Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2012:0063 - Bug Fix Advisory
Issued:
2012-01-25
Updated:
2012-01-25

RHBA-2012:0063 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

kernel bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple bugs and add one enhancement are now
available for Red Hat Enterprise Linux 5 Extended Update Support.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

This update fixes the following bugs:

  • The kdump service did not work properly with some HP Smart Array controllers

and could fail to create a core dump file or could become unresponsive under
certain circumstances. This update provides multiple bug fixes and changes for
the cciss driver and thus ensures that kdump works as expected with most HP
Smart Array controllers.

On a Red Hat Enterprise Linux 5.6 system, it is advisable to update the firmware
of the HP ProLiant Generation 6 (G6) controller (which includes: P410i, P411,
P212, P712, and P812) to version 5.02 or later. After the successful firmware
update, reboot the system and kdump will work as expected.

However, kdump may still fail when using the HP Smart Array 5i Controller on a
Red Hat Enterprise Linux 5.6 system. (BZ#749187)

  • When the SMP (Symmetric Multi Processing) kernel ran the crash_kexec()

function, the local Advanced Programmable Interrupt Controllers (APICs) could
have pending interrupt requests (IRQs) in their vector tables. If there was more
than one pending IRQ within the same 32-bit word in the Local APIC (LAPIC)
vector table registers, the I/O APIC subsystem would enter setup with pending
interrupts left in the LAPIC, causing various degrees of malfunctioning
depending on the stuck interrupt vector. This update adds the MAX_LOOPS
parameter to limit number of iterations and to provide enough time for the
pending IRQs to be cleared if the loop was to lock-up. (BZ#756943)

  • The IDE error handling code uses the IDE interrupt handler and the general

interrupt handler. This could lead to the erroneous execution of kexec/kdump
code that was intended to only run at boot time. As a result, the asserted IDE
IRQ line would be cleared without the interrupt being handled, which in turn
caused the system to become unresponsive during the shut down of the kexec/kdump
kernel. To fix this bug, a new test for the IRQ status, which should be
IRQ_DISABLED, has been introduced to ensure that the code introduced for the
kexec/kdump kernel only executes at boot time. (BZ#759386)

  • When kdump was triggered under a heavy load, the system became unresponsive

and failed to capture a crash dump. This update fixes interrupt handling for
kdump so that kdump successfully captures a crash dump while under a heavy load.
(BZ#761535)

  • When a device triggered an interrupt request (IRQ) during kdump kernel

startup, the kernel tried to process the IRQ even though the respective
interrupt handler was not loaded. As a consequence, the kernel could not finish
its startup and the system became unresponsive. This update allows the kernel to
disable the IRQ line if the kernel receives a large number of IRQs and there is
no interrupt handler loaded in the kernel. The kernel now starts as expected and
kdump can successfully create a core dump. (BZ#761539)

In addition, this update adds the following enhancement:

  • This update provides the latest cciss driver. The driver now allows the kernel

to wait for a reasonable amount of time after PCI Power Management resets a
CCISS device so the device can be properly detected. (BZ#758021)

All users are advised to upgrade to these updated packages, which fix these bugs
and add this enhancement. The system must be rebooted for this update to take
effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm

  • Uvh" as that will remove the running kernel binaries from your system. You may

use "rpm -e" to remove old kernels after determining that the new kernel
functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.33.1.el5.src.rpm SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1
x86_64
kernel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 880335e943f7646bf34dbe6447862628782827acb1e0358bdf1fa8d5bf1ca2fb
kernel-debug-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 39d1dde272023346985ba7d885d39cc95998ca49d6e292cbdf1228a84643e462
kernel-debug-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: c6796e45023fb7b3d8a99dc2faa702b97dd242142d338d7452971fc9ffd52923
kernel-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 9d3da8ed84cb02c1c95e2eea532799f15a4e58ccf93f27a1a545da21a4659426
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: cc60de41ae5c0935b21836798c3771ceee7f88b38dd19c34e74697578d2fafbc
kernel-xen-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: c36aef45af18681fd1e86029c25fff1a3cac487350a4c289e39224e85cbbfe69
kernel-xen-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: ccb7a448168ea6100cdee877de279be1362779b8260e32486c8411a1b61064a8
ia64
kernel-2.6.18-238.33.1.el5.ia64.rpm SHA-256: c60d41b5df5e15e775fb2f7f910730414e1fdbd0132c7c1975674c8d7ba11602
kernel-debug-2.6.18-238.33.1.el5.ia64.rpm SHA-256: 0073a4a6052b476f5de9996d2153e93513b0cdac674a6168868f8679bdf4f9e1
kernel-debug-devel-2.6.18-238.33.1.el5.ia64.rpm SHA-256: c517b7005bdcc5511932485614da1ada35342fcf14e1d5c559dd9efb98542720
kernel-devel-2.6.18-238.33.1.el5.ia64.rpm SHA-256: 56c1bc1bff43a4feae4653302217d95202f8da3a90e7526c9a67591202d9021d
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.ia64.rpm SHA-256: aa9f9e28264fc5217b93766d45ea65c8502fcafeca87fc559e1026ccb82d34f8
kernel-xen-2.6.18-238.33.1.el5.ia64.rpm SHA-256: f91de15d3a3a35cf54810047e296462366b5274bd34101beb4564dbc9c7094a4
kernel-xen-devel-2.6.18-238.33.1.el5.ia64.rpm SHA-256: 435da3f6d8787feffc207a33eedf92e30728e494b8ffe52a49aba6f85c2f0c2b
i386
kernel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 87252b21281c6ac8a8c416ed8e3f45a14a8384c8ed0be996ccf8da7a03dd493c
kernel-PAE-2.6.18-238.33.1.el5.i686.rpm SHA-256: 5bb31fc590f8de3e1748b01aeee8f8811b9fe05e23563ce5c5857612c1ab769e
kernel-PAE-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 7dae0b9086717da43617657a15bdf0c2932411d15bf131d79b4e5af0f4b909a3
kernel-debug-2.6.18-238.33.1.el5.i686.rpm SHA-256: e7c66fdea0adc467cd06c68c18c6fdf393763e40f22b56013185db9aff660755
kernel-debug-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 96f20ddfe50b6ba47eb09d8234833cdde35b225ddf351cb8c99e3b25c0d6df5a
kernel-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: b9958f2e48e2a16ddadd002b559508beea04e28be58ab0ae9de46684b07c5678
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.i386.rpm SHA-256: d6a629f9812ebb3f61bb3a749c597bc97526c4d9eba75b44b02dac6fc212c6e7
kernel-xen-2.6.18-238.33.1.el5.i686.rpm SHA-256: 6244b8e26d7decd016f91c5d1ea895e184ae814c9493ce425c70ca93fdd2f6f5
kernel-xen-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 5ed726667efa9b0e179b310f0fc0b0ff26780c7ddfcff71e16631a1e4c73a143

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.33.1.el5.src.rpm SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1
x86_64
kernel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 880335e943f7646bf34dbe6447862628782827acb1e0358bdf1fa8d5bf1ca2fb
kernel-debug-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 39d1dde272023346985ba7d885d39cc95998ca49d6e292cbdf1228a84643e462
kernel-debug-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: c6796e45023fb7b3d8a99dc2faa702b97dd242142d338d7452971fc9ffd52923
kernel-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 9d3da8ed84cb02c1c95e2eea532799f15a4e58ccf93f27a1a545da21a4659426
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: cc60de41ae5c0935b21836798c3771ceee7f88b38dd19c34e74697578d2fafbc
kernel-xen-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: c36aef45af18681fd1e86029c25fff1a3cac487350a4c289e39224e85cbbfe69
kernel-xen-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: ccb7a448168ea6100cdee877de279be1362779b8260e32486c8411a1b61064a8
ia64
kernel-2.6.18-238.33.1.el5.ia64.rpm SHA-256: c60d41b5df5e15e775fb2f7f910730414e1fdbd0132c7c1975674c8d7ba11602
kernel-debug-2.6.18-238.33.1.el5.ia64.rpm SHA-256: 0073a4a6052b476f5de9996d2153e93513b0cdac674a6168868f8679bdf4f9e1
kernel-debug-devel-2.6.18-238.33.1.el5.ia64.rpm SHA-256: c517b7005bdcc5511932485614da1ada35342fcf14e1d5c559dd9efb98542720
kernel-devel-2.6.18-238.33.1.el5.ia64.rpm SHA-256: 56c1bc1bff43a4feae4653302217d95202f8da3a90e7526c9a67591202d9021d
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.ia64.rpm SHA-256: aa9f9e28264fc5217b93766d45ea65c8502fcafeca87fc559e1026ccb82d34f8
kernel-xen-2.6.18-238.33.1.el5.ia64.rpm SHA-256: f91de15d3a3a35cf54810047e296462366b5274bd34101beb4564dbc9c7094a4
kernel-xen-devel-2.6.18-238.33.1.el5.ia64.rpm SHA-256: 435da3f6d8787feffc207a33eedf92e30728e494b8ffe52a49aba6f85c2f0c2b
i386
kernel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 87252b21281c6ac8a8c416ed8e3f45a14a8384c8ed0be996ccf8da7a03dd493c
kernel-PAE-2.6.18-238.33.1.el5.i686.rpm SHA-256: 5bb31fc590f8de3e1748b01aeee8f8811b9fe05e23563ce5c5857612c1ab769e
kernel-PAE-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 7dae0b9086717da43617657a15bdf0c2932411d15bf131d79b4e5af0f4b909a3
kernel-debug-2.6.18-238.33.1.el5.i686.rpm SHA-256: e7c66fdea0adc467cd06c68c18c6fdf393763e40f22b56013185db9aff660755
kernel-debug-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 96f20ddfe50b6ba47eb09d8234833cdde35b225ddf351cb8c99e3b25c0d6df5a
kernel-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: b9958f2e48e2a16ddadd002b559508beea04e28be58ab0ae9de46684b07c5678
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.i386.rpm SHA-256: d6a629f9812ebb3f61bb3a749c597bc97526c4d9eba75b44b02dac6fc212c6e7
kernel-xen-2.6.18-238.33.1.el5.i686.rpm SHA-256: 6244b8e26d7decd016f91c5d1ea895e184ae814c9493ce425c70ca93fdd2f6f5
kernel-xen-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 5ed726667efa9b0e179b310f0fc0b0ff26780c7ddfcff71e16631a1e4c73a143

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.33.1.el5.src.rpm SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1
s390x
kernel-2.6.18-238.33.1.el5.s390x.rpm SHA-256: 896b9d6fb8a8792e7575ecc6ac2ee0c985888664eeac52d376bcdfa1049c2e7d
kernel-debug-2.6.18-238.33.1.el5.s390x.rpm SHA-256: f63f8bf6c95ef4b701f9edcfec6b5a9c4354b35051aca458164e2c91f3330829
kernel-debug-devel-2.6.18-238.33.1.el5.s390x.rpm SHA-256: 294e7bdbc7ee72a67d8bd79cf93fff4bd0280f8e6d48743a490d1d3e65cccaa4
kernel-devel-2.6.18-238.33.1.el5.s390x.rpm SHA-256: 2db22b1a7ce74d939ffa599c5675e0edd041b435d6de86fcc4c7a71b63010b04
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.s390x.rpm SHA-256: 19168fd60a80a62a73c1b7aee1cf80702b62db598ad4f833b0ec9a5753740780
kernel-kdump-2.6.18-238.33.1.el5.s390x.rpm SHA-256: 316abb6805de8d2776dffacd2e9d6eb4e37bc17d6537f5f36d4c6ea5d74d7297
kernel-kdump-devel-2.6.18-238.33.1.el5.s390x.rpm SHA-256: 121b28d1f69af457f8dc308ac690fe738dbc6636cd378334abc0c9526e330bb9

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.33.1.el5.src.rpm SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1
ppc
kernel-2.6.18-238.33.1.el5.ppc64.rpm SHA-256: 674fbb0f13cefa3307f58ba5e97f44725f001f1f490ecbfd84c54480a69e9e66
kernel-debug-2.6.18-238.33.1.el5.ppc64.rpm SHA-256: 068896488dfbff3257ad88e62ea7c3307397d571af5cf778b07680a34773f91e
kernel-debug-devel-2.6.18-238.33.1.el5.ppc64.rpm SHA-256: b73db091ba0230d746e664db0da283dedbb16773d8d75084c85f48b654812789
kernel-devel-2.6.18-238.33.1.el5.ppc64.rpm SHA-256: 256e2d8eaf0592a513fe513925ca1a7413b954dea60e376019cdba55135737ae
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.ppc.rpm SHA-256: 489be9284f791cc65e291e10650cbb9827aad21a3ec92c49a3af3bcf9564101b
kernel-headers-2.6.18-238.33.1.el5.ppc64.rpm SHA-256: 198251e332ca657d1cb25e1b20dc8d92218cf45158efa1b6d8c4283d86044b35
kernel-kdump-2.6.18-238.33.1.el5.ppc64.rpm SHA-256: 992d6adebf7780dfe8ede84faa2ba2e7f95bac8968a1243c2f1b7372b1576aee
kernel-kdump-devel-2.6.18-238.33.1.el5.ppc64.rpm SHA-256: 01a2546fe4395386212801f1cdee07d16bc81461848067df7c83379f4eadd7b6

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.33.1.el5.src.rpm SHA-256: 90bf9fb4356a7c2146874b99c194cfdf7fe285a53a92b327125e39cde27971d1
x86_64
kernel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 880335e943f7646bf34dbe6447862628782827acb1e0358bdf1fa8d5bf1ca2fb
kernel-debug-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 39d1dde272023346985ba7d885d39cc95998ca49d6e292cbdf1228a84643e462
kernel-debug-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: c6796e45023fb7b3d8a99dc2faa702b97dd242142d338d7452971fc9ffd52923
kernel-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: 9d3da8ed84cb02c1c95e2eea532799f15a4e58ccf93f27a1a545da21a4659426
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: cc60de41ae5c0935b21836798c3771ceee7f88b38dd19c34e74697578d2fafbc
kernel-xen-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: c36aef45af18681fd1e86029c25fff1a3cac487350a4c289e39224e85cbbfe69
kernel-xen-devel-2.6.18-238.33.1.el5.x86_64.rpm SHA-256: ccb7a448168ea6100cdee877de279be1362779b8260e32486c8411a1b61064a8
i386
kernel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 87252b21281c6ac8a8c416ed8e3f45a14a8384c8ed0be996ccf8da7a03dd493c
kernel-PAE-2.6.18-238.33.1.el5.i686.rpm SHA-256: 5bb31fc590f8de3e1748b01aeee8f8811b9fe05e23563ce5c5857612c1ab769e
kernel-PAE-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 7dae0b9086717da43617657a15bdf0c2932411d15bf131d79b4e5af0f4b909a3
kernel-debug-2.6.18-238.33.1.el5.i686.rpm SHA-256: e7c66fdea0adc467cd06c68c18c6fdf393763e40f22b56013185db9aff660755
kernel-debug-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 96f20ddfe50b6ba47eb09d8234833cdde35b225ddf351cb8c99e3b25c0d6df5a
kernel-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: b9958f2e48e2a16ddadd002b559508beea04e28be58ab0ae9de46684b07c5678
kernel-doc-2.6.18-238.33.1.el5.noarch.rpm SHA-256: 267ee4e0775b04a080b09784325ed1e521f291b48d2e6ab04b7c51ecf0066aa8
kernel-headers-2.6.18-238.33.1.el5.i386.rpm SHA-256: d6a629f9812ebb3f61bb3a749c597bc97526c4d9eba75b44b02dac6fc212c6e7
kernel-xen-2.6.18-238.33.1.el5.i686.rpm SHA-256: 6244b8e26d7decd016f91c5d1ea895e184ae814c9493ce425c70ca93fdd2f6f5
kernel-xen-devel-2.6.18-238.33.1.el5.i686.rpm SHA-256: 5ed726667efa9b0e179b310f0fc0b0ff26780c7ddfcff71e16631a1e4c73a143

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility