Security Advisory Important: kernel security, bug fix, and enhancement update

Advisory: RHSA-2014:0285-1
Type: Security Advisory
Severity: Important
Issued on: 2014-03-12
Last updated on: 2014-03-12
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2013-2929
CVE-2013-4483
CVE-2013-4554
CVE-2013-6381
CVE-2013-6383
CVE-2013-6885
CVE-2013-7263

Details

Updated kernel packages that fix multiple security issues, several bugs,
and add one enhancement are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A buffer overflow flaw was found in the way the qeth_snmp_command()
function in the Linux kernel's QETH network device driver implementation
handled SNMP IOCTL requests with an out-of-bounds length. A local,
unprivileged user could use this flaw to crash the system or, potentially,
escalate their privileges on the system. (CVE-2013-6381, Important)

* A flaw was found in the way the ipc_rcu_putref() function in the Linux
kernel's IPC implementation handled reference counter decrementing.
A local, unprivileged user could use this flaw to trigger an Out of Memory
(OOM) condition and, potentially, crash the system. (CVE-2013-4483,
Moderate)

* It was found that the Xen hypervisor implementation did not correctly
check privileges of hypercall attempts made by HVM guests, allowing
hypercalls to be invoked from protection rings 1 and 2 in addition to ring
0. A local attacker in an HVM guest able to execute code on privilege
levels 1 and 2 could potentially use this flaw to further escalate their
privileges in that guest. Note: Xen HVM guests running unmodified versions
of Red Hat Enterprise Linux and Microsoft Windows are not affected by this
issue because they are known to only use protection rings 0 (kernel) and 3
(userspace). (CVE-2013-4554, Moderate)

* A flaw was found in the way the Linux kernel's Adaptec RAID controller
(aacraid) checked permissions of compat IOCTLs. A local attacker could use
this flaw to bypass intended security restrictions. (CVE-2013-6383,
Moderate)

* It was found that, under specific circumstances, a combination of write
operations to write-combined memory and locked CPU instructions may cause a
core hang on certain AMD CPUs (for more information, refer to AMD CPU
erratum 793 linked in the References section). A privileged user in a guest
running under the Xen hypervisor could use this flaw to cause a denial of
service on the host system. This update adds a workaround to the Xen
hypervisor implementation, which mitigates the AMD CPU issue. Note: this
issue only affects AMD Family 16h Models 00h-0Fh Processors. Non-AMD CPUs
are not vulnerable. (CVE-2013-6885, Moderate)

* It was found that certain protocol handlers in the Linux kernel's
networking implementation could set the addr_len value without initializing
the associated data structure. A local, unprivileged user could use this
flaw to leak kernel stack memory to user space using the recvmsg, recvfrom,
and recvmmsg system calls. (CVE-2013-7263, Low)

* A flaw was found in the way the get_dumpable() function return value was
interpreted in the ptrace subsystem of the Linux kernel. When
'fs.suid_dumpable' was set to 2, a local, unprivileged local user could
use this flaw to bypass intended ptrace restrictions and obtain
potentially sensitive information. (CVE-2013-2929, Low)

Red Hat would like to thank Vladimir Davydov of Parallels for reporting
CVE-2013-4483 and the Xen project for reporting CVE-2013-4554 and
CVE-2013-6885. Upstream acknowledges Jan Beulich as the original reporter
of CVE-2013-4554 and CVE-2013-6885.

This update also fixes several bugs and adds one enhancement.
Documentation for these changes will be available shortly from the
Technical Notes document linked to in the References section.

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement. The system must be rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-371.6.1.el5.src.rpm
File outdated by:  RHSA-2015:0783
    MD5: d867eab2458107b9b525327c6caaf457
SHA-256: 3004e37bc577a0ae41f06d68bf2dd4880ebe882b978ecccf4a90606ffd6fa488
 
IA-32:
kernel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: adaf541c137298c79d3437c10da4e555
SHA-256: 67b8314af1d81bd9cea2fe8cef28ea6e4b4c1928d9922727c224a99a3271824a
kernel-PAE-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 239c468253927e5e918d9900ce6a16c8
SHA-256: 79b818dc86679f86db3455af2badc34244b54dcfbbda988d389caf3c51c71dbe
kernel-PAE-debuginfo-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: c68a7c95ba5847491071f30544c5162a
SHA-256: 3a13fc06e58993a141585ef2ddd4db0356980a175ba3bca71b4b52ae377b2ce2
kernel-PAE-devel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 05c2a851616a49b96acf232012246ca2
SHA-256: a55cdb4a67277cf8ac90306f35fb76182a65f2576ce87560b8fa5e214c6d7518
kernel-debug-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 851feb9f9b867cc07e87d76451beb024
SHA-256: 4f493f657b008ea2a5b8e2303923c998946a173917deb88ef632ae2499b6acee
kernel-debug-debuginfo-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: d5d752385a4820b756a7a500efb70012
SHA-256: e7890a833eff73f93d5881db9c4b8dd64bc55536374a4f4ceb26e76cdd2e72c1
kernel-debug-devel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 0aa032f912dde841593bb7dd8c4750db
SHA-256: 5717de0b7b4666ccdb1e8ac8aec8cd67d79c3cb84f25836ca3368ae85cbd8e8c
kernel-debuginfo-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: d50505629764ca1f2f4d67bc891772c0
SHA-256: c2af964546c0d6a2787685f62a38481332590461ba52003bbdb49e948f44f7dd
kernel-debuginfo-common-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 1b076289b6dd8ed51cbb3af40358a8de
SHA-256: 9076b8ca51b58b31936a9d9fe461693930bad340704ab054c061ed34a5d06f6c
kernel-devel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 6971594840de0e90c479f6cc847c4616
SHA-256: bc38ca7d48dda51700e8efcbe61cf30c6ebb0b72bd9378c4c4506a6f77f9aaeb
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm
File outdated by:  RHSA-2015:0783
    MD5: c5b646625e48852e73c9122adc1ada39
SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.i386.rpm
File outdated by:  RHSA-2015:0783
    MD5: 5fd1126092c212558aa18fd3b9dbebd9
SHA-256: e1de7d5aeb66cbb8c9c8cd073ab0c2fb1398e8baef0bdc464ff897e0fc0b0667
kernel-xen-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: f2a0fd48bff67409632e2b31d27b92b0
SHA-256: 8454af639b9756d28fc0b2bca566813cff413442a6f64e94b84a26082fbb50a4
kernel-xen-debuginfo-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 4bee07b916852608e91e682cbbb39744
SHA-256: f4d53f7c209dcccdfd411d2756078869a7cb9b3742b24a8d00dbacbbe4001571
kernel-xen-devel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 249b088fc025a12141f047d67bea7da6
SHA-256: 6a3d8a00571a67f2e41969a9f1ff8d42fcb80d926593cc80e7e62342447ccbe3
 
IA-64:
kernel-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 6a246899cc895802f3e9fda9b8502260
SHA-256: 4cfb95909ce84370e65c74dc5d73b708947b8a24db04aa55d50f8a1e601786fb
kernel-debug-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: ac238d80671715cabc7fadc96e14b3a5
SHA-256: c45bfe9df42df983c356fdff9c788aa9a5d3a9fb024672450e3d3162a40a2903
kernel-debug-debuginfo-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 792ce0a0cd37afc7eb26c381cbfbd310
SHA-256: 98e26295086b3e7a2c6eb2fb421b1e41018fcfeee5afa2575b7d2c2b34b36dd0
kernel-debug-devel-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 45e9e38283bc15c9a9dd54b7401b2c21
SHA-256: 47ee6f4c121d5f42da2070c4cba8fb614e4fcf9a667770a8300f86d0085e6432
kernel-debuginfo-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: b4898b16b6ca69c907853eb8345f5734
SHA-256: 172be3a9631941129d164dcbd2cc32d9cd8738d1eaba90cafe1f2f00760e62a6
kernel-debuginfo-common-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 77652edcc97f385c26f5a4151297982d
SHA-256: 4ba6c84db21cbbac7781fa8283802e2b8debdedbf3a6bc710d1760be51bdcda7
kernel-devel-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 661d0b09ffef3189b0732edb5e043f52
SHA-256: de2d15d8d79203b9f52d10eae9619be61c173944f3e9cabefa872f24b9607ca0
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm
File outdated by:  RHSA-2015:0783
    MD5: c5b646625e48852e73c9122adc1ada39
SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 0764eba2de05c0b1416f33ece8d92c25
SHA-256: 4a5f828c2b785a63a020dbdeb79d8cbbdc3544bde7010bf2157f9bdf96d0a9d8
kernel-xen-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 90e69562060fa7cebbffb5ca40d3bb0b
SHA-256: c5054cd40b1cee14112f5a31d50e2f085e25dd5584bfa906601d69014170e89c
kernel-xen-debuginfo-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 0d11ffd052df559233be4727a94bd635
SHA-256: c5213ed772bd3727876fe5a8185047ed372e66933579a57bb930c86faab3c676
kernel-xen-devel-2.6.18-371.6.1.el5.ia64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 9fcf1630bde384e1dc5c9a4031e8b7b6
SHA-256: 9c9d575026c10d23023f3810028abbe9a0013ae162415e8d8ebac2a6c3c031b2
 
PPC:
kernel-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 1e1b384cc5ace62068cf984d663f3629
SHA-256: 72b20b7028ea94fc836f0ed048e78c152778e080705ef4f1a07d00b533b8ce22
kernel-debug-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 2713f509789e73d48c31dcafe5f46ce7
SHA-256: 5778bde527d0c6bc9902ba2c53c16fa3ef1bf5f609ed00ecfe46da3b75e79917
kernel-debug-debuginfo-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 091a9ea1a1eddb4b301dbbd9cf0b609d
SHA-256: 93d6a33fc7b82d354b67d883818dbf048f49c3338b06dc7ec31cfd40868622a8
kernel-debug-devel-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: c06b2d56b304ccf394dd1d76325000a6
SHA-256: 928cc543e2b48b6e39f56b073aebb33cdcd7e0c04f807e8d93af63a65f59ba7f
kernel-debuginfo-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: aaf0f8bacc549a81ebf8da0e67849387
SHA-256: 28450364f8b66ecbc04cb749224fb9d3c3fe0a850453ff12357e9839ce6c5be4
kernel-debuginfo-common-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: bf67875a86a5f7b18f410097e8f07a03
SHA-256: e485fed2e8b5e3430e85d1742a8d9162d2ecf95028342f9773c7a91bdfe4881b
kernel-devel-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: f0d5734d987b32a4ff6fb7d484eea19b
SHA-256: 041f5c9410003a29849fb292ce95c28e717b0dc33a72e2af88a4c97983a1919d
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm
File outdated by:  RHSA-2015:0783
    MD5: c5b646625e48852e73c9122adc1ada39
SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.ppc.rpm
File outdated by:  RHSA-2015:0783
    MD5: 51546d9a63820086b96b61209088101a
SHA-256: 806426656f29216ca2a23646b336ebb74950a8f76ea1424add26c57a4b62d0ec
kernel-headers-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 2dba5822e9302027bedfe0706e255150
SHA-256: d9e296b2c31a311e1ee9ab00865636b2c9e877d826de80a7765c8fecf9bffc2e
kernel-kdump-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 89940c25235ead544c51fb4e8d385638
SHA-256: b50d46fa744ed9c61999996c9aac96565b88d313f5018d168ca8fe20b186a1d0
kernel-kdump-debuginfo-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 17ccfd1c86cf69b72c7b14b4c5db153b
SHA-256: 01ace33961d0e4ecb7c583d1f78843716197750be15c002751b00b1ea653b301
kernel-kdump-devel-2.6.18-371.6.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 88981ac65faa76d79833456db75683a4
SHA-256: d7c7a75bcf2921f497aa52d8f7d0294a44f8eadf5f4d52821d6123b776ee00c4
 
s390x:
kernel-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: f3e8a764f2f533b9514ee9b88c43dbbf
SHA-256: c95531dbe9d1ed0ae1d4cc6b5e2a169b469e6d46d3ae25f2c304a8221fdf4140
kernel-debug-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: 70ce2ab9f9e109446fcfe3e065171abb
SHA-256: 80d939d7934e9c87824d1fb353c62ba8c10774d555bf65c68fd129b654489d5e
kernel-debug-debuginfo-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: 3b4154b9a06ce2a2147fae0a23a56f13
SHA-256: d57b4f891ff55eb855a8d3751df7e9af9556932e55fa5b3129342bb8f87118f9
kernel-debug-devel-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: 50c6ce7cfdf78f29f95da2b1becfe29c
SHA-256: c6087ed99791750284d00006ee0fcaf9d4e147e7284a5f9d3cb53eec54bc8610
kernel-debuginfo-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: 670eac877a6e11ce8d5408fcc4e51f2b
SHA-256: fa8d0c827ac94fc6355904400e413345303b8865131f83d3d2b91c431f7158a0
kernel-debuginfo-common-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: 012c83f7f0a8286897639ef137688b95
SHA-256: f4a584e6c1e23e1ee331b8cc1a8d0db16f1ee5c5f54440333b1af8090389b11c
kernel-devel-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: 770a3c57cf6a2249eb408b5e9b30efd0
SHA-256: 67f79132746c79deb6428b2b7b2a7ab2e8e56ac1282ea895b28ccb7c0b428b2c
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm
File outdated by:  RHSA-2015:0783
    MD5: c5b646625e48852e73c9122adc1ada39
SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: aa55a83692eb2c67c2dd9fe675cdb9f7
SHA-256: 86bcd0db7d887c94c5efa7e7c61c829dba3a1b55d3c28c31f2c526d95d35e1a6
kernel-kdump-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: 2f9d51ecef9d7463b74c2dc557595d50
SHA-256: 214a7bc508d16e868de6d125012c10993c370d0513dd0d0a42b123c7df7e2d9a
kernel-kdump-debuginfo-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: 03a9a62134808d9a4dd25d1472be935c
SHA-256: 99a1589250d2f21750866e0eea8825d590c1b1527dfd7952d8f54b101c111d51
kernel-kdump-devel-2.6.18-371.6.1.el5.s390x.rpm
File outdated by:  RHSA-2015:0783
    MD5: e22fc4d93d620d7b3c65347ed86bd15a
SHA-256: 05f9cd4a56183c07f292d3eb2575ec7f1e2bb01d5811a98bb6eb06d1bb7d1a34
 
x86_64:
kernel-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 66ad16761620aafcd243ccf10d1e4c6b
SHA-256: 8abced78086858583fbff0df918a2b3146c5adb84e9d567a378e5f76c35432d9
kernel-debug-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 3c4250c12e7a524f5929aea151746694
SHA-256: 8695fdd570d9b9ce0caca9846cad20d7dbf77c134a89def072762fcecf851b89
kernel-debug-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 9569171050a64c9bc5ee78a4540d6246
SHA-256: 9032a2df75a5ebf944696359f85b9bcd0754fecfc1f3b72893c8f01ed98692eb
kernel-debug-devel-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 98a811748cff4feab91b1c6832601c5d
SHA-256: 3e6727d06c5205a8730fb81dc1b305da705e4d67fc756ccec791ed148ee449db
kernel-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: bbcb0d6e7479bac1b03c222a6410d86c
SHA-256: d4c92ebf0ab5abea0a2af35868ddf53c02c386e1a006aad28984a01c7dade744
kernel-debuginfo-common-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 8ca15b0b944f21705a1c98cf4e82c756
SHA-256: f76343d082219306011bb4335b2e2284365ecba4215689e856e9052f24d40b66
kernel-devel-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 65e07240b993b91b066738d5857638b3
SHA-256: 6f3cee072c34fb3666367a78396ab9894ba8c6b3289c6ab5422edd2258030495
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm
File outdated by:  RHSA-2015:0783
    MD5: c5b646625e48852e73c9122adc1ada39
SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 6b342044b4913e2a3ba92636adc11377
SHA-256: 343fbbcfe4908f12f6127072fafebfd5f56fa2f7eb5aa965a16b016b9b2e9147
kernel-xen-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: cf553e2a5358edaf3208a19bbc57d6c5
SHA-256: 3c2f9e5bf45653ec91ee0f31c1ba37d1b9aec80c4dcdf41e70a3f4b3faf8bedb
kernel-xen-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: a83a4ccbe4b9ad7632773a266cc23f36
SHA-256: e5741c5c9046301b10e17968bd80cafa0275bdc21928b9f0460afc6aae1a8ad7
kernel-xen-devel-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 271bba7177fbbf2ec6a80340aa974274
SHA-256: 5b43584ea5140d197bbc1ad77d5e8a48e7843f026483400827cf32dbe9430e96
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-371.6.1.el5.src.rpm
File outdated by:  RHSA-2015:0783
    MD5: d867eab2458107b9b525327c6caaf457
SHA-256: 3004e37bc577a0ae41f06d68bf2dd4880ebe882b978ecccf4a90606ffd6fa488
 
IA-32:
kernel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: adaf541c137298c79d3437c10da4e555
SHA-256: 67b8314af1d81bd9cea2fe8cef28ea6e4b4c1928d9922727c224a99a3271824a
kernel-PAE-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 239c468253927e5e918d9900ce6a16c8
SHA-256: 79b818dc86679f86db3455af2badc34244b54dcfbbda988d389caf3c51c71dbe
kernel-PAE-debuginfo-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: c68a7c95ba5847491071f30544c5162a
SHA-256: 3a13fc06e58993a141585ef2ddd4db0356980a175ba3bca71b4b52ae377b2ce2
kernel-PAE-devel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 05c2a851616a49b96acf232012246ca2
SHA-256: a55cdb4a67277cf8ac90306f35fb76182a65f2576ce87560b8fa5e214c6d7518
kernel-debug-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 851feb9f9b867cc07e87d76451beb024
SHA-256: 4f493f657b008ea2a5b8e2303923c998946a173917deb88ef632ae2499b6acee
kernel-debug-debuginfo-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: d5d752385a4820b756a7a500efb70012
SHA-256: e7890a833eff73f93d5881db9c4b8dd64bc55536374a4f4ceb26e76cdd2e72c1
kernel-debug-devel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 0aa032f912dde841593bb7dd8c4750db
SHA-256: 5717de0b7b4666ccdb1e8ac8aec8cd67d79c3cb84f25836ca3368ae85cbd8e8c
kernel-debuginfo-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: d50505629764ca1f2f4d67bc891772c0
SHA-256: c2af964546c0d6a2787685f62a38481332590461ba52003bbdb49e948f44f7dd
kernel-debuginfo-common-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 1b076289b6dd8ed51cbb3af40358a8de
SHA-256: 9076b8ca51b58b31936a9d9fe461693930bad340704ab054c061ed34a5d06f6c
kernel-devel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 6971594840de0e90c479f6cc847c4616
SHA-256: bc38ca7d48dda51700e8efcbe61cf30c6ebb0b72bd9378c4c4506a6f77f9aaeb
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm
File outdated by:  RHSA-2015:0783
    MD5: c5b646625e48852e73c9122adc1ada39
SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.i386.rpm
File outdated by:  RHSA-2015:0783
    MD5: 5fd1126092c212558aa18fd3b9dbebd9
SHA-256: e1de7d5aeb66cbb8c9c8cd073ab0c2fb1398e8baef0bdc464ff897e0fc0b0667
kernel-xen-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: f2a0fd48bff67409632e2b31d27b92b0
SHA-256: 8454af639b9756d28fc0b2bca566813cff413442a6f64e94b84a26082fbb50a4
kernel-xen-debuginfo-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 4bee07b916852608e91e682cbbb39744
SHA-256: f4d53f7c209dcccdfd411d2756078869a7cb9b3742b24a8d00dbacbbe4001571
kernel-xen-devel-2.6.18-371.6.1.el5.i686.rpm
File outdated by:  RHSA-2015:0783
    MD5: 249b088fc025a12141f047d67bea7da6
SHA-256: 6a3d8a00571a67f2e41969a9f1ff8d42fcb80d926593cc80e7e62342447ccbe3
 
x86_64:
kernel-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 66ad16761620aafcd243ccf10d1e4c6b
SHA-256: 8abced78086858583fbff0df918a2b3146c5adb84e9d567a378e5f76c35432d9
kernel-debug-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 3c4250c12e7a524f5929aea151746694
SHA-256: 8695fdd570d9b9ce0caca9846cad20d7dbf77c134a89def072762fcecf851b89
kernel-debug-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 9569171050a64c9bc5ee78a4540d6246
SHA-256: 9032a2df75a5ebf944696359f85b9bcd0754fecfc1f3b72893c8f01ed98692eb
kernel-debug-devel-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 98a811748cff4feab91b1c6832601c5d
SHA-256: 3e6727d06c5205a8730fb81dc1b305da705e4d67fc756ccec791ed148ee449db
kernel-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: bbcb0d6e7479bac1b03c222a6410d86c
SHA-256: d4c92ebf0ab5abea0a2af35868ddf53c02c386e1a006aad28984a01c7dade744
kernel-debuginfo-common-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 8ca15b0b944f21705a1c98cf4e82c756
SHA-256: f76343d082219306011bb4335b2e2284365ecba4215689e856e9052f24d40b66
kernel-devel-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 65e07240b993b91b066738d5857638b3
SHA-256: 6f3cee072c34fb3666367a78396ab9894ba8c6b3289c6ab5422edd2258030495
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm
File outdated by:  RHSA-2015:0783
    MD5: c5b646625e48852e73c9122adc1ada39
SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 6b342044b4913e2a3ba92636adc11377
SHA-256: 343fbbcfe4908f12f6127072fafebfd5f56fa2f7eb5aa965a16b016b9b2e9147
kernel-xen-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: cf553e2a5358edaf3208a19bbc57d6c5
SHA-256: 3c2f9e5bf45653ec91ee0f31c1ba37d1b9aec80c4dcdf41e70a3f4b3faf8bedb
kernel-xen-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: a83a4ccbe4b9ad7632773a266cc23f36
SHA-256: e5741c5c9046301b10e17968bd80cafa0275bdc21928b9f0460afc6aae1a8ad7
kernel-xen-devel-2.6.18-371.6.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:0783
    MD5: 271bba7177fbbf2ec6a80340aa974274
SHA-256: 5b43584ea5140d197bbc1ad77d5e8a48e7843f026483400827cf32dbe9430e96
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1024854 - CVE-2013-4483 kernel: ipc: ipc_rcu_putref refcount races
1028148 - CVE-2013-2929 kernel: exec/ptrace: get_dumpable() incorrect tests
1029111 - CVE-2013-4554 kernel: xen: hypercalls exposed to privilege rings 1 and 2 of HVM guests
1033530 - CVE-2013-6383 Kernel: AACRAID Driver compat IOCTL missing capability check
1033600 - CVE-2013-6381 Kernel: qeth: buffer overflow in snmp ioctl
1035823 - CVE-2013-6885 hw: AMD CPU erratum may cause core hang
1035875 - CVE-2013-7263 CVE-2013-7265 Kernel: net: leakage of uninitialized memory to user-space via recv syscalls


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/