Updated kernel packages that fix one security issue are now available forRed Hat Enterprise Linux 5.6 Long Life.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* A flaw was found in the way the Linux kernel handled GS segment registerbase switching when recovering from a #SS (stack segment) fault on anerroneous return to user space. A local, unprivileged user could use thisflaw to escalate their privileges on the system. (CVE-2014-9322, Important)Red Hat would like to thank Andy Lutomirski for reporting this issue.All kernel users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. The system must berebooted for this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/articles/11258To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
kernel-2.6.18-238.54.1.el5.src.rpm
    MD5: c13692c1277a1faaced398b3a81364f0SHA-256: 7aad1d47622fdc719feb852a7e63bd1dd552bf6dbe99c2e91a74bada8b255fb0
 
IA-32:
kernel-2.6.18-238.54.1.el5.i686.rpm
    MD5: 7885257e5cd38f32b00eb662c2ff85ddSHA-256: 326bd5b74735542f0fba4096ecf92bc8361ff74e17fe789e8d72121cb8fa1e8c
kernel-PAE-2.6.18-238.54.1.el5.i686.rpm
    MD5: 3c87bbdb59160d2a975bbbb9c95a38a8SHA-256: ec846aa425b6c73d92a758ed0f67c3465610488049a64443e62c58e9008a1d41
kernel-PAE-debuginfo-2.6.18-238.54.1.el5.i686.rpm
    MD5: a4b7d1ad4c4ad54bd28394405f8b7cd6SHA-256: c09c4e678b34a8e3644b98157b9193b1b4e368ec0d4c07042918700af0b1a33c
kernel-PAE-devel-2.6.18-238.54.1.el5.i686.rpm
    MD5: 30f27da4eb1b4e6966e20ce87b550dfbSHA-256: 9bdf2ad3d17ddfafd93c3063d7d7f273a91aa8ab4d2064adc41413863bfa2305
kernel-debug-2.6.18-238.54.1.el5.i686.rpm
    MD5: d5343dd0b27c9d8d88e351e102c8b7fbSHA-256: 3c0d75e3496c99a4946137549580a661ca667f37606481fcacc6da080bfbe9be
kernel-debug-debuginfo-2.6.18-238.54.1.el5.i686.rpm
    MD5: b672805e69a67923356bc6af78b0c84aSHA-256: b7113e23cf2de92e0566a8068d08e93c28696fd789a698fde6f17b4082bc0f63
kernel-debug-devel-2.6.18-238.54.1.el5.i686.rpm
    MD5: 5541d4fcf8881eb9b0e53bb43a7d73c5SHA-256: 72bf0dc0ad2a2f55d233f677220d99939e8bc8221c12adc6582d83d61ae52573
kernel-debuginfo-2.6.18-238.54.1.el5.i686.rpm
    MD5: 23d8a0f8580ffd876cbe7a1c62edd8b9SHA-256: 583703f59ade0454d068c5e9d6d43a386aa98948b8b48ee6dae89e15ad46b9e4
kernel-debuginfo-common-2.6.18-238.54.1.el5.i686.rpm
    MD5: 9ade227c79c10c1659f0a1763f6418b7SHA-256: 7a29046eec3f7e60cfe0709870a55864e8cac3d19a19c1c9fef60ea59170bac0
kernel-devel-2.6.18-238.54.1.el5.i686.rpm
    MD5: 9e7112d602fa07fb95020ec7ed7dcc66SHA-256: 29ee236e5f4621243df4fc9568c97fb581345fa602b4d9c7e7661525b0e2851e
kernel-doc-2.6.18-238.54.1.el5.noarch.rpm
    MD5: e7639ef447bb2f97eaf657c96b5edb19SHA-256: a81f083a31b81807d4dacce76f8fe4fd0dfeb89de0be8ef24395a82a0a1e2c74
kernel-headers-2.6.18-238.54.1.el5.i386.rpm
    MD5: 4d74284a39b6f998d9049caf2c5d37f0SHA-256: c4fd4f3acc16750eda66820577c6d9a9b717f8f09bec1617c42f58a1236a937b
kernel-xen-2.6.18-238.54.1.el5.i686.rpm
    MD5: dbba20e3202b2f8091ecf1ef383d00b6SHA-256: 43298b745ecfbe65dc28e140622dacf4c0ce22051fc10797efe62e7f3b1f587c
kernel-xen-debuginfo-2.6.18-238.54.1.el5.i686.rpm
    MD5: 228c091eb6a9ba9229731e789c7345afSHA-256: d61e5247debce0858d852e4961c9417d318bcca75f721f1464dc0edcda8002fd
kernel-xen-devel-2.6.18-238.54.1.el5.i686.rpm
    MD5: 3df996f334932b05009e4700b449f360SHA-256: cbe5cc3dfbc1a11b0de29c856ed9e7ee1482bc567d0437fbd27d84f98cb47627
 
IA-64:
kernel-2.6.18-238.54.1.el5.ia64.rpm
    MD5: 93a09368a4eddda4fb6479de6345fa8cSHA-256: ba85950285403c5a45c9b01f3d6794447c3be844a07b3878afe185899e66da62
kernel-debug-2.6.18-238.54.1.el5.ia64.rpm
    MD5: ba4990b8db05e38be4e0b8b13ebd79f1SHA-256: f9ff37107eee8dd2647660a4a7b51a0b1fb128489d8dc568d2d0d983b368b7e8
kernel-debug-debuginfo-2.6.18-238.54.1.el5.ia64.rpm
    MD5: 7f075aeb2150b1ee4eeb9f31207d94beSHA-256: 1b2d2df3565fcf7a0feb517740c544e9ee733894cdbd6a80515b8666d63afdd5
kernel-debug-devel-2.6.18-238.54.1.el5.ia64.rpm
    MD5: 55da88b7a08b32436b68116fc0a95bb5SHA-256: 63e7ee1509d9d983147a17be95a8fa1b9acc2568fea51263b68beae3244abed8
kernel-debuginfo-2.6.18-238.54.1.el5.ia64.rpm
    MD5: fd980813543f5961c7afcf4b2df59221SHA-256: 525932681835c8dc3122b9f3b80dc0adbc867423b5436f0868052f383980cb45
kernel-debuginfo-common-2.6.18-238.54.1.el5.ia64.rpm
    MD5: dc77b77fef2cbb5da41c259f7a5ab7c0SHA-256: ae274189ba7b5d1d0b9e860490a4a895bbe1c68632d01a8605e453e463357441
kernel-devel-2.6.18-238.54.1.el5.ia64.rpm
    MD5: 5b16b1fd8b378abf120b796e324d2328SHA-256: ce55f78089675ef0346ff3ff677728711133031429a65fd38c574f0804535907
kernel-doc-2.6.18-238.54.1.el5.noarch.rpm
    MD5: e7639ef447bb2f97eaf657c96b5edb19SHA-256: a81f083a31b81807d4dacce76f8fe4fd0dfeb89de0be8ef24395a82a0a1e2c74
kernel-headers-2.6.18-238.54.1.el5.ia64.rpm
    MD5: e307f796d4d96b8992f30eb324b64c44SHA-256: 4279f974198c3b3dcc65d0b979bb5189867a7838344e1da51ecae899af99cebc
kernel-xen-2.6.18-238.54.1.el5.ia64.rpm
    MD5: 839cc6ea3c1a8db9df2974cb289d40d2SHA-256: 471377fff1068f364b52528f9386ee4f5a9131b2178fa2c90ee171172a674213
kernel-xen-debuginfo-2.6.18-238.54.1.el5.ia64.rpm
    MD5: f366fab8126822bdd1d3ebd55285a740SHA-256: 8634158c49b065de654930d2f069785105239dfcb4f2a29b8dd826fcef425b99
kernel-xen-devel-2.6.18-238.54.1.el5.ia64.rpm
    MD5: 0fc55efd692285eb6f912a26c9c735e4SHA-256: e897ff09c1f6ddf978f32146a4fd6b3b383e03fdc324cf908de4c37d9a433b4a
 
x86_64:
kernel-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 53790058d4b4b0722a2820324447350bSHA-256: 8b0c50be22555eae5f06bcdcd53494b485230a8983d41df0d47974a8fd1d54a2
kernel-debug-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 6ca4916b03ac1f0f43d47edb1264589bSHA-256: 4a6b48e582b1df0d1169b8aa13965971783706f7ca545cfcbcf895891c1e4ed9
kernel-debug-debuginfo-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 537efc1fc2d53edcfcffebeca2d325d1SHA-256: 7d03617cde1ee78243dbc9e0dcf04af429d88469efbbbb719d58e54564ae4b8e
kernel-debug-devel-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 9af9527048bfd0a56dec403aa63e8a02SHA-256: d779a7c2f855c54e9ae9f94adbb8159fb724a4bb8c2e007aae404e41aaa0ec67
kernel-debuginfo-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 1cbb0ae4661df9e36bd871c5f6de322eSHA-256: 4810db84cbef2b441bd7cbab5e963435657f7f7fa052fb19545b2e3f480ede7b
kernel-debuginfo-common-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 82f387ee95f94aadc6f89c37278169f3SHA-256: 6fb6c2ee49efaf36a0e5b55450d7acafe098f32413935fa6b9ee72513337a978
kernel-devel-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 8c4804bf8ee6c20ae735a75029a0676fSHA-256: 476d4c7c647c280b2299973b5f8749da1696c22038c420e99cac34820035c90e
kernel-doc-2.6.18-238.54.1.el5.noarch.rpm
    MD5: e7639ef447bb2f97eaf657c96b5edb19SHA-256: a81f083a31b81807d4dacce76f8fe4fd0dfeb89de0be8ef24395a82a0a1e2c74
kernel-headers-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 4dd900340fec1fc6a6e7bf2660371c47SHA-256: 5a34727c725f87add5617ef1a3683457b67a0308c22567f2c6da669790bacc2a
kernel-xen-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: 1d9d950fad34db40f598f366a2e841e6SHA-256: 679981f74ae1eecf4c5baa9e279b40aa1139e77b49e36a4e532e7a6f5a8a42da
kernel-xen-debuginfo-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: bc249af6669063b462ee0415b8cbb3a8SHA-256: fb5d6c3d126e4f457c0aafb44f3df9867e425c0257c8eba34c6ed06b71197a24
kernel-xen-devel-2.6.18-238.54.1.el5.x86_64.rpm
    MD5: f92b6fd82f91dde3be7f762298196652SHA-256: 5134324c90e82b211132495c26f6e71019eb105e0069b1981a31939b01f9907b
 
(The unlinked packages above are only available from the Red Hat Network)
1172806 – CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply