Updated kernel packages that fix one security issue and one bug are nowavailable for Red Hat Enterprise Linux 5.6 Long Life.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* It was found that the Linux kernel’s implementation of vectored pipe readand write functionality did not take into account the I/O vectors that werealready processed when retrying after a failed atomic access operation,potentially resulting in memory corruption due to an I/O vector arrayoverrun. A local, unprivileged user could use this flaw to crash the systemor, potentially, escalate their privileges on the system. (CVE-2015-1805,Important)The security impact of this issue was discovered by Red Hat.This update also fixes the following bug:* Previously, the signal delivery paths did not clear the TS_USEDFPU flag,which could cause problems in the switch_to() function and lead tofloating-point unit (FPU) corruption. With this update, TS_USEDFPU iscleared as expected, and FPU is no longer under threat of corruption.(BZ#1214237)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
kernel-2.6.18-238.56.1.el5.src.rpm
    MD5: 90a853d7fe496493dae068dc54204445SHA-256: 5bf20a68f11a5a9641720f2cda0dc8a2ddbc6b4a1a0ed0424f209ecb670c3f2c
 
IA-32:
kernel-2.6.18-238.56.1.el5.i686.rpm
    MD5: a4dee75cb42663fdba7fc1fc49efe4e6SHA-256: 0174ac866a764c3d499844411d45ab7c5eb13b02044e4718c27bd6809c224493
kernel-PAE-2.6.18-238.56.1.el5.i686.rpm
    MD5: ffd708c930733105a2289e0e7c92c343SHA-256: 78b8e3ce3322918874817060cf550ad991878f8c55a0f3617075d01f8bde8323
kernel-PAE-debuginfo-2.6.18-238.56.1.el5.i686.rpm
    MD5: d8d3d991390053d81946e34b6241e1a8SHA-256: ec817440939446477f67a4f5de8461dda270449e640fe5ec74b5e98e11d8d9bb
kernel-PAE-devel-2.6.18-238.56.1.el5.i686.rpm
    MD5: f23e994b2f1df93a7dd0900fc9ec3948SHA-256: e5f48deaa9463f7c31814346580ed7f79632195a4a84e20354c871f3c80adbbd
kernel-debug-2.6.18-238.56.1.el5.i686.rpm
    MD5: 0fe950182e6f1bc4996451ee19a5b331SHA-256: cf9bad56b79a0f10452ff7cb4f89a1badb8239e663b2259618b9c41eebd2188a
kernel-debug-debuginfo-2.6.18-238.56.1.el5.i686.rpm
    MD5: a99c6064c61fd2452bee3111db3676f3SHA-256: f6f27b0ade14ae17d733d47aa7af7b184b9a91041a13bded0119e584308c39ea
kernel-debug-devel-2.6.18-238.56.1.el5.i686.rpm
    MD5: 787c8b38c3778c9f19480601993f612dSHA-256: 6486dba811ed0109636517bf40ba01e0549972cd52e531a205e57c059689dcea
kernel-debuginfo-2.6.18-238.56.1.el5.i686.rpm
    MD5: 39266fd738d55ab09adc62d5f1763652SHA-256: 797aa50b7afc7977b1510b9f7d1bcaa8b3273ce96254084c5ccda399331f6d78
kernel-debuginfo-common-2.6.18-238.56.1.el5.i686.rpm
    MD5: 5761037dd6da889b8adeabb8d72f4a94SHA-256: 14dd1eff0a0d2a77c66af97e5b90033aa8d0c03fb430591b7fa1ccc1902689bb
kernel-devel-2.6.18-238.56.1.el5.i686.rpm
    MD5: 47eaf55a9a4e680785ed55118dc10918SHA-256: fa80db5d6db361fffe3d12600ed737c81a1e49ff655aeca4134b14fa3747baa6
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm
    MD5: d80502a5dc690b019979daa33782411eSHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.i386.rpm
    MD5: ebf4ca54ecd291308760c8182f77ae69SHA-256: 10cab296f2a47fda5777861320983101f523f67cd8e03c0a0992d2b754671548
kernel-xen-2.6.18-238.56.1.el5.i686.rpm
    MD5: 3e3985047769104757968a047bde47a8SHA-256: f0d4ef5ae5212011c3959e8d5ebbc599ffdba3d3fb5b90c2015e87069d9fa6b6
kernel-xen-debuginfo-2.6.18-238.56.1.el5.i686.rpm
    MD5: 35bb9f5f16ddf39844e28ae3b373d6baSHA-256: 64047b695c7da90c217496e398237a06539f46ae43b2a81c4888e50c0a7b8167
kernel-xen-devel-2.6.18-238.56.1.el5.i686.rpm
    MD5: b26b2bc2a8f40ec089e9bcf4fc2b4ebcSHA-256: 63e0a493fd8b0897a803f13e80ecb6349a93c30efd6be568f8f45fc6bb14d5f1
 
IA-64:
kernel-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 4fde501219c86cfb8a941518745a2b66SHA-256: f518cdc9f089ee98d3ade3868c3a7315ac8dc9897113edcc3200151bb26a56c3
kernel-debug-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 80ca668083af55a4fc14adcf42ea8dadSHA-256: 4fced25b74f3791c9086f6b51045a5c890cb7f02701183e3413bc065f7062c9e
kernel-debug-debuginfo-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 333823746fe4243b805f69d0f830e7c6SHA-256: 1f88dae112cef03eed9a811da21fc0ec2dbc174c004fd57076ac3d78c515f2e9
kernel-debug-devel-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 4fb03ee05486aa25b266390585dd381cSHA-256: 32ec184beb1eed57ecc8311aaafba3b159d3e5906a40dfa040f7a378b4a1795c
kernel-debuginfo-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 275e0e13fa3014a2c68825bd2a7bbd79SHA-256: e58fd73481db3a61f0c0c8285f92a35194444b5d194ec92d852c00ed58cc6e4c
kernel-debuginfo-common-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 1a86fe75374f5847b79e57c174bb1cb0SHA-256: d13d380791260021395d810200c4c76377c023ce53fffc3a6e1c9da327646423
kernel-devel-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 77e416a85b0d5e8e889e9342b00f7b27SHA-256: 2592b39154be0448bb3c02e8c3a4fd653c25d8315cb1b088ab6d347e2061f190
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm
    MD5: d80502a5dc690b019979daa33782411eSHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 624984f4607884c3c67d700bcf77eb90SHA-256: 3a77b6ae0a8b2b0cd3858bf0e061cc91fd685c6a4435fc78f82c67c01dd8a2d9
kernel-xen-2.6.18-238.56.1.el5.ia64.rpm
    MD5: dd9d6f0ed1f8ddd58c90cd13167041aeSHA-256: 30b976c91146a1bd005acb0135b749d7e1207fdab9f995ed7319d7a5b978e7f2
kernel-xen-debuginfo-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 780456fed8a6c6b77fd4040baffe959aSHA-256: 3a925634040f12e6dc7f8ff50d9b53c16e4ad3216453e060ae8f8fa8c4eaeaed
kernel-xen-devel-2.6.18-238.56.1.el5.ia64.rpm
    MD5: 699baa3706e8dbfb5b4df95211254e0bSHA-256: 74abc660581a38c0553353ae69070e28e1b055999183d77a9788c0f730b0051c
 
x86_64:
kernel-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: efa895792396da5f55ce58d061879d39SHA-256: 57cb9869de7ccb9525d3b642dab8b5ccd3725cb62f888e71b398f790753e3bd9
kernel-debug-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: 45ff7d5cde40e0cef97bb8228ebfdbf3SHA-256: 4737e27557f6a5c22173e695cd636d203a18be9f244781fcd95b2406a69ac64e
kernel-debug-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: 4faeb23ce703e67ad18cde300d2636afSHA-256: fdabb981d88e4f8c46733488bcf0f7ad470b938d29f1294bc6a091086a7e3fe5
kernel-debug-devel-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: 69f3cc651a61bc9302c748fe277654caSHA-256: cc63d69f6d0ddb3e4b81e32615451f3bdbb2880c94c9d07b6c0e7f292e19cdf2
kernel-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: 9ec01504b485326d4d2e8d4cb3562a8bSHA-256: 6b63efa04db975566913f32b5bda61f9282e5cd13c7c4fc45e2d1fcbe5547ebf
kernel-debuginfo-common-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: 5e5aa9e5b43230729685d8b6323f6448SHA-256: 17dc4597b81a26bafeafb11db70a16bd7daa153e682beba70b4859c523c1fe68
kernel-devel-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: 8dde56dfa26091f3ab3ba753287a46b9SHA-256: fead6a716a04da1675126891949b17d3e184914596e877b4fac3139c6d1728d8
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm
    MD5: d80502a5dc690b019979daa33782411eSHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: 231affb1965f42df68e4e1ecb622d00fSHA-256: bbc7069ec83f1c8e6fd09d8d1200dfd176b903e451a6302be60dd353dbd25bed
kernel-xen-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: f7468c3c4b2eccbb547f459dd9bb2364SHA-256: ca2d55807a06535fb34af6d62a07ea69c4b8e524856ff4ed6b1ded3d824c720e
kernel-xen-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: 9ce93102c114548371c39f5996471942SHA-256: 48af75b116f8b88e38d894bd964d5f25886df0fcd02e2ce419d89cfb3e1a2135
kernel-xen-devel-2.6.18-238.56.1.el5.x86_64.rpm
    MD5: e78dd53cd0f58bcb9a1b97f031a4a56cSHA-256: 230f9cf1aab926d69a43f09b34cae0069ab1a168235e350e27ce7f63ca828f28
 
(The unlinked packages above are only available from the Red Hat Network)
1202855 – CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply