Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2011:1813-1
Type: Security Advisory
Severity: Important
Issued on: 2011-12-13
Last updated on: 2011-12-13
Affected Products: Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)
CVEs (cve.mitre.org): CVE-2011-2482
CVE-2011-2491
CVE-2011-2495
CVE-2011-2517
CVE-2011-2519
CVE-2011-2901

Details

Updated kernel packages that fix several security issues and various bugs
are now available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

These packages contain the Linux kernel.

This update fixes the following security issues:

* A flaw in the Stream Control Transmission Protocol (SCTP) implementation
could allow a remote attacker to cause a denial of service by sending a
specially-crafted SCTP packet to a target system. (CVE-2011-2482,
Important)

If you do not run applications that use SCTP, you can prevent the sctp
module from being loaded by adding the following to the end of the
"/etc/modprobe.d/blacklist.conf" file:

blacklist sctp

This way, the sctp module cannot be loaded accidentally, which may occur
if an application that requires SCTP is started. A reboot is not necessary
for this change to take effect.

* A flaw in the client-side NFS Lock Manager (NLM) implementation could
allow a local, unprivileged user to cause a denial of service.
(CVE-2011-2491, Important)

* Flaws in the netlink-based wireless configuration interface could allow
a local user, who has the CAP_NET_ADMIN capability, to cause a denial of
service or escalate their privileges on systems that have an active
wireless interface. (CVE-2011-2517, Important)

* A flaw was found in the way the Linux kernel's Xen hypervisor
implementation emulated the SAHF instruction. When using a
fully-virtualized guest on a host that does not use hardware assisted
paging (HAP), such as those running CPUs that do not have support for (or
those that have it disabled) Intel Extended Page Tables (EPT) or AMD
Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged
guest user could trigger this flaw to cause the hypervisor to crash.
(CVE-2011-2519, Moderate)

* A flaw in the __addr_ok() macro in the Linux kernel's Xen hypervisor
implementation when running on 64-bit systems could allow a privileged
guest user to crash the hypervisor. (CVE-2011-2901, Moderate)

* /proc/[PID]/io is world-readable by default. Previously, these files
could be read without any further restrictions. A local, unprivileged user
could read these files, belonging to other, possibly privileged processes
to gather confidential information, such as the length of a password used
in a process. (CVE-2011-2495, Low)

Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and
Vasiliy Kulikov of Openwall for reporting CVE-2011-2495.

This update also fixes the following bugs:

* On Broadcom PCI cards that use the tg3 driver, the operational state of a
network device, represented by the value in
"/sys/class/net/ethX/operstate", was not initialized by default.
Consequently, the state was reported as "unknown" when the tg3 network
device was actually in the "up" state. This update modifies the tg3 driver
to properly set the operstate value. (BZ#744699)

* A KVM (Kernel-based Virtual Machine) guest can get preempted by the host,
when a higher priority process needs to run. When a guest is not running
for several timer interrupts in a row, ticks could be lost, resulting in
the jiffies timer advancing slower than expected and timeouts taking longer
than expected. To correct for the issue of lost ticks,
do_timer_tsc_timekeeping() checks a reference clock source (kvm-clock when
running as a KVM guest) to see if timer interrupts have been missed. If so,
jiffies is incremented by the number of missed timer interrupts, ensuring
that programs are woken up on time. (BZ#747874)

* When a block device object was allocated, the bd_super field was not
being explicitly initialized to NULL. Previously, users of the block device
object could set bd_super to NULL when the object was released by calling
the kill_block_super() function. Certain third-party file systems do not
always use this function, and bd_super could therefore become uninitialized
when the object was allocated again. This could cause a kernel panic in the
blkdev_releasepage() function, when the uninitialized bd_super field was
dereferenced. Now, bd_super is properly initialized in the bdget()
function, and the kernel panic no longer occurs. (BZ#751137)


Solution

Users should upgrade to these updated packages, which contain
backported patches to resolve these issues. The system must be
rebooted for this update to take effect.

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
kernel-2.6.18-238.31.1.el5.src.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0938cb1888a63fb2c5e87d1d601e7b49
SHA-256: ee37f92843dfa07a7de8da0a1a7b45aa7807621a2f813d75b6562af486f3d0bb
 
IA-32:
kernel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5f72f2df96594fd784e4757b2c479835
SHA-256: 544499433564ca79eb1756cbf5204149ebde5ab17442c7b74a928926de05aec4
kernel-PAE-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 19f6b67d2fa8eb04082312829a48b546
SHA-256: 1f8605cf2e06e427c783af14617858342050427fa92cd6032f0f6c01bd25d5bf
kernel-PAE-devel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 65d245bad62dd1cb2e4fad096d4fc8a0
SHA-256: 5ebff5485320982622672a6268cb3750e951804c1a6c6b6d2277b35beaf5ea3d
kernel-debug-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: b82ef6a26087433d38d984fd7a110e2b
SHA-256: f77ba2586103ba4e7ba47312111ca7624aa165051f7f433e16dbe4b0811deb58
kernel-debug-devel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 42ed0131c01295d833c8677f944b3f44
SHA-256: 8890c1d291fc2142ca22c78bf7a48261363ed608d997c86896d8c6dbe98b3552
kernel-devel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: cd5852764d5d17df49185c57286001fb
SHA-256: 9b040ccebdf53715480532e189233e245e997c57c33c235ff6465f30ff1a407d
kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a4aa700015a369c5fcc99f34c4bf57f0
SHA-256: c72e53e832fa129052617f39bded354c137e0fe1d8a92acb4f7a258f8d12e720
kernel-headers-2.6.18-238.31.1.el5.i386.rpm
File outdated by:  RHBA-2014:0013
    MD5: be000116a03ce58926f309cb4c1241e3
SHA-256: dd0c7fdc92cc608d2516c16252510793cbad7559124e6f5232c7a3fdd157a766
kernel-xen-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0cd3acb823147ec27ccf4f0d3b708600
SHA-256: e2e15b7117bdf5449b7e2114d9ed62b9623f8a2e258f1e593ae04078ee5b5d18
kernel-xen-devel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 8c8f403dd6760fd818fd95f545b3dbf3
SHA-256: 69f8842cba15ed219c2d999673028ee96e3c5066697db461fdc80e58993bf46b
 
IA-64:
kernel-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: fc8837f63ad0704780b7848a210c4f32
SHA-256: db34ff74574b59b40504a0f973f65eabfdba417a00e965aa06990d7b438546ec
kernel-debug-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: a086fce7b3a31b029c39ddf8ce29e706
SHA-256: 3485a4883bd2375602f4a0e731a184f1064022afa8363f140cfb65a9b9c90422
kernel-debug-devel-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 95ebd4342865f9708219cce7ab703c5d
SHA-256: 420a6548c14e30060bc5d431af32bd387c566f20367dc65609dc623f6bdc3055
kernel-devel-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 9f64a23a3f6f932d000e1277dac742d9
SHA-256: 353eaf2f6bcfb8c2e85c86bce0042d093c372fe3bcd948f7166881fe53f49cd9
kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a4aa700015a369c5fcc99f34c4bf57f0
SHA-256: c72e53e832fa129052617f39bded354c137e0fe1d8a92acb4f7a258f8d12e720
kernel-headers-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 85999d1a236337046de85e99b17c3ae7
SHA-256: 1127068c7ceca01d5cfe8e81c28d5f92589a9b83db61401863ee6b443f001bb6
kernel-xen-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0a7bfcb723f2dc56784aa72f6b51f3a3
SHA-256: e8d18d77b7e2189fa7fc14b9f74d464973d4384563d68f6002c96827adb6cc32
kernel-xen-devel-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 2e795dc721509211095cedabc9884f12
SHA-256: 1c2a5e6952e2fd297276087a0b622b47681840752adb21a0deeaf6cb23e1c56c
 
PPC:
kernel-2.6.18-238.31.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: fb41f0728b6bd88efd81f19954cd2bed
SHA-256: 833e3f7c13d727198e4153763dd9c9ed6ae0fbd2aad068b0fed99fdd5dc30d4a
kernel-debug-2.6.18-238.31.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: c6cf6e8272ba1466ae3f6f61d3a36b46
SHA-256: 320baf82bee000fc6e82a7c65faf02f0ef866650409f29a28cb7f26f3fa06c6c
kernel-debug-devel-2.6.18-238.31.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 96f6fd4ecbf79a3b8d0c7bbff8797495
SHA-256: 072ba2177f1094971c1246fb689b40e7a266fa010d37e32dce06f4c1514fa901
kernel-devel-2.6.18-238.31.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 12785a3d0d6b754f350ecea26ed6c9fb
SHA-256: 1dedb1b0ef8a1a04ade8356252724fa9ee7a986303032e1e6baa9e2c96e62935
kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a4aa700015a369c5fcc99f34c4bf57f0
SHA-256: c72e53e832fa129052617f39bded354c137e0fe1d8a92acb4f7a258f8d12e720
kernel-headers-2.6.18-238.31.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0013
    MD5: 4691a6c28931e7305d325dda8cbf8fb4
SHA-256: ee2e821d174253346fcc94ca354e5bfbef3916c91539faf2d199b3268170be81
kernel-headers-2.6.18-238.31.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 77aec9467d84defa02e9f7a2f18facfd
SHA-256: 4c66891b0ccb9b08bcc578ed0ee5f88c54e9cd5e06008ab9f288d3decd7ebf56
kernel-kdump-2.6.18-238.31.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 347655280623a5db83c49dd132d09eaa
SHA-256: 1e6a735c1fb52f6ffb5baff9fbc225b362809e3dfa5d719adbe750815f1aacbb
kernel-kdump-devel-2.6.18-238.31.1.el5.ppc64.rpm
File outdated by:  RHBA-2014:0013
    MD5: c523a3c8fe0846c15d042fddc9beca33
SHA-256: 0f1cdb23fcf723625b8f3407e9d99fb018a876ffb7bdfbab70da4916d04e7648
 
s390x:
kernel-2.6.18-238.31.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: a636d5a4ad93152e8f4c1fa659fc2635
SHA-256: cc3205975511f92fa7c6d31ada96cbd3f0e55e41ea4b6b46fefc820387548dae
kernel-debug-2.6.18-238.31.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 7451a970334293d440d32c2323a83ed1
SHA-256: ddcdea6f525a25f4d22f6857d1ba03b93018994e36c4bc13e90f8e5c11362891
kernel-debug-devel-2.6.18-238.31.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 3517e06003b8d170f5d688d5ab073569
SHA-256: f61ccc37aa04190afe73049b0effebe3231bab66fbd3b267ebd947ea509fe2bc
kernel-devel-2.6.18-238.31.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: ce330e942ac3324431f225dc120fa133
SHA-256: b6456f25daa2bd8639ad319eeb57d7e64785d4d3a5956358b5dd2bd11d885802
kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a4aa700015a369c5fcc99f34c4bf57f0
SHA-256: c72e53e832fa129052617f39bded354c137e0fe1d8a92acb4f7a258f8d12e720
kernel-headers-2.6.18-238.31.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: e1acd222d5995679ba3a53981b6da587
SHA-256: 54e6f380bf1dc3bbe6f6afa1bd9b918c1fc8b9809f63987dbabe72f0a0a7b7cf
kernel-kdump-2.6.18-238.31.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 110bceb61237f493dc315364dc2dd55e
SHA-256: 0579bc37eb422a78d5588e8ced4aaade1a3bda587c70133b3deb757fa70d78ec
kernel-kdump-devel-2.6.18-238.31.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0013
    MD5: 61e1c845b7393aafad444211172f5c0d
SHA-256: 635bf0cc2fb129442744b22363ebaf57f341b4365124237cb61d5a880f3b43a0
 
x86_64:
kernel-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 4b07be92cc85f82a3c6807d31c3a3a22
SHA-256: 5646bfb0c420cf71f7a4c8cd649d191ec84d1a477f11a5c40cc29399219295d4
kernel-debug-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 949ae0f2bf7778b04a36d47a5029413d
SHA-256: 3e39afaf2ab2e78e167e919f3679c460028d2ed7f6d1228879d257f12e823b3c
kernel-debug-devel-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 1c53f95ac1c7dddcb785ce2dc1a3cdd5
SHA-256: af999a7ef337a757e40a3323c378fe2eb212963c5156ae12f3472eadbd3575f8
kernel-devel-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5580f22ef4190bfbd99f9bc9b40e4bcb
SHA-256: 91221d35c81d5eee4512a547a0185cbb08833bcb5a098cb869bf3d21afbd69c1
kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a4aa700015a369c5fcc99f34c4bf57f0
SHA-256: c72e53e832fa129052617f39bded354c137e0fe1d8a92acb4f7a258f8d12e720
kernel-headers-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 97f05b0356a3b9e20a876321b5a041b7
SHA-256: aa35d6353cf4e8289b1e3135f798c12ae15a2584e2f08fca1c98587740b19fe9
kernel-xen-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 8d35f1d1ce11edf031add46ab69d0006
SHA-256: 84ae0b6340a99ea5f3d255b039980b9b416e54a65986b550946c0ebdcd32caa0
kernel-xen-devel-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 09bc8b2e100efdb589d41d87ecc99f89
SHA-256: b9491a12ee0d1d3d5926ba0cf91062739b9cd9c140969374a6fe68e5c6fe543f
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
kernel-2.6.18-238.31.1.el5.src.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0938cb1888a63fb2c5e87d1d601e7b49
SHA-256: ee37f92843dfa07a7de8da0a1a7b45aa7807621a2f813d75b6562af486f3d0bb
 
IA-32:
kernel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5f72f2df96594fd784e4757b2c479835
SHA-256: 544499433564ca79eb1756cbf5204149ebde5ab17442c7b74a928926de05aec4
kernel-PAE-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 19f6b67d2fa8eb04082312829a48b546
SHA-256: 1f8605cf2e06e427c783af14617858342050427fa92cd6032f0f6c01bd25d5bf
kernel-PAE-devel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 65d245bad62dd1cb2e4fad096d4fc8a0
SHA-256: 5ebff5485320982622672a6268cb3750e951804c1a6c6b6d2277b35beaf5ea3d
kernel-debug-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: b82ef6a26087433d38d984fd7a110e2b
SHA-256: f77ba2586103ba4e7ba47312111ca7624aa165051f7f433e16dbe4b0811deb58
kernel-debug-devel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 42ed0131c01295d833c8677f944b3f44
SHA-256: 8890c1d291fc2142ca22c78bf7a48261363ed608d997c86896d8c6dbe98b3552
kernel-devel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: cd5852764d5d17df49185c57286001fb
SHA-256: 9b040ccebdf53715480532e189233e245e997c57c33c235ff6465f30ff1a407d
kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a4aa700015a369c5fcc99f34c4bf57f0
SHA-256: c72e53e832fa129052617f39bded354c137e0fe1d8a92acb4f7a258f8d12e720
kernel-headers-2.6.18-238.31.1.el5.i386.rpm
File outdated by:  RHBA-2014:0013
    MD5: be000116a03ce58926f309cb4c1241e3
SHA-256: dd0c7fdc92cc608d2516c16252510793cbad7559124e6f5232c7a3fdd157a766
kernel-xen-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0cd3acb823147ec27ccf4f0d3b708600
SHA-256: e2e15b7117bdf5449b7e2114d9ed62b9623f8a2e258f1e593ae04078ee5b5d18
kernel-xen-devel-2.6.18-238.31.1.el5.i686.rpm
File outdated by:  RHBA-2014:0013
    MD5: 8c8f403dd6760fd818fd95f545b3dbf3
SHA-256: 69f8842cba15ed219c2d999673028ee96e3c5066697db461fdc80e58993bf46b
 
IA-64:
kernel-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: fc8837f63ad0704780b7848a210c4f32
SHA-256: db34ff74574b59b40504a0f973f65eabfdba417a00e965aa06990d7b438546ec
kernel-debug-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: a086fce7b3a31b029c39ddf8ce29e706
SHA-256: 3485a4883bd2375602f4a0e731a184f1064022afa8363f140cfb65a9b9c90422
kernel-debug-devel-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 95ebd4342865f9708219cce7ab703c5d
SHA-256: 420a6548c14e30060bc5d431af32bd387c566f20367dc65609dc623f6bdc3055
kernel-devel-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 9f64a23a3f6f932d000e1277dac742d9
SHA-256: 353eaf2f6bcfb8c2e85c86bce0042d093c372fe3bcd948f7166881fe53f49cd9
kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a4aa700015a369c5fcc99f34c4bf57f0
SHA-256: c72e53e832fa129052617f39bded354c137e0fe1d8a92acb4f7a258f8d12e720
kernel-headers-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 85999d1a236337046de85e99b17c3ae7
SHA-256: 1127068c7ceca01d5cfe8e81c28d5f92589a9b83db61401863ee6b443f001bb6
kernel-xen-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 0a7bfcb723f2dc56784aa72f6b51f3a3
SHA-256: e8d18d77b7e2189fa7fc14b9f74d464973d4384563d68f6002c96827adb6cc32
kernel-xen-devel-2.6.18-238.31.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 2e795dc721509211095cedabc9884f12
SHA-256: 1c2a5e6952e2fd297276087a0b622b47681840752adb21a0deeaf6cb23e1c56c
 
x86_64:
kernel-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 4b07be92cc85f82a3c6807d31c3a3a22
SHA-256: 5646bfb0c420cf71f7a4c8cd649d191ec84d1a477f11a5c40cc29399219295d4
kernel-debug-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 949ae0f2bf7778b04a36d47a5029413d
SHA-256: 3e39afaf2ab2e78e167e919f3679c460028d2ed7f6d1228879d257f12e823b3c
kernel-debug-devel-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 1c53f95ac1c7dddcb785ce2dc1a3cdd5
SHA-256: af999a7ef337a757e40a3323c378fe2eb212963c5156ae12f3472eadbd3575f8
kernel-devel-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 5580f22ef4190bfbd99f9bc9b40e4bcb
SHA-256: 91221d35c81d5eee4512a547a0185cbb08833bcb5a098cb869bf3d21afbd69c1
kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
File outdated by:  RHBA-2014:0013
    MD5: a4aa700015a369c5fcc99f34c4bf57f0
SHA-256: c72e53e832fa129052617f39bded354c137e0fe1d8a92acb4f7a258f8d12e720
kernel-headers-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 97f05b0356a3b9e20a876321b5a041b7
SHA-256: aa35d6353cf4e8289b1e3135f798c12ae15a2584e2f08fca1c98587740b19fe9
kernel-xen-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 8d35f1d1ce11edf031add46ab69d0006
SHA-256: 84ae0b6340a99ea5f3d255b039980b9b416e54a65986b550946c0ebdcd32caa0
kernel-xen-devel-2.6.18-238.31.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0013
    MD5: 09bc8b2e100efdb589d41d87ecc99f89
SHA-256: b9491a12ee0d1d3d5926ba0cf91062739b9cd9c140969374a6fe68e5c6fe543f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share
714867 - CVE-2011-2482 kernel: sctp dos
716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak
718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations
718882 - CVE-2011-2519 kernel: xen: x86_emulate: fix SAHF emulation
728042 - CVE-2011-2901 kernel: xen: off-by-one shift in x86_64 __addr_ok()


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/