Security Advisory Moderate: kernel security, bug fix, and enhancement update

Advisory: RHSA-2014:0433-1
Type: Security Advisory
Severity: Moderate
Issued on: 2014-04-24
Last updated on: 2014-04-24
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2012-6638
CVE-2013-2888

Details

Updated kernel packages that fix two security issues, three bugs, and add
one enhancement are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A flaw was found in the way the Linux kernel's TCP/IP protocol suite
implementation handled TCP packets with both the SYN and FIN flags set.
A remote attacker could use this flaw to consume an excessive amount of
resources on the target system, potentially resulting in a denial of
service. (CVE-2012-6638, Moderate)

* A flaw was found in the way the Linux kernel handled HID (Human Interface
Device) reports with an out-of-bounds Report ID. An attacker with physical
access to the system could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2013-2888,
Moderate)

This update also fixes the following bugs:

* A previous change to the sunrpc code introduced a race condition between
the rpc_wake_up_task() and rpc_wake_up_status() functions. A race between
threads operating on these functions could result in a deadlock situation,
subsequently triggering a "soft lockup" event and rendering the system
unresponsive. This problem has been fixed by re-ordering tasks in the RPC
wait queue. (BZ#1073731)

* Running a process in the background on a GFS2 file system could
sometimes trigger a glock recursion error that resulted in a kernel panic.
This happened when a readpage operation attempted to take a glock that had
already been held by another function. To prevent this error, GFS2 now
verifies whether the glock is already held when performing the readpage
operation. (BZ#1073953)

* A previous patch backport to the IUCV (Inter User Communication Vehicle)
code was incomplete. Consequently, when establishing an IUCV connection,
the kernel could, under certain circumstances, dereference a NULL pointer,
resulting in a kernel panic. A patch has been applied to correct this
problem by calling the proper function when removing IUCV paths.
(BZ#1077045)

In addition, this update adds the following enhancement:

* The lpfc driver had a fixed timeout of 60 seconds for SCSI task
management commands. With this update, the lpfc driver enables the user to
set this timeout within the range from 5 to 180 seconds. The timeout can
be changed by modifying the "lpfc_task_mgmt_tmo" parameter for the lpfc
driver. (BZ#1073123)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement. The system must be rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-371.8.1.el5.src.rpm
File outdated by:  RHSA-2015:1042
    MD5: cb70c81f0a357c4a558b575d91d6225f
SHA-256: 040a59ef7165597a27a2c6f2e4b010b0b2b82a69ea710bb3f1f00a3026ff55a0
 
IA-32:
kernel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 64db454a433e100af4baeabc42b61b8a
SHA-256: 894693418264150b6beddbfe78c3aec263a02e71a93280b33eeb771afd463486
kernel-PAE-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 26ec9ba843276bce4a136f1a887f0dc6
SHA-256: b3359eb2abbd5f1cd92b31b5ee4b117e596a0ab906e6bf6770a0e63c47163491
kernel-PAE-debuginfo-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: de71e794dfc3e7649463b533e09cda5a
SHA-256: b9f6115d9fe94461a1a55e1f762018d93ef7422e7c7cc8244abedfdcbedee59b
kernel-PAE-devel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: afee5a8699536df2c5780317d148d242
SHA-256: 01d5a92af18a492b2688dddcb5b61846d8a7a2a61c718096c0ec90f37a7c4c3b
kernel-debug-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 60ad90b41519ae07fdf87716706d3d21
SHA-256: f1ebbc654b02cf7af60424d9f21f75564af7c66e9b21e82e0bd38bdb28a7c075
kernel-debug-debuginfo-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: dbe315c471eb1743f53319ba14fc7e12
SHA-256: 4ac30b760690fdf4a68b48a9657922e2c7af0a7a54066228aadfcae33701b756
kernel-debug-devel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 1ee057c9e1c93812da7a2eb5554e4d12
SHA-256: 40c2ffd9154729cade55cd6e7d100a1391c93122a8758cb0331a87ce52c5b1b4
kernel-debuginfo-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: b8234e7529bf16b11690441e71503dbe
SHA-256: 9e53bcb11df871babdbb808e4766e818e1ac379bfc53c35ca929eff36131ddb0
kernel-debuginfo-common-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 3b0b84080c312c4f39f5eb33de4a6a1e
SHA-256: 726220ec91a40a1a952bc946c3591f71078c56f49249a62b81e1b8acbb9e948d
kernel-devel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: f5e862cb671647b0d194ca520c6b3440
SHA-256: a011dee805cd83d9b2a3cb9bb376561ac70f5d9c1d998c09fae13d4a189112d0
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm
File outdated by:  RHSA-2015:1042
    MD5: 85958c5b7b6808a941e565a3077f8db1
SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.i386.rpm
File outdated by:  RHSA-2015:1042
    MD5: e6af500e347ebdedc99819296c0635b3
SHA-256: 70cf155f56768146397188249f60938445925902574e5a0d438df218b01837e5
kernel-xen-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 963b5aa16b1b0b4199308c945e6ed1c8
SHA-256: 750004dd6b127c422a6f54db01272ee2b72e8f90d306a78e6740603fe1188059
kernel-xen-debuginfo-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 0becf236a397e73f891fedb6d72b0732
SHA-256: f4caeeb1e2be5e37200b653c07c120aedf5a553f6ba6cfe902c0f771fd6affe3
kernel-xen-devel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 88c70f6db36871ac879f90cea5b6f43d
SHA-256: 4c8b60e69ab49166e50b091fdb026ab96d7399dcddca0a921b52cbf7edaa1483
 
IA-64:
kernel-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 42ede0788ca9dab2a4a67bfb4904aa2a
SHA-256: e25f8ff3e84a7a9030e926b1687a8b05942ba4cd45eb9111efa28aadf8762c81
kernel-debug-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 70e88c841f3b375d33e8a71b72db69cc
SHA-256: f6361a7f9c2ee1d57a811684014b937e9c354f6128d1a590a35544b4c7a3f63d
kernel-debug-debuginfo-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: dba60445d89d333f521bcd89070b35de
SHA-256: 18c456a233e61dff81d3471387fc54baf5d11aa6bbe8f0ac14429308ab615354
kernel-debug-devel-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 36bbdde6e4ef2985f54989fff71c9e8f
SHA-256: 9892a4bc0fc1c2c0f3876ec9a9cbe54badb99ffb98a3d6385d424ea0bd289120
kernel-debuginfo-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 39a56d031e4ec7094c8016d5f2110510
SHA-256: 1566b80ddb4a079605ac13d9be3092056a60e30fdc1f9f1af82aef72271af9d2
kernel-debuginfo-common-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 35bb4f5e1a9b4987c4e3d9d5397f1bb0
SHA-256: 7500d6758770d914761c8f365021cd5c1c798df604f8a961c59c60d640128429
kernel-devel-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 86ae0d0a0457a34c13889852f6934ae6
SHA-256: 91e4be15075dfc7a435757696b0b8984b3b383e49f7d2191aeccec9dca9849aa
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm
File outdated by:  RHSA-2015:1042
    MD5: 85958c5b7b6808a941e565a3077f8db1
SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: b702a1f6d327857953d1708d38f6841a
SHA-256: 923bc41f7aa04c2dcb6e7f267c86c6556fc63339377e82dadac2b2c8c7873539
kernel-xen-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 7c14362e2928dcf0edb2adff0b0a1af4
SHA-256: 260baa49aaacd55385588c7062d14dcfabe49c6b8e392340c56cc13662888048
kernel-xen-debuginfo-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 7c499a989c4262cac43dcb91cf6995eb
SHA-256: 4968b009dfe0bf60df435a8888b910a1cf23416785da8f833f0e07c1ea03d617
kernel-xen-devel-2.6.18-371.8.1.el5.ia64.rpm
File outdated by:  RHSA-2015:1042
    MD5: d3152896002bb2196b484c36927b326a
SHA-256: f081438ab0ce66488e524f0b456730341f4bc022cee2c6162082cb7c66f609ed
 
PPC:
kernel-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 55e219d49fc06d127e8414c84d4bf748
SHA-256: cec3d8a40f4e98919e63792363b3d879089d8081f4993bbc428a741fa68153d4
kernel-debug-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 8f678a020c6d62f331f10b242feeffc2
SHA-256: 60e8ee3fafc49915a3165f5c8cf158457c39915af653b09f247689fa40e9a266
kernel-debug-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 4bebb906bbf8ce6d4616b2e25e4bf58d
SHA-256: 35ce35ad6e9f9a7c2e4cde71521d20ab75321f375c91141753040d9ba53cdb07
kernel-debug-devel-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: b50340d3516b4f9b81ffd5190731146c
SHA-256: 24faad0bfb6ba3bffedb69f080949ce60fd18c1f58091ebe8b6c5754dcb24a90
kernel-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 70fe9c83c395e753fc076bb13fe5a72e
SHA-256: 0edfd398ce09cb1a1f12ee97c1693f714d21e85ade593c303876912c7b5b66bc
kernel-debuginfo-common-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 18f598a498f8f7091ff26a847fcf660a
SHA-256: f8f55d4b1f131469fcdf3906d0a0a5dcc45d33120b4a620779d363b6f80c8c47
kernel-devel-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: f05838db90cdb8bf8c8dbe58dbf23464
SHA-256: 579387f05c3b79b828118aa950bee806616abdf64013f2e66f57c8647b73f73b
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm
File outdated by:  RHSA-2015:1042
    MD5: 85958c5b7b6808a941e565a3077f8db1
SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.ppc.rpm
File outdated by:  RHSA-2015:1042
    MD5: c871968b72b94cfd23d57b422392fb02
SHA-256: 00f09fe32198261cf1467c83ea09b01fed53dc1e1eeb5cfea83933c423cf137c
kernel-headers-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 3a19e31614f17767a03b510605984125
SHA-256: 9afdbdfc20ccc3dc9df3657dc09779d2c6945bc5070fffd54327e55925e09f23
kernel-kdump-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: b0fe2eb2ba70859dc04baa7850f0d5b5
SHA-256: cc3a5f3895955a76244bb4f99d59cbb1f1169d99fc6445db39c84390a8ef5d29
kernel-kdump-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 32a3e036f702ffc3a9bc9c3c291529b5
SHA-256: 7295a4e4abf725f46b1365426182b12e2b3947a328c4aa50f35fe07323da0eeb
kernel-kdump-devel-2.6.18-371.8.1.el5.ppc64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 9af2de6742cab6b6330f6a37f8988edf
SHA-256: e0257ea1c2b765fef536c200a911f3b54752b6d947cadb369df72604c2f0ee97
 
s390x:
kernel-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: b3ee1c0a7c140a30b5732016e21adbc2
SHA-256: c96d461102456e78b9a487789119bfaa5d0a424d3c40c8d7538400e8b1974b7a
kernel-debug-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: bf9aa8f57fa39fea42ac6f9b7e1c5f15
SHA-256: 9b1e256e1f82207ca458d3fcbc57e874f9dfb29aeb17c8c42bc9b8de954ea9b4
kernel-debug-debuginfo-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: 2f5fdd252be60180bde5fd7f6c1c81e4
SHA-256: 2baa4b8868b88b911a13d33dbaeda33369ad7ce60d599286e4008685bb74cc80
kernel-debug-devel-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: ba290e10e20273659990348d9e098be7
SHA-256: 411789ac745397524e6f9706d3393d0cb538533c84ef6764ad5eb5488db13565
kernel-debuginfo-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: cfa033035436d7f58c6b5314057251dc
SHA-256: b558d4407c6b4a74e69f7b02767d8c304c942019ab2dde5db5a7442c53b62adf
kernel-debuginfo-common-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: f44b62373486be89852b6a09d30a92a5
SHA-256: 5ad37a99504b48f90eb9bc4cb06f5e3b423931d87ed853a3f24709c26bc60282
kernel-devel-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: 03c3d57cea941d4f3c1dbb4f3090dd33
SHA-256: 172e6a3bc987eda73fc209de8e45c5a19f54143685eb27a334074b3d0d7646df
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm
File outdated by:  RHSA-2015:1042
    MD5: 85958c5b7b6808a941e565a3077f8db1
SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: cb25d3b8b1d302f126a9c873421b1cfe
SHA-256: ae7c00d4a2bf832895114e966f6e54ef00e8ace75cf67525d125d55b9abe8fb4
kernel-kdump-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: 857fc19573c04632bf650dc2e7b2daac
SHA-256: ffa853cb311821d0193027b76e2e81b266f7d8263cc86980ca54b917259f0ab6
kernel-kdump-debuginfo-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: e0cbbed1502af0b807db09c525e5dad3
SHA-256: 686ce97d254d8c90d99f471c2c76e3ac3422fbe2377ce7e9b4a35b877543976a
kernel-kdump-devel-2.6.18-371.8.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1042
    MD5: e9e9a0b3b441812b455299059dea2f54
SHA-256: 102eaa9340d39b9ab4dd22f752eef14858c35655fe7131f64efce219760619f4
 
x86_64:
kernel-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 9bd17f1fb89d76064669d0aad6673c00
SHA-256: 4c52e28230fe95b4c5068c73e100fb3bf6b3b94e973cec7293f30e21977b62fa
kernel-debug-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: b5c4e334ed6d2ef36db21d1213704882
SHA-256: 6451bffa4a7e620da53aca3d54fa7067373352534a83f6e6fefcae9fb3f71738
kernel-debug-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 82b5c85e565d81d03779ee9b551a84d3
SHA-256: 736a4c9e96ccb31e2f7d5a05e49cf834c4881809feb37fafc1b0c162698492aa
kernel-debug-devel-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 59643fc824676fa5f3b62855cf3f94fd
SHA-256: 2a000c0496265713e38326d29b539ba96265c7b942031baec1fe5082fbc7a922
kernel-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: fcca2b73f51d6637a7155ec04662f0c3
SHA-256: 8952542a5248fe5737df9720bb8fd97ca0da6978fd768cd7fb50b9d3185f9084
kernel-debuginfo-common-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: e21e2837d3df9e91ed4a343223e1ab4c
SHA-256: a67a716c2638656632bccc939191253139867b9f1297df4ef5dcd9dbe22cecfe
kernel-devel-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 2e67e28851fa5e9c1e9a166a804c5067
SHA-256: 400b82d77675621a6a4529d2b0d730a03b8d0a17bec334720b217b3aedbfc953
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm
File outdated by:  RHSA-2015:1042
    MD5: 85958c5b7b6808a941e565a3077f8db1
SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 392b6606be22912a2d2d2da369f621f8
SHA-256: c703cea32d55384b6b59934f0bcbafdbd818b342a794430d87cd6fe880770f8c
kernel-xen-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 059eaccd9f5aa7e45f723c1a96b0b16d
SHA-256: 2e26382c460183fb5136252656bb4d04604d688e54ecacf2ae9d8047ec75b82f
kernel-xen-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 3330396aa1b454174bedf52dd16280ad
SHA-256: e1e1eee3ca7d3a1c38e11e733873c66fb801b0d9241e939f0ad9fe5b1db760dd
kernel-xen-devel-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: fb99a91c6175cc6b79d331830e9d011e
SHA-256: ee00c4fba64aeaf5079eb3ba444e1e4d42844a5ecc831ba6e14a983613a64aa6
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-371.8.1.el5.src.rpm
File outdated by:  RHSA-2015:1042
    MD5: cb70c81f0a357c4a558b575d91d6225f
SHA-256: 040a59ef7165597a27a2c6f2e4b010b0b2b82a69ea710bb3f1f00a3026ff55a0
 
IA-32:
kernel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 64db454a433e100af4baeabc42b61b8a
SHA-256: 894693418264150b6beddbfe78c3aec263a02e71a93280b33eeb771afd463486
kernel-PAE-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 26ec9ba843276bce4a136f1a887f0dc6
SHA-256: b3359eb2abbd5f1cd92b31b5ee4b117e596a0ab906e6bf6770a0e63c47163491
kernel-PAE-debuginfo-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: de71e794dfc3e7649463b533e09cda5a
SHA-256: b9f6115d9fe94461a1a55e1f762018d93ef7422e7c7cc8244abedfdcbedee59b
kernel-PAE-devel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: afee5a8699536df2c5780317d148d242
SHA-256: 01d5a92af18a492b2688dddcb5b61846d8a7a2a61c718096c0ec90f37a7c4c3b
kernel-debug-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 60ad90b41519ae07fdf87716706d3d21
SHA-256: f1ebbc654b02cf7af60424d9f21f75564af7c66e9b21e82e0bd38bdb28a7c075
kernel-debug-debuginfo-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: dbe315c471eb1743f53319ba14fc7e12
SHA-256: 4ac30b760690fdf4a68b48a9657922e2c7af0a7a54066228aadfcae33701b756
kernel-debug-devel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 1ee057c9e1c93812da7a2eb5554e4d12
SHA-256: 40c2ffd9154729cade55cd6e7d100a1391c93122a8758cb0331a87ce52c5b1b4
kernel-debuginfo-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: b8234e7529bf16b11690441e71503dbe
SHA-256: 9e53bcb11df871babdbb808e4766e818e1ac379bfc53c35ca929eff36131ddb0
kernel-debuginfo-common-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 3b0b84080c312c4f39f5eb33de4a6a1e
SHA-256: 726220ec91a40a1a952bc946c3591f71078c56f49249a62b81e1b8acbb9e948d
kernel-devel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: f5e862cb671647b0d194ca520c6b3440
SHA-256: a011dee805cd83d9b2a3cb9bb376561ac70f5d9c1d998c09fae13d4a189112d0
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm
File outdated by:  RHSA-2015:1042
    MD5: 85958c5b7b6808a941e565a3077f8db1
SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.i386.rpm
File outdated by:  RHSA-2015:1042
    MD5: e6af500e347ebdedc99819296c0635b3
SHA-256: 70cf155f56768146397188249f60938445925902574e5a0d438df218b01837e5
kernel-xen-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 963b5aa16b1b0b4199308c945e6ed1c8
SHA-256: 750004dd6b127c422a6f54db01272ee2b72e8f90d306a78e6740603fe1188059
kernel-xen-debuginfo-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 0becf236a397e73f891fedb6d72b0732
SHA-256: f4caeeb1e2be5e37200b653c07c120aedf5a553f6ba6cfe902c0f771fd6affe3
kernel-xen-devel-2.6.18-371.8.1.el5.i686.rpm
File outdated by:  RHSA-2015:1042
    MD5: 88c70f6db36871ac879f90cea5b6f43d
SHA-256: 4c8b60e69ab49166e50b091fdb026ab96d7399dcddca0a921b52cbf7edaa1483
 
x86_64:
kernel-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 9bd17f1fb89d76064669d0aad6673c00
SHA-256: 4c52e28230fe95b4c5068c73e100fb3bf6b3b94e973cec7293f30e21977b62fa
kernel-debug-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: b5c4e334ed6d2ef36db21d1213704882
SHA-256: 6451bffa4a7e620da53aca3d54fa7067373352534a83f6e6fefcae9fb3f71738
kernel-debug-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 82b5c85e565d81d03779ee9b551a84d3
SHA-256: 736a4c9e96ccb31e2f7d5a05e49cf834c4881809feb37fafc1b0c162698492aa
kernel-debug-devel-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 59643fc824676fa5f3b62855cf3f94fd
SHA-256: 2a000c0496265713e38326d29b539ba96265c7b942031baec1fe5082fbc7a922
kernel-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: fcca2b73f51d6637a7155ec04662f0c3
SHA-256: 8952542a5248fe5737df9720bb8fd97ca0da6978fd768cd7fb50b9d3185f9084
kernel-debuginfo-common-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: e21e2837d3df9e91ed4a343223e1ab4c
SHA-256: a67a716c2638656632bccc939191253139867b9f1297df4ef5dcd9dbe22cecfe
kernel-devel-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 2e67e28851fa5e9c1e9a166a804c5067
SHA-256: 400b82d77675621a6a4529d2b0d730a03b8d0a17bec334720b217b3aedbfc953
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm
File outdated by:  RHSA-2015:1042
    MD5: 85958c5b7b6808a941e565a3077f8db1
SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 392b6606be22912a2d2d2da369f621f8
SHA-256: c703cea32d55384b6b59934f0bcbafdbd818b342a794430d87cd6fe880770f8c
kernel-xen-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 059eaccd9f5aa7e45f723c1a96b0b16d
SHA-256: 2e26382c460183fb5136252656bb4d04604d688e54ecacf2ae9d8047ec75b82f
kernel-xen-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: 3330396aa1b454174bedf52dd16280ad
SHA-256: e1e1eee3ca7d3a1c38e11e733873c66fb801b0d9241e939f0ad9fe5b1db760dd
kernel-xen-devel-2.6.18-371.8.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1042
    MD5: fb99a91c6175cc6b79d331830e9d011e
SHA-256: ee00c4fba64aeaf5079eb3ba444e1e4d42844a5ecc831ba6e14a983613a64aa6
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1000451 - CVE-2013-2888 Kernel: HID: memory corruption flaw
1066055 - CVE-2012-6638 Kernel: net: tcp: potential DoS via SYN+FIN messages


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/