-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b418c92fe9e196a50f4ad84fe47996c8
kernel-kdump-devel-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1ab27180d31c3f391de914fd010780d2
 
s390x:
kernel-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 92526d4381f580a33273160f9d57100f
kernel-debug-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 74cea0bd7bdc0bb9f963389edaca5935
kernel-debug-devel-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 69a198f18400081b519267070a543e27
kernel-devel-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: be898fdbf0325660b607a7d2ada0adb7
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 38d455e49c3f2990b3e208501e73872f
kernel-kdump-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 96f5026e40b6808b81e8f90983e3eeda
kernel-kdump-devel-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5319e4c0efc4b146815fc5ff4b2cf6bb
 
x86_64:
kernel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 14d8ea3e9f5b8bc2698c8105199af4c8
kernel-debug-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 03adbf20a852cd331c80b05252882cc3
kernel-debug-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 50ffa73ed045f2a45b8705d1d6c862a7
kernel-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f77d400f0d7b3f644228c7d65bb39b4f
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ee555fa66313f8d089ad99c10bd80aee
kernel-xen-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2a69e43c50035a87a6ead7201753ad90
kernel-xen-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5633c4dae34f70dc6029a3ae24f912de
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-128.1.1.el5.src.rpm
File outdated by:  RHBA-2012:1356
    MD5: a13070a257b44a0640c101b379ed4173
 
IA-32:
kernel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3eb93bd43fd2c07ea82dce1fd51d7913
kernel-PAE-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1ba2698d1ea84f1432229fb440bcf192
kernel-PAE-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6cccdb5f190bfbd853e942883d97a67d
kernel-debug-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 069c22b344cebe8fe3af8eee4e029b39
kernel-debug-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bdfafb84d3d0307d783afdd2c420e1a7
kernel-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 10bd2a9e7989ab63f886699d5f25fb8c
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2e45e687b2b10bcfd912396ff64e5db8
kernel-xen-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 25b062cd152e1dc1c1dc35ed9aca4637
kernel-xen-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 295dfc47421177013d808cfb2dee5ba0
 
x86_64:
kernel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 14d8ea3e9f5b8bc2698c8105199af4c8
kernel-debug-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 03adbf20a852cd331c80b05252882cc3
kernel-debug-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 50ffa73ed045f2a45b8705d1d6c862a7
kernel-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f77d400f0d7b3f644228c7d65bb39b4f
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ee555fa66313f8d089ad99c10bd80aee
kernel-xen-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2a69e43c50035a87a6ead7201753ad90
kernel-xen-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5633c4dae34f70dc6029a3ae24f912de
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
kernel-2.6.18-128.1.1.el5.src.rpm
File outdated by:  RHBA-2012:1356
    MD5: a13070a257b44a0640c101b379ed4173
 
IA-32:
kernel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 3eb93bd43fd2c07ea82dce1fd51d7913
kernel-PAE-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 1ba2698d1ea84f1432229fb440bcf192
kernel-PAE-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 6cccdb5f190bfbd853e942883d97a67d
kernel-debug-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 069c22b344cebe8fe3af8eee4e029b39
kernel-debug-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: bdfafb84d3d0307d783afdd2c420e1a7
kernel-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 10bd2a9e7989ab63f886699d5f25fb8c
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.i386.rpm
File outdated by:  RHBA-2010:0996
    MD5: 2e45e687b2b10bcfd912396ff64e5db8
kernel-xen-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 25b062cd152e1dc1c1dc35ed9aca4637
kernel-xen-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 295dfc47421177013d808cfb2dee5ba0
 
IA-64:
kernel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: e511049ea0b8b5ec14e95357af7ef2ed
kernel-debug-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 1919535ff3f7f3f8cfac09f3923b175c
kernel-debug-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 18ea7397837696dc1c65363fd6ad5d30
kernel-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: ef1263d20c303c589bded6b99acec6e5
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: e2cbe25201378315c4acdf675f5633da
kernel-xen-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 98c467d1e1ac55841fe13b02141fd26c
kernel-xen-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 381211767f09f33be4243c0855beb2d9
 
PPC:
kernel-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: b5d9c8b30c385290c5893ae58a773330
kernel-debug-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: e7d17bbd9913d5c0ad3fce1429a7030c
kernel-debug-devel-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: cb99aae75c086fb025086551298dceec
kernel-devel-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 720efcc118f1395efc74070797a21cca
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.ppc.rpm
File outdated by:  RHBA-2010:0996
    MD5: a06aef1a20c53f843966679caa5ca4ff
kernel-headers-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 66c5dcb7abadf9fab76deeeae785e5ea
kernel-kdump-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: b418c92fe9e196a50f4ad84fe47996c8
kernel-kdump-devel-2.6.18-128.1.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 1ab27180d31c3f391de914fd010780d2
 
s390x:
kernel-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 92526d4381f580a33273160f9d57100f
kernel-debug-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 74cea0bd7bdc0bb9f963389edaca5935
kernel-debug-devel-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 69a198f18400081b519267070a543e27
kernel-devel-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: be898fdbf0325660b607a7d2ada0adb7
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 38d455e49c3f2990b3e208501e73872f
kernel-kdump-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 96f5026e40b6808b81e8f90983e3eeda
kernel-kdump-devel-2.6.18-128.1.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 5319e4c0efc4b146815fc5ff4b2cf6bb
 
x86_64:
kernel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 14d8ea3e9f5b8bc2698c8105199af4c8
kernel-debug-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 03adbf20a852cd331c80b05252882cc3
kernel-debug-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 50ffa73ed045f2a45b8705d1d6c862a7
kernel-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: f77d400f0d7b3f644228c7d65bb39b4f
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: ee555fa66313f8d089ad99c10bd80aee
kernel-xen-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 2a69e43c50035a87a6ead7201753ad90
kernel-xen-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 5633c4dae34f70dc6029a3ae24f912de
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
kernel-2.6.18-128.1.1.el5.src.rpm
File outdated by:  RHBA-2012:1356
    MD5: a13070a257b44a0640c101b379ed4173
 
IA-32:
kernel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 3eb93bd43fd2c07ea82dce1fd51d7913
kernel-PAE-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 1ba2698d1ea84f1432229fb440bcf192
kernel-PAE-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 6cccdb5f190bfbd853e942883d97a67d
kernel-debug-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 069c22b344cebe8fe3af8eee4e029b39
kernel-debug-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: bdfafb84d3d0307d783afdd2c420e1a7
kernel-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 10bd2a9e7989ab63f886699d5f25fb8c
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.i386.rpm
File outdated by:  RHBA-2012:1356
    MD5: 2e45e687b2b10bcfd912396ff64e5db8
kernel-xen-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 25b062cd152e1dc1c1dc35ed9aca4637
kernel-xen-devel-2.6.18-128.1.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 295dfc47421177013d808cfb2dee5ba0
 
IA-64:
kernel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: e511049ea0b8b5ec14e95357af7ef2ed
kernel-debug-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 1919535ff3f7f3f8cfac09f3923b175c
kernel-debug-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 18ea7397837696dc1c65363fd6ad5d30
kernel-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: ef1263d20c303c589bded6b99acec6e5
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: e2cbe25201378315c4acdf675f5633da
kernel-xen-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 98c467d1e1ac55841fe13b02141fd26c
kernel-xen-devel-2.6.18-128.1.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 381211767f09f33be4243c0855beb2d9
 
x86_64:
kernel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 14d8ea3e9f5b8bc2698c8105199af4c8
kernel-debug-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 03adbf20a852cd331c80b05252882cc3
kernel-debug-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 50ffa73ed045f2a45b8705d1d6c862a7
kernel-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: f77d400f0d7b3f644228c7d65bb39b4f
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: b0cc63803ed6e7121a3aa5cbe5943e28
kernel-headers-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: ee555fa66313f8d089ad99c10bd80aee
kernel-xen-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 2a69e43c50035a87a6ead7201753ad90
kernel-xen-devel-2.6.18-128.1.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 5633c4dae34f70dc6029a3ae24f912de
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

469631 - CVE-2008-4933 kernel: hfsplus: fix Buffer overflow with a corrupted image
469640 - CVE-2008-4934 kernel: hfsplus: check read_mapping_page() return value
470769 - CVE-2008-5025 kernel: hfs: fix namelength memory corruption
477744 - CVE-2008-5713 kernel: soft lockup occurs when network load is very high
478800 - CVE-2009-0065 kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID
479812 - IB/ipoib: data transmission fails in connected mode on any HCA
480576 - RHEL5.2/3 - setpgid() returns ESRCH in some situations
480592 - CVE-2009-0031 kernel: local denial of service in keyctl_join_session_keyring
480996 - zfcp: fix hexdump data in s390dbf traces
481117 - RHSA-2008:0508 linux-2.6.9-x86_64-copy_user-zero-tail.patch broken
481119 - Kernel panic in auth_rpcgss:__gss_find_upcall
481120 - oops in mirror_map (dm-raid1.c)
481122 - [5.3] clock_gettime() syscall returns a smaller timespec value than previous.


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/