Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2012:1323-1
Type: Security Advisory
Severity: Important
Issued on: 2012-10-02
Last updated on: 2012-10-02
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2012-2319
CVE-2012-3412
CVE-2012-3430
CVE-2012-3510

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A flaw was found in the way socket buffers (skb) requiring TSO (TCP
segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

* A use-after-free flaw was found in the xacct_add_tsk() function in the
Linux kernel's taskstats subsystem. A local, unprivileged user could use
this flaw to cause an information leak or a denial of service.
(CVE-2012-3510, Moderate)

* A buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS Plus (HFS+) file system implementation in the Linux kernel. A local
user able to mount a specially-crafted HFS+ file system image could use
this flaw to cause a denial of service or escalate their privileges.
(CVE-2012-2319, Low)

* A flaw was found in the way the msg_namelen variable in the rds_recvmsg()
function of the Linux kernel's Reliable Datagram Sockets (RDS) protocol
implementation was initialized. A local, unprivileged user could use this
flaw to leak kernel stack memory to user-space. (CVE-2012-3430, Low)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
CVE-2012-3412, and Alexander Peslyak for reporting CVE-2012-3510. The
CVE-2012-3430 issue was discovered by the Red Hat InfiniBand team.

This update also fixes the following bugs:

* The cpuid_whitelist() function, masking the Enhanced Intel SpeedStep
(EST) flag from all guests, prevented the "cpuspeed" service from working
in the privileged Xen domain (dom0). CPU scaling was therefore not
possible. With this update, cpuid_whitelist() is aware whether the domain
executing CPUID is privileged or not, and enables the EST flag for dom0.
(BZ#846125)

* If a delayed-allocation write was performed before quota was enabled,
the kernel displayed the following warning message:

WARNING: at fs/quota/dquot.c:988 dquot_claim_space+0x77/0x112()

This was because information about the delayed allocation was not recorded
in the quota structure. With this update, writes prior to enabling quota
are properly accounted for, and the message is not displayed. (BZ#847326)

* In Red Hat Enterprise Linux 5.9, the DSCP (Differentiated Services Code
Point) netfilter module now supports mangling of the DSCP field.
(BZ#847327)

* Some subsystems clear the TIF_SIGPENDING flag during error handling in
fork() paths. Previously, if the flag was cleared, the ERESTARTNOINTR error
code could be returned. The underlying source code has been modified so
that the error code is no longer returned. (BZ#847359)

* An unnecessary check for the RXCW.CW bit could cause the Intel e1000e NIC
(Network Interface Controller) to not work properly. The check has been
removed so that the Intel e1000e NIC works as expected. (BZ#852448)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-308.16.1.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: bb328cc0179338fde53467e53bdc2b3d
SHA-256: 2a7b9b9dfa6098f0b6374c05af25a86003a1a26ce510ef94b55aada3c0e8f2ba
 
IA-32:
kernel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d901fa4291a5788c0c4db52538256c7
SHA-256: 115257281af52f0da43f8ec43df2a185a22fc9f330e2b473f4a7d3081c617051
kernel-PAE-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e2a46e75012cf4f5c05a5ef45c444c72
SHA-256: ed47486bf5266c38582b587f4f3a50bdb6b6a58ceb43392d95a69159369f2f8e
kernel-PAE-debuginfo-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3844f9e7256928d8dac43073a7145160
SHA-256: 6ea8ae87f50ae8cf72df29fc2a85453fec8f510f005ac27bcf80feb7462d53a8
kernel-PAE-devel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5a4ba14fb437956fb078812ba9f6598c
SHA-256: ec3a8f69f9a7a0d2f0d29a16daa23cbc9ab4e45e9f3093f19e951e080c9bd0a4
kernel-debug-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 88d6ad6a505e61f301ed94a184259a5b
SHA-256: 2184e2a8eb1bee1321052039bba909576cab7e43151ec100d1bf4293664a4ad3
kernel-debug-debuginfo-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 19e95361c957a74786169482a519ab72
SHA-256: 0570b3ed5639dc52ccb9fba956c3c0bd7cbe5d38277d2cd75bf70137933aaa63
kernel-debug-devel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: f328ad56f803613028756f633da5e537
SHA-256: 303d9fe0512bf4185393aa179b73af1c57f1bd3ace869ccef5a5a9989b3c9ea8
kernel-debuginfo-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5e21d60f315fa401fb600becac12499f
SHA-256: a2fe836dc34c7986ad9d352145bef064c6e13d6a52282535483dce2583ab3728
kernel-debuginfo-common-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b47d8528f30895538da15fc3c221e4a0
SHA-256: bf62935b0c9dcb1be75eabb5a3524c6b94823309a9000f482dda588dca09dc54
kernel-devel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b17e63276960c98503be19e669f33c0b
SHA-256: 38c37774e2bcc2ca82387cc2dc74ec488803d30c2339302dadca4d669d3addc8
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0542ff222252b26297b9b00028f32dd7
SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4f479bdbbb55babcb2ec7582fe52298b
SHA-256: 2e36b61f375c1d5ccf16b05da197656bef3efba37f7b7a7e74791b56b848f9f0
kernel-xen-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1602a1d70a840fe0308345a56f799d61
SHA-256: 2d06c54faa224a4590f8cb32b2dd1c7d590fa1a11d9c8aae9f91dae38741a789
kernel-xen-debuginfo-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ba68189721953420c765ec012d840409
SHA-256: b793f5b4fef7b49cc4625025b8cd8e0840ea0fb317e193b76e20971d4bcdc929
kernel-xen-devel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a8993e4669ea40d944e5710a79833a3c
SHA-256: d4171344e6b2d3b051de62559dc1fdfc35414da8072f473bc1d68ee8f6b1cd2b
 
IA-64:
kernel-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e5c9c408394fa74f26a4426830f61e4e
SHA-256: 4a058cad93d1d53211062bf504993fcfd11c2c4b4f57f70ae7fa3b0af2a71242
kernel-debug-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 515d05f5423c52eb7d550a6aaa25c8ad
SHA-256: 3cc9309ad9f6bb7d837835577b7cf9d59767ba8d011634fd29d62b4daac57aa8
kernel-debug-debuginfo-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 038bf8301e2c81c683bfd01b819bee99
SHA-256: 3f483cbc3502cc250ab12f635179cbdb471423998d3f2b49823a434acf6972e4
kernel-debug-devel-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0b1e9e5e299b827442558520bb481e08
SHA-256: 2ba0373044264c7c7b2033d75329e02a02ce33db24d7045f1c593e2fbc0e6123
kernel-debuginfo-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 531ea41f6217928e0ee9647660e44060
SHA-256: 3abc631ff559a09f879bd1ce69d0e0cefc8756a916a02aa5e20a30b2df41e217
kernel-debuginfo-common-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7d3faf2ff821d6ca1f06995b336db837
SHA-256: c3b9eab3d7ccf4c73774df1effeb7e6f4754549362eab04507989b22ef76b0aa
kernel-devel-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5aa821271a15a82977774275d71ac471
SHA-256: afec6260b5d1305fb2c1ce22161552778e5b37c772059ee69e7e8a9856ad5ba3
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0542ff222252b26297b9b00028f32dd7
SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 040c6725c89a702314533b9ff6777dbf
SHA-256: a41f577fc4e18c41116a24e932abf0a73a5daa78d03f5377ad7f0fa52289e82a
kernel-xen-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6cee5350a8933e7b00acf18ab95218ef
SHA-256: 25d2cd6a0f165161cee1cb593df9ebe0204c7364f2aace94293a2a368039d000
kernel-xen-debuginfo-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0fe77667ae5b09a51368f4e12109d889
SHA-256: 4adb9ef5624df31484c36c290b8713e0c6d752917597abe69712b3dd8d70587a
kernel-xen-devel-2.6.18-308.16.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 07abb30395a42174b7de429e63ffeefd
SHA-256: 8be125878d41ca1b4d98e2e99582c84587b99838f8629409c57d14752dc14605
 
PPC:
kernel-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9b0ec2f7dc68e4b6689014a753a6ecc3
SHA-256: 2b1059fa7a2dab59542cf9155b484e7be1337b2c9df7c0a4889993d632693207
kernel-debug-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 22fa362bb8bd9f1ed9f0e8969a9afd08
SHA-256: 845ea68e33d8d3c88b248013072e7bdf803ae45d7d031db17d41d916984f6cf0
kernel-debug-debuginfo-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 34dc9997f1b6de040ad788430a57aa48
SHA-256: 5c385b67bcd31443565220b668af1ba82de3718e4acc078c292be6c259902209
kernel-debug-devel-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7ad38dbe706aed5f044b66bea1454767
SHA-256: ede820dd2c58bd8fc0f097ce7d98a9f7a705cfc578442fbd8be556e99dcd3c76
kernel-debuginfo-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1fd494cfe168386591984c6fdd0267bc
SHA-256: ee4c1fdb844c7431b8512c5be836887183e08df5cda1500f867239b2da606bc4
kernel-debuginfo-common-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5582151162a92eae580dd98e575b150e
SHA-256: adff47d1fb0dcca706bf98313a90856e259b3f3b881ec6a8de30d8e49bd18e8e
kernel-devel-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: df88c91cd8146195f1add08506d06ff3
SHA-256: 8da3c8db31b25efc3fee023f491f16986aecad03600143ea46819e4573800c4c
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0542ff222252b26297b9b00028f32dd7
SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: cd78b71d4a1fa335e557786d776e7f90
SHA-256: 810b9fe171d46deb123ef9ba94168fbc7f3c465037410a1b93001b26f820e02b
kernel-headers-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0ad1803ad6a6ebf2985d899518ba1be0
SHA-256: 672015c44fd066c80d0d3ac580063e5dad96b2283cc9d488bd61f948ee10961e
kernel-kdump-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 96699c68e4edd06481a82dbb936dba3b
SHA-256: ab1a243b3ddb630f714894cedb95a943ffcf0ca36ea7dad0b5ab49ff89f20038
kernel-kdump-debuginfo-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 414553daf96d7fd3626bfb311512bc30
SHA-256: 96c19ab9f2d3ac1c7631fbfd5ed5e64d5c59aa67377fa721ef249612328d4ce3
kernel-kdump-devel-2.6.18-308.16.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8cdca372dd2d8c7ddbfad05ee1d59dd3
SHA-256: 9c68e998700dc38801a3fe0d66e71bf61521fef3e4c12e66f2cb354a61313368
 
s390x:
kernel-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0d7d76d2def433bcd72567d4e0848cef
SHA-256: 6e5ea11dcdc772449ffaf1ae501f30336193fb67b8e9f1e3f5cf55aa44837ea0
kernel-debug-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 90442675229d532b8a56b7a270f4a92a
SHA-256: 6f828c6fce8bad1638ec80862d09af0a6a7775a2c9e871d12991d107e5a64a01
kernel-debug-debuginfo-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0a40c69f5d878402354f50865bac0368
SHA-256: 8f821d57f23a87958c7fd32a6bff297243fdab2f82306f9d9fc8bb50ba6ed9ec
kernel-debug-devel-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 280544b1af745aca751a6a28bfdab060
SHA-256: b5cf74eff1cd034d9fcb99a1254ce65323f597d82645f6b45df230b985c745f5
kernel-debuginfo-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9488029b36f98188a4f8889e84f0b215
SHA-256: fa6583925e6728a8a9d382daf3d507b1a812bd369de0e403c935299690d72f62
kernel-debuginfo-common-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5d6ce57839a0fc76374358a440e5b73a
SHA-256: b01a6ab9e9bb33a3ad38e8ee7b4f7dd0c3f25c1258b18ab2fbc9567267107157
kernel-devel-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: d0274588469f0a25bfbcde6db348821f
SHA-256: 259c42d39b505894c1ab8311b6e479b377253ef32edc69d9d1a78b89f46cb889
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0542ff222252b26297b9b00028f32dd7
SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 76a8f0028e498b01c6426ae8eff0975d
SHA-256: e57b61c977d29955e9fb65da1f6dc62d13d6d8d0ba29adb405a90cfa008dca81
kernel-kdump-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: a92ed7695ed5b857afdd26e5de02efd3
SHA-256: b9a3920ed69b60089fa4a05f90c8daa87b02db193a8560f5167d3d3711d7e85d
kernel-kdump-debuginfo-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: ec49127c711f37abcb25fef199d00124
SHA-256: a33f2f7d53580d75fec8954b2bf188d26622b2a3a2973b0549b856ddc85c1663
kernel-kdump-devel-2.6.18-308.16.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 88ded0eced03cb50e2e2c77d3b265b78
SHA-256: fa7ddff79756568139e569762d2e13dbdc28488bf994bfdaf1de3bb0e96c7814
 
x86_64:
kernel-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9814a7471343d1a49c3563aeff7e6f12
SHA-256: 20c18ed1c0be8833d9150af385d4da58e149d606e4db3dcd4d9ba7fe970e911e
kernel-debug-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 08bebdaa72bb8c6bb553d70b5a429fa8
SHA-256: b938c36d2ae9869c19834a300fdac765be2f895f5c4930cfc714ea546baad8e4
kernel-debug-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: be40a10e66896c5d044e170d364f6b30
SHA-256: 99d018eed4ccaf86bfc9bab9f1fd4a2f847f460e2de59fe2b48f17753c089157
kernel-debug-devel-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 39dde8913627332217bac36b1b10b840
SHA-256: 7e174187e06a3919fe157b71b11e13ac1d6386e7274d1f8e17352531bcebbc4e
kernel-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 26aae4398ee43059474e1cb7c38e833e
SHA-256: 061d24daeb37f68bcbb9701f0c7272bd85475eed1a660dd204b298e5aecd3eb1
kernel-debuginfo-common-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b55fd24792642e23ec6ce79c46331d4f
SHA-256: ac61a7dcf2ffaa780cb38573fcb0a96abb9f9f7abef9acdab9ce24a278fac8d7
kernel-devel-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1bcabda01547d957e48aa70dce834e16
SHA-256: cf9b32f02e100239b383275c031ca5bb14ddb337e3ddcaf34e6483f7239c994e
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0542ff222252b26297b9b00028f32dd7
SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bd3a35e4044827532c85f17176dfba44
SHA-256: 85a33f5cdf632de89359153ed8e98ab4f4e7d5725fa2e25b2a1510c7c8857b97
kernel-xen-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f9fb706f6abd9852d41326aa58988a06
SHA-256: cd31965352597b2d7d2901d40a843f0035ebdfc5e8a624363e71f30639fdeb03
kernel-xen-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a49de57703ff70abcf7a0e3c7b989516
SHA-256: c3b76972bcbdc6cc8cf2de4b765fd3a8cff328ae77c49aaf7da0e3a32a9a97af
kernel-xen-devel-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8db54fda196dbfa6dceb800bcec1c70a
SHA-256: fbfa008fe971ca5fb0d1856429a79cbd3803451612a35145df21472b0f356288
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-308.16.1.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: bb328cc0179338fde53467e53bdc2b3d
SHA-256: 2a7b9b9dfa6098f0b6374c05af25a86003a1a26ce510ef94b55aada3c0e8f2ba
 
IA-32:
kernel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d901fa4291a5788c0c4db52538256c7
SHA-256: 115257281af52f0da43f8ec43df2a185a22fc9f330e2b473f4a7d3081c617051
kernel-PAE-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e2a46e75012cf4f5c05a5ef45c444c72
SHA-256: ed47486bf5266c38582b587f4f3a50bdb6b6a58ceb43392d95a69159369f2f8e
kernel-PAE-debuginfo-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3844f9e7256928d8dac43073a7145160
SHA-256: 6ea8ae87f50ae8cf72df29fc2a85453fec8f510f005ac27bcf80feb7462d53a8
kernel-PAE-devel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5a4ba14fb437956fb078812ba9f6598c
SHA-256: ec3a8f69f9a7a0d2f0d29a16daa23cbc9ab4e45e9f3093f19e951e080c9bd0a4
kernel-debug-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 88d6ad6a505e61f301ed94a184259a5b
SHA-256: 2184e2a8eb1bee1321052039bba909576cab7e43151ec100d1bf4293664a4ad3
kernel-debug-debuginfo-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 19e95361c957a74786169482a519ab72
SHA-256: 0570b3ed5639dc52ccb9fba956c3c0bd7cbe5d38277d2cd75bf70137933aaa63
kernel-debug-devel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: f328ad56f803613028756f633da5e537
SHA-256: 303d9fe0512bf4185393aa179b73af1c57f1bd3ace869ccef5a5a9989b3c9ea8
kernel-debuginfo-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5e21d60f315fa401fb600becac12499f
SHA-256: a2fe836dc34c7986ad9d352145bef064c6e13d6a52282535483dce2583ab3728
kernel-debuginfo-common-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b47d8528f30895538da15fc3c221e4a0
SHA-256: bf62935b0c9dcb1be75eabb5a3524c6b94823309a9000f482dda588dca09dc54
kernel-devel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: b17e63276960c98503be19e669f33c0b
SHA-256: 38c37774e2bcc2ca82387cc2dc74ec488803d30c2339302dadca4d669d3addc8
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0542ff222252b26297b9b00028f32dd7
SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4f479bdbbb55babcb2ec7582fe52298b
SHA-256: 2e36b61f375c1d5ccf16b05da197656bef3efba37f7b7a7e74791b56b848f9f0
kernel-xen-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1602a1d70a840fe0308345a56f799d61
SHA-256: 2d06c54faa224a4590f8cb32b2dd1c7d590fa1a11d9c8aae9f91dae38741a789
kernel-xen-debuginfo-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: ba68189721953420c765ec012d840409
SHA-256: b793f5b4fef7b49cc4625025b8cd8e0840ea0fb317e193b76e20971d4bcdc929
kernel-xen-devel-2.6.18-308.16.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a8993e4669ea40d944e5710a79833a3c
SHA-256: d4171344e6b2d3b051de62559dc1fdfc35414da8072f473bc1d68ee8f6b1cd2b
 
x86_64:
kernel-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9814a7471343d1a49c3563aeff7e6f12
SHA-256: 20c18ed1c0be8833d9150af385d4da58e149d606e4db3dcd4d9ba7fe970e911e
kernel-debug-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 08bebdaa72bb8c6bb553d70b5a429fa8
SHA-256: b938c36d2ae9869c19834a300fdac765be2f895f5c4930cfc714ea546baad8e4
kernel-debug-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: be40a10e66896c5d044e170d364f6b30
SHA-256: 99d018eed4ccaf86bfc9bab9f1fd4a2f847f460e2de59fe2b48f17753c089157
kernel-debug-devel-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 39dde8913627332217bac36b1b10b840
SHA-256: 7e174187e06a3919fe157b71b11e13ac1d6386e7274d1f8e17352531bcebbc4e
kernel-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 26aae4398ee43059474e1cb7c38e833e
SHA-256: 061d24daeb37f68bcbb9701f0c7272bd85475eed1a660dd204b298e5aecd3eb1
kernel-debuginfo-common-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b55fd24792642e23ec6ce79c46331d4f
SHA-256: ac61a7dcf2ffaa780cb38573fcb0a96abb9f9f7abef9acdab9ce24a278fac8d7
kernel-devel-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1bcabda01547d957e48aa70dce834e16
SHA-256: cf9b32f02e100239b383275c031ca5bb14ddb337e3ddcaf34e6483f7239c994e
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0542ff222252b26297b9b00028f32dd7
SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bd3a35e4044827532c85f17176dfba44
SHA-256: 85a33f5cdf632de89359153ed8e98ab4f4e7d5725fa2e25b2a1510c7c8857b97
kernel-xen-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f9fb706f6abd9852d41326aa58988a06
SHA-256: cd31965352597b2d7d2901d40a843f0035ebdfc5e8a624363e71f30639fdeb03
kernel-xen-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: a49de57703ff70abcf7a0e3c7b989516
SHA-256: c3b76972bcbdc6cc8cf2de4b765fd3a8cff328ae77c49aaf7da0e3a32a9a97af
kernel-xen-devel-2.6.18-308.16.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8db54fda196dbfa6dceb800bcec1c70a
SHA-256: fbfa008fe971ca5fb0d1856429a79cbd3803451612a35145df21472b0f356288
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

819471 - CVE-2012-2319 kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020)
820039 - CVE-2012-3430 kernel: recv{from,msg}() on an rds socket can leak kernel memory
844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option
847326 - WARNING: at fs/dquot.c:814 dquot_claim_reserved_space() in dmesg [rhel-5.8.z]
849722 - CVE-2012-3510 kernel: taskstats: use-after-free in xacct_add_tsk()


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/