Skip to navigation

Security Advisory Moderate: Red Hat Enterprise Linux 5.8 kernel update

Advisory: RHSA-2012:0150-3
Type: Security Advisory
Severity: Moderate
Issued on: 2012-02-21
Last updated on: 2012-02-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2011-1083

Details

Updated kernel packages that fix one security issue, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the eighth regular update.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* A flaw was found in the way the Linux kernel's Event Poll (epoll)
subsystem handled large, nested epoll structures. A local, unprivileged
user could use this flaw to cause a denial of service. (CVE-2011-1083,
Moderate)

Red Hat would like to thank Nelson Elhage for reporting this issue.

These updated kernel packages include a number of bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Enterprise Linux 5.8 Technical
Notes, linked to in the References, for information on the most significant
of these changes.

All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which correct these issues and add these enhancements. The system
must be rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-308.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6d2e3e57d892d19b7cec62f83bd91869
SHA-256: 96dcc6e82aa32fbe5da7e34fdc0f2e62f326d8a2b860d3817636af8dfa5a289a
 
IA-32:
kernel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: aff6e162dcd30f66a5605dc1050234df
SHA-256: 26420ecaafd3bc79fa7be8b6bae44ce930d834a9710326eae586a9a734b0a61d
kernel-PAE-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e0d736e6ec1a76be633a302325aac9d6
SHA-256: 9fe47da810193b82dc24d498026a75546449e2902e2e898e557777672beae452
kernel-PAE-debuginfo-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 05d82728ab91f01142691c50ff91f0b5
SHA-256: 986f36743685f12253641c48202be55071f8afdea17bd8039881033f08e673e5
kernel-PAE-devel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3fb53d5734249757f5f5dcb4612684a4
SHA-256: 2885c4d3c83b3fe86f6985a53d03d89c0708b86be367769877d77e0dbc17340a
kernel-debug-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3cb54af201b8266469936718a7346e85
SHA-256: d93285069f1cf92f6309d55154eb479f5a8266f459341b0d5a0bbac3b894f19e
kernel-debug-debuginfo-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 841dfea633814bc425d05a1f3641cfd4
SHA-256: 236095b0ced94f7cc296235cd06f67da3826c49e72d0ca2573cd9740739f6749
kernel-debug-devel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: f58c2ca3fb7b845598f530d08ec6ad5f
SHA-256: a2268dee40b40b147b1cf78224875200d40e92032b33e9994cca4bcf78936503
kernel-debuginfo-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c9ee8d2b0657f5681785771c7120d590
SHA-256: 0662ee4e10bc2f957853c746d8b4eaeb0842ba286fee875494647ba53c0fef9e
kernel-debuginfo-common-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bacdb776e22e8267d2fc72c4a80905a4
SHA-256: 13e3e8e78fd8317344a3d300cfc9ec8a9a22f163d12eea2353c2d293a3bc2864
kernel-devel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6d7807639d35e7387dd53c4362fd992e
SHA-256: 15cefd6c764cd1694c4a958335135869db54fe0faeeedfb9059cdbd6be9a0c03
kernel-doc-2.6.18-308.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5c61a84c8806b0a2fea3774e6bbebd6
SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: df6e44b2e7c96d01a909bde8dc14a10b
SHA-256: 7b7bc0c8e68354ee9a8b720cf0ca0573aae3e6343d40ea3f7064fbfd2f98a95c
kernel-xen-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2d5c228f2d3e6e114c3a7da8a5aa2f9
SHA-256: 0a3d4d4a50ac0ecb862cf5d2a496e65f0e4d53b90d1542f621fb3a3f19a7232e
kernel-xen-debuginfo-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5bd03f4ac2b5dd3c679f3bab94a807b2
SHA-256: bc2f7d91c759e7b601e1ff12fe3c91e97eacdbb4faf35bfa320d3160a231bb04
kernel-xen-devel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: cb61922c61effb5aa4775e2a8cde9bc1
SHA-256: 32dc5361133c537938881db91813a4c4e3ad7888ea9ad7b174c902c50c9e2d9e
 
IA-64:
kernel-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8cdc37aa8a2ee01ff58bd51b9b33301c
SHA-256: 9455719f787e2b7731dae3dd22d50137e49ee9d757125b673ccfe12717eda7e0
kernel-debug-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: dffb9fc446895d6512a2b8c759dab6b0
SHA-256: a0e6e146ab1e9bc07e35a8090f3dbca9ecf42270fa3c5d0fd2f4e1116b73d0c0
kernel-debug-debuginfo-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 61751c5fa4550d7727b0f0f148010a0b
SHA-256: 823741485f477bd3d7ce2e718ab1330eafb54853391393bc585cf04e8f303e9d
kernel-debug-devel-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ce8170dca6101794a3cf288c7d18a47f
SHA-256: c5330d994f30bd6916677fc0ef9c80aaaaab417e55175632e972aa4293e06661
kernel-debuginfo-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: dc8955da03c82d59e4e77713b26ea79b
SHA-256: 78a257522588820b24bcc2d2a2103aac11d0ab875c7ef68a308ae421d0d7a653
kernel-debuginfo-common-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f4b64da41322f5806fd036f6e9bc9324
SHA-256: 6bee219a603bbf1456eeca2e4fb612456046c937876d9f93a2144c082f4753c9
kernel-devel-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5c64fe8dd0ff5ca6f6ea2b22e99a2898
SHA-256: 76b63a779aaf6081b7ec7041363ccb75e4055a0b090170772bcfeefe5245daef
kernel-doc-2.6.18-308.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5c61a84c8806b0a2fea3774e6bbebd6
SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6703b7a6fab178fa95d53e40fd17d057
SHA-256: 9d95848096797c7a059a014f1de288a62d0d6d62837ef3ceecbe4d1cfb7d1181
kernel-xen-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 67a9a0adb91c091300ebd7a62aed4cb2
SHA-256: bb87c7ce02bebf2af0f741f656b18be2b653c4a3833eca1cc8d27dbfdd29e9bc
kernel-xen-debuginfo-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f6f9c340bec12ad1c3063a8ace95c3ad
SHA-256: cf54865fcc60dd84af80ff4f77a545ca9bcfdccce89b8f1659159dee5dc9058f
kernel-xen-devel-2.6.18-308.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 285e2737a435e98a71f02f0ae0deb706
SHA-256: f794a8a1671d3b888f9886242a9325e3400e0e868e04108ea80bfd954492f63a
 
PPC:
kernel-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1f3270ed9182f39bf867416d548e37d8
SHA-256: 184135014863ab38d1a2404a8b5107f52574a106d9dbfe82b88a58e31cb1e352
kernel-debug-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a4fb32b8aa06881d90737ab5a4b9ebdd
SHA-256: eff50abaa13aaf7ade025064798d8be42a2913f69a99fdd5b97678bac3426176
kernel-debug-debuginfo-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 134ba658c3d923009fed7a219ed898e2
SHA-256: 8b3dd0531ceda3c2e8d28d43ea1666d67364d712fbae9704702630bf75e5e65f
kernel-debug-devel-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bfd3009bf6c044b3198e777ce12741ef
SHA-256: 2a46dbae4c3c6124e6bee171f6cb84cabd238faea41d7e10baaa9a07e1926764
kernel-debuginfo-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 39ff39b624f8074b580b69fd7ebeeaa0
SHA-256: b86896d41bd03947c9bdaa25354b68fd1f689048b78c0ca27b6c1dc64e89191f
kernel-debuginfo-common-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 782bf61276fab9b211f16214c1295935
SHA-256: a6e4c6506c83d549a0f3f34c63ae1153913ab17e566689efa377a8d1e3de5e80
kernel-devel-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: aef75776422d3f6c40141ff40bfb023d
SHA-256: 4aa758d817bb2e8f83205138ec1d306aa0f8d43c52429e87a7c08e9e7aa55081
kernel-doc-2.6.18-308.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5c61a84c8806b0a2fea3774e6bbebd6
SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 36f275f5a7820d7ccd8b349804428119
SHA-256: 522bb8a26955edc805d23535c23d5c32ca0b35433a4b582aa698c1f0b4af03e4
kernel-headers-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 83baa29cba2075393aeb196b335e2a1d
SHA-256: c7eb35c7b821a6dd4a7eedd7da0986225fca8dabb576422ad0d0609ce7779352
kernel-kdump-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 994c3a5248c4f121bf32f5d833c39d42
SHA-256: c4467b0e95efb25e798ac6ae4f362f7ca128d8f3b433599c8dd381ebbcbfa43e
kernel-kdump-debuginfo-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 15fcd608fff82014ebfc76a03ad02ec3
SHA-256: 4b4610cd643e0250f78b8aeb89c73eb6b426bae190508cc8b4cc085ee12e13f6
kernel-kdump-devel-2.6.18-308.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 06722cfdc9ff07a2b30f47e8f9a932ff
SHA-256: af3e6c60296a03c8408c82679c6dd7fb28be43572d9eb509fc2100d91227060f
 
s390x:
kernel-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: a120d50237dd77dcabe1e4dc61423d09
SHA-256: d34818b50c32552411d79fc819ee023a128ec0c6d9df509771844cb140cc7b97
kernel-debug-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5a5b78fe5a17771c667c97bda34952d4
SHA-256: f09c149e8c8b55f25b85863bb43ce9c048197c030088b657f6414ac593650cb4
kernel-debug-debuginfo-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: b9d7962f2817d4441b9ca483470710c0
SHA-256: ddeae259db90b76b7352f1440ac182b46fe7954b3814a6c9e5a5dd50bb74c83b
kernel-debug-devel-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4dad1950f4bada05af83cb19505fe606
SHA-256: 0073fe67bec50b29b539759c4b0a07dd4f12bb3bd4467cff946ced8dbd84d373
kernel-debuginfo-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: d6beb65a5e9aebad8e43172cb989f3d2
SHA-256: 76becd210e4bd229a073f1b19e3890703d32a6b987d1294215ea9778673743d3
kernel-debuginfo-common-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1edf5a30c368df9f5836800626b5ece3
SHA-256: 240e96dfb039cfe1921237f9a5a8bcb7bcf01f8596e7d4b0296a2f16d56c06a1
kernel-devel-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: d86125bcac09c5557f738442527a8873
SHA-256: a190475c9d0dad2458d7e78a5ced44e66c14732cde25b00442d5199f537c1c3c
kernel-doc-2.6.18-308.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5c61a84c8806b0a2fea3774e6bbebd6
SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: dc395256d9bc77dd8cdcdd8e3a2a684f
SHA-256: ad34b60c3d874288b4f9c8e0a91ed1d41c1f0489a40b7394f7b9fbb902962f1a
kernel-kdump-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: e1129f964621be013fe558c18b5b5d6f
SHA-256: 0058107c399ad5eadeb491be4dcacc5c202165970fe33a9ce6db4c4374834d72
kernel-kdump-debuginfo-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 562a6de6ad4d02589173efb8055cc5ff
SHA-256: 1945cc309e5565eda1085d3a2ca3510af2907de3542912308f3d9d51ebbbe4ed
kernel-kdump-devel-2.6.18-308.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: e3dbf6c7f0fb74016fee5797f8f3c4bb
SHA-256: 7af6fc3bc5827789759ecfa3ae4d23c019bd9760cc7c41521a810ff64c571556
 
x86_64:
kernel-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2b3546b792989135d29a24e2942aedb8
SHA-256: 6b06b63d946abdb90d338d1fc671d1d7e7e64e4033ad213812b45dae310fd985
kernel-debug-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 09f35caccde121cda88474571e480226
SHA-256: 7deafc36b45058643d960ef48d25ad30ef924aa7cc348f18ad1367dc2f7d4811
kernel-debug-debuginfo-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a0042ce7c4f18e247464fa12d1281430
SHA-256: 4f3e86f33bf6a72ad30e89d12370547a34a0ed4d93c862621cc9a4aba4c0bbba
kernel-debug-devel-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 61f08003b71b9856b20e7509904aa68e
SHA-256: d5e273234dc8cfe65d2ffa27f7fdf0d2a7e8e7537058f235657cce0016a5ade7
kernel-debuginfo-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 274388b6b4c0fc8fa42bfbc31941c491
SHA-256: 1530f25f5fb1e5f8b98d06fb442f5faecf769d50796e4c8de5c7575d2d63575f
kernel-debuginfo-common-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: afa37c2907cfe0bb5365869ecce0f87b
SHA-256: ec340d1ce42e5a182b821c28d8574ff7e8b3c39f526c921b19c9f5683899c571
kernel-devel-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 106280aeb8feeeb027a4d5fae5e395a2
SHA-256: 9751501de3b4bbd05850c8b429955a40a0128a4b7bb3100e12206c74827d42c0
kernel-doc-2.6.18-308.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5c61a84c8806b0a2fea3774e6bbebd6
SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: dbd0a379e10b458fc601622f4c85f67f
SHA-256: 1f288fe2e3b93c706910ec20df8c463f6400d7fd80d9e3d157957fb1d8c3f651
kernel-xen-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 611580897be56922d26aef62d5067f64
SHA-256: 9d16e1c07349899a07169348cff872acecb4e408b3a34c25837615c380c405aa
kernel-xen-debuginfo-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f7e20d63400c2211726a397749325e05
SHA-256: e815260b66aea51ed637153754efa577585bf4ba8cd23f65a02fb1b90ffe59f5
kernel-xen-devel-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1c2bf27515b9121d8b73f5cd346b9c56
SHA-256: 9ceca607dcb0507998fd606980fd7bb041c4acb7e257298731a929945a8b7ef6
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-308.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6d2e3e57d892d19b7cec62f83bd91869
SHA-256: 96dcc6e82aa32fbe5da7e34fdc0f2e62f326d8a2b860d3817636af8dfa5a289a
 
IA-32:
kernel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: aff6e162dcd30f66a5605dc1050234df
SHA-256: 26420ecaafd3bc79fa7be8b6bae44ce930d834a9710326eae586a9a734b0a61d
kernel-PAE-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e0d736e6ec1a76be633a302325aac9d6
SHA-256: 9fe47da810193b82dc24d498026a75546449e2902e2e898e557777672beae452
kernel-PAE-debuginfo-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 05d82728ab91f01142691c50ff91f0b5
SHA-256: 986f36743685f12253641c48202be55071f8afdea17bd8039881033f08e673e5
kernel-PAE-devel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3fb53d5734249757f5f5dcb4612684a4
SHA-256: 2885c4d3c83b3fe86f6985a53d03d89c0708b86be367769877d77e0dbc17340a
kernel-debug-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3cb54af201b8266469936718a7346e85
SHA-256: d93285069f1cf92f6309d55154eb479f5a8266f459341b0d5a0bbac3b894f19e
kernel-debug-debuginfo-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 841dfea633814bc425d05a1f3641cfd4
SHA-256: 236095b0ced94f7cc296235cd06f67da3826c49e72d0ca2573cd9740739f6749
kernel-debug-devel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: f58c2ca3fb7b845598f530d08ec6ad5f
SHA-256: a2268dee40b40b147b1cf78224875200d40e92032b33e9994cca4bcf78936503
kernel-debuginfo-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c9ee8d2b0657f5681785771c7120d590
SHA-256: 0662ee4e10bc2f957853c746d8b4eaeb0842ba286fee875494647ba53c0fef9e
kernel-debuginfo-common-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bacdb776e22e8267d2fc72c4a80905a4
SHA-256: 13e3e8e78fd8317344a3d300cfc9ec8a9a22f163d12eea2353c2d293a3bc2864
kernel-devel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6d7807639d35e7387dd53c4362fd992e
SHA-256: 15cefd6c764cd1694c4a958335135869db54fe0faeeedfb9059cdbd6be9a0c03
kernel-doc-2.6.18-308.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5c61a84c8806b0a2fea3774e6bbebd6
SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: df6e44b2e7c96d01a909bde8dc14a10b
SHA-256: 7b7bc0c8e68354ee9a8b720cf0ca0573aae3e6343d40ea3f7064fbfd2f98a95c
kernel-xen-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2d5c228f2d3e6e114c3a7da8a5aa2f9
SHA-256: 0a3d4d4a50ac0ecb862cf5d2a496e65f0e4d53b90d1542f621fb3a3f19a7232e
kernel-xen-debuginfo-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5bd03f4ac2b5dd3c679f3bab94a807b2
SHA-256: bc2f7d91c759e7b601e1ff12fe3c91e97eacdbb4faf35bfa320d3160a231bb04
kernel-xen-devel-2.6.18-308.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: cb61922c61effb5aa4775e2a8cde9bc1
SHA-256: 32dc5361133c537938881db91813a4c4e3ad7888ea9ad7b174c902c50c9e2d9e
 
x86_64:
kernel-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2b3546b792989135d29a24e2942aedb8
SHA-256: 6b06b63d946abdb90d338d1fc671d1d7e7e64e4033ad213812b45dae310fd985
kernel-debug-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 09f35caccde121cda88474571e480226
SHA-256: 7deafc36b45058643d960ef48d25ad30ef924aa7cc348f18ad1367dc2f7d4811
kernel-debug-debuginfo-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a0042ce7c4f18e247464fa12d1281430
SHA-256: 4f3e86f33bf6a72ad30e89d12370547a34a0ed4d93c862621cc9a4aba4c0bbba
kernel-debug-devel-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 61f08003b71b9856b20e7509904aa68e
SHA-256: d5e273234dc8cfe65d2ffa27f7fdf0d2a7e8e7537058f235657cce0016a5ade7
kernel-debuginfo-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 274388b6b4c0fc8fa42bfbc31941c491
SHA-256: 1530f25f5fb1e5f8b98d06fb442f5faecf769d50796e4c8de5c7575d2d63575f
kernel-debuginfo-common-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: afa37c2907cfe0bb5365869ecce0f87b
SHA-256: ec340d1ce42e5a182b821c28d8574ff7e8b3c39f526c921b19c9f5683899c571
kernel-devel-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 106280aeb8feeeb027a4d5fae5e395a2
SHA-256: 9751501de3b4bbd05850c8b429955a40a0128a4b7bb3100e12206c74827d42c0
kernel-doc-2.6.18-308.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5c61a84c8806b0a2fea3774e6bbebd6
SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: dbd0a379e10b458fc601622f4c85f67f
SHA-256: 1f288fe2e3b93c706910ec20df8c463f6400d7fd80d9e3d157957fb1d8c3f651
kernel-xen-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 611580897be56922d26aef62d5067f64
SHA-256: 9d16e1c07349899a07169348cff872acecb4e408b3a34c25837615c380c405aa
kernel-xen-debuginfo-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f7e20d63400c2211726a397749325e05
SHA-256: e815260b66aea51ed637153754efa577585bf4ba8cd23f65a02fb1b90ffe59f5
kernel-xen-devel-2.6.18-308.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1c2bf27515b9121d8b73f5cd346b9c56
SHA-256: 9ceca607dcb0507998fd606980fd7bb041c4acb7e257298731a929945a8b7ef6
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

485173 - kernel/module-verify-sig.c with memory uncleaned bug
516170 - kernel multipath driver behaves badly on medium errors
526862 - [RHEL5 Xen]: Mask out CPU features by default
543064 - No NUMA node hash function found on a EX machine
571737 - Cannot use Quickcam Pro 9000 with Ekiga, fails with "uvcvideo: Failed to query ..."
585935 - Bug in RHEL-5.4/5.5 nfs_access_cache_shrinker
608156 - kernel panic if bonding initialization fails
618317 - RFE: RHEL5 Xen: support online dynamic resize of guest virtual disks
664653 - [5.4] OS cannot recognize DVD disk replace in rescue mode.
668027 - unexpected error message when sending a unsolicited NA from user code
668529 - Spare disk added to a raid1 array by mdadm command is dropped upon next boot.
674663 - vlapic: Fix possible guest tick losing after save/restore
681578 - CVE-2011-1083 kernel: excessive in kernel CPU consumption when creating large nested epoll structures
681902 - GFS2: Add readahead to sequential directory traversal
683372 - NFS4: Incorrect server behavior when using OPEN call with O_CREATE on a directory on which the process has no WRITE permissions.
688673 - PCI Virtual Function Passthrough - SR-IOV, Paravirt Guest fails to obtain IRQ after reboot
688791 - dropwatch>stop: Waiting for deactivation ack (forever)
691087 - Incorrect values in /proc/sys/vm/dirty_writeback_centises and dirty_expire_centisecs
694625 - Non-responsive scsi target leads to excessive scsi recovery and dm-mp failover time
697021 - Patch needed to allow MTU >1500 on vif prior to connecting to bridge
698842 - kvmclock: MP-BIOS bug: 8254 timer not connected to IO-APIC
698928 - VLAN interface with changed MAC address fails to communicate
700565 - RHEL6.1 32bit xen hvm guest crash randomly
700752 - 32-bit PV guest crash on restore on x64_86 host
700886 - RHEL5.6 TSC used as default clock source on multi-chassis system
703150 - multiple resource leaks on error paths in blkfront and netfront
703505 - 300 seconds time shift in vdso version of clock_gettime()
704921 - panic in cifsd code after unexpected lookup error -88.
706339 - open/closed files in cifs mount points
707966 - 2.6.18-238.1.1.el5 or newer won't boot under Xen HVM due to linux-2.6-virt-nmi-don-t-print-nmi-stuck-messages-on-guests.patch
709271 - net.ipv6.conf.default.dad_transmits has no effect on tentative IPv6 addresses
709515 - Kernel panic at nfs4_callback_compound+0x2dd
711070 - mask the SMEP bit for PV, do the same or backport SMEP emulation for HVM
712439 - Backport "x86: extend debug key 't' to collect useful clock skew info"
712440 - Backport "vmx: Print advanced features during boot"
712441 - Backport "x86/hvm: fix off-by-one errors in vcpuid range checks"
713702 - pull missing fixes from upstream x86_emulate()
714053 - couple nice-to-have xen hypervisor patches
714670 - TCP_CRR and concurrent TCP stream tests over IPv6 sometime fails on rhel5.7
715501 - ext4: Don't error out the fs if the user tries to make a file too big
716834 - 'dmesg' command is swamped with the message: pci_set_power_state(): 0000:05:05.0: state=3, current state=5
717434 - Unable to attach a cdrom device to guest domain
717850 - miss xmit_hash_policy=layer2+3 in modinfo bonding output
718232 - [xfs] mis-sized O_DIRECT I/O results in hung task timeouts
718641 - Can't change lacp_rate in bonding mode=802.3ad
718988 - [EL5.7] igb: failed to activate WOL on 2nd LAN port on i350
720347 - RHEL 6.1 Xen paravirt guest is getting network outage during live migration (host side)
720551 - xfs_error_report() oops when passed-in mp is NULL
720936 - Windows guests may hang/BSOD on some AMD processors.
720986 - vlapic: backport EOI fast path
723755 - win2003 i386 guest BSOD when created with e1000 nic
728508 - Huge performance regression in NFS client
729261 - ext3/ext4 mbcache causes high CPU load
732752 - exclude VMX_PROCBASED_CTL2 from the MSRs a VMX guest is allowed to access
733416 - netfront MTU drops to 1500 after domain migration
734708 - xen modules - unable to handle kernel NULL pointer dereference
734900 - Panic, NMI Watchdog detected LOCKUP on CPU 6
735477 - nfs4_getfacl decoding causes kernel oops
740203 - Host crash when pass-through fails
740299 - [RTC] - The ioctl RTC_IRPQ_READ doesn't return the correct value
742880 - [RFE] backport Xen watchdog (hypervisor side only)
752626 - BNX2I: Fixed the endian on TTT for NOP out transmission
753729 - system cannot suspend with "stopping tasks timed out - bnx2i_thread/0 remaining"
771592 - Install RHEV-H to virtual machine cause VM kernel panic when boot
772578 - [ALL LANG] [anaconda] The installation halted when clicking 'Skip' button (select 'Skip entering Installation Number')


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/