Security Advisory Moderate: kernel security and bug fix update

Advisory: RHSA-2014:0926-1
Type: Security Advisory
Severity: Moderate
Issued on: 2014-07-23
Last updated on: 2014-07-23
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2014-2678
CVE-2014-4021

Details

Updated kernel packages that fix two security issues and several bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
Moderate security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A NULL pointer dereference flaw was found in the rds_iw_laddr_check()
function in the Linux kernel's implementation of Reliable Datagram Sockets
(RDS). A local, unprivileged user could use this flaw to crash the system.
(CVE-2014-2678, Moderate)

* It was found that the Xen hypervisor implementation did not properly
clean memory pages previously allocated by the hypervisor. A privileged
guest user could potentially use this flaw to read data relating to other
guests or the hypervisor itself. (CVE-2014-4021, Moderate)

Red Hat would like to thank the Xen project for reporting CVE-2014-4021.
Upstream acknowledges Jan Beulich as the original reporter.

This update also fixes the following bugs:

* A bug in the journaling block device (jbd and jbd2) code could, under
certain circumstances, trigger a BUG_ON() assertion and result in a kernel
oops. This happened when an application performed an extensive number of
commits to the journal of the ext3 file system and there was no currently
active transaction while synchronizing the file's in-core state. This
problem has been resolved by correcting respective test conditions in the
jbd and jbd2 code. (BZ#1097528)

* After a statically defined gateway became unreachable and its
corresponding neighbor entry entered a FAILED state, the gateway stayed in
the FAILED state even after it became reachable again. As a consequence,
traffic was not routed through that gateway. This update allows probing
such a gateway automatically so that the traffic can be routed through
this gateway again once it becomes reachable. (BZ#1106354)

* Due to an incorrect condition check in the IPv6 code, the ipv6 driver
was unable to correctly assemble incoming packet fragments, which resulted
in a high IPv6 packet loss rate. This update fixes the said check for a
fragment overlap and ensures that incoming IPv6 packet fragments are now
processed as expected. (BZ#1107932)

* Recent changes in the d_splice_alias() function introduced a bug that
allowed d_splice_alias() to return a dentry from a different directory
than the directory being looked up. As a consequence in cluster
environment, a kernel panic could be triggered when a directory was being
removed while a concurrent cross-directory operation was performed on this
directory on another cluster node. This update avoids the kernel panic in
this situation by correcting the search logic in the d_splice_alias()
function so that the function can no longer return a dentry from an
incorrect directory. (BZ#1109720)

* The NFSv4 server did not handle multiple OPEN operations to the same file
separately, which could cause the NFSv4 client to repeatedly send CLOSE
requests with the same state ID, even though the NFS server rejected the
request with an NFS4ERR_OLD_STATEID (10024) error code. This update
ensures that the NFSv4 client no longer re-sends the same CLOSE request
after receiving NFS4ERR_OLD_STATEID. (BZ#1113468)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-371.11.1.el5.src.rpm
File outdated by:  RHSA-2017:0323
    MD5: 0cd20358739ec5ac21150ec092142025
SHA-256: 54d4c593cdfc5131baa14f266b568e5c05b790dea312aeb4a52fe08851a0251c
 
IA-32:
kernel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: e46719bd9c72d60e44727044af8af7fb
SHA-256: 50d292e6063521b6facf5376cb96c3f340f98af4ddb4bb7004f11f024dc61f79
kernel-PAE-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 774e6cb18688d332a00ba1af08f7a6d4
SHA-256: e8da2cbf4aed3236b0c71002ddda414d6523fdaf7840aa87248f860ff84a5219
kernel-PAE-debuginfo-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 09fc22230bc51b933cccbe7ff22ae246
SHA-256: 82e9e0535bc5da81a0dd0d2a166ee7c2b1a4e9794912c5591ca926aff2129dca
kernel-PAE-devel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 0ee5125653149c7513efb02a4ecc87ea
SHA-256: c5b9757252b1f68321c7d39c28101666da6d260a3b19fc734e529e9deb7a19b3
kernel-debug-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: eeb7fd94122707ee8e4e9c2e0d0249ee
SHA-256: 9912486456a47d43b52d2dfd6bab784d911aa65a844ac2600c5b11dc00bf674b
kernel-debug-debuginfo-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 08328a038df4baf5353deec6013c3f98
SHA-256: 4ddb58acb3dc6823feab3f94a13857998b2a6e217d4e6a874c1c2235275ea405
kernel-debug-devel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 53b4fea31d8354ac7f31f23da86bf4e7
SHA-256: 1f16478bd9bafa8d76df6eab255e1e996723f972b8cc4363235626970655cdee
kernel-debuginfo-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: cabd44db5f40129ee0cb3c9716666f79
SHA-256: 2313ae1c4eb089e60d71714ae657732b2bb1ef17f4c44dbd16d52d1d2325e4ff
kernel-debuginfo-common-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: d90e2d6eb191a9f12a89f3f18567e41c
SHA-256: 4035ab1ef4d52fb5fc350820eae924b32b5b8b9e146f2cb1e409b8fefc75d857
kernel-devel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: af2117e40d9b83a291601a56451c1fea
SHA-256: 0bd91428afc80548003ec80103a8dd5ac5a86790e9a913d7e7e8209e8e4a2f71
kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
File outdated by:  RHSA-2017:0323
    MD5: 6ba44e7adae5f54a639013e4191c9fd9
SHA-256: 57dc2973eddd3415f1f2f322bb1da110ffdbe5912bed0c8a9cf993c6b9980c60
kernel-headers-2.6.18-371.11.1.el5.i386.rpm
File outdated by:  RHSA-2017:0323
    MD5: a6bca657e0376c76e3201de390a2daf8
SHA-256: 7b7b5a90fa0abb899d3dec19af0700a45cf2e7319bd6b76c1b7227931a8690f3
kernel-xen-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: b2182aa9e37a8ab1185bfe425f5c7da3
SHA-256: 07a949c70330c6ecd43286aa2d5d1aa38797397d4b32ddeb88ce734a742a7347
kernel-xen-debuginfo-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 82a053c25209bf8c7dded5b1ecbce151
SHA-256: 296e2a8cb39dee3ca2f721059ea5360da453fe207a1a4ed7c1dbeabc7db377cd
kernel-xen-devel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 79e59a5210ae322e535f02739f372ff1
SHA-256: 45b52fe7e82f6c7fe07e0259d57c8fd23cb08fa5f9c59a033adf3aedfd515790
 
IA-64:
kernel-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 957a5c67e545ce949a623ca66e0546fc
SHA-256: a2fba23f67a4756c12e8c7e7308e8a7b091b774f371602f5de70ebb5fbce1595
kernel-debug-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: b2bd13ca41827a22ac99b1e97d6cedce
SHA-256: 61ff4265dce9c1f09855a0057c71be55bf51cb2bc064dc34577ad29ba1e69aa4
kernel-debug-debuginfo-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 579e47fe38512280d01bd2dfc4d2c5cf
SHA-256: f8eda8253b5624f697d99ffcb89fadfc9b4b9036ebffdfa557bab1ba50f9374b
kernel-debug-devel-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: ea141ac181ae4a19cb7227e89be70fa3
SHA-256: 783714cbaf5fda81a11b07a63e309551e6e1d3128d12bab5e573a967039325f4
kernel-debuginfo-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: a9a089cda4bbabf2bc6c05140ffcf24e
SHA-256: 4fa734bc30c3fa371fd8fecb852f32c32175ea428b4f6017fd37eff25112db1e
kernel-debuginfo-common-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 4e3399099ea9127364ca5893269fa315
SHA-256: 77ea228a61c632d4e25c95fd90488c7a8617bc9bbe65b17fd4c0ab747b60758c
kernel-devel-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 73cfac34b5a349b77f481d93ac858513
SHA-256: a385eede037ca4132d67a91d05f196095d8fab05ab5f4e1927361f36c9fd2920
kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
File outdated by:  RHSA-2017:0323
    MD5: 6ba44e7adae5f54a639013e4191c9fd9
SHA-256: 57dc2973eddd3415f1f2f322bb1da110ffdbe5912bed0c8a9cf993c6b9980c60
kernel-headers-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 48ff714dee14704fa1afff52da424391
SHA-256: 5c6ebbff1370d81328263553b5dcc5a91d9bbc5fe7af6063f23b792f1b6c5ecd
kernel-xen-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 291efedb8ecb8294af8bf83ebe7bf90d
SHA-256: 9655116d53fe573a21c44e29553a9ff56bec9422f36a1d676ee1cade45d02de7
kernel-xen-debuginfo-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 235d4f02f7b3fc96aad5c72977f30562
SHA-256: 81dfe50b72851cba1c2acadb41fab0181adb0adc8c9a569d7aaddeaf8cef1518
kernel-xen-devel-2.6.18-371.11.1.el5.ia64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 7825a21e8a72962689f73a557b67b093
SHA-256: 7c88f5b49b14509c977ad92e724e9d6bd27efc980e9e69ce3e9ab32dc0f89d4c
 
PPC:
kernel-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: e771b4510d97464cc46e37c7694fb53b
SHA-256: 9b2c5022c36ec5e73e0352ccb50e5760a504856881e339508f681b03a67440a7
kernel-debug-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: d221128795baa77d5ea3a0b1e87ba749
SHA-256: 5510ce81a50fbd24adc57be23a2ad7d6192164cfd13ce3c0380cd4b1e1adb6c3
kernel-debug-debuginfo-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: bc9e34523e9c26611f0db261ece2c7eb
SHA-256: 89204f067373a0c2bb588b4398966e7e1faf22139dd5a2770bdbb23f8cc4f2f7
kernel-debug-devel-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: e79e9c135f29519a19ecbf032aab9b64
SHA-256: b826b872c1ae78fc611a6b732f3cf74f6a9768b358fe14fa7a0a1028cfa187b4
kernel-debuginfo-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: e94ebaf4db92be3e602e0766cdd85d46
SHA-256: 0f101fc2a608eb1c5c5efc4a4d1055218d3fea38ae555b596da25d2fcfe388a2
kernel-debuginfo-common-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: c9c4deb5ba0b3dbf4553a90c5a05687e
SHA-256: 7427ff4b6aabb5592c70d5f7f854099aa8b0842cc5745e572966ff85872db236
kernel-devel-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: ff27ee28672a87ec3c99d4f5be00e44c
SHA-256: 5e6166450e2cc3b283ff6b6c57f1cdf8e909d27c811ae980dc3baa3b3ce3fbd1
kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
File outdated by:  RHSA-2017:0323
    MD5: 6ba44e7adae5f54a639013e4191c9fd9
SHA-256: 57dc2973eddd3415f1f2f322bb1da110ffdbe5912bed0c8a9cf993c6b9980c60
kernel-headers-2.6.18-371.11.1.el5.ppc.rpm
File outdated by:  RHSA-2017:0323
    MD5: 42ba9493a78114e3d5e7b1a5b8a0f418
SHA-256: c9b527cbe62fd445f7fa518b970380969ffb1cada1c311c85553bf08b2dd36d9
kernel-headers-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 8badf1559aa8e2c017b1f01de50b70a5
SHA-256: 065b8fd3d77111efac95de2c800152fd4de8b1a0afd2570f821932bccd2efc20
kernel-kdump-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 8405576fc5079e2e7c487d5a1c4bc422
SHA-256: d8dc78b60a50bad034d4a24870a3a1d28643242561c05ce51a859ea1d991488f
kernel-kdump-debuginfo-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 5d35f7504f8172bd31b37c0cdff9baeb
SHA-256: c146095f3fa13a272b7ebd5958f033735664dc3f1692205fb623b09dd537e083
kernel-kdump-devel-2.6.18-371.11.1.el5.ppc64.rpm
File outdated by:  RHSA-2017:0323
    MD5: a4b0720e7a97202fa7bf0135ceb83376
SHA-256: 69d5d33071d07d71c9db491de25b8f066cc1ffa8ef09ed9172acac88ff89f4d3
 
