Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2010:0149-1
Type: Security Advisory
Severity: Important
Issued on: 2010-03-16
Last updated on: 2010-03-16
Affected Products: Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2009-4141
CVE-2010-0008
CVE-2010-0437

Details

Updated kernel packages that fix three security issues and multiple bugs
are now available for Red Hat Enterprise Linux 5.3 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a deficiency was found in the fasync_helper() implementation. This could
allow a local, unprivileged user to leverage a use-after-free of locked,
asynchronous file descriptors to cause a denial of service or privilege
escalation. (CVE-2009-4141, Important)

* a NULL pointer dereference flaw was found in the sctp_rcv_ootb() function
in the Linux kernel Stream Control Transmission Protocol (SCTP)
implementation. A remote attacker could send a specially-crafted SCTP
packet to a target system, resulting in a denial of service.
(CVE-2010-0008, Important)

* a NULL pointer dereference flaw was found in the ip6_dst_lookup_tail()
function in the Linux kernel. An attacker on the local network could
trigger this flaw by sending IPv6 traffic to a target system, leading to a
system crash (kernel OOPS) if dst->neighbour is NULL on the target system
when receiving an IPv6 packet. (CVE-2010-0437, Important)

This update also fixes the following bugs:

* programs compiled on x86, and that also call sched_rr_get_interval(),
were silently corrupted when run on 64-bit systems. With this update, when
such programs attempt to call sched_rr_get_interval() on 64-bit systems,
sys32_sched_rr_get_interval() is called instead, which resolves this issue.
(BZ#557683)

* the fix for CVE-2009-4538 provided by RHSA-2010:0053 introduced a
regression, preventing Wake on LAN (WoL) working for network devices using
the Intel PRO/1000 Linux driver, e1000e. Attempting to configure WoL for
such devices resulted in the following error, even when configuring valid
options:

"Cannot set new wake-on-lan settings: Operation not supported
not setting wol"

This update resolves this regression, and WoL now works as expected for
network devices using the e1000e driver. (BZ#559334)

* a number of bugs have been fixed in the copy_user routines for Intel 64
and AMD64 systems, one of which could have possibly led to data corruption.
(BZ#568307)

* on some systems, a race condition in the inode-based file event
notifications implementation caused soft lockups and the following
messages:

"BUG: warning at fs/inotify.c:181/set_dentry_child_flags()"
"BUG: soft lockup - CPU#[x] stuck for 10s!"

This update resolves this race condition, and also removes the inotify
debugging code from the kernel, due to race conditions in that code.
(BZ#568663)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
kernel-2.6.18-128.14.1.el5.src.rpm
File outdated by:  RHBA-2012:1356
    MD5: 8587e46a22515bf382e464660090ad01
SHA-256: fc107899d4b2937ee937daef2928d60c73267f7834e559920e781f8241662d00
 
IA-32:
kernel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: c5eb8c0d1148a3f89a98812530e9e0fe
SHA-256: be3e13d9d3ece5c174b327bd1014bd8d53f84d4001b9fb8a69427cd371754909
kernel-PAE-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: d759e2e52274e9eff7086bfc08f5b151
SHA-256: 96c262bab001a7480a0cc41527caebe57a33e5e0ceef3bb3ff9963b159b96de0
kernel-PAE-devel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 33f2843d24a7678c454004d52d158119
SHA-256: 2978bf4a4346fa0a969c6668ddc3cf1df762b933b332433a3c896e04d1386b39
kernel-debug-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: dd5824052d29ccce35d3b9a1eab0fa71
SHA-256: 47fb097c1647770a5bde4a31502ee9d90679e326086b2a1404a5a8bd404e9974
kernel-debug-devel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: bccef71ae62e6eec40994f160994947f
SHA-256: 9286829485c6dc93e420fa6ca4cb6704752b167ec73c720bcec795c82b7e422d
kernel-devel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 852c291ad8486df39f021b35233e4329
SHA-256: c1da0b39e7b0b11cdf60b622e818b9c617f1bc661497247051fcc45a5af401b4
kernel-doc-2.6.18-128.14.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: fdfbc2d3865c9af2f1197b08b975bb8f
SHA-256: 377b0c9abd750cf72ff738f5761cd2bb3baa59f6798c7c05173fbc18a2d97efa
kernel-headers-2.6.18-128.14.1.el5.i386.rpm
File outdated by:  RHBA-2010:0996
    MD5: 7dcbee14ef673f77eea3f4198235e636
SHA-256: fae5f58694c3edf960e8bafde635dd7a612cd0601ab721f7b077fa013f0021b4
kernel-xen-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 190a044159f330e9ccd3a7c830fb133c
SHA-256: 304c78960796bdb8de96b6874725c7ae3ae00ef05a15b2254d8cb45d69366aa0
kernel-xen-devel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2010:0996
    MD5: 8c550db75b53b94a1291d23873493d0c
SHA-256: 29d97183160e85a7d174ffa5684cbbd3aeecb56a35bf6424f026735cbf6ac89e
 
IA-64:
kernel-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 2f3e3c170900ad1c25526aaac34ad659
SHA-256: da04e267e3b72b2a7b359225e8647d0a52f368fdc5b38b19001b61c312ea8008
kernel-debug-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: b12d68a4b4e995fd415871aa57e2e48b
SHA-256: 88b1765239b99839a468c5d3a4becd5af970ef7aceb351af7e67604496c89d50
kernel-debug-devel-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 6a074472b0ed2f2d9232fa9a5d562ecd
SHA-256: 405f2df79a421a0865ea65f87dbbfd9996b06f8a430fcc58aa7a06de1f7f009f
kernel-devel-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 01ac2123f62879e0a84f6d5120a64284
SHA-256: 614b5a4f760139b4590e2ecc7fbd39963e6edecee1d6b14dbd36a7d2c6bc0175
kernel-doc-2.6.18-128.14.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: fdfbc2d3865c9af2f1197b08b975bb8f
SHA-256: 377b0c9abd750cf72ff738f5761cd2bb3baa59f6798c7c05173fbc18a2d97efa
kernel-headers-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: bfa34ec2f241dc7ec5fd9d9b6b4b9c78
SHA-256: 80bf8c17feb3888aa0c20ee35ef8dd6b205792067dcb133c1a0911b3e788cef2
kernel-xen-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: bbe4667012186acfcaf44e0b9be720c7
SHA-256: bec0db6eb85c6d4a173082b86d958a6ab4349ef7b91293d545112ee3a095b41a
kernel-xen-devel-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 9920bf835b3bd9a7138489c621521005
SHA-256: 3010c10d90e0511c61f9c5f79de8b79753fa0764eb1d71972ac25b5950f937f0
 
PPC:
kernel-2.6.18-128.14.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: be80a0367f5574a0a6d817acac73d106
SHA-256: 99a8725c6a55e5f75d3dd5cfd0790dbb011c7c33df6898bde26b9ec4883240e5
kernel-debug-2.6.18-128.14.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: fe5cf7fb562fac984c1d9db65e8a06e0
SHA-256: 1f180bd221b6b98e13c3f18b0c2ec73e0b80203b6ff4c00c951773cee7f30f53
kernel-debug-devel-2.6.18-128.14.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 8059c5c08a38ed109a6db81b290056c2
SHA-256: 26694142214769dd000a988af0e0393fccfc077d91bfdc0235738a47a0761a05
kernel-devel-2.6.18-128.14.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 751c61d8f3f04262c9ce86959be5eac7
SHA-256: f9c75774e71c06979809dbec97bcfd9eda9ef4dab4fef90e3f86386a5057a859
kernel-doc-2.6.18-128.14.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: fdfbc2d3865c9af2f1197b08b975bb8f
SHA-256: 377b0c9abd750cf72ff738f5761cd2bb3baa59f6798c7c05173fbc18a2d97efa
kernel-headers-2.6.18-128.14.1.el5.ppc.rpm
File outdated by:  RHBA-2010:0996
    MD5: f2fe015a77482bde821a9367a844eff9
SHA-256: 73cf735f2ec9bf9b2949c91d848575f0769e16388fb31abfff598fcc6c9982d9
kernel-headers-2.6.18-128.14.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: d6f9fa53341397c599776741b0dcbef0
SHA-256: be939da272cbf22effffb964eb236ec78616e14cb510540ebdb7c9bee6d7206d
kernel-kdump-2.6.18-128.14.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: f66d6f3198e14781a243f22cb104cb0c
SHA-256: 663245bacd99045fb2734bb19912d9e0336b52b73436c47eb96f0e5d6e905602
kernel-kdump-devel-2.6.18-128.14.1.el5.ppc64.rpm
File outdated by:  RHBA-2010:0996
    MD5: de3333c214db81cbe137834ff4321e08
SHA-256: 0c168f4570a807e8d02890633248e8e44aafd21a638c5ab2fcae906157bea578
 
s390x:
kernel-2.6.18-128.14.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 05935bdc13f718c8dfd3647040501ee9
SHA-256: 4470e54df9102e354b9f0c55c51aa10110dcd4a4e4408fe0c0dca496fe5533fa
kernel-debug-2.6.18-128.14.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: e68955c60233811bcd8dcf7428bd7b68
SHA-256: 741e25cb78839daa2c005b1fa5c012b3689514739349847c5dbb9206b00622ba
kernel-debug-devel-2.6.18-128.14.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 5b9b7cceadbc5e5bfb7e90b2e0c274ba
SHA-256: b84cf91bc27f9c4c524f300684a8c5de358ff84b9d5833a8d4f9c48a288c928e
kernel-devel-2.6.18-128.14.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 4cfe8ff6df3684aa3d584ecb6d8824b3
SHA-256: 95be5c1240e4fdf8feea912d86ed777b25cc3d27eca9553061393543d123bcf3
kernel-doc-2.6.18-128.14.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: fdfbc2d3865c9af2f1197b08b975bb8f
SHA-256: 377b0c9abd750cf72ff738f5761cd2bb3baa59f6798c7c05173fbc18a2d97efa
kernel-headers-2.6.18-128.14.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 14ac10e860d0b2a3c4259062161739ad
SHA-256: 44e16e0a3a2beb15bb02f3af423f4be23176998b16057aa1acda18cdb697e052
kernel-kdump-2.6.18-128.14.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 0bd1f832c43e9e98cdc8b01f6d3e886e
SHA-256: fc2c7c1895299620ab6fd3fe98ef806f818a033e201ccaa325b10d6cf4cc786f
kernel-kdump-devel-2.6.18-128.14.1.el5.s390x.rpm
File outdated by:  RHBA-2010:0996
    MD5: 46bec2dbbbf4dd5d29294f449166e2b4
SHA-256: 3d115fa25de279542b913887afef6f29943fb669173ecc5b5e1c771ea59021b4
 
x86_64:
kernel-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 30c79ea7d59ea6387a31d86caab12227
SHA-256: 509570ffb9b8876e7fab4946e8230d35a109f6d3a528ed4a967b98fb441da020
kernel-debug-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 0d7af518d54d27779b6cc85fe1e48e7f
SHA-256: dfbb9a4b12aca66127b840430ee762f0470ef489d398fe2ff322ca0543efb81a
kernel-debug-devel-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: e3dc8b00506fd98db9ddf2e2f9a0a546
SHA-256: c5efc7fe7f139d65349685ab8cdf62770af725c36e79f20872d466b9430e83af
kernel-devel-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: f16cfdf064fce16d717c64c2f249b9bf
SHA-256: 3d5952409d8528bd10b30abca8d8c8f2be6120bcb494e29ef57ddb12fe69e00f
kernel-doc-2.6.18-128.14.1.el5.noarch.rpm
File outdated by:  RHBA-2010:0996
    MD5: fdfbc2d3865c9af2f1197b08b975bb8f
SHA-256: 377b0c9abd750cf72ff738f5761cd2bb3baa59f6798c7c05173fbc18a2d97efa
kernel-headers-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 096aee95cd4eea0749ad89fd2bdfd562
SHA-256: 65ee6c4ba591235eb1a73e08bb46e1b90d75d4101e1e3563ed4d0e249289daa3
kernel-xen-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: 2f075c25ec0819a5bef1e2f21828f29c
SHA-256: 2ad43ed0c002b8916000c49063388401c04b9343de0abf371826925b541f050b
kernel-xen-devel-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2010:0996
    MD5: a7e5e79aa70636d2fa648edca0d73206
SHA-256: a1465faee1c14aa9430c4af815243e51b64dfbf87803f1e8ac447985c926b4f3
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
kernel-2.6.18-128.14.1.el5.src.rpm
File outdated by:  RHBA-2012:1356
    MD5: 8587e46a22515bf382e464660090ad01
SHA-256: fc107899d4b2937ee937daef2928d60c73267f7834e559920e781f8241662d00
 
IA-32:
kernel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: c5eb8c0d1148a3f89a98812530e9e0fe
SHA-256: be3e13d9d3ece5c174b327bd1014bd8d53f84d4001b9fb8a69427cd371754909
kernel-PAE-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: d759e2e52274e9eff7086bfc08f5b151
SHA-256: 96c262bab001a7480a0cc41527caebe57a33e5e0ceef3bb3ff9963b159b96de0
kernel-PAE-devel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 33f2843d24a7678c454004d52d158119
SHA-256: 2978bf4a4346fa0a969c6668ddc3cf1df762b933b332433a3c896e04d1386b39
kernel-debug-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: dd5824052d29ccce35d3b9a1eab0fa71
SHA-256: 47fb097c1647770a5bde4a31502ee9d90679e326086b2a1404a5a8bd404e9974
kernel-debug-devel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: bccef71ae62e6eec40994f160994947f
SHA-256: 9286829485c6dc93e420fa6ca4cb6704752b167ec73c720bcec795c82b7e422d
kernel-devel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 852c291ad8486df39f021b35233e4329
SHA-256: c1da0b39e7b0b11cdf60b622e818b9c617f1bc661497247051fcc45a5af401b4
kernel-doc-2.6.18-128.14.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: fdfbc2d3865c9af2f1197b08b975bb8f
SHA-256: 377b0c9abd750cf72ff738f5761cd2bb3baa59f6798c7c05173fbc18a2d97efa
kernel-headers-2.6.18-128.14.1.el5.i386.rpm
File outdated by:  RHBA-2012:1356
    MD5: 7dcbee14ef673f77eea3f4198235e636
SHA-256: fae5f58694c3edf960e8bafde635dd7a612cd0601ab721f7b077fa013f0021b4
kernel-xen-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 190a044159f330e9ccd3a7c830fb133c
SHA-256: 304c78960796bdb8de96b6874725c7ae3ae00ef05a15b2254d8cb45d69366aa0
kernel-xen-devel-2.6.18-128.14.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 8c550db75b53b94a1291d23873493d0c
SHA-256: 29d97183160e85a7d174ffa5684cbbd3aeecb56a35bf6424f026735cbf6ac89e
 
IA-64:
kernel-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 2f3e3c170900ad1c25526aaac34ad659
SHA-256: da04e267e3b72b2a7b359225e8647d0a52f368fdc5b38b19001b61c312ea8008
kernel-debug-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: b12d68a4b4e995fd415871aa57e2e48b
SHA-256: 88b1765239b99839a468c5d3a4becd5af970ef7aceb351af7e67604496c89d50
kernel-debug-devel-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 6a074472b0ed2f2d9232fa9a5d562ecd
SHA-256: 405f2df79a421a0865ea65f87dbbfd9996b06f8a430fcc58aa7a06de1f7f009f
kernel-devel-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 01ac2123f62879e0a84f6d5120a64284
SHA-256: 614b5a4f760139b4590e2ecc7fbd39963e6edecee1d6b14dbd36a7d2c6bc0175
kernel-doc-2.6.18-128.14.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: fdfbc2d3865c9af2f1197b08b975bb8f
SHA-256: 377b0c9abd750cf72ff738f5761cd2bb3baa59f6798c7c05173fbc18a2d97efa
kernel-headers-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: bfa34ec2f241dc7ec5fd9d9b6b4b9c78
SHA-256: 80bf8c17feb3888aa0c20ee35ef8dd6b205792067dcb133c1a0911b3e788cef2
kernel-xen-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: bbe4667012186acfcaf44e0b9be720c7
SHA-256: bec0db6eb85c6d4a173082b86d958a6ab4349ef7b91293d545112ee3a095b41a
kernel-xen-devel-2.6.18-128.14.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 9920bf835b3bd9a7138489c621521005
SHA-256: 3010c10d90e0511c61f9c5f79de8b79753fa0764eb1d71972ac25b5950f937f0
 
x86_64:
kernel-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 30c79ea7d59ea6387a31d86caab12227
SHA-256: 509570ffb9b8876e7fab4946e8230d35a109f6d3a528ed4a967b98fb441da020
kernel-debug-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 0d7af518d54d27779b6cc85fe1e48e7f
SHA-256: dfbb9a4b12aca66127b840430ee762f0470ef489d398fe2ff322ca0543efb81a
kernel-debug-devel-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: e3dc8b00506fd98db9ddf2e2f9a0a546
SHA-256: c5efc7fe7f139d65349685ab8cdf62770af725c36e79f20872d466b9430e83af
kernel-devel-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: f16cfdf064fce16d717c64c2f249b9bf
SHA-256: 3d5952409d8528bd10b30abca8d8c8f2be6120bcb494e29ef57ddb12fe69e00f
kernel-doc-2.6.18-128.14.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: fdfbc2d3865c9af2f1197b08b975bb8f
SHA-256: 377b0c9abd750cf72ff738f5761cd2bb3baa59f6798c7c05173fbc18a2d97efa
kernel-headers-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 096aee95cd4eea0749ad89fd2bdfd562
SHA-256: 65ee6c4ba591235eb1a73e08bb46e1b90d75d4101e1e3563ed4d0e249289daa3
kernel-xen-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 2f075c25ec0819a5bef1e2f21828f29c
SHA-256: 2ad43ed0c002b8916000c49063388401c04b9343de0abf371826925b541f050b
kernel-xen-devel-2.6.18-128.14.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: a7e5e79aa70636d2fa648edca0d73206
SHA-256: a1465faee1c14aa9430c4af815243e51b64dfbf87803f1e8ac447985c926b4f3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

547906 - CVE-2009-4141 kernel: create_elf_tables can leave urandom in a bad state
555658 - CVE-2010-0008 kernel: sctp remote denial of service
557683 - [5.4] sched_rr_get_interval() destroys user data in 32-bit compat mode. [rhel-5.3.z]
559334 - e1000e: wol is broken on 2.6.18-185.el5 [rhel-5.3.z]
563781 - CVE-2010-0437 kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference
568307 - [x86_64]: copy_user_c can zero more data than needed [rhel-5.3.z]
568663 - CRM 1908390 - BUG: warning at fs/inotify.c:181/set_dentry_child_flags() [rhel-5.3.z]


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/