Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2011:0833-1
Type: Security Advisory
Severity: Important
Issued on: 2011-05-31
Last updated on: 2011-05-31
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)
CVEs (cve.mitre.org): CVE-2011-0726
CVE-2011-1078
CVE-2011-1079
CVE-2011-1080
CVE-2011-1093
CVE-2011-1163
CVE-2011-1166
CVE-2011-1170
CVE-2011-1171
CVE-2011-1172
CVE-2011-1494
CVE-2011-1495
CVE-2011-1577
CVE-2011-1763

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A flaw in the dccp_rcv_state_process() function could allow a remote
attacker to cause a denial of service, even when the socket was already
closed. (CVE-2011-1093, Important)

* Multiple buffer overflow flaws were found in the Linux kernel's
Management Module Support for Message Passing Technology (MPT) based
controllers. A local, unprivileged user could use these flaws to cause a
denial of service, an information leak, or escalate their privileges.
(CVE-2011-1494, CVE-2011-1495, Important)

* A missing validation of a null-terminated string data structure element
in the bnep_sock_ioctl() function could allow a local user to cause an
information leak or a denial of service. (CVE-2011-1079, Moderate)

* Missing error checking in the way page tables were handled in the Xen
hypervisor implementation could allow a privileged guest user to cause the
host, and the guests, to lock up. (CVE-2011-1166, Moderate)

* A flaw was found in the way the Xen hypervisor implementation checked for
the upper boundary when getting a new event channel port. A privileged
guest user could use this flaw to cause a denial of service or escalate
their privileges. (CVE-2011-1763, Moderate)

* The start_code and end_code values in "/proc/[pid]/stat" were not
protected. In certain scenarios, this flaw could be used to defeat Address
Space Layout Randomization (ASLR). (CVE-2011-0726, Low)

* A missing initialization flaw in the sco_sock_getsockopt() function could
allow a local, unprivileged user to cause an information leak.
(CVE-2011-1078, Low)

* A missing validation of a null-terminated string data structure element
in the do_replace() function could allow a local user who has the
CAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1080, Low)

* A buffer overflow flaw in the DEC Alpha OSF partition implementation in
the Linux kernel could allow a local attacker to cause an information leak
by mounting a disk that contains specially-crafted partition tables.
(CVE-2011-1163, Low)

* Missing validations of null-terminated string data structure elements in
the do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(),
and do_arpt_get_ctl() functions could allow a local user who has the
CAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170,
CVE-2011-1171, CVE-2011-1172, Low)

* A heap overflow flaw in the Linux kernel's EFI GUID Partition Table (GPT)
implementation could allow a local attacker to cause a denial of service
by mounting a disk that contains specially-crafted partition tables.
(CVE-2011-1577, Low)

Red Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and
CVE-2011-1495; Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1078,
CVE-2011-1080, CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172; Kees Cook
for reporting CVE-2011-0726; and Timo Warns for reporting CVE-2011-1163
and CVE-2011-1577.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-238.12.1.el5.src.rpm
File outdated by:  RHBA-2014:0013
    MD5: 155fc6b55999d76127ea3c2f267a0c9f
SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
 
IA-32:
kernel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ab5569eeead3d60b64edc630bac8499c
SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 75683d146700ee90a3d5ca08a551c5b6
SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a470708e5ecc37de14d69e022ac0db68
SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 32b9c6f4487b63baa76558d36c389587
SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc03cffdaaae320df0ae43015473fd76
SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 55244559ba8ef8d8cb5c122eb515e491
SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: e96655ec2f0de9274c568410f337de83
SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3aa39897dca85ae6c7b50a200f30012b
SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bd1414aaeb5894343da6adc15f53b894
SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba
 