s390x:
kernel-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 662ad059f9f21494623ff10d247a6d81
SHA-256: cea66375485d89c0b330ee5b1b00c27321c420249f81fdeae202016c239b0ed0
kernel-debug-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 31601ba918b87dfb03791ee26294d0c9
SHA-256: 17a9436ec4c90aaed6d847f0c1986f86136f80e848bca312d9512e94f29f3b2d
kernel-debug-debuginfo-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: ee3de768b00f0751baf1f1cb896f299f
SHA-256: 5bf8a020e98c310d1f5749eb52e5d1d056628757b41ebd23bd491016587e46c5
kernel-debug-devel-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 1833b180e1a342cb08ded632f577814c
SHA-256: d91a12984159069fb29f5c986bfe7c3144332c9992f8bce43d59bca65ff371af
kernel-debuginfo-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 706683517e0818eef5c4310f7d5cb922
SHA-256: b31cb17849810974e8483d983ea92b87314c1f7315d5c25890f9de1c763af0a3
kernel-debuginfo-common-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 4548f08cf8e40f63ec7795da311a6602
SHA-256: bb36a25a6eb42f2e828fc64afabe41fe641f547d5d67af3704b1c228699c96ef
kernel-devel-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 18cb52b9a8096d86630fac1583a9c2c4
SHA-256: e007c4a22818516a259cbdc7ba7ea7d73eb186e8ff13e607ff93566adcd30b7f
kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
File outdated by:  RHSA-2017:0323
    MD5: 6ba44e7adae5f54a639013e4191c9fd9
SHA-256: 57dc2973eddd3415f1f2f322bb1da110ffdbe5912bed0c8a9cf993c6b9980c60
kernel-headers-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 107d7024e9566ecf24b1783daaf48746
SHA-256: 03c602522825cb8cf60146682bec7d1e1ab766a3040e751eb7bcefd5886ef674
kernel-kdump-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 946df4633008d89c12b31a4317eb59f1
SHA-256: 49534488655306cc0ed37f261474e027b1180b81b36d555f0c0c128933f1de3b
kernel-kdump-debuginfo-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: 686dcae69a5d8889df7467ccef3f27ad
SHA-256: 1ed09b09d62f5d74c752831fda5483f556218b5b34679b00328b888683226bdb
kernel-kdump-devel-2.6.18-371.11.1.el5.s390x.rpm
File outdated by:  RHSA-2017:0323
    MD5: cbc8355a9457f1380bfbc3cde771e517
SHA-256: dfaa6cf522236ca994080dc418e96997b4cc9aaabdeca1c4ebb8049d7d9e6f81
 
x86_64:
kernel-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 4ef9834c7f3355b85e616c3d1a847a18
SHA-256: 097d8eba6970e4e70908d0ec41d83d51fd040ea3111bc6a24c80156cd9e35784
kernel-debug-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: c28f0bafeb0829eabdb8e6a9df0b1953
SHA-256: 404d6fafff59ee6a2d1511e57501ab63dd64603bf940f9ecf13ef0e8fcfcfcc3
kernel-debug-debuginfo-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: cf24e0863bfd30c53b5886c7777d2d79
SHA-256: 9e8e979453206ae81ede1171eb306df8c8801904d5f8287b0f615599633328f4
kernel-debug-devel-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: f53557e27ab8a0dfcea5f1b65da271c9
SHA-256: 1900a890a74e0454d5f52a17795287a53064933132374938090aa036f64bcedf
kernel-debuginfo-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: c89fd839e205bdaa9f2baa07a70f10d7
SHA-256: a73c021becfdee1ecb7d30623fe8e65e7c26fb0e4a81a0986d3a7d3e9e472a4a
kernel-debuginfo-common-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 0c8a417dec9fe6ac646621b5dd0d01c4
SHA-256: 74ab0b8827ed95797ea39301a10f5941e4452a517d110acb5a9efd552c16d975
kernel-devel-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 3f761e817ff4f955fbdc40915db88c22
SHA-256: 75ee3485b4490d08d5231d532daea2a3c2041c7fd69ae477c2a4cfa35be3c89e
kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
File outdated by:  RHSA-2017:0323
    MD5: 6ba44e7adae5f54a639013e4191c9fd9
SHA-256: 57dc2973eddd3415f1f2f322bb1da110ffdbe5912bed0c8a9cf993c6b9980c60
kernel-headers-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 7905193f9d110e952860a75733ca8792
SHA-256: 8bc4c49c3605ce4688d042c564e8efbb3ebdb7006246051457a23fbdeb02b6b1
kernel-xen-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 9426cf870f8fce928eca357ef4741a34
SHA-256: aca21027c11df6f518d7396de0a6d510d5f3b983d6270206d3437e25347960ed
kernel-xen-debuginfo-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 67782b5a75e1fdfc00ecdbc2f4f7aefd
SHA-256: cd38181e20cf7c8102b3787b88d0194125fdb5d355bce42fe136b2d68c5b5489
kernel-xen-devel-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: d7b6d2d1692e6396bb34eabfaec1fe14
SHA-256: 9bf95a1c158974baa16354577d4481cf22d57179906ae1ee0838a4120238fde8
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-371.11.1.el5.src.rpm
File outdated by:  RHSA-2017:0323
    MD5: 0cd20358739ec5ac21150ec092142025
SHA-256: 54d4c593cdfc5131baa14f266b568e5c05b790dea312aeb4a52fe08851a0251c
 
IA-32:
kernel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: e46719bd9c72d60e44727044af8af7fb
SHA-256: 50d292e6063521b6facf5376cb96c3f340f98af4ddb4bb7004f11f024dc61f79
kernel-PAE-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 774e6cb18688d332a00ba1af08f7a6d4
SHA-256: e8da2cbf4aed3236b0c71002ddda414d6523fdaf7840aa87248f860ff84a5219
kernel-PAE-debuginfo-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 09fc22230bc51b933cccbe7ff22ae246
SHA-256: 82e9e0535bc5da81a0dd0d2a166ee7c2b1a4e9794912c5591ca926aff2129dca
kernel-PAE-devel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 0ee5125653149c7513efb02a4ecc87ea
SHA-256: c5b9757252b1f68321c7d39c28101666da6d260a3b19fc734e529e9deb7a19b3
kernel-debug-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: eeb7fd94122707ee8e4e9c2e0d0249ee
SHA-256: 9912486456a47d43b52d2dfd6bab784d911aa65a844ac2600c5b11dc00bf674b
kernel-debug-debuginfo-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 08328a038df4baf5353deec6013c3f98
SHA-256: 4ddb58acb3dc6823feab3f94a13857998b2a6e217d4e6a874c1c2235275ea405
kernel-debug-devel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 53b4fea31d8354ac7f31f23da86bf4e7
SHA-256: 1f16478bd9bafa8d76df6eab255e1e996723f972b8cc4363235626970655cdee
kernel-debuginfo-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: cabd44db5f40129ee0cb3c9716666f79
SHA-256: 2313ae1c4eb089e60d71714ae657732b2bb1ef17f4c44dbd16d52d1d2325e4ff
kernel-debuginfo-common-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: d90e2d6eb191a9f12a89f3f18567e41c
SHA-256: 4035ab1ef4d52fb5fc350820eae924b32b5b8b9e146f2cb1e409b8fefc75d857
kernel-devel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: af2117e40d9b83a291601a56451c1fea
SHA-256: 0bd91428afc80548003ec80103a8dd5ac5a86790e9a913d7e7e8209e8e4a2f71
kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
File outdated by:  RHSA-2017:0323
    MD5: 6ba44e7adae5f54a639013e4191c9fd9
SHA-256: 57dc2973eddd3415f1f2f322bb1da110ffdbe5912bed0c8a9cf993c6b9980c60
kernel-headers-2.6.18-371.11.1.el5.i386.rpm
File outdated by:  RHSA-2017:0323
    MD5: a6bca657e0376c76e3201de390a2daf8
SHA-256: 7b7b5a90fa0abb899d3dec19af0700a45cf2e7319bd6b76c1b7227931a8690f3
kernel-xen-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: b2182aa9e37a8ab1185bfe425f5c7da3
SHA-256: 07a949c70330c6ecd43286aa2d5d1aa38797397d4b32ddeb88ce734a742a7347
kernel-xen-debuginfo-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 82a053c25209bf8c7dded5b1ecbce151
SHA-256: 296e2a8cb39dee3ca2f721059ea5360da453fe207a1a4ed7c1dbeabc7db377cd
kernel-xen-devel-2.6.18-371.11.1.el5.i686.rpm
File outdated by:  RHSA-2017:0323
    MD5: 79e59a5210ae322e535f02739f372ff1
SHA-256: 45b52fe7e82f6c7fe07e0259d57c8fd23cb08fa5f9c59a033adf3aedfd515790
 
x86_64:
kernel-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 4ef9834c7f3355b85e616c3d1a847a18
SHA-256: 097d8eba6970e4e70908d0ec41d83d51fd040ea3111bc6a24c80156cd9e35784
kernel-debug-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: c28f0bafeb0829eabdb8e6a9df0b1953
SHA-256: 404d6fafff59ee6a2d1511e57501ab63dd64603bf940f9ecf13ef0e8fcfcfcc3
kernel-debug-debuginfo-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: cf24e0863bfd30c53b5886c7777d2d79
SHA-256: 9e8e979453206ae81ede1171eb306df8c8801904d5f8287b0f615599633328f4
kernel-debug-devel-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: f53557e27ab8a0dfcea5f1b65da271c9
SHA-256: 1900a890a74e0454d5f52a17795287a53064933132374938090aa036f64bcedf
kernel-debuginfo-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: c89fd839e205bdaa9f2baa07a70f10d7
SHA-256: a73c021becfdee1ecb7d30623fe8e65e7c26fb0e4a81a0986d3a7d3e9e472a4a
kernel-debuginfo-common-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 0c8a417dec9fe6ac646621b5dd0d01c4
SHA-256: 74ab0b8827ed95797ea39301a10f5941e4452a517d110acb5a9efd552c16d975
kernel-devel-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 3f761e817ff4f955fbdc40915db88c22
SHA-256: 75ee3485b4490d08d5231d532daea2a3c2041c7fd69ae477c2a4cfa35be3c89e
kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
File outdated by:  RHSA-2017:0323
    MD5: 6ba44e7adae5f54a639013e4191c9fd9
SHA-256: 57dc2973eddd3415f1f2f322bb1da110ffdbe5912bed0c8a9cf993c6b9980c60
kernel-headers-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 7905193f9d110e952860a75733ca8792
SHA-256: 8bc4c49c3605ce4688d042c564e8efbb3ebdb7006246051457a23fbdeb02b6b1
kernel-xen-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 9426cf870f8fce928eca357ef4741a34
SHA-256: aca21027c11df6f518d7396de0a6d510d5f3b983d6270206d3437e25347960ed
kernel-xen-debuginfo-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: 67782b5a75e1fdfc00ecdbc2f4f7aefd
SHA-256: cd38181e20cf7c8102b3787b88d0194125fdb5d355bce42fe136b2d68c5b5489
kernel-xen-devel-2.6.18-371.11.1.el5.x86_64.rpm
File outdated by:  RHSA-2017:0323
    MD5: d7b6d2d1692e6396bb34eabfaec1fe14
SHA-256: 9bf95a1c158974baa16354577d4481cf22d57179906ae1ee0838a4120238fde8
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1083274 - CVE-2014-2678 kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check()
1103646 - CVE-2014-4021 xen: Hypervisor heap contents leaked to guests (xsa-100)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/