Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHBA-2012:0361 - Bug Fix Advisory
Issued:
2012-03-07
Updated:
2012-03-07

RHBA-2012:0361 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

kernel bug fix

Type/Severity

Bug Fix Advisory

Topic

Updated kernel packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 5.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Bug fixes:

  • The root user without the CAP_SYS_ADMIN capability was able to reset the
    contents of the "/proc/sys/kernel/dmesg_restrict" configuration file to 0.
    Consequently, the unprivileged root user could bypass the protection of the
    "dmesg_restrict" file and read the kernel ring buffer. This update ensures that
    only the root user with the CAP_SYS_ADMIN capability is allowed to write to the
    dmesg_restrict file. Any unauthorized attempt on writing to this file now fails
    with an EPERM error. (BZ#749246)
  • An Ethernet physical transceiver (a PHY chip) was always powered up when a
    network interface card (NIC) using the igb driver was brought down. Recent
    changes had modified the kernel so that the PHY chip was powered down in such a
    scenario. With this PHY power saving feature, the PHY chip could unexpectedly
    lose its settings on rare occasions. Consequently, the PHY chip did not recover
    after the NIC had been re-attached and the NIC could not be brought up. The igb
    driver has been modified so that the PHY chip is now reset when the NIC is
    re-attached to the network. NICs using the igb driver are brought up as
    expected. (BZ#786168)
  • The way how the kernel processes dentries in the dcache when unmounting file
    systems allowed the concurrent activity on the list of dentries. If the list was
    large enough, the kernel could, under certain circumstances, panic due to NMI
    watchdog timeout triggered by the waiting concurrent process. This update
    modifies underlying functions to use a private dcache list for certain
    operations on the dcache so that concurrent activities are no longer affected in
    this scenario. (BZ#789369)
  • The Abstract Control Model (ACM) driver uses spinlocks to protect the lists of
    USB Request Blocks (URBs) and read buffers maintained by the driver. Previously,
    when a USB device used the ACM interface, a race condition between scheduled ACM
    tasklets could occur. Consequently, the system could enter a deadlock situation
    because tasklets could take spinlocks without disabling interrupt requests
    (IRQs). This situation resulted in various types of soft lockups ending up with
    a kernel panic. This update fixes the problem so that IRQs are disabled when a
    spinlock is taken. Deadlocks no longer occur and the kernel no longer crashes in
    this scenario. (BZ#790778)
  • A recent change in the QLogic qla2xxx driver introduced a bug which could,
    under rare circumstances, cause the system to become unresponsive. This problem
    occurred during I/O error recovery on systems using SAN configurations with
    QLogic Fibre Channel Hot Bus Adapters (HBAs). This update corrects the qla2xxx
    driver so the system no longer hangs in this scenario. (BZ#790907)
  • Due to recent changes in the tg3 driver, the driver attempted to use an
    already freed pointer to a socket buffer (SKB) when the NIC was recovering from
    unsuccessful memory mapping. Consequently, the NIC went offline and the kernel
    panicked. With this update, the SKB pointer is newly allocated in this scenario.
    The NIC recovers as expected and a kernel panic does not occur. Also, the tg3
    driver could, under certain circumstances, attempt to unmap a memory fragment
    that had not been mapped. Consequently, the kernel panicked. This update fixes
    the bug by correcting the "last" parameter supplied. (BZ#790910)
  • When a network interface card (NIC) with a fan experiences a fan failure, the
    PHY chip is usually powered down by its firmware. Previously, the bnx2x driver
    did not handle fan failures correctly, which could trigger a non-maskable
    interrupt (NMI). Consequently, the kernel could crash or panic. This update
    modifies the bnx2x driver to handle fan failures properly, the NIC is now shut
    down as expected and the kernel does not crash in this scenario. (BZ#790912)

All users are advised to upgrade to these updated packages, which fix these
bugs. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm

  • Uvh" as that will remove the running kernel binaries from your system. You may
    use "rpm -e" to remove old kernels after determining that the new kernel
    functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

(none)

CVEs

  • CVE-2011-4080

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-308.1.1.el5.src.rpm SHA-256: 306bbd49d16fe74b8c469ebff1093d95b54a74abfe136d53518e322815c01f19
x86_64
kernel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: e942a06a9d82d49c37974da3c581c80fdad52baaf0839d3dce9d24e0c1e6743a
kernel-debug-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 3f58b1735560d76414a6b5a8a05bcf073411b5126b1033c1124f86908ea962de
kernel-debug-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 88b8c9369836bf00cb5d952295a2d11a44a6872f29a3bc26a4ace74d25cd9c1c
kernel-debug-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: f9a75f873122136dab18efd7e8d6ffb5f760546f83e40d6d757c83c208edb5ea
kernel-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 9223d041896e74d3036de2d27064cb7ff9651526d1dd969f425a77a953c6b2f1
kernel-debuginfo-common-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: d39fdda0e96a1599435706a288b3a868a5394bb81d475fb9b814535ab3be03d9
kernel-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: fa7e0676ee0cb963c5415c95b16d2fb7eb8f2b0e331f1111be6fae354d4deb9d
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: f3a75a82384d8073a823cd3abeef45dabadebf11acbf628510972748e97b9410
kernel-xen-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: d07ffbe66704e682b607dbe0d7d8eafa2bd0b3edc62ff663ac46e5120a16d438
kernel-xen-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: ab40fcc42ec64a09224d805904260b113a88480df9b5fc7316eb3e50308c7f48
kernel-xen-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 36c0a870fa473ab077f50ded670e9377500eec775883f16b243a9ff0be07d1c7
ia64
kernel-2.6.18-308.1.1.el5.ia64.rpm SHA-256: aec09ef956a8631ce8a052fe7c7dc1f69071235e01496433ea7df977236b8d1b
kernel-debug-2.6.18-308.1.1.el5.ia64.rpm SHA-256: 82eae8c607780c7a0476029c13d1a1a7132b9f769749959f478939ef58db7cc2
kernel-debug-debuginfo-2.6.18-308.1.1.el5.ia64.rpm SHA-256: d7a60006032008edd997b733446bf45fefc68f46f91c3e6b36598742a02d6e5e
kernel-debug-devel-2.6.18-308.1.1.el5.ia64.rpm SHA-256: 6535d89826246917824358339bd736f1bd678fb89effaca04f9ebbd0753c492c
kernel-debuginfo-2.6.18-308.1.1.el5.ia64.rpm SHA-256: f863a40ddb9d175647fa59c70ef466c44a28fb7b9a03b63ed3b953e26b41a585
kernel-debuginfo-common-2.6.18-308.1.1.el5.ia64.rpm SHA-256: cfea66ee5b6c1ee39d418add5dcb983128b314f6170a811f0bb6298dc6886ef6
kernel-devel-2.6.18-308.1.1.el5.ia64.rpm SHA-256: 4ae32fd8e80595f793c97c138293c633442186266450ec6d6ec6547fc2fa16ea
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.ia64.rpm SHA-256: e57edf5ffeeb31d2446d57811ea2c546c368ff72f35d59a04de0aa544b94ce6e
kernel-xen-2.6.18-308.1.1.el5.ia64.rpm SHA-256: d389f07888bff4405a0cf3bd44c54ec91ee20ab6261aa9eeaffc32083c1a48b4
kernel-xen-debuginfo-2.6.18-308.1.1.el5.ia64.rpm SHA-256: ef3e5be03e8c0a8d564e8272bcd3b77f2ffb5fa6034ed8add3f741f9002f3d17
kernel-xen-devel-2.6.18-308.1.1.el5.ia64.rpm SHA-256: a0149de0e9eac9da4950bf41b695486453186fd5328b0e6f054fc98e8144a8f5
i386
kernel-2.6.18-308.1.1.el5.i686.rpm SHA-256: b8367f33e671645cab54c657166df6d8c94effa056ef491aa3e602f4542cd5a7
kernel-PAE-2.6.18-308.1.1.el5.i686.rpm SHA-256: ac92e519cf462f4e6efc57e223b3c11b33294908f53a978ad5dc89f86f0c8025
kernel-PAE-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: 13b4b7c1a9899f00d88e231788239aeaeaeab59b19449f1d99bf718f4e68411d
kernel-PAE-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: 9b25d9c8f437c304bddccb700c201a180f4f3f5dedfe3ecc0b75c40ecd0702e1
kernel-debug-2.6.18-308.1.1.el5.i686.rpm SHA-256: 697d0f9b408fbfb0cb3b82983b40d99c0cd79eb9c9f10c35f509917b7ccc3b3c
kernel-debug-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: c643d79723c7dc518bc306822b8e7ca8a8549607a4ef2d470b4279516e0444bc
kernel-debug-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: ef9a3e03b9ed7bbab85e5a40d7e19b45bd2b9cd0a4244f9fce6762fed2ba109f
kernel-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: e644a29ee2a3fcb4c23dd88ba9436f5e0fbf148f1073be43541888c0dc035621
kernel-debuginfo-common-2.6.18-308.1.1.el5.i686.rpm SHA-256: b1b8e38663abee6ec6410150f79fda7fe2dbeed89f7a3616378aac17b6b8a437
kernel-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: ed47013197200b5d5d42253f6cc1c2f4f1831d2344a2bc33bf8ec16ab41bd4fa
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.i386.rpm SHA-256: 9a16083c13cb1fd0cd4fc2fdf4e0a0e4b13b45a549ddb7d2fd4dde8f382162c9
kernel-xen-2.6.18-308.1.1.el5.i686.rpm SHA-256: f337aeaea15a2d8b9263634f9772a90a5ea129ecf61a03b55994fc90b16447e0
kernel-xen-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: 5900c148cdfe17a3c6c3e0f9368fae665768c4d69f964954018b78a4c1234916
kernel-xen-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: eb7f45e0290fe4f70532dce0e1d13298789b54fa9483910b892c6a65f1b0897c

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-308.1.1.el5.src.rpm SHA-256: 306bbd49d16fe74b8c469ebff1093d95b54a74abfe136d53518e322815c01f19
x86_64
kernel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: e942a06a9d82d49c37974da3c581c80fdad52baaf0839d3dce9d24e0c1e6743a
kernel-debug-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 3f58b1735560d76414a6b5a8a05bcf073411b5126b1033c1124f86908ea962de
kernel-debug-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 88b8c9369836bf00cb5d952295a2d11a44a6872f29a3bc26a4ace74d25cd9c1c
kernel-debug-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: f9a75f873122136dab18efd7e8d6ffb5f760546f83e40d6d757c83c208edb5ea
kernel-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 9223d041896e74d3036de2d27064cb7ff9651526d1dd969f425a77a953c6b2f1
kernel-debuginfo-common-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: d39fdda0e96a1599435706a288b3a868a5394bb81d475fb9b814535ab3be03d9
kernel-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: fa7e0676ee0cb963c5415c95b16d2fb7eb8f2b0e331f1111be6fae354d4deb9d
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: f3a75a82384d8073a823cd3abeef45dabadebf11acbf628510972748e97b9410
kernel-xen-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: d07ffbe66704e682b607dbe0d7d8eafa2bd0b3edc62ff663ac46e5120a16d438
kernel-xen-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: ab40fcc42ec64a09224d805904260b113a88480df9b5fc7316eb3e50308c7f48
kernel-xen-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 36c0a870fa473ab077f50ded670e9377500eec775883f16b243a9ff0be07d1c7
i386
kernel-2.6.18-308.1.1.el5.i686.rpm SHA-256: b8367f33e671645cab54c657166df6d8c94effa056ef491aa3e602f4542cd5a7
kernel-PAE-2.6.18-308.1.1.el5.i686.rpm SHA-256: ac92e519cf462f4e6efc57e223b3c11b33294908f53a978ad5dc89f86f0c8025
kernel-PAE-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: 13b4b7c1a9899f00d88e231788239aeaeaeab59b19449f1d99bf718f4e68411d
kernel-PAE-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: 9b25d9c8f437c304bddccb700c201a180f4f3f5dedfe3ecc0b75c40ecd0702e1
kernel-debug-2.6.18-308.1.1.el5.i686.rpm SHA-256: 697d0f9b408fbfb0cb3b82983b40d99c0cd79eb9c9f10c35f509917b7ccc3b3c
kernel-debug-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: c643d79723c7dc518bc306822b8e7ca8a8549607a4ef2d470b4279516e0444bc
kernel-debug-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: ef9a3e03b9ed7bbab85e5a40d7e19b45bd2b9cd0a4244f9fce6762fed2ba109f
kernel-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: e644a29ee2a3fcb4c23dd88ba9436f5e0fbf148f1073be43541888c0dc035621
kernel-debuginfo-common-2.6.18-308.1.1.el5.i686.rpm SHA-256: b1b8e38663abee6ec6410150f79fda7fe2dbeed89f7a3616378aac17b6b8a437
kernel-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: ed47013197200b5d5d42253f6cc1c2f4f1831d2344a2bc33bf8ec16ab41bd4fa
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.i386.rpm SHA-256: 9a16083c13cb1fd0cd4fc2fdf4e0a0e4b13b45a549ddb7d2fd4dde8f382162c9
kernel-xen-2.6.18-308.1.1.el5.i686.rpm SHA-256: f337aeaea15a2d8b9263634f9772a90a5ea129ecf61a03b55994fc90b16447e0
kernel-xen-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: 5900c148cdfe17a3c6c3e0f9368fae665768c4d69f964954018b78a4c1234916
kernel-xen-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: eb7f45e0290fe4f70532dce0e1d13298789b54fa9483910b892c6a65f1b0897c

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-308.1.1.el5.src.rpm SHA-256: 306bbd49d16fe74b8c469ebff1093d95b54a74abfe136d53518e322815c01f19
x86_64
kernel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: e942a06a9d82d49c37974da3c581c80fdad52baaf0839d3dce9d24e0c1e6743a
kernel-debug-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 3f58b1735560d76414a6b5a8a05bcf073411b5126b1033c1124f86908ea962de
kernel-debug-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 88b8c9369836bf00cb5d952295a2d11a44a6872f29a3bc26a4ace74d25cd9c1c
kernel-debug-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: f9a75f873122136dab18efd7e8d6ffb5f760546f83e40d6d757c83c208edb5ea
kernel-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 9223d041896e74d3036de2d27064cb7ff9651526d1dd969f425a77a953c6b2f1
kernel-debuginfo-common-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: d39fdda0e96a1599435706a288b3a868a5394bb81d475fb9b814535ab3be03d9
kernel-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: fa7e0676ee0cb963c5415c95b16d2fb7eb8f2b0e331f1111be6fae354d4deb9d
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: f3a75a82384d8073a823cd3abeef45dabadebf11acbf628510972748e97b9410
kernel-xen-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: d07ffbe66704e682b607dbe0d7d8eafa2bd0b3edc62ff663ac46e5120a16d438
kernel-xen-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: ab40fcc42ec64a09224d805904260b113a88480df9b5fc7316eb3e50308c7f48
kernel-xen-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 36c0a870fa473ab077f50ded670e9377500eec775883f16b243a9ff0be07d1c7
i386
kernel-2.6.18-308.1.1.el5.i686.rpm SHA-256: b8367f33e671645cab54c657166df6d8c94effa056ef491aa3e602f4542cd5a7
kernel-PAE-2.6.18-308.1.1.el5.i686.rpm SHA-256: ac92e519cf462f4e6efc57e223b3c11b33294908f53a978ad5dc89f86f0c8025
kernel-PAE-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: 13b4b7c1a9899f00d88e231788239aeaeaeab59b19449f1d99bf718f4e68411d
kernel-PAE-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: 9b25d9c8f437c304bddccb700c201a180f4f3f5dedfe3ecc0b75c40ecd0702e1
kernel-debug-2.6.18-308.1.1.el5.i686.rpm SHA-256: 697d0f9b408fbfb0cb3b82983b40d99c0cd79eb9c9f10c35f509917b7ccc3b3c
kernel-debug-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: c643d79723c7dc518bc306822b8e7ca8a8549607a4ef2d470b4279516e0444bc
kernel-debug-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: ef9a3e03b9ed7bbab85e5a40d7e19b45bd2b9cd0a4244f9fce6762fed2ba109f
kernel-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: e644a29ee2a3fcb4c23dd88ba9436f5e0fbf148f1073be43541888c0dc035621
kernel-debuginfo-common-2.6.18-308.1.1.el5.i686.rpm SHA-256: b1b8e38663abee6ec6410150f79fda7fe2dbeed89f7a3616378aac17b6b8a437
kernel-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: ed47013197200b5d5d42253f6cc1c2f4f1831d2344a2bc33bf8ec16ab41bd4fa
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.i386.rpm SHA-256: 9a16083c13cb1fd0cd4fc2fdf4e0a0e4b13b45a549ddb7d2fd4dde8f382162c9
kernel-xen-2.6.18-308.1.1.el5.i686.rpm SHA-256: f337aeaea15a2d8b9263634f9772a90a5ea129ecf61a03b55994fc90b16447e0
kernel-xen-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: 5900c148cdfe17a3c6c3e0f9368fae665768c4d69f964954018b78a4c1234916
kernel-xen-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: eb7f45e0290fe4f70532dce0e1d13298789b54fa9483910b892c6a65f1b0897c

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-308.1.1.el5.src.rpm SHA-256: 306bbd49d16fe74b8c469ebff1093d95b54a74abfe136d53518e322815c01f19
s390x
kernel-2.6.18-308.1.1.el5.s390x.rpm SHA-256: ee5adf2bc92ae88656908f73b33de466355d3b7c41d65f49a258bd6a46dfa4d1
kernel-debug-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 78b456c8dae3e1bc289df53d4058bdf53f661e3183a153ae5b0fc7640500134f
kernel-debug-debuginfo-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 2f74d64b82a023328ed51db98d379e59f27218f26d57fda25368df0fc3426b1d
kernel-debug-devel-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 1f55fd236535dcc499a0a64aec0fefa717d2177652784400350f1c18ece064f7
kernel-debuginfo-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 05b5a50480431a98c1e24e32ac507e9dfaa9297893ddab813826ed3f0934b29e
kernel-debuginfo-common-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 957d08d8a6efa7e81ff6f17a06a2f628c39fd0a4a14302624244bc7579d22bcf
kernel-devel-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 3eb0f8c5f61f24a28b19c81ac560ee8cdaa1f150f9c104e308c86af6af3aa212
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.s390x.rpm SHA-256: f1182a094afe8c93efefdab68c6664be3d0bdafef81d5ac0ca0f8d36c7f159f7
kernel-kdump-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 0f8cf169542f7996e8396a4a46036cdae95394be26831a6dc17d5e4d2c46094f
kernel-kdump-debuginfo-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 70bd9f18603335d7cfeadb90162e0f3a7d72225971cf612194837e7e1fa03213
kernel-kdump-devel-2.6.18-308.1.1.el5.s390x.rpm SHA-256: 48a4c6b50cd5faf44704d4e7a908f5a3730ed4fe63464836871bfa0b1ccb5109

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-308.1.1.el5.src.rpm SHA-256: 306bbd49d16fe74b8c469ebff1093d95b54a74abfe136d53518e322815c01f19
ppc
kernel-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: 9e4881658ce0d978938fbe5357d25b5c07384e0db4984b08adb67115b1d8185b
kernel-debug-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: 2503fa895051e79b7db1844480b1f8d45979f4a9041abecac50c2518d00d40cb
kernel-debug-debuginfo-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: 5ab50944403a8df045ccd1cab7d2df92f2b568791eaff1bb01a1be1549dec799
kernel-debug-devel-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: 2a76cd011c30f623aaa3dec875b4856c1d4920286d911e123fe2e5c2ad5e9fdf
kernel-debuginfo-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: 2e23611ecdbd53cf415e770d50ebc700c23a70200ef02a6b5b6c592b1c3e4037
kernel-debuginfo-common-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: 57795284d85f388efca2c2094c7f48544fd4c6fbdced16352d06cc130ef47725
kernel-devel-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: 05e6a05ac3fb11748456b444d6d95df0d5cfffa7f92cadc5157ab30695b1ac61
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.ppc.rpm SHA-256: caffbea22d30f4b617b6ee99033b78f6ce3d1c7b0b301c31fb54080070130210
kernel-headers-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: a4cef2d8ac184279b14108fc9b815f2f516a75e0cb1410583551dd24e9408b38
kernel-kdump-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: 83e73b9fd068418365de457af857e3f3c0a210f8e66897a046969128a3964c7d
kernel-kdump-debuginfo-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: a054334f49b21129798e331d6c04f48e25f96ddc8659c9baedaa0f23b01e602c
kernel-kdump-devel-2.6.18-308.1.1.el5.ppc64.rpm SHA-256: f141d8f96b525e79d0d049cb5447b362519da04de5e4ae048bd5b110aeabc22b

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-308.1.1.el5.src.rpm SHA-256: 306bbd49d16fe74b8c469ebff1093d95b54a74abfe136d53518e322815c01f19
x86_64
kernel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: e942a06a9d82d49c37974da3c581c80fdad52baaf0839d3dce9d24e0c1e6743a
kernel-debug-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 3f58b1735560d76414a6b5a8a05bcf073411b5126b1033c1124f86908ea962de
kernel-debug-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 88b8c9369836bf00cb5d952295a2d11a44a6872f29a3bc26a4ace74d25cd9c1c
kernel-debug-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: f9a75f873122136dab18efd7e8d6ffb5f760546f83e40d6d757c83c208edb5ea
kernel-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 9223d041896e74d3036de2d27064cb7ff9651526d1dd969f425a77a953c6b2f1
kernel-debuginfo-common-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: d39fdda0e96a1599435706a288b3a868a5394bb81d475fb9b814535ab3be03d9
kernel-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: fa7e0676ee0cb963c5415c95b16d2fb7eb8f2b0e331f1111be6fae354d4deb9d
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: f3a75a82384d8073a823cd3abeef45dabadebf11acbf628510972748e97b9410
kernel-xen-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: d07ffbe66704e682b607dbe0d7d8eafa2bd0b3edc62ff663ac46e5120a16d438
kernel-xen-debuginfo-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: ab40fcc42ec64a09224d805904260b113a88480df9b5fc7316eb3e50308c7f48
kernel-xen-devel-2.6.18-308.1.1.el5.x86_64.rpm SHA-256: 36c0a870fa473ab077f50ded670e9377500eec775883f16b243a9ff0be07d1c7
i386
kernel-2.6.18-308.1.1.el5.i686.rpm SHA-256: b8367f33e671645cab54c657166df6d8c94effa056ef491aa3e602f4542cd5a7
kernel-PAE-2.6.18-308.1.1.el5.i686.rpm SHA-256: ac92e519cf462f4e6efc57e223b3c11b33294908f53a978ad5dc89f86f0c8025
kernel-PAE-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: 13b4b7c1a9899f00d88e231788239aeaeaeab59b19449f1d99bf718f4e68411d
kernel-PAE-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: 9b25d9c8f437c304bddccb700c201a180f4f3f5dedfe3ecc0b75c40ecd0702e1
kernel-debug-2.6.18-308.1.1.el5.i686.rpm SHA-256: 697d0f9b408fbfb0cb3b82983b40d99c0cd79eb9c9f10c35f509917b7ccc3b3c
kernel-debug-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: c643d79723c7dc518bc306822b8e7ca8a8549607a4ef2d470b4279516e0444bc
kernel-debug-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: ef9a3e03b9ed7bbab85e5a40d7e19b45bd2b9cd0a4244f9fce6762fed2ba109f
kernel-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: e644a29ee2a3fcb4c23dd88ba9436f5e0fbf148f1073be43541888c0dc035621
kernel-debuginfo-common-2.6.18-308.1.1.el5.i686.rpm SHA-256: b1b8e38663abee6ec6410150f79fda7fe2dbeed89f7a3616378aac17b6b8a437
kernel-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: ed47013197200b5d5d42253f6cc1c2f4f1831d2344a2bc33bf8ec16ab41bd4fa
kernel-doc-2.6.18-308.1.1.el5.noarch.rpm SHA-256: 00b7d28dabc6c49e02c89f0b720e48208abefeeb4536e0507f2d626e45394138
kernel-headers-2.6.18-308.1.1.el5.i386.rpm SHA-256: 9a16083c13cb1fd0cd4fc2fdf4e0a0e4b13b45a549ddb7d2fd4dde8f382162c9
kernel-xen-2.6.18-308.1.1.el5.i686.rpm SHA-256: f337aeaea15a2d8b9263634f9772a90a5ea129ecf61a03b55994fc90b16447e0
kernel-xen-debuginfo-2.6.18-308.1.1.el5.i686.rpm SHA-256: 5900c148cdfe17a3c6c3e0f9368fae665768c4d69f964954018b78a4c1234916
kernel-xen-devel-2.6.18-308.1.1.el5.i686.rpm SHA-256: eb7f45e0290fe4f70532dce0e1d13298789b54fa9483910b892c6a65f1b0897c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+