IA-64:
kernel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0e5600f688443d477bbfbf07e917ba2d
SHA-256: 16df790fd91b0f69a0ff91f2735adbb7da014e518df84bd4c466a159cfe558e5
kernel-debug-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ef47d8a9307017127bc715025153d9a7
SHA-256: 282c2dbf4e6a0f48a8747390a3f998b886df7b699b8836db7e9e087806a457d1
kernel-debug-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7bc964bf3f3fcbfcc2d3bf67029f6a07
SHA-256: d04741526e2e2dc142811b8a3bff32be599734cad110dc4836963630f8316f8f
kernel-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 59fa2546cdc77718a5d69dfbb7f4d4b2
SHA-256: 5bb0b88bdc1f3ae798e2cc10e102c02f06a94656639cd13baf09183f1816293a
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cf3f4fea722a4efa64cdee4b9e1ae20f
SHA-256: 71e68f2e6dc9b2e8fba528c5ed40ab5924dcab6b6bad1818768bc75421947a2d
kernel-xen-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 642bac8f787abceceba2245fe28dacbd
SHA-256: f45b4e49fbbf0b1bc212c4c7e8d35ebb93f808e0442efd452bb7c5eff2146bf0
kernel-xen-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e8bf403692f2f4e0889b2773781bb4ba
SHA-256: 578a476c3050dc815c16001f725997e742e33eeae18d6f1a2583d1e881dd4374
 
PPC:
kernel-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d5893b6d75ac50a707fbf45e16c2e34
SHA-256: 45b9585ef851f679d01b10a67f03a82e16895bad6856ee33cda06da48bf9720d
kernel-debug-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2f7573702051bbf0bf54480aec903c2a
SHA-256: bca50937dd6ab88a777e853b419737569c558c1322abd983612bfb52616c228f
kernel-debug-devel-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc14880a05412a2fb3f2cafc675aa8a9
SHA-256: c72cdbc749c6ca05276aa21c2456fb41de0d5e648e786cd3977fb84552ea61f0
kernel-devel-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8ecd9debdb8f7cb40c4e37cf45859e15
SHA-256: 7a72945fab2befe6f1408267097e5b70cfafc25ec1dab3ff7be7930747bc5c35
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 34c3ef314c43832b195b25ebe71bb256
SHA-256: 9b09437089804e1791e5bd7dc34bedfa3448a8bd426e38090dfcfd7665cef435
kernel-headers-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 43fe5c081e6282b335ade987b60da125
SHA-256: 7abae94619c48a2f586ab943541821c3a38c58922274c68b3f5c0c5836321371
kernel-kdump-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 56c3eca795a367918f1d2d7a1d3c6e84
SHA-256: a8f788b555b32c43522f45ddb7419bd68bdbb3cb7449484e00f7a26d2cf4338b
kernel-kdump-devel-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3ba033fe1d84d0b4c7cf1f3617ff7463
SHA-256: 00f9438c10d29b08c66fdeb92b94a0e9e875e71a48398b4a2859fe3818072634
 
s390x:
kernel-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 28945341d51f3ae559f5ec59f8b8c224
SHA-256: 48fad836b190c85615060a6eb3863b718c7335233efb8c98447b5f67bd89e987
kernel-debug-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 76664f5bffe85eaae042ba2fc6c8f8f9
SHA-256: c68fcd40835e3a3f6c753190e4da6a8244e35a9114524d21f0e1379fa0db6e05
kernel-debug-devel-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 91026c68fc636a0d83aa77cec5b6fe93
SHA-256: 420994329f4ef0604ead7000b2b5caeab1f7a4c96ecc39f49d2556ecc758e5f8
kernel-devel-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6135cda9e38b8770140c3d327918aa77
SHA-256: e666d1c0fcba50d1613df6471c7b736d0b899db5fc6d254be46ac64e3e898fe2
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 897661b50b52cbd008e8ef6fda8646e2
SHA-256: 87c36234f4596ed8da8940636b868ca4bd51e4f8fc191324827026dbb24d0362
kernel-kdump-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: c7a97e88fe2757243dfe006f94678e66
SHA-256: 1888ff632fbf0c990e21a62b6c7f1b589e45f409b6ed2f73d7a9dbd0dfa6abf9
kernel-kdump-devel-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: b69e77e096070b952913afdda008edb8
SHA-256: fa8bb396d5b867bd8fc852af6d0b86630986c663d7cf102075b5ff4c393b3914
 
x86_64:
kernel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b036a149b8be2d690231330f204fa414
SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ace95439e5a5895f23d46054dd1ecee9
SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0c4a6bd13c5de7e5638242ac6b435875
SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5a3d79351f2b4f08fea4e6a0913c0e0b
SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 225265bc7d30c6f37b16391c4d6e6e43
SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b46b1cdcf2674c577eaeee57582d3354
SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2561f585a3a3efdb31f1be98a6606778
SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-238.12.1.el5.src.rpm
File outdated by:  RHBA-2014:0013
    MD5: 155fc6b55999d76127ea3c2f267a0c9f
SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
 
IA-32:
kernel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ab5569eeead3d60b64edc630bac8499c
SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 75683d146700ee90a3d5ca08a551c5b6
SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a470708e5ecc37de14d69e022ac0db68
SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 32b9c6f4487b63baa76558d36c389587
SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: fc03cffdaaae320df0ae43015473fd76
SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 55244559ba8ef8d8cb5c122eb515e491
SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: e96655ec2f0de9274c568410f337de83
SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3aa39897dca85ae6c7b50a200f30012b
SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bd1414aaeb5894343da6adc15f53b894
SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba
 
x86_64:
kernel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b036a149b8be2d690231330f204fa414
SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ace95439e5a5895f23d46054dd1ecee9
SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0c4a6bd13c5de7e5638242ac6b435875
SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5a3d79351f2b4f08fea4e6a0913c0e0b
SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 225265bc7d30c6f37b16391c4d6e6e43
SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b46b1cdcf2674c577eaeee57582d3354
SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2561f585a3a3efdb31f1be98a6606778
SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
kernel-2.6.18-238.12.1.el5.src.rpm
File outdated by:  RHBA-2014:0013
    MD5: 155fc6b55999d76127ea3c2f267a0c9f
SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
 
IA-32:
kernel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: ab5569eeead3d60b64edc630bac8499c
SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 75683d146700ee90a3d5ca08a551c5b6
SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: a470708e5ecc37de14d69e022ac0db68
SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 32b9c6f4487b63baa76558d36c389587
SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: fc03cffdaaae320df0ae43015473fd76
SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 55244559ba8ef8d8cb5c122eb515e491
SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm
File outdated by:  RHBA-2014:0013
    MD5: e96655ec2f0de9274c568410f337de83
SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 3aa39897dca85ae6c7b50a200f30012b
SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: bd1414aaeb5894343da6adc15f53b894
SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba
 
IA-64:
kernel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0e5600f688443d477bbfbf07e917ba2d
SHA-256: 16df790fd91b0f69a0ff91f2735adbb7da014e518df84bd4c466a159cfe558e5
kernel-debug-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: ef47d8a9307017127bc715025153d9a7
SHA-256: 282c2dbf4e6a0f48a8747390a3f998b886df7b699b8836db7e9e087806a457d1
kernel-debug-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 7bc964bf3f3fcbfcc2d3bf67029f6a07
SHA-256: d04741526e2e2dc142811b8a3bff32be599734cad110dc4836963630f8316f8f
kernel-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 59fa2546cdc77718a5d69dfbb7f4d4b2
SHA-256: 5bb0b88bdc1f3ae798e2cc10e102c02f06a94656639cd13baf09183f1816293a
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: cf3f4fea722a4efa64cdee4b9e1ae20f
SHA-256: 71e68f2e6dc9b2e8fba528c5ed40ab5924dcab6b6bad1818768bc75421947a2d
kernel-xen-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 642bac8f787abceceba2245fe28dacbd
SHA-256: f45b4e49fbbf0b1bc212c4c7e8d35ebb93f808e0442efd452bb7c5eff2146bf0
kernel-xen-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: e8bf403692f2f4e0889b2773781bb4ba
SHA-256: 578a476c3050dc815c16001f725997e742e33eeae18d6f1a2583d1e881dd4374
 
PPC:
kernel-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0d5893b6d75ac50a707fbf45e16c2e34
SHA-256: 45b9585ef851f679d01b10a67f03a82e16895bad6856ee33cda06da48bf9720d
kernel-debug-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 2f7573702051bbf0bf54480aec903c2a
SHA-256: bca50937dd6ab88a777e853b419737569c558c1322abd983612bfb52616c228f
kernel-debug-devel-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: fc14880a05412a2fb3f2cafc675aa8a9
SHA-256: c72cdbc749c6ca05276aa21c2456fb41de0d5e648e786cd3977fb84552ea61f0
kernel-devel-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 8ecd9debdb8f7cb40c4e37cf45859e15
SHA-256: 7a72945fab2befe6f1408267097e5b70cfafc25ec1dab3ff7be7930747bc5c35
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0013
    MD5: 34c3ef314c43832b195b25ebe71bb256
SHA-256: 9b09437089804e1791e5bd7dc34bedfa3448a8bd426e38090dfcfd7665cef435
kernel-headers-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 43fe5c081e6282b335ade987b60da125
SHA-256: 7abae94619c48a2f586ab943541821c3a38c58922274c68b3f5c0c5836321371
kernel-kdump-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 56c3eca795a367918f1d2d7a1d3c6e84
SHA-256: a8f788b555b32c43522f45ddb7419bd68bdbb3cb7449484e00f7a26d2cf4338b
kernel-kdump-devel-2.6.18-238.12.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 3ba033fe1d84d0b4c7cf1f3617ff7463
SHA-256: 00f9438c10d29b08c66fdeb92b94a0e9e875e71a48398b4a2859fe3818072634
 
s390x:
kernel-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 28945341d51f3ae559f5ec59f8b8c224
SHA-256: 48fad836b190c85615060a6eb3863b718c7335233efb8c98447b5f67bd89e987
kernel-debug-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 76664f5bffe85eaae042ba2fc6c8f8f9
SHA-256: c68fcd40835e3a3f6c753190e4da6a8244e35a9114524d21f0e1379fa0db6e05
kernel-debug-devel-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 91026c68fc636a0d83aa77cec5b6fe93
SHA-256: 420994329f4ef0604ead7000b2b5caeab1f7a4c96ecc39f49d2556ecc758e5f8
kernel-devel-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 6135cda9e38b8770140c3d327918aa77
SHA-256: e666d1c0fcba50d1613df6471c7b736d0b899db5fc6d254be46ac64e3e898fe2
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 897661b50b52cbd008e8ef6fda8646e2
SHA-256: 87c36234f4596ed8da8940636b868ca4bd51e4f8fc191324827026dbb24d0362
kernel-kdump-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: c7a97e88fe2757243dfe006f94678e66
SHA-256: 1888ff632fbf0c990e21a62b6c7f1b589e45f409b6ed2f73d7a9dbd0dfa6abf9
kernel-kdump-devel-2.6.18-238.12.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: b69e77e096070b952913afdda008edb8
SHA-256: fa8bb396d5b867bd8fc852af6d0b86630986c663d7cf102075b5ff4c393b3914
 
x86_64:
kernel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: b036a149b8be2d690231330f204fa414
SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: ace95439e5a5895f23d46054dd1ecee9
SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0c4a6bd13c5de7e5638242ac6b435875
SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5a3d79351f2b4f08fea4e6a0913c0e0b
SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 225265bc7d30c6f37b16391c4d6e6e43
SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: b46b1cdcf2674c577eaeee57582d3354
SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 2561f585a3a3efdb31f1be98a6606778
SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
kernel-2.6.18-238.12.1.el5.src.rpm
File outdated by:  RHBA-2014:0013
    MD5: 155fc6b55999d76127ea3c2f267a0c9f
SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
 
IA-32:
kernel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: ab5569eeead3d60b64edc630bac8499c
SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 75683d146700ee90a3d5ca08a551c5b6
SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: a470708e5ecc37de14d69e022ac0db68
SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 32b9c6f4487b63baa76558d36c389587
SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: fc03cffdaaae320df0ae43015473fd76
SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 55244559ba8ef8d8cb5c122eb515e491
SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm
File outdated by:  RHBA-2014:0013
    MD5: e96655ec2f0de9274c568410f337de83
SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 3aa39897dca85ae6c7b50a200f30012b
SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: bd1414aaeb5894343da6adc15f53b894
SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba
 
IA-64:
kernel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0e5600f688443d477bbfbf07e917ba2d
SHA-256: 16df790fd91b0f69a0ff91f2735adbb7da014e518df84bd4c466a159cfe558e5
kernel-debug-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: ef47d8a9307017127bc715025153d9a7
SHA-256: 282c2dbf4e6a0f48a8747390a3f998b886df7b699b8836db7e9e087806a457d1
kernel-debug-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 7bc964bf3f3fcbfcc2d3bf67029f6a07
SHA-256: d04741526e2e2dc142811b8a3bff32be599734cad110dc4836963630f8316f8f
kernel-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 59fa2546cdc77718a5d69dfbb7f4d4b2
SHA-256: 5bb0b88bdc1f3ae798e2cc10e102c02f06a94656639cd13baf09183f1816293a
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: cf3f4fea722a4efa64cdee4b9e1ae20f
SHA-256: 71e68f2e6dc9b2e8fba528c5ed40ab5924dcab6b6bad1818768bc75421947a2d
kernel-xen-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 642bac8f787abceceba2245fe28dacbd
SHA-256: f45b4e49fbbf0b1bc212c4c7e8d35ebb93f808e0442efd452bb7c5eff2146bf0
kernel-xen-devel-2.6.18-238.12.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: e8bf403692f2f4e0889b2773781bb4ba
SHA-256: 578a476c3050dc815c16001f725997e742e33eeae18d6f1a2583d1e881dd4374
 
x86_64:
kernel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: b036a149b8be2d690231330f204fa414
SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: ace95439e5a5895f23d46054dd1ecee9
SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0c4a6bd13c5de7e5638242ac6b435875
SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5a3d79351f2b4f08fea4e6a0913c0e0b
SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a52492a5197db2c6a483daf4057d277d
SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 225265bc7d30c6f37b16391c4d6e6e43
SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: b46b1cdcf2674c577eaeee57582d3354
SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 2561f585a3a3efdb31f1be98a6606778
SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

681259 - CVE-2011-1078 kernel: bt sco_conninfo infoleak
681260 - CVE-2011-1079 kernel: bnep device field missing NULL terminator
681262 - CVE-2011-1080 kernel: ebtables stack infoleak
682954 - CVE-2011-1093 kernel: dccp: fix oops on Reset after close
684569 - CVE-2011-0726 kernel: proc: protect mm start_code/end_code in /proc/pid/stat
688021 - CVE-2011-1163 kernel: fs/partitions: Corrupted OSF partition table infoleak
688156 - [5.6][REG]for some uses of 'nfsservctl' system call, the kernel crashes. [rhel-5.6.z]
688579 - CVE-2011-1166 kernel: xen: x86_64: fix error checking in arch_set_info_guest()
689321 - CVE-2011-1170 ipv4: netfilter: arp_tables: fix infoleak to userspace
689327 - CVE-2011-1171 ipv4: netfilter: ip_tables: fix infoleak to userspace
689345 - CVE-2011-1172 ipv6: netfilter: ip6_tables: fix infoleak to userspace
689699 - Deadlock between device driver attachment and device removal with a USB device [rhel-5.6.z]
689700 - [NetApp 5.6 Bug] QLogic 8G FC firmware dumps seen during IO [rhel-5.6.z]
690134 - Time runs too fast in a VM on processors with > 4GHZ freq [rhel-5.6.z]
690239 - gfs2: creating large files suddenly slow to a crawl [rhel-5.6.z]
694021 - CVE-2011-1494 CVE-2011-1495 kernel: drivers/scsi/mpt2sas: prevent heap overflows
695976 - CVE-2011-1577 kernel: corrupted GUID partition tables can cause kernel oops
696136 - RHEL 5.6 (kernel -238) causes audio issues [rhel-5.6.z]
697448 - slab corruption after seeing some nfs-related BUG: warning [rhel-5.6.z]
699808 - dasd: fix race between open and offline [rhel-5.6.z]
701240 - CVE-2011-1763 kernel: xen: improper upper boundary check in get_free_port() function


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/