Skip to navigation

Security Advisory Important: kernel security update

Advisory: RHSA-2012:0721-1
Type: Security Advisory
Severity: Important
Issued on: 2012-06-12
Last updated on: 2012-06-12
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2012-0217
CVE-2012-2934

Details

Updated kernel packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* It was found that the Xen hypervisor implementation as shipped with Red
Hat Enterprise Linux 5 did not properly restrict the syscall return
addresses in the sysret return path to canonical addresses. An unprivileged
user in a 64-bit para-virtualized guest, that is running on a 64-bit host
that has an Intel CPU, could use this flaw to crash the host or,
potentially, escalate their privileges, allowing them to execute arbitrary
code at the hypervisor level. (CVE-2012-0217, Important)

* It was found that guests could trigger a bug in earlier AMD CPUs, leading
to a CPU hard lockup, when running on the Xen hypervisor implementation. An
unprivileged user in a 64-bit para-virtualized guest could use this flaw to
crash the host. Warning: After installing this update, hosts that are using
an affected AMD CPU (refer to Red Hat Bugzilla bug #824966 for a list) will
fail to boot. In order to boot such hosts, the new kernel parameter,
allow_unsafe, can be used ("allow_unsafe=on"). This option should only be
used with hosts that are running trusted guests, as setting it to "on"
reintroduces the flaw (allowing guests to crash the host). (CVE-2012-2934,
Moderate)

Note: For Red Hat Enterprise Linux guests, only privileged guest users can
exploit the CVE-2012-0217 and CVE-2012-2934 issues.

Red Hat would like to thank the Xen project for reporting these issues.
Upstream acknowledges Rafal Wojtczuk as the original reporter of
CVE-2012-0217.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-308.8.2.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 657cef16e6611d6f917cec2a25e7e99e
SHA-256: 21d14efaef51fd14681c3eeda9713bec2f6bd523a33328d2ed804405e87a1be5
 
IA-32:
kernel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 35c1158c82cd775cf20b073b5428606e
SHA-256: 897762bcd031135aa0669edb8346ffcc3751d7365271f30af353e4847e915444
kernel-PAE-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 02eef4e263f998f20c3c70c70795de7a
SHA-256: f17e3e0360ca406b051d098d072b78d85983c3ac2c78b7312f262b11873a8dcf
kernel-PAE-debuginfo-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1a172de388bd6605334cbdecbdc819b9
SHA-256: b52b0e9e869bfa27e52eea2c9ae4ef7546fcb90db066a9ba56102245a07c9027
kernel-PAE-devel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 37774be0d817c9a889dd5a8cdea0452e
SHA-256: 5ef65e0b934ec7437772d6a2fd7b3e672c5eb652caab14b00809d6dafe3f617c
kernel-debug-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1f09e30223e2c48a9ea91a4df3ec7b22
SHA-256: 10434df7d2b3b8cb16200c71f7a922cc9d2a2d54d341158d1e30bc3c4d389da1
kernel-debug-debuginfo-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ff73bb490c4e79bb1d7c98f52d6d3812
SHA-256: f7dce680fa16ad773b717153e90deef5b2ee8ea3ae71095112dc48b4f301ee1f
kernel-debug-devel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6bcc8aaa8452e2887e103d5bba7be28a
SHA-256: ca04a3956a88cc931253737f3fec5166f191efa9532eb1f9e13712c220ad88e8
kernel-debuginfo-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 40678a7d19701be200f2e4595c8ec219
SHA-256: 00861d72106abf37ff0d0c5ee590554120b935d0597ca255fac6609da6dc0261
kernel-debuginfo-common-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3de3679f27568c34f3cdd4f284c4d7b2
SHA-256: f15d2c911c5ce1098f70d377d844db3a120905a7d8493b6d8a31205ceb4440ea
kernel-devel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e06dd08ff28642177759f3060dbf5cc9
SHA-256: 71554ceae50874026d5edbd8edd44fe4eae184950dd98c53162d0c6fe1f961ad
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: d86697ad85122d95fda866e5a123ea19
SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 77a7e8642f0f5583e49c0f2730321626
SHA-256: e7a44875bff0f15d0cd8a48a4af3fd65bebed5fb72d0ee9ea462d94206ce1e9d
kernel-xen-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4ea859aa6fbe6b0aa2372a801de35eea
SHA-256: f9e8bc102ec75836048bc6ee49131aa217e737d4c66671b1b924a83b403f69f8
kernel-xen-debuginfo-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c8a5e55586d405f022321509f02d957b
SHA-256: 56e3122643c2ad71b0fb96e7341abf78be8428c7be506b06c0bb0c9e7bea68a2
kernel-xen-devel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: aaefae0f39b7be087b352d8501dd715b
SHA-256: e83edb26cd8ee98e37cdd14a7344fde5b2d479e7f0d38ac060f9cdc560914e14
 
IA-64:
kernel-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 57bdca488e90c75ba7d796c9a2899b76
SHA-256: 3e1e5458a7930c0d57a854ec0db25a8988452273c9853443f68a94fb3e304b53
kernel-debug-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cf60521a4786157da97b0b9aa98bead6
SHA-256: b94bcd3d6aed790351842cf4fae0cf52cb8ab3b33546e98ab7aa795098f05269
kernel-debug-debuginfo-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e7a35c15514229bcaba2128ef9a54b65
SHA-256: 15a645e988a78e280a4472d5a529f0cb352117dd7c7ea12e6308b2fd49d5816d
kernel-debug-devel-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: eba3b1160b55616b5d1d8742d6874fd7
SHA-256: 934d4430aa84bdedd3485f3bd147553b4b313b350165107d48336b5f7c0944d2
kernel-debuginfo-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ff28316538dfa7ba75b40981717791b1
SHA-256: cf8241effdb9a2bbe0f79edc8de1fe9a9c15774c02385145ecc4cd41318b480c
kernel-debuginfo-common-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cb4d96126d8b8d688f6aabda66a2827d
SHA-256: 0dc425d100235b6839e65c80c91aca6e2099d6a3c732baa0e1822ceaa7612fc7
kernel-devel-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ffaafbbdb7a68a615570e033651aa355
SHA-256: 9ffe2f2b5e697642a4284511877373bf690156428b11edf2bf8b9c9fbadb85ef
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: d86697ad85122d95fda866e5a123ea19
SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 028312713d6a8a32eb4c299260b8cf0c
SHA-256: f458e3011101a890fc653c2ddbdfcaa1aa1c698b5bda2d4ce325be1cf1d23921
kernel-xen-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3b409d68e81d472e60181effadf48f6c
SHA-256: 468958476a5f5f834729df5aed5a2f05a3160d90f188ac519e005755741798a1
kernel-xen-debuginfo-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: fd40791e6ef34d74a36973c7ce7a19cb
SHA-256: 8962eda5b4a9a238a5897dd8575f7e5c09daa1f700238dafc09e47c1b4755c69
kernel-xen-devel-2.6.18-308.8.2.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 75ed7bed5958d927a54c88fae6e6ce59
SHA-256: 574eb2cb5eb59ba6b9a379cfb3c6f287c019b87b3ddc36a9a7130ece49fa1105
 
PPC:
kernel-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 11233a474b67764bdea5525b9e723812
SHA-256: dd0d4cb6dae33151668e73885c11a8571bc3ae0343115be39121eeefc8dfda5e
kernel-debug-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 24c1696fade31dacdd039b250228ef92
SHA-256: d2e652b4187bb1e6ce78add37eda4dcf5dd2d33e5a308c5621587fbbb49425b9
kernel-debug-debuginfo-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 11a1fae199b6adc0f85a1039a6c56ca3
SHA-256: ec9132a1516c015e4717852c0b4ffe5e4cb8c3dbb7d5c98ae7a9108984912218
kernel-debug-devel-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6a0bf28dbb45346e98eb26038c9bab03
SHA-256: b78a944c234bf06a2444e5628266182cbfd29b18787ec3bce01b6f504b9ced52
kernel-debuginfo-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a1955056b3352b68b0e6871c6cfb715f
SHA-256: 25258a5defffff0e6aa383536d2882e77e7e98f3d9bfa57263ac65d6556ec817
kernel-debuginfo-common-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 14252f7f4db0ce22e00234a2e582e934
SHA-256: c18d2336bc876210ec1996c370b31f2a5fa3827a9861f95c20d3e47a742324e4
kernel-devel-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 89eb9e45142d3195a2db6106802e4d50
SHA-256: 1d3faf560d680b734754db0c183009cc91c514e56195f4bd4275ee7d73f80f25
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: d86697ad85122d95fda866e5a123ea19
SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 56b871ad3557d7fb180433f6d9a94a00
SHA-256: a14f9587aee92ecb55662a8a3a0b2c3e73e91e411896343a726f715a4d2798c1
kernel-headers-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a05d4ff1359f868d3fc27e9e4b8d77c3
SHA-256: ba613789a458087a8a28914fffa1073f8f66d82afe89f48a291e5948bce4d825
kernel-kdump-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cbf9c49ce096e9fd8fa1ed8ce8f8c495
SHA-256: 69e4b18ad538613fa933d9ffff526447d3c5da73975aa048b6fffc0874b68167
kernel-kdump-debuginfo-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 781774311362699ca2f4bd0b0e8dff03
SHA-256: 15443fc917469a1ab2f29e923af9b984a98c2b730b94c1d812731a16a900daf9
kernel-kdump-devel-2.6.18-308.8.2.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f57a6eb6d472029dafc774f9564d490b
SHA-256: de3407d9e89fac81c82fb0e0ee1e3292f8b2996190862c40957f2d847cae5361
 
s390x:
kernel-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 68cf5fdb4d270aceb69c5e7abf604d61
SHA-256: 4d94e772f10669d5cf13e3f0bb6d7bb80529a4dc9f0ebdfd8bda40277b598c19
kernel-debug-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 037cbaf6c064dc125a97d061230c3476
SHA-256: e398bab36df1ad3a9ae1f0ab2e75ad2e8c4dc208c2a6e27c49e6a0e981a290da
kernel-debug-debuginfo-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 69979b56fb1c3dc909970be5352026b7
SHA-256: b57b515a68c4c186800ff09535a83bc4ee6af253dd4233d56d10c7667beb7120
kernel-debug-devel-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5886bb08b6e030ef6473b43f18a4e622
SHA-256: fb9d1dbb512c037854ac2dd06cb24aeb70390c96dd966f739aa62d62b3da941f
kernel-debuginfo-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5fdfdd5bcd9b72179cc7da0a223ce399
SHA-256: 9cfbb3ac3f3f1960fac21b65db8392a9c493c8b54070c69ba4aa585219633f64
kernel-debuginfo-common-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 688e0ea7aeed1806d1823513d6c016ee
SHA-256: 75a2cf3f0dbc1479be385eade534d231512ace1c9f78d988fe021935f16072dd
kernel-devel-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 29774d52ef2666098934b870c040e5c7
SHA-256: 897e483813ba4955c3b1cca6b088d252ecb1b4124b19b8ebccff5609ce583c50
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: d86697ad85122d95fda866e5a123ea19
SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: c2af2f6ab5fc1085913a9c860aa91a77
SHA-256: 385bcfce350d8b439dff566629d1996a16b4f42ed310d80655ddaa7d5ba7a599
kernel-kdump-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 268854a20ca135f554792c0d35cb2a02
SHA-256: 3abfed86f4d8c6ae7b52e0f2f722041cc850bd30e0bc1cdea434fa1e1e597f8c
kernel-kdump-debuginfo-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: d708a5b446f122cd5aedca5664799363
SHA-256: ec06487c7708586114c1d9e9322fad6a2279679f6b7754379741301cbdea5fe7
kernel-kdump-devel-2.6.18-308.8.2.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4f40bcdca9b09e99810d85d8e874785c
SHA-256: de6994839fa34b43516ea008516f1157f573a3a80b8343cbeeda48ff5f992096
 
x86_64:
kernel-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c1a00b294b745d4b99d1574043e31558
SHA-256: ac9b9ef922abc95f64a55d447b6a01617757e89c7536c48c4b2d72e51762648c
kernel-debug-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2099413ac4456f746f8fcadd9017a325
SHA-256: 5e0d5e2ede09ade763765e2a7bb71bdd9436df1fb9a3782cabdac3127fdab468
kernel-debug-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5941797427ec31e16bdccf6b10d40a3c
SHA-256: fba8c25cda5da8fc4d849c8b82c882ad146a09cda20a4d1da194d37e19e59c3a
kernel-debug-devel-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cd50cd483310d71b1292e4b6fd8facdf
SHA-256: 0fb1672e4f0e791b03f757077b183b60d452596de4f238a412ea590852faee1a
kernel-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bee967867aa5865bfa16a324ca36b616
SHA-256: d49607ce3894322c4364d2bbd9aa1053724e1c1c565fdcd82a99443043521164
kernel-debuginfo-common-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7e45af5b88c28b7d195dae2ddcd82655
SHA-256: f12abf795366dbb18c51a0a84809aa3305af04d7813ff615973c58dcb2fde7c1
kernel-devel-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 99cb29688827abd8157d8399350e5825
SHA-256: 2b9c0313a0c6285ec8b74b3c5f555d8febb27354561cbcc6df39efccfc5e36e2
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: d86697ad85122d95fda866e5a123ea19
SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e87a7bd963a2d6f0119d64f56b51c119
SHA-256: 52cdb662da0a0b2831b983bc0c5640d4c1b9af654024e60aa7b69443461b4f80
kernel-xen-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ba8823a2285c75574d216fec3d4d3617
SHA-256: 49ec4bd238582aeaef6dadc3811b196efbc4947e85ea5b835f9034e2eade19e4
kernel-xen-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2ce0aaecab20d02ca92c41218c55777f
SHA-256: d900e2208e8df73d625b933d382f00d8d26eb36b7c05aed2338957f0a0edc310
kernel-xen-devel-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 030742c7f192560b1d022af4c6ff7604
SHA-256: 8c08f903c9ec6c0c3cba80f1f2f9c05932f5f68b6de5871f6226914b24f89c0f
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-308.8.2.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 657cef16e6611d6f917cec2a25e7e99e
SHA-256: 21d14efaef51fd14681c3eeda9713bec2f6bd523a33328d2ed804405e87a1be5
 
IA-32:
kernel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 35c1158c82cd775cf20b073b5428606e
SHA-256: 897762bcd031135aa0669edb8346ffcc3751d7365271f30af353e4847e915444
kernel-PAE-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 02eef4e263f998f20c3c70c70795de7a
SHA-256: f17e3e0360ca406b051d098d072b78d85983c3ac2c78b7312f262b11873a8dcf
kernel-PAE-debuginfo-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1a172de388bd6605334cbdecbdc819b9
SHA-256: b52b0e9e869bfa27e52eea2c9ae4ef7546fcb90db066a9ba56102245a07c9027
kernel-PAE-devel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 37774be0d817c9a889dd5a8cdea0452e
SHA-256: 5ef65e0b934ec7437772d6a2fd7b3e672c5eb652caab14b00809d6dafe3f617c
kernel-debug-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1f09e30223e2c48a9ea91a4df3ec7b22
SHA-256: 10434df7d2b3b8cb16200c71f7a922cc9d2a2d54d341158d1e30bc3c4d389da1
kernel-debug-debuginfo-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ff73bb490c4e79bb1d7c98f52d6d3812
SHA-256: f7dce680fa16ad773b717153e90deef5b2ee8ea3ae71095112dc48b4f301ee1f
kernel-debug-devel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6bcc8aaa8452e2887e103d5bba7be28a
SHA-256: ca04a3956a88cc931253737f3fec5166f191efa9532eb1f9e13712c220ad88e8
kernel-debuginfo-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 40678a7d19701be200f2e4595c8ec219
SHA-256: 00861d72106abf37ff0d0c5ee590554120b935d0597ca255fac6609da6dc0261
kernel-debuginfo-common-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3de3679f27568c34f3cdd4f284c4d7b2
SHA-256: f15d2c911c5ce1098f70d377d844db3a120905a7d8493b6d8a31205ceb4440ea
kernel-devel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e06dd08ff28642177759f3060dbf5cc9
SHA-256: 71554ceae50874026d5edbd8edd44fe4eae184950dd98c53162d0c6fe1f961ad
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: d86697ad85122d95fda866e5a123ea19
SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 77a7e8642f0f5583e49c0f2730321626
SHA-256: e7a44875bff0f15d0cd8a48a4af3fd65bebed5fb72d0ee9ea462d94206ce1e9d
kernel-xen-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4ea859aa6fbe6b0aa2372a801de35eea
SHA-256: f9e8bc102ec75836048bc6ee49131aa217e737d4c66671b1b924a83b403f69f8
kernel-xen-debuginfo-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c8a5e55586d405f022321509f02d957b
SHA-256: 56e3122643c2ad71b0fb96e7341abf78be8428c7be506b06c0bb0c9e7bea68a2
kernel-xen-devel-2.6.18-308.8.2.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: aaefae0f39b7be087b352d8501dd715b
SHA-256: e83edb26cd8ee98e37cdd14a7344fde5b2d479e7f0d38ac060f9cdc560914e14
 
x86_64:
kernel-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c1a00b294b745d4b99d1574043e31558
SHA-256: ac9b9ef922abc95f64a55d447b6a01617757e89c7536c48c4b2d72e51762648c
kernel-debug-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2099413ac4456f746f8fcadd9017a325
SHA-256: 5e0d5e2ede09ade763765e2a7bb71bdd9436df1fb9a3782cabdac3127fdab468
kernel-debug-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5941797427ec31e16bdccf6b10d40a3c
SHA-256: fba8c25cda5da8fc4d849c8b82c882ad146a09cda20a4d1da194d37e19e59c3a
kernel-debug-devel-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cd50cd483310d71b1292e4b6fd8facdf
SHA-256: 0fb1672e4f0e791b03f757077b183b60d452596de4f238a412ea590852faee1a
kernel-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bee967867aa5865bfa16a324ca36b616
SHA-256: d49607ce3894322c4364d2bbd9aa1053724e1c1c565fdcd82a99443043521164
kernel-debuginfo-common-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7e45af5b88c28b7d195dae2ddcd82655
SHA-256: f12abf795366dbb18c51a0a84809aa3305af04d7813ff615973c58dcb2fde7c1
kernel-devel-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 99cb29688827abd8157d8399350e5825
SHA-256: 2b9c0313a0c6285ec8b74b3c5f555d8febb27354561cbcc6df39efccfc5e36e2
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: d86697ad85122d95fda866e5a123ea19
SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e87a7bd963a2d6f0119d64f56b51c119
SHA-256: 52cdb662da0a0b2831b983bc0c5640d4c1b9af654024e60aa7b69443461b4f80
kernel-xen-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ba8823a2285c75574d216fec3d4d3617
SHA-256: 49ec4bd238582aeaef6dadc3811b196efbc4947e85ea5b835f9034e2eade19e4
kernel-xen-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2ce0aaecab20d02ca92c41218c55777f
SHA-256: d900e2208e8df73d625b933d382f00d8d26eb36b7c05aed2338957f0a0edc310
kernel-xen-devel-2.6.18-308.8.2.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 030742c7f192560b1d022af4c6ff7604
SHA-256: 8c08f903c9ec6c0c3cba80f1f2f9c05932f5f68b6de5871f6226914b24f89c0f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

813428 - CVE-2012-0217 kernel: x86-64: avoid sysret to non-canonical address
824966 - CVE-2012-2934 kernel: denial of service due to AMD Erratum #121


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/