Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0519 - Security Advisory
Issued:
2008-06-25
Updated:
2008-06-25

RHSA-2008:0519 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix various security issues and a bug are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

  • A security flaw was found in the Linux kernel memory copy routines, when

running on certain AMD64 systems. If an unsuccessful attempt to copy kernel
memory from source to destination memory locations occurred, the copy
routines did not zero the content at the destination memory location. This
could allow a local unprivileged user to view potentially sensitive data.
(CVE-2008-2729, Important)

  • Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and

64-bit emulation. This could allow a local unprivileged user to prepare and
run a specially crafted binary, which would use this deficiency to leak
uninitialized and potentially sensitive data. (CVE-2008-0598, Important)

  • Brandon Edwards discovered a missing length validation check in the Linux

kernel DCCP module reconciliation feature. This could allow a local
unprivileged user to cause a heap overflow, gaining privileges for
arbitrary code execution. (CVE-2008-2358, Moderate)

As well, these updated packages fix the following bug:

  • Due to a regression, "gettimeofday" may have gone backwards on certain

x86 hardware. This issue was quite dangerous for time-sensitive systems,
such as those used for transaction systems and databases, and may have
caused applications to produce incorrect results, or even crash.

Red Hat Enterprise Linux 5 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 433938 - CVE-2008-0598 kernel: linux x86_64 ia32 emulation leaks uninitialized data
  • BZ - 447389 - CVE-2008-2358 kernel: dccp: sanity check feature length
  • BZ - 451271 - CVE-2008-2729 kernel: [x86_64] The string instruction version didn't zero the output on exception.

CVEs

  • CVE-2008-2729
  • CVE-2008-0598
  • CVE-2008-2358

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-92.1.6.el5.src.rpm SHA-256: 2bf2b3b82cd407e964e0edaa363dbe26a80c2109c68c8017108cc4eb55cd1bd5
x86_64
kernel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: cd0046070a05ac9b994d72182ded72ab1581ff329223915b9288dae78041ee25
kernel-debug-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 67d6477ae9dd460145caaa21053818dd86c16fc23862ff2b247832a7eeffe769
kernel-debug-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 154213fc0dbb3e0ddebd55450f3bd1f3b1903d0d1150730a61769ca566ffb39b
kernel-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: c55cc1e09525ab9cd8c4771ff96c1a7f93c1404f0bc4c59dfc31ef0dbc362d0f
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 7e098d16bec76b7a0f53f88ec268d4b231ccbd01f78ea82a3ca68b9d65bf9e92
kernel-xen-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 0ea2ec05f3f15b26c1a58da6022de9caf9c2b66d773174db77e015c003fa1260
kernel-xen-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 7edb87b0aa373499c6ed07104223668ac854bb737ba7cd014562659795e724fc
ia64
kernel-2.6.18-92.1.6.el5.ia64.rpm SHA-256: b526824177885c59f58ca7a942bff87c576be35208857ede1cb60fa803eb61b5
kernel-debug-2.6.18-92.1.6.el5.ia64.rpm SHA-256: 35cf678948fa5d507cd71fe1c47cd9ba6ab670eea44cd2f393eca918fc0c9352
kernel-debug-devel-2.6.18-92.1.6.el5.ia64.rpm SHA-256: c7511e095d69c38cbccf1c0c313a07cffa50cf5da714e7ab38b338fe0a37940a
kernel-devel-2.6.18-92.1.6.el5.ia64.rpm SHA-256: 04030ebee48b9979f6a296c11bee0f45930c5c5509e607e50151af8bd7205667
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.ia64.rpm SHA-256: 4740817b29ac14d9cd8a7420f1b152161a91b38c1925f6bc114407a4209075a9
kernel-xen-2.6.18-92.1.6.el5.ia64.rpm SHA-256: 447dfaa20acb8b166ec205d51b722fe33352207cca5b756f466d8c7f5bc1d9bd
kernel-xen-devel-2.6.18-92.1.6.el5.ia64.rpm SHA-256: d853e65c6a16d36ffd9e91bb802f2067f97fd3e78896854cb66a4309044139bc
i386
kernel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 61075a125e13b86425afaadc03a2e6b080c17a6c0cabd20da278fb7b79b10a3e
kernel-PAE-2.6.18-92.1.6.el5.i686.rpm SHA-256: 66be9ede2988c71f88d57e56564698208969ee4c09ed98aea783e667400db103
kernel-PAE-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 7008c0e8f91b67c367ee2be516e04737cddca7fbb41a82220cc940fb8b0f6e19
kernel-debug-2.6.18-92.1.6.el5.i686.rpm SHA-256: e49a314b36d625435e0c71b4a371b0f67392c406f1a6a2cce1cc017d07b70283
kernel-debug-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 984dc495fdd513b4f737fd189f7f0ae00318709980b6d2c4eb8d7914cbc2a978
kernel-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: a7eba0cce2b00e8f508146cec34e57ddf3eb4a2ab760349dbb942d8519256bfe
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.i386.rpm SHA-256: d333bc4ae3a80e7480843b862be99b828f35ac01a334a7d4383d790afe0690ea
kernel-xen-2.6.18-92.1.6.el5.i686.rpm SHA-256: 9073bf8a1c0f113967e027b069cdb45b1dd89abd3eaa2dfa4c7df03a69cbcb67
kernel-xen-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: ad546d46e8630cc021dbc77d864551bf5919caa42087ff76ce95c025567b2e65

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-92.1.6.el5.src.rpm SHA-256: 2bf2b3b82cd407e964e0edaa363dbe26a80c2109c68c8017108cc4eb55cd1bd5
x86_64
kernel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: cd0046070a05ac9b994d72182ded72ab1581ff329223915b9288dae78041ee25
kernel-debug-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 67d6477ae9dd460145caaa21053818dd86c16fc23862ff2b247832a7eeffe769
kernel-debug-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 154213fc0dbb3e0ddebd55450f3bd1f3b1903d0d1150730a61769ca566ffb39b
kernel-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: c55cc1e09525ab9cd8c4771ff96c1a7f93c1404f0bc4c59dfc31ef0dbc362d0f
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 7e098d16bec76b7a0f53f88ec268d4b231ccbd01f78ea82a3ca68b9d65bf9e92
kernel-xen-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 0ea2ec05f3f15b26c1a58da6022de9caf9c2b66d773174db77e015c003fa1260
kernel-xen-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 7edb87b0aa373499c6ed07104223668ac854bb737ba7cd014562659795e724fc
i386
kernel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 61075a125e13b86425afaadc03a2e6b080c17a6c0cabd20da278fb7b79b10a3e
kernel-PAE-2.6.18-92.1.6.el5.i686.rpm SHA-256: 66be9ede2988c71f88d57e56564698208969ee4c09ed98aea783e667400db103
kernel-PAE-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 7008c0e8f91b67c367ee2be516e04737cddca7fbb41a82220cc940fb8b0f6e19
kernel-debug-2.6.18-92.1.6.el5.i686.rpm SHA-256: e49a314b36d625435e0c71b4a371b0f67392c406f1a6a2cce1cc017d07b70283
kernel-debug-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 984dc495fdd513b4f737fd189f7f0ae00318709980b6d2c4eb8d7914cbc2a978
kernel-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: a7eba0cce2b00e8f508146cec34e57ddf3eb4a2ab760349dbb942d8519256bfe
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.i386.rpm SHA-256: d333bc4ae3a80e7480843b862be99b828f35ac01a334a7d4383d790afe0690ea
kernel-xen-2.6.18-92.1.6.el5.i686.rpm SHA-256: 9073bf8a1c0f113967e027b069cdb45b1dd89abd3eaa2dfa4c7df03a69cbcb67
kernel-xen-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: ad546d46e8630cc021dbc77d864551bf5919caa42087ff76ce95c025567b2e65

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-92.1.6.el5.src.rpm SHA-256: 2bf2b3b82cd407e964e0edaa363dbe26a80c2109c68c8017108cc4eb55cd1bd5
x86_64
kernel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: cd0046070a05ac9b994d72182ded72ab1581ff329223915b9288dae78041ee25
kernel-debug-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 67d6477ae9dd460145caaa21053818dd86c16fc23862ff2b247832a7eeffe769
kernel-debug-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 154213fc0dbb3e0ddebd55450f3bd1f3b1903d0d1150730a61769ca566ffb39b
kernel-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: c55cc1e09525ab9cd8c4771ff96c1a7f93c1404f0bc4c59dfc31ef0dbc362d0f
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 7e098d16bec76b7a0f53f88ec268d4b231ccbd01f78ea82a3ca68b9d65bf9e92
kernel-xen-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 0ea2ec05f3f15b26c1a58da6022de9caf9c2b66d773174db77e015c003fa1260
kernel-xen-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 7edb87b0aa373499c6ed07104223668ac854bb737ba7cd014562659795e724fc
i386
kernel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 61075a125e13b86425afaadc03a2e6b080c17a6c0cabd20da278fb7b79b10a3e
kernel-PAE-2.6.18-92.1.6.el5.i686.rpm SHA-256: 66be9ede2988c71f88d57e56564698208969ee4c09ed98aea783e667400db103
kernel-PAE-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 7008c0e8f91b67c367ee2be516e04737cddca7fbb41a82220cc940fb8b0f6e19
kernel-debug-2.6.18-92.1.6.el5.i686.rpm SHA-256: e49a314b36d625435e0c71b4a371b0f67392c406f1a6a2cce1cc017d07b70283
kernel-debug-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 984dc495fdd513b4f737fd189f7f0ae00318709980b6d2c4eb8d7914cbc2a978
kernel-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: a7eba0cce2b00e8f508146cec34e57ddf3eb4a2ab760349dbb942d8519256bfe
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.i386.rpm SHA-256: d333bc4ae3a80e7480843b862be99b828f35ac01a334a7d4383d790afe0690ea
kernel-xen-2.6.18-92.1.6.el5.i686.rpm SHA-256: 9073bf8a1c0f113967e027b069cdb45b1dd89abd3eaa2dfa4c7df03a69cbcb67
kernel-xen-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: ad546d46e8630cc021dbc77d864551bf5919caa42087ff76ce95c025567b2e65

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-92.1.6.el5.src.rpm SHA-256: 2bf2b3b82cd407e964e0edaa363dbe26a80c2109c68c8017108cc4eb55cd1bd5
s390x
kernel-2.6.18-92.1.6.el5.s390x.rpm SHA-256: 7c776e055a839b8e1cb4807e7a2fdcacd943c6de0369ef77690489e1389472d3
kernel-debug-2.6.18-92.1.6.el5.s390x.rpm SHA-256: 44b73545d87ad44677647d8efe960ca9738acd223ed4f3a349691e45a1fea7be
kernel-debug-devel-2.6.18-92.1.6.el5.s390x.rpm SHA-256: 327fba4d31033b694ef79201584374f72d7782843276b2a3fa2363fef3bb4f95
kernel-devel-2.6.18-92.1.6.el5.s390x.rpm SHA-256: 6e2b70f9790bc8a41e26d7ea0e024af3c3508c66dcc397ce27830e8492e46b0e
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.s390x.rpm SHA-256: fb1959ec190c8ebad118670f9b60e3e9dbbd908244a9e818c289f7ed1e06d7db
kernel-kdump-2.6.18-92.1.6.el5.s390x.rpm SHA-256: 0b7ec3c80790f169e9a7357953d8098f241f8b373786184d7531359ab111dcb6
kernel-kdump-devel-2.6.18-92.1.6.el5.s390x.rpm SHA-256: 78f2cfeb79306df9c0e50f1a3e408e4718831d13fb18e99a4fee1afa566f9648

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-92.1.6.el5.src.rpm SHA-256: 2bf2b3b82cd407e964e0edaa363dbe26a80c2109c68c8017108cc4eb55cd1bd5
ppc
kernel-2.6.18-92.1.6.el5.ppc64.rpm SHA-256: 11a8b5a305c361a033ff9221fcaf5159bd943951735830575958a1fd9adcea19
kernel-debug-2.6.18-92.1.6.el5.ppc64.rpm SHA-256: 1abde03f9433c03e1bbdd5452af7e93507e8c29e51e785aca2d3d88d8a5bf5cc
kernel-debug-devel-2.6.18-92.1.6.el5.ppc64.rpm SHA-256: e08b08664dcb04b76bf87c305608968fa0de72254bbf934d73d152d039efb9a0
kernel-devel-2.6.18-92.1.6.el5.ppc64.rpm SHA-256: c6bc67091864afe595d96c588b11b3420b53ffd43fc29110171d1a6470c2d509
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.ppc.rpm SHA-256: cf0193c48c37699ffb4fad13dacff341ba72cf165a6c1aeb772fec6d63c052c8
kernel-headers-2.6.18-92.1.6.el5.ppc64.rpm SHA-256: 39a468a10e24cf5e32cb01b5f2e0b8735e7c8798f7fefd122ffa58f7e984f978
kernel-kdump-2.6.18-92.1.6.el5.ppc64.rpm SHA-256: fddeff0f9c2b72e6339fcf55012fc99673434ee928e1c2dda145b4aafd87cec1
kernel-kdump-devel-2.6.18-92.1.6.el5.ppc64.rpm SHA-256: 48d8663c14aa671bbd9eeb64106833108898c2950da6507f5f7e1b7ec28aec91

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-92.1.6.el5.src.rpm SHA-256: 2bf2b3b82cd407e964e0edaa363dbe26a80c2109c68c8017108cc4eb55cd1bd5
x86_64
kernel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: cd0046070a05ac9b994d72182ded72ab1581ff329223915b9288dae78041ee25
kernel-debug-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 67d6477ae9dd460145caaa21053818dd86c16fc23862ff2b247832a7eeffe769
kernel-debug-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 154213fc0dbb3e0ddebd55450f3bd1f3b1903d0d1150730a61769ca566ffb39b
kernel-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: c55cc1e09525ab9cd8c4771ff96c1a7f93c1404f0bc4c59dfc31ef0dbc362d0f
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 7e098d16bec76b7a0f53f88ec268d4b231ccbd01f78ea82a3ca68b9d65bf9e92
kernel-xen-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 0ea2ec05f3f15b26c1a58da6022de9caf9c2b66d773174db77e015c003fa1260
kernel-xen-devel-2.6.18-92.1.6.el5.x86_64.rpm SHA-256: 7edb87b0aa373499c6ed07104223668ac854bb737ba7cd014562659795e724fc
i386
kernel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 61075a125e13b86425afaadc03a2e6b080c17a6c0cabd20da278fb7b79b10a3e
kernel-PAE-2.6.18-92.1.6.el5.i686.rpm SHA-256: 66be9ede2988c71f88d57e56564698208969ee4c09ed98aea783e667400db103
kernel-PAE-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 7008c0e8f91b67c367ee2be516e04737cddca7fbb41a82220cc940fb8b0f6e19
kernel-debug-2.6.18-92.1.6.el5.i686.rpm SHA-256: e49a314b36d625435e0c71b4a371b0f67392c406f1a6a2cce1cc017d07b70283
kernel-debug-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: 984dc495fdd513b4f737fd189f7f0ae00318709980b6d2c4eb8d7914cbc2a978
kernel-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: a7eba0cce2b00e8f508146cec34e57ddf3eb4a2ab760349dbb942d8519256bfe
kernel-doc-2.6.18-92.1.6.el5.noarch.rpm SHA-256: dc15292a149d673b8c124c79112c19fc8bdde46ad5812d5d9c840b610c0d76bd
kernel-headers-2.6.18-92.1.6.el5.i386.rpm SHA-256: d333bc4ae3a80e7480843b862be99b828f35ac01a334a7d4383d790afe0690ea
kernel-xen-2.6.18-92.1.6.el5.i686.rpm SHA-256: 9073bf8a1c0f113967e027b069cdb45b1dd89abd3eaa2dfa4c7df03a69cbcb67
kernel-xen-devel-2.6.18-92.1.6.el5.i686.rpm SHA-256: ad546d46e8630cc021dbc77d864551bf5919caa42087ff76ce95c025567b2e65

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility