Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2014:2031 - Security Advisory
Issued:
2014-12-22
Updated:
2014-12-22

RHSA-2014:2031 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.6 Long Life.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A flaw was found in the way the Linux kernel handled GS segment register

base switching when recovering from a #SS (stack segment) fault on an
erroneous return to user space. A local, unprivileged user could use this
flaw to escalate their privileges on the system. (CVE-2014-9322, Important)

Red Hat would like to thank Andy Lutomirski for reporting this issue.

All kernel users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386

Fixes

  • BZ - 1172806 - CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility

CVEs

  • CVE-2014-9322

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.54.1.el5.src.rpm SHA-256: 7aad1d47622fdc719feb852a7e63bd1dd552bf6dbe99c2e91a74bada8b255fb0
x86_64
kernel-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 8b0c50be22555eae5f06bcdcd53494b485230a8983d41df0d47974a8fd1d54a2
kernel-debug-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 4a6b48e582b1df0d1169b8aa13965971783706f7ca545cfcbcf895891c1e4ed9
kernel-debug-debuginfo-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 7d03617cde1ee78243dbc9e0dcf04af429d88469efbbbb719d58e54564ae4b8e
kernel-debug-devel-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: d779a7c2f855c54e9ae9f94adbb8159fb724a4bb8c2e007aae404e41aaa0ec67
kernel-debuginfo-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 4810db84cbef2b441bd7cbab5e963435657f7f7fa052fb19545b2e3f480ede7b
kernel-debuginfo-common-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 6fb6c2ee49efaf36a0e5b55450d7acafe098f32413935fa6b9ee72513337a978
kernel-devel-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 476d4c7c647c280b2299973b5f8749da1696c22038c420e99cac34820035c90e
kernel-doc-2.6.18-238.54.1.el5.noarch.rpm SHA-256: a81f083a31b81807d4dacce76f8fe4fd0dfeb89de0be8ef24395a82a0a1e2c74
kernel-headers-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 5a34727c725f87add5617ef1a3683457b67a0308c22567f2c6da669790bacc2a
kernel-xen-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 679981f74ae1eecf4c5baa9e279b40aa1139e77b49e36a4e532e7a6f5a8a42da
kernel-xen-debuginfo-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: fb5d6c3d126e4f457c0aafb44f3df9867e425c0257c8eba34c6ed06b71197a24
kernel-xen-devel-2.6.18-238.54.1.el5.x86_64.rpm SHA-256: 5134324c90e82b211132495c26f6e71019eb105e0069b1981a31939b01f9907b
ia64
kernel-2.6.18-238.54.1.el5.ia64.rpm SHA-256: ba85950285403c5a45c9b01f3d6794447c3be844a07b3878afe185899e66da62
kernel-debug-2.6.18-238.54.1.el5.ia64.rpm SHA-256: f9ff37107eee8dd2647660a4a7b51a0b1fb128489d8dc568d2d0d983b368b7e8
kernel-debug-debuginfo-2.6.18-238.54.1.el5.ia64.rpm SHA-256: 1b2d2df3565fcf7a0feb517740c544e9ee733894cdbd6a80515b8666d63afdd5
kernel-debug-devel-2.6.18-238.54.1.el5.ia64.rpm SHA-256: 63e7ee1509d9d983147a17be95a8fa1b9acc2568fea51263b68beae3244abed8
kernel-debuginfo-2.6.18-238.54.1.el5.ia64.rpm SHA-256: 525932681835c8dc3122b9f3b80dc0adbc867423b5436f0868052f383980cb45
kernel-debuginfo-common-2.6.18-238.54.1.el5.ia64.rpm SHA-256: ae274189ba7b5d1d0b9e860490a4a895bbe1c68632d01a8605e453e463357441
kernel-devel-2.6.18-238.54.1.el5.ia64.rpm SHA-256: ce55f78089675ef0346ff3ff677728711133031429a65fd38c574f0804535907
kernel-doc-2.6.18-238.54.1.el5.noarch.rpm SHA-256: a81f083a31b81807d4dacce76f8fe4fd0dfeb89de0be8ef24395a82a0a1e2c74
kernel-headers-2.6.18-238.54.1.el5.ia64.rpm SHA-256: 4279f974198c3b3dcc65d0b979bb5189867a7838344e1da51ecae899af99cebc
kernel-xen-2.6.18-238.54.1.el5.ia64.rpm SHA-256: 471377fff1068f364b52528f9386ee4f5a9131b2178fa2c90ee171172a674213
kernel-xen-debuginfo-2.6.18-238.54.1.el5.ia64.rpm SHA-256: 8634158c49b065de654930d2f069785105239dfcb4f2a29b8dd826fcef425b99
kernel-xen-devel-2.6.18-238.54.1.el5.ia64.rpm SHA-256: e897ff09c1f6ddf978f32146a4fd6b3b383e03fdc324cf908de4c37d9a433b4a
i386
kernel-2.6.18-238.54.1.el5.i686.rpm SHA-256: 326bd5b74735542f0fba4096ecf92bc8361ff74e17fe789e8d72121cb8fa1e8c
kernel-PAE-2.6.18-238.54.1.el5.i686.rpm SHA-256: ec846aa425b6c73d92a758ed0f67c3465610488049a64443e62c58e9008a1d41
kernel-PAE-debuginfo-2.6.18-238.54.1.el5.i686.rpm SHA-256: c09c4e678b34a8e3644b98157b9193b1b4e368ec0d4c07042918700af0b1a33c
kernel-PAE-devel-2.6.18-238.54.1.el5.i686.rpm SHA-256: 9bdf2ad3d17ddfafd93c3063d7d7f273a91aa8ab4d2064adc41413863bfa2305
kernel-debug-2.6.18-238.54.1.el5.i686.rpm SHA-256: 3c0d75e3496c99a4946137549580a661ca667f37606481fcacc6da080bfbe9be
kernel-debug-debuginfo-2.6.18-238.54.1.el5.i686.rpm SHA-256: b7113e23cf2de92e0566a8068d08e93c28696fd789a698fde6f17b4082bc0f63
kernel-debug-devel-2.6.18-238.54.1.el5.i686.rpm SHA-256: 72bf0dc0ad2a2f55d233f677220d99939e8bc8221c12adc6582d83d61ae52573
kernel-debuginfo-2.6.18-238.54.1.el5.i686.rpm SHA-256: 583703f59ade0454d068c5e9d6d43a386aa98948b8b48ee6dae89e15ad46b9e4
kernel-debuginfo-common-2.6.18-238.54.1.el5.i686.rpm SHA-256: 7a29046eec3f7e60cfe0709870a55864e8cac3d19a19c1c9fef60ea59170bac0
kernel-devel-2.6.18-238.54.1.el5.i686.rpm SHA-256: 29ee236e5f4621243df4fc9568c97fb581345fa602b4d9c7e7661525b0e2851e
kernel-doc-2.6.18-238.54.1.el5.noarch.rpm SHA-256: a81f083a31b81807d4dacce76f8fe4fd0dfeb89de0be8ef24395a82a0a1e2c74
kernel-headers-2.6.18-238.54.1.el5.i386.rpm SHA-256: c4fd4f3acc16750eda66820577c6d9a9b717f8f09bec1617c42f58a1236a937b
kernel-xen-2.6.18-238.54.1.el5.i686.rpm SHA-256: 43298b745ecfbe65dc28e140622dacf4c0ce22051fc10797efe62e7f3b1f587c
kernel-xen-debuginfo-2.6.18-238.54.1.el5.i686.rpm SHA-256: d61e5247debce0858d852e4961c9417d318bcca75f721f1464dc0edcda8002fd
kernel-xen-devel-2.6.18-238.54.1.el5.i686.rpm SHA-256: cbe5cc3dfbc1a11b0de29c856ed9e7ee1482bc567d0437fbd27d84f98cb47627

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility