Skip to navigation

Security Advisory Moderate: kernel security and bug fix update

Advisory: RHSA-2011:1321-1
Type: Security Advisory
Severity: Moderate
Issued on: 2011-09-20
Last updated on: 2011-09-20
Affected Products: Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)
CVEs (cve.mitre.org): CVE-2011-2723

Details

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The kernel packages contain the Linux kernel.

Security fix:

* A flaw in skb_gro_header_slow() in the Linux kernel could lead to GRO
(Generic Receive Offload) fields being left in an inconsistent state. An
attacker on the local network could use this flaw to trigger a denial of
service. (CVE-2011-2723, Moderate)

Red Hat would like to thank Brent Meshier for reporting this issue.

Bug fixes:

* When reading a file from a subdirectory in /proc/bus/pci/ while
hot-unplugging the device related to that file, the system will crash. Now,
the kernel correctly handles the simultaneous removal of a device and
access to the representation of that device in the proc file system.
(BZ#713454)

* RHSA-2011:0017 introduced a regression: Non-disk SCSI devices (except for
tape drives) such as enclosure or CD-ROM devices were hidden when attached
to a SAS based RAID controller that uses the megaraid_sas driver. With this
update, such devices are accessible, as expected. (BZ#726487)

* The fix for CVE-2010-3432 provided in RHSA-2011:0004 introduced a
regression: Information in sctp_packet_config(), which was called before
appending data chunks to a packet, was not reset, causing considerably poor
SCTP (Stream Control Transmission Protocol) performance. With this update,
the packet information is reset after transmission. (BZ#727591)

* Certain systems do not correctly set the ACPI FADT APIC mode bit. They
set the bit to "cluster" mode instead of "physical" mode which caused these
systems to boot without the TSC (Time Stamp Counter). With this update, the
ACPI FADT check has been removed due to its unreliability. (BZ#728162)

* Performance when invalidating and rereading cached data as a glock moves
around the cluster with GFS2 is improved. (BZ#729082)

* Performance issues occurred when multiple nodes attempted to call mmap()
on the same inode at the same time on a GFS2 file system, as it was using
an exclusive glock. With this update, a shared lock is used when "noatime"
is set on the mount, allowing mmap() operations to occur in parallel,
fixing this bug. Note that this issue only refers to mmap() system calls,
and not to subsequent page faults. (BZ#729090)

* Some of the functions in the GFS2 file system were not reserving enough
space for the resource group header in a transaction and for resource
groups bit blocks that get added when a memory allocation is performed.
That resulted in failed write and allocation operations. With this update,
GFS2 makes sure to reserve space in the described scenario, using the new
gfs2_rg_blocks() inline function. (BZ#729092)

* When GFS2 grew the file system, it never reread the rindex file during
the grow. This is necessary for large grows when the file system is almost
full, and GFS2 needs to use some of the space allocated earlier in the grow
to complete it. Now, if GFS2 fails to reserve the necessary space and the
rindex data is not up-to-date, it rereads it. (BZ#729094)

* Previously, when the Xen hypervisor split a 2 MB page into 4 KB pages, it
linked the new page from PDE (Page Directory Entry) before it filled
entries of the page with appropriate data. Consequently, when doing a live
migration with EPT (Extended Page Tables) enabled on a non-idle guest
running with more than two virtual CPUs, the guest often terminated
unexpectedly. With this update, the Xen hypervisor prepares the page table
entry first, and then links it in. (BZ#730684)

* Changes made to TSC as a clock source for IRQs caused virtual machines
running under the VMware ESX or ESXi hypervisors to become unresponsive
during the initial kernel boot process. With this update, the
enable_tsc_timer flag enables the do_timer_tsc_timekeeping() function to be
called in the do_timer_interrupt_hook() function, preventing a deadlock in
the timer interrupt handler. (BZ#730688)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
kernel-2.6.18-238.27.1.el5.src.rpm
File outdated by:  RHBA-2014:0013
    MD5: d62201e96bd4af5688cd2bbb84aa9268
SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
 
IA-32:
kernel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 08da53cbc17261abd4d7ee894b05bdd1
SHA-256: 097567137218b57cda73120e7eceecd9b9a3a88626bc8422f024794049393cf5
kernel-PAE-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: b1319a5d2b4904dca62b8add09032db8
SHA-256: 5205d26ab88d0c60971c069ac0643cc168e2b143811bce2c5f9bdfa861a2368a
kernel-PAE-devel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: ed03e356d0f01b57f80d70d17e28c273
SHA-256: dffd874f1c8f46a5cad745378c36e9464e0bbbdb61e4a2b04af1f2533fdfecd0
kernel-debug-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 6219a5a8b4b8bc8a06940e811b53c134
SHA-256: 5e22ef0a8e0baa7a85c882f80cb766f51195c87bd88fa23d17c2d49e2fd9bb75
kernel-debug-devel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 64aa3d2a4b253b57ff433ff5178f1bad
SHA-256: 0d871182725418cb0ffc28303f00c353bcbec72d1a6b59be194c8e5092427dd0
kernel-devel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: d02829a944200848dc7009b3a1e750f3
SHA-256: 9f3a0f2ff58291dc1ae5806599df38f246d61f40d30c391c9bd06557f78cdaa1
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5c0dc5aa6fd7004cf4ab80b52e316126
SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.i386.rpm
File outdated by:  RHBA-2014:0013
    MD5: bba43a44ed03c6a4b6e870e6aae6d84e
SHA-256: 7135eb35ad98bddc9307577821c244108cb2e426ab0cfa259c49032b5a7619fd
kernel-xen-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 527f3e87b5d1ca57a82e46c2a6967305
SHA-256: 49fb2bae1f7e2aef95b4235772a8e1b1cebe3c29a292aa64c877a7cc94325177
kernel-xen-devel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5004903c65f421a669ec767f7d71e280
SHA-256: ca4b5b3115d2a910f0e8fe9107d4566fa7c3c99a81ff7ad77e7a11f588c8853d
 
IA-64:
kernel-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 975e2e534ca1430180c6639877ffe666
SHA-256: 2f8c277043be08fc42dfec81756f4122bbd152b8eb7fd8aa23944fe8a81dd848
kernel-debug-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 1317f4aa2f0ed55bec05d1ec1b449bb5
SHA-256: 8b0b9178a0df31896e6e6a2d4c721eb1ce44570cc8e287e839722d9ba4b1be4f
kernel-debug-devel-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 4da0084981f933ba05f901e43a35bd1a
SHA-256: 9431ebeffe80f95c00c8d12ce08133247ece044058d3408beb7f0c7fd8456502
kernel-devel-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 868313f830b225813f7539a38f82bc07
SHA-256: 386a02ea635be480a40f4345c3d69ecb955e2674f371ab634a172c83c9ee0eda
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5c0dc5aa6fd7004cf4ab80b52e316126
SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 932d9de49cc4303cd6cc387cbe2228e8
SHA-256: a3c53d196eeb971fa67e5b1089b9fc6deb40b7bf942f719aee92d730a8f042ba
kernel-xen-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 9c499df30b81f6397b9a13358b0c6380
SHA-256: da838344bd1003077e58783adac2edbeb33586de9a21c555595aa9378d71f9c2
kernel-xen-devel-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 80c88213ab998cb5df8903b283aeded0
SHA-256: 9dfa64b1aa6897ca2f53c0d8fc48cbe5bdde9a055480506f0f32af73b05afe83
 
PPC:
kernel-2.6.18-238.27.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 7877094d16dcb2573b339eeccb33f3fc
SHA-256: 691f59213c8183da56c0f3fe71ea3ba3bc3edd79b2febc588bc59240affacc36
kernel-debug-2.6.18-238.27.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: aaf919e144bc9ffbfbd4b589217bae66
SHA-256: 609a3f3b5bd4adf0fb87cef9a8ef08cfc3f37c7b752375e413572e77a23b2938
kernel-debug-devel-2.6.18-238.27.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: d0b2132f630bdf3ea4924159ff346091
SHA-256: 72259b821ede9ba282e000d1ad8f60b227b53f110d3854b7b68e6b5b0085554c
kernel-devel-2.6.18-238.27.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 4e63c0a6cbdd60b5795315a3dabc7c79
SHA-256: 311073c8af0dd942c8fbb58665c4e1bcf41459cbcdc7c7c605b4c91a927c860d
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5c0dc5aa6fd7004cf4ab80b52e316126
SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0013
    MD5: 3d87d27488ccba0faf3a24d8485826f7
SHA-256: 174706f0e52590d398b55264d45b0a4c735c39c3635000ee3c242921f1d1d807
kernel-headers-2.6.18-238.27.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 632dea655e17fc98486d083b1be80def
SHA-256: 1b2bacc8d6d17a6e0d49a13f20831df45dc8dd9f702d4a5bf751c5e70defd46d
kernel-kdump-2.6.18-238.27.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 8a57717d531217e5102412af97a51c7b
SHA-256: c3bf6b690abd3c03afb85bd1a96435141c7e37b6785505c8646508651fe39351
kernel-kdump-devel-2.6.18-238.27.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: c7da1e80fddf1bb8b96818e0600b2c35
SHA-256: 1b60c633dcf1c73dfe7d4fddda408e4b4c6cd1fde5a0941cad270304ad66c058
 
s390x:
kernel-2.6.18-238.27.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: d666eb29f261e7b51992e76fc034f44c
SHA-256: 954f7c3f6651ad856a8a4a0e840da2a692f9c7065b4521cc5a63fd12df010875
kernel-debug-2.6.18-238.27.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 028f83e56e6b937de781753d4459c0b9
SHA-256: e107f873a585ff1ca82f75d9ecd82e48a1b420f316d4e4a13275043204644ab3
kernel-debug-devel-2.6.18-238.27.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 24fd74d3bfabafb0cb2d6d6d094899bd
SHA-256: 568955ced9732049517033a4ffd255a7802dbc78dce0c672d8de0154209c00e8
kernel-devel-2.6.18-238.27.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 4a95ea60f1467e188f7aff20f042a21a
SHA-256: b3429590d17daa41ef7a724f00254131a01e3040bc09d576fcde8e3bda7b3aca
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5c0dc5aa6fd7004cf4ab80b52e316126
SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 7a3db3d839e6dbecbdcca6467cedb47d
SHA-256: b2b68caaacd1f2e089383c998a1f28e0dacec8507c7a19f4441b884eb15ef3cd
kernel-kdump-2.6.18-238.27.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: ba49eb48d1f666892805f1ea308ec1d6
SHA-256: 0a3af46fa7e31ddb7dcf9a9c0990a6897d9b4cd1c2f17276f89060776fc94695
kernel-kdump-devel-2.6.18-238.27.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 3a06b32e047fd41f7c8b8f0db77c7738
SHA-256: 95070e777bcb015873b90eee931bcbd37cc4bdd40b6258cb336b04651f6790d9
 
x86_64:
kernel-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 405ac38e56951e8a94202632a61409d9
SHA-256: 452ad1ff04c711c06808bd2e24a1635f5be1889262c13167bfd5440175bbb9dd
kernel-debug-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: c5c0eaead40240b5ca4e2d46cff26081
SHA-256: 7a7af7fe782f8688e958fb7149a59a2419e895eea846dd6f797f293dd222c313
kernel-debug-devel-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0ec78ee63a7c0da05d769ad3ccb6a2d9
SHA-256: a2bcf77e238d65d41f5bb796c26f148fa9d73ad06b5db0283e61dc2813834da7
kernel-devel-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: ed78a4617c1fee979eb37d3250ddfe5e
SHA-256: cbcf971931f0db5d7bf94ece3788c90d76b368c38ef6b341cce91f1def41b198
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5c0dc5aa6fd7004cf4ab80b52e316126
SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 19c04c0e4dad0a45d8d74da9282dcca4
SHA-256: 9d7875f74a6407bf883cc821397879c824db38ce67dd1ae5a8c0f49d0be2e00b
kernel-xen-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 73134a116300f6786bc3386577170c12
SHA-256: b833a23b05b31d46c267011c6db4ec3348080deb27535507228764acf0b479c9
kernel-xen-devel-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 19d306fd3036097d0bff6885a5319176
SHA-256: 37080a9e5d2e060e98f13da824834d3ce504fbd55af78c5005b1e4fa367b611f
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
kernel-2.6.18-238.27.1.el5.src.rpm
File outdated by:  RHBA-2014:0013
    MD5: d62201e96bd4af5688cd2bbb84aa9268
SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
 
IA-32:
kernel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 08da53cbc17261abd4d7ee894b05bdd1
SHA-256: 097567137218b57cda73120e7eceecd9b9a3a88626bc8422f024794049393cf5
kernel-PAE-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: b1319a5d2b4904dca62b8add09032db8
SHA-256: 5205d26ab88d0c60971c069ac0643cc168e2b143811bce2c5f9bdfa861a2368a
kernel-PAE-devel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: ed03e356d0f01b57f80d70d17e28c273
SHA-256: dffd874f1c8f46a5cad745378c36e9464e0bbbdb61e4a2b04af1f2533fdfecd0
kernel-debug-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 6219a5a8b4b8bc8a06940e811b53c134
SHA-256: 5e22ef0a8e0baa7a85c882f80cb766f51195c87bd88fa23d17c2d49e2fd9bb75
kernel-debug-devel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 64aa3d2a4b253b57ff433ff5178f1bad
SHA-256: 0d871182725418cb0ffc28303f00c353bcbec72d1a6b59be194c8e5092427dd0
kernel-devel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: d02829a944200848dc7009b3a1e750f3
SHA-256: 9f3a0f2ff58291dc1ae5806599df38f246d61f40d30c391c9bd06557f78cdaa1
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5c0dc5aa6fd7004cf4ab80b52e316126
SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.i386.rpm
File outdated by:  RHBA-2014:0013
    MD5: bba43a44ed03c6a4b6e870e6aae6d84e
SHA-256: 7135eb35ad98bddc9307577821c244108cb2e426ab0cfa259c49032b5a7619fd
kernel-xen-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 527f3e87b5d1ca57a82e46c2a6967305
SHA-256: 49fb2bae1f7e2aef95b4235772a8e1b1cebe3c29a292aa64c877a7cc94325177
kernel-xen-devel-2.6.18-238.27.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5004903c65f421a669ec767f7d71e280
SHA-256: ca4b5b3115d2a910f0e8fe9107d4566fa7c3c99a81ff7ad77e7a11f588c8853d
 
IA-64:
kernel-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 975e2e534ca1430180c6639877ffe666
SHA-256: 2f8c277043be08fc42dfec81756f4122bbd152b8eb7fd8aa23944fe8a81dd848
kernel-debug-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 1317f4aa2f0ed55bec05d1ec1b449bb5
SHA-256: 8b0b9178a0df31896e6e6a2d4c721eb1ce44570cc8e287e839722d9ba4b1be4f
kernel-debug-devel-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 4da0084981f933ba05f901e43a35bd1a
SHA-256: 9431ebeffe80f95c00c8d12ce08133247ece044058d3408beb7f0c7fd8456502
kernel-devel-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 868313f830b225813f7539a38f82bc07
SHA-256: 386a02ea635be480a40f4345c3d69ecb955e2674f371ab634a172c83c9ee0eda
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5c0dc5aa6fd7004cf4ab80b52e316126
SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 932d9de49cc4303cd6cc387cbe2228e8
SHA-256: a3c53d196eeb971fa67e5b1089b9fc6deb40b7bf942f719aee92d730a8f042ba
kernel-xen-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 9c499df30b81f6397b9a13358b0c6380
SHA-256: da838344bd1003077e58783adac2edbeb33586de9a21c555595aa9378d71f9c2
kernel-xen-devel-2.6.18-238.27.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 80c88213ab998cb5df8903b283aeded0
SHA-256: 9dfa64b1aa6897ca2f53c0d8fc48cbe5bdde9a055480506f0f32af73b05afe83
 
x86_64:
kernel-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 405ac38e56951e8a94202632a61409d9
SHA-256: 452ad1ff04c711c06808bd2e24a1635f5be1889262c13167bfd5440175bbb9dd
kernel-debug-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: c5c0eaead40240b5ca4e2d46cff26081
SHA-256: 7a7af7fe782f8688e958fb7149a59a2419e895eea846dd6f797f293dd222c313
kernel-debug-devel-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0ec78ee63a7c0da05d769ad3ccb6a2d9
SHA-256: a2bcf77e238d65d41f5bb796c26f148fa9d73ad06b5db0283e61dc2813834da7
kernel-devel-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: ed78a4617c1fee979eb37d3250ddfe5e
SHA-256: cbcf971931f0db5d7bf94ece3788c90d76b368c38ef6b341cce91f1def41b198
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5c0dc5aa6fd7004cf4ab80b52e316126
SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 19c04c0e4dad0a45d8d74da9282dcca4
SHA-256: 9d7875f74a6407bf883cc821397879c824db38ce67dd1ae5a8c0f49d0be2e00b
kernel-xen-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 73134a116300f6786bc3386577170c12
SHA-256: b833a23b05b31d46c267011c6db4ec3348080deb27535507228764acf0b479c9
kernel-xen-devel-2.6.18-238.27.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 19d306fd3036097d0bff6885a5319176
SHA-256: 37080a9e5d2e060e98f13da824834d3ce504fbd55af78c5005b1e4fa367b611f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

726552 - CVE-2011-2723 kernel: gro: only reset frag0 when skb can be pulled
729090 - mmapping a read only file on a gfs2 filesystem incorrectly acquires an exclusive glock
729092 - GFS2: Not enough space reserved in gfs2_write_begin and possibly elsewhere.
729094 - GFS2: Kernel changes necessary to allow growing completely full filesystems.


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/