Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0957 - Security Advisory
Issued:
2008-11-04
Updated:
2008-11-12

RHSA-2008:0957 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that resolve several security issues and fix
various bugs are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

[Updated 12th November 2008]
The original packages distributed with this errata had a bug which
prevented the Xen kernel booting on older hardware. We have updated the
packages to correct this bug.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • the Xen implementation did not prevent applications running in a

para-virtualized guest from modifying CR4 TSC. This could cause a local
denial of service. (CVE-2007-5907, Important)

  • Tavis Ormandy reported missing boundary checks in the Virtual Dynamic

Shared Objects (vDSO) implementation. This could allow a local unprivileged
user to cause a denial of service or escalate privileges. (CVE-2008-3527,
Important)

  • the do_truncate() and generic_file_splice_write() functions did not clear

the setuid and setgid bits. This could allow a local unprivileged user to
obtain access to privileged information. (CVE-2008-4210, CVE-2008-3833,
Important)

  • a flaw was found in the Linux kernel splice implementation. This could

cause a local denial of service when there is a certain failure in the
add_to_page_cache_lru() function. (CVE-2008-4302, Important)

  • a flaw was found in the Linux kernel when running on AMD64 systems.

During a context switch, EFLAGS were being neither saved nor restored. This
could allow a local unprivileged user to cause a denial of service.
(CVE-2006-5755, Low)

  • a flaw was found in the Linux kernel virtual memory implementation. This

could allow a local unprivileged user to cause a denial of service.
(CVE-2008-2372, Low)

  • an integer overflow was discovered in the Linux kernel Datagram

Congestion Control Protocol (DCCP) implementation. This could allow a
remote attacker to cause a denial of service. By default, remote DCCP is
blocked by SELinux. (CVE-2008-3276, Low)

In addition, these updated packages fix the following bugs:

  • random32() seeding has been improved.
  • in a multi-core environment, a race between the QP async event-handler

and the destro_qp() function could occur. This led to unpredictable results
during invalid memory access, which could lead to a kernel crash.

  • a format string was omitted in the call to the request_module() function.
  • a stack overflow caused by an infinite recursion bug in the binfmt_misc

kernel module was corrected.

  • the ata_scsi_rbuf_get() and ata_scsi_rbuf_put() functions now check for

scatterlist usage before calling kmap_atomic().

  • a sentinel NUL byte was added to the device_write() function to ensure

that lspace.name is NUL-terminated.

  • in the character device driver, a range_is_allowed() check was added to

the read_mem() and write_mem() functions. It was possible for an
illegitimate application to bypass these checks, and access /dev/mem beyond
the 1M limit by calling mmap_mem() instead. Also, the parameters of
range_is_allowed() were changed to cleanly handle greater than 32-bits of
physical address on 32-bit architectures.

  • some of the newer Nehalem-based systems declare their CPU DSDT entries as

type "Alias". During boot, this caused an "Error attaching device data"
message to be logged.

  • the evtchn event channel device lacked locks and memory barriers. This

has led to xenstore becoming unresponsive on the Itanium(r) architecture.

  • sending of gratuitous ARP packets in the Xen frontend network driver is

now delayed until the backend signals that its carrier status has been
processed by the stack.

  • on forcedeth devices, whenever setting ethtool parameters for link speed,

the device could stop receiving interrupts.

  • the CIFS 'forcedirectio' option did not allow text to be appended to files.
  • the gettimeofday() function returned a backwards time on Intel(r) 64.
  • residual-count corrections during UNDERRUN handling were added to the

qla2xxx driver.

  • the fix for a small quirk was removed for certain Adaptec controllers for

which it caused problems.

  • the "xm trigger init" command caused a domain panic if a userland

application was running on a guest on the Intel(r) 64 architecture.

Users of kernel should upgrade to these updated packages, which contain
backported patches to correct these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 377561 - CVE-2007-5907 kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible)
  • BZ - 452666 - CVE-2008-2372 kernel: Reinstate ZERO_PAGE optimization in 'get_user_pages()' and fix XIP
  • BZ - 457718 - CVE-2006-5755 kernel: local denial of service due to NT bit leakage
  • BZ - 458021 - kernel: random32: seeding improvement [rhel-5.2.z]
  • BZ - 458759 - kernel: dlm: dlm/user.c input validation fixes [rhel-5.2.z]
  • BZ - 458781 - LTC44618-Race possibility between QP async handler and destroy_qp()
  • BZ - 459226 - CVE-2008-3276 Linux kernel dccp_setsockopt_change() integer overflow
  • BZ - 459461 - kernel: cpufreq: fix format string bug [rhel-5.2.z]
  • BZ - 459464 - kernel: binfmt_misc.c: avoid potential kernel stack overflow [rhel-5.2.z]
  • BZ - 460251 - CVE-2008-3527 kernel: missing boundary checks in syscall/syscall32_nopage()
  • BZ - 460638 - [REG][5.3] The system crashed by the NULL pointer access with kmap_atomic() of ata_scsi_rbuf_get().
  • BZ - 460858 - kernel: devmem: add range_is_allowed() check to mmap_mem() [rhel-5.2.z]
  • BZ - 460868 - RHEL5.2 ACPI core bug
  • BZ - 461099 - evtchn device lacks lock and barriers
  • BZ - 461457 - Coordinate gratuitous ARP with backend network status
  • BZ - 461894 - nVidia MCP55 MCP55 Ethernet (rev a3) not functional on kernel 2.6.18-53.1.4
  • BZ - 462434 - CVE-2008-4302 kernel: splice: fix bad unlock_page() in error case
  • BZ - 462591 - CIFS option forcedirectio fails to allow the appending of text to files.
  • BZ - 462860 - RHEL5.3: Fix time of gettimeofday() going backward (EM64T) (*)
  • BZ - 463661 - CVE-2008-4210 kernel: open() call allows setgid bit when user is not in new file's group
  • BZ - 464450 - CVE-2008-3833 kernel: remove SUID when splicing into an inode
  • BZ - 465741 - [QLogic 5.2.z bug] qla2xxx - Additional residual-count corrections during UNDERRUN handling.
  • BZ - 466427 - Significant regression in time() performance
  • BZ - 466885 - [aacraid 5.2.z] aac_srb: aac_fib_send failed with status 8195
  • BZ - 467105 - xm trigger <domain> init causes kernel panic.

CVEs

  • CVE-2008-2372
  • CVE-2008-3276
  • CVE-2008-4302
  • CVE-2006-5755
  • CVE-2008-4210
  • CVE-2007-5907
  • CVE-2008-3527
  • CVE-2008-3833

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-92.1.17.el5.src.rpm SHA-256: be2fbf71c3669c397692a4c6a992d622679a316c4490d7c617443be9b424b240
kernel-2.6.18-92.1.18.el5.src.rpm SHA-256: 959941aef25935dc551d4c19919dabd1a4af368f2ac2b493b5b07ff18227dc9d
x86_64
kernel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: fd38b85aa4b2839aff72aac1d78dd95cf9acadda85ffb5a50ac4ef9cabf0c27b
kernel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 1fca590f1e285fb75b8709fa12f6af705bbd470c7bdc1c32ac44c155106a7ff0
kernel-debug-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: 9a4ffb38ebefc7589eeae4237b1840fc67dccf8dce758e9b415b58cdca9b367a
kernel-debug-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: a99631ffcdb4ad282d0300da04283c078b898b8c5f30b92cd0b56f409d296c11
kernel-debug-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: b4c4e53c3cc88311ac0d1c8c15ecc1711d19142714ed7aab6fea11545b1f3578
kernel-debug-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 6b3cee3d45ef5b28b95757e3f364cf1d3bae46f1c9443e9d4514841ae3ae800b
kernel-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: c43275b0a53b396b24ae3cc88c8de6d72695835369c5b6baa35e8bcae6bf1461
kernel-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: c9dbbc4315ecdbe67ff8ec4fb0044fcd02b3dc4f5d11b608312e9eb5d01d920f
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: d71740a831109734ab005ab0ed02b4eeef7bc5f139c97d9b82b64c451ceea08a
kernel-headers-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 9878eb0013a49963a363367e95e6741f071b5441b22086c6567e0cefe20a0575
kernel-xen-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: d3abb78719f7cd55be29eba7c1331ce027bf8d846a8accbafdc129b6641996a6
kernel-xen-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: f1392ddffb4cf437fcfa685a59521bba09cd4b930ed22810794241174e94a4f0
kernel-xen-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: 8184e1ab6fb0f1570804667b1ca2f1c372ba2ebcca4f104625ecd97c80d871d1
kernel-xen-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 30e402c2fddeabf95cea03dc1fea5bcbc9ceffc48101ef3a069d6d932bf22149
ia64
kernel-2.6.18-92.1.17.el5.ia64.rpm SHA-256: 613596958b52ac11bcb557e2705aaa89168245fe272dd7620d61de74504fa591
kernel-2.6.18-92.1.18.el5.ia64.rpm SHA-256: 6ba71383cb2b6511136753701b70d1f861a70878064dc93fd63f0ff0dbb8f41b
kernel-debug-2.6.18-92.1.17.el5.ia64.rpm SHA-256: 5caf45ed0011148e8e76964eecedd6ae55ee47ace0bfe4c20d0754b0237244b2
kernel-debug-2.6.18-92.1.18.el5.ia64.rpm SHA-256: eddb7706d43802aed1b377c0b9e7f984e2ef05a78ad89acd343809c5376e66cb
kernel-debug-devel-2.6.18-92.1.17.el5.ia64.rpm SHA-256: c630674f084bae9fca3122460291529a804badbf3a5a6e4c2a1efb1e2e00a8a3
kernel-debug-devel-2.6.18-92.1.18.el5.ia64.rpm SHA-256: f159e7ccd58211cfc9b841d70f4a1ce31fd5467171631907e7f2ad31d40819e8
kernel-devel-2.6.18-92.1.17.el5.ia64.rpm SHA-256: 2090c4b2a3cf576e9b2ffed4d522cf66323f117e9da7b80f5889e952556f11f8
kernel-devel-2.6.18-92.1.18.el5.ia64.rpm SHA-256: e500083554b43b75bbcc73243299aebfe6cd63e724b4ea84df35f06914e5a985
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.ia64.rpm SHA-256: 0fb9a5325a5f7555aabc13e1d1f0300f65624f1cb3d8fb06b18752c1c78e60d9
kernel-headers-2.6.18-92.1.18.el5.ia64.rpm SHA-256: 06d3a26579df5651fbfad851c75c1f7f539720485ec215f4268fb719c94d44d3
kernel-xen-2.6.18-92.1.17.el5.ia64.rpm SHA-256: 5054e1de87711d8c920d4b7c044acc26a8dc993838376c1dc64534508c5f3339
kernel-xen-2.6.18-92.1.18.el5.ia64.rpm SHA-256: 2e7a24773d4b624311bd7fe8c192b6cfaa4de34df485ba350892e12ab1a5a01f
kernel-xen-devel-2.6.18-92.1.17.el5.ia64.rpm SHA-256: 21a1a8761d17c5802e0d3f8dc1baa7a8264b1be325a66dfdbb66029ce113a2d8
kernel-xen-devel-2.6.18-92.1.18.el5.ia64.rpm SHA-256: 76b86c2521d0f5f05f1550190f44e184e997231676fa010d32bb10df43c4b4fb
i386
kernel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 8139a96275bae5c5d6933fe04e8ee8df1a28dd572821764699cc78fbe492c4b2
kernel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 5026061e2f76eb88b2e5e159cf94bca4f5f960cd39715f3b268b5dac7503d8f3
kernel-PAE-2.6.18-92.1.17.el5.i686.rpm SHA-256: 7907b1ee70ba20768fa8a66480b38767e818dd171329b94b5ffcc0036d35494c
kernel-PAE-2.6.18-92.1.18.el5.i686.rpm SHA-256: a5d8ac792cc7e891c62fb8315794439ad1f1aba3e5e4d0421fcd4deb3312ee14
kernel-PAE-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: ba1df45891720ff4be741f02b643dbb40cb634a20792c7f88a2c31bb324bf0c7
kernel-PAE-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: a09ad2fe010d32798901a601875c75b7ac295fd91f51ab159714c27f9c64cfcf
kernel-debug-2.6.18-92.1.17.el5.i686.rpm SHA-256: ee6581e7b247c5f3363d506b37ba028512d3f86b054b913bfdfa91e0ba427fbf
kernel-debug-2.6.18-92.1.18.el5.i686.rpm SHA-256: f365a0ca09938e1a29c4e6cc35bc208047b88dfa894a5a3929ac9f94921a0d09
kernel-debug-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 9196c5cab8abb917be8ad700b635f7bae9621fc525636119913648223f1bc1de
kernel-debug-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 575487af482333e11cb9e9bf6f7d046e72b857ce8dcd13aaf4e3e5fbb90b1794
kernel-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 07981437310a8776a50a4c87e294e474b2df178b413b8c1588439e3c7a9bd5e9
kernel-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: f578b9503c365e71a1d039b1d0df6a7d50bc1dddcdd0cad5c63852caf873e2fd
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.i386.rpm SHA-256: eaa72d1726a2ecdf0ca802041e3e536508b01d625a7fd167d728cf92a3c29cb3
kernel-headers-2.6.18-92.1.18.el5.i386.rpm SHA-256: a4ac978ae493c12826f20a3d1e38bc00443dd38ca56f7c8c3726957bb0bd8a9d
kernel-xen-2.6.18-92.1.17.el5.i686.rpm SHA-256: df0aff9d9aa11277f73d0698574befb8f9ddf9b54d976640a18427cf039bccb4
kernel-xen-2.6.18-92.1.18.el5.i686.rpm SHA-256: 1d521ae1391d3407d5d8de634434c41e5e531b0c3b717340327854dd81347a29
kernel-xen-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 0e9b95c3069470910d9118c854104c9ca34ef2d814541dc17da51dfbf781d3d0
kernel-xen-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 9b50af57e53551c053e0105b0f540108de18b090d85156b690120ea38ffef5c8

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-92.1.17.el5.src.rpm SHA-256: be2fbf71c3669c397692a4c6a992d622679a316c4490d7c617443be9b424b240
kernel-2.6.18-92.1.18.el5.src.rpm SHA-256: 959941aef25935dc551d4c19919dabd1a4af368f2ac2b493b5b07ff18227dc9d
x86_64
kernel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: fd38b85aa4b2839aff72aac1d78dd95cf9acadda85ffb5a50ac4ef9cabf0c27b
kernel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 1fca590f1e285fb75b8709fa12f6af705bbd470c7bdc1c32ac44c155106a7ff0
kernel-debug-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: 9a4ffb38ebefc7589eeae4237b1840fc67dccf8dce758e9b415b58cdca9b367a
kernel-debug-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: a99631ffcdb4ad282d0300da04283c078b898b8c5f30b92cd0b56f409d296c11
kernel-debug-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: b4c4e53c3cc88311ac0d1c8c15ecc1711d19142714ed7aab6fea11545b1f3578
kernel-debug-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 6b3cee3d45ef5b28b95757e3f364cf1d3bae46f1c9443e9d4514841ae3ae800b
kernel-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: c43275b0a53b396b24ae3cc88c8de6d72695835369c5b6baa35e8bcae6bf1461
kernel-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: c9dbbc4315ecdbe67ff8ec4fb0044fcd02b3dc4f5d11b608312e9eb5d01d920f
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: d71740a831109734ab005ab0ed02b4eeef7bc5f139c97d9b82b64c451ceea08a
kernel-headers-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 9878eb0013a49963a363367e95e6741f071b5441b22086c6567e0cefe20a0575
kernel-xen-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: d3abb78719f7cd55be29eba7c1331ce027bf8d846a8accbafdc129b6641996a6
kernel-xen-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: f1392ddffb4cf437fcfa685a59521bba09cd4b930ed22810794241174e94a4f0
kernel-xen-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: 8184e1ab6fb0f1570804667b1ca2f1c372ba2ebcca4f104625ecd97c80d871d1
kernel-xen-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 30e402c2fddeabf95cea03dc1fea5bcbc9ceffc48101ef3a069d6d932bf22149
i386
kernel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 8139a96275bae5c5d6933fe04e8ee8df1a28dd572821764699cc78fbe492c4b2
kernel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 5026061e2f76eb88b2e5e159cf94bca4f5f960cd39715f3b268b5dac7503d8f3
kernel-PAE-2.6.18-92.1.17.el5.i686.rpm SHA-256: 7907b1ee70ba20768fa8a66480b38767e818dd171329b94b5ffcc0036d35494c
kernel-PAE-2.6.18-92.1.18.el5.i686.rpm SHA-256: a5d8ac792cc7e891c62fb8315794439ad1f1aba3e5e4d0421fcd4deb3312ee14
kernel-PAE-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: ba1df45891720ff4be741f02b643dbb40cb634a20792c7f88a2c31bb324bf0c7
kernel-PAE-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: a09ad2fe010d32798901a601875c75b7ac295fd91f51ab159714c27f9c64cfcf
kernel-debug-2.6.18-92.1.17.el5.i686.rpm SHA-256: ee6581e7b247c5f3363d506b37ba028512d3f86b054b913bfdfa91e0ba427fbf
kernel-debug-2.6.18-92.1.18.el5.i686.rpm SHA-256: f365a0ca09938e1a29c4e6cc35bc208047b88dfa894a5a3929ac9f94921a0d09
kernel-debug-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 9196c5cab8abb917be8ad700b635f7bae9621fc525636119913648223f1bc1de
kernel-debug-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 575487af482333e11cb9e9bf6f7d046e72b857ce8dcd13aaf4e3e5fbb90b1794
kernel-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 07981437310a8776a50a4c87e294e474b2df178b413b8c1588439e3c7a9bd5e9
kernel-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: f578b9503c365e71a1d039b1d0df6a7d50bc1dddcdd0cad5c63852caf873e2fd
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.i386.rpm SHA-256: eaa72d1726a2ecdf0ca802041e3e536508b01d625a7fd167d728cf92a3c29cb3
kernel-headers-2.6.18-92.1.18.el5.i386.rpm SHA-256: a4ac978ae493c12826f20a3d1e38bc00443dd38ca56f7c8c3726957bb0bd8a9d
kernel-xen-2.6.18-92.1.17.el5.i686.rpm SHA-256: df0aff9d9aa11277f73d0698574befb8f9ddf9b54d976640a18427cf039bccb4
kernel-xen-2.6.18-92.1.18.el5.i686.rpm SHA-256: 1d521ae1391d3407d5d8de634434c41e5e531b0c3b717340327854dd81347a29
kernel-xen-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 0e9b95c3069470910d9118c854104c9ca34ef2d814541dc17da51dfbf781d3d0
kernel-xen-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 9b50af57e53551c053e0105b0f540108de18b090d85156b690120ea38ffef5c8

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-92.1.17.el5.src.rpm SHA-256: be2fbf71c3669c397692a4c6a992d622679a316c4490d7c617443be9b424b240
kernel-2.6.18-92.1.18.el5.src.rpm SHA-256: 959941aef25935dc551d4c19919dabd1a4af368f2ac2b493b5b07ff18227dc9d
x86_64
kernel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: fd38b85aa4b2839aff72aac1d78dd95cf9acadda85ffb5a50ac4ef9cabf0c27b
kernel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 1fca590f1e285fb75b8709fa12f6af705bbd470c7bdc1c32ac44c155106a7ff0
kernel-debug-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: 9a4ffb38ebefc7589eeae4237b1840fc67dccf8dce758e9b415b58cdca9b367a
kernel-debug-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: a99631ffcdb4ad282d0300da04283c078b898b8c5f30b92cd0b56f409d296c11
kernel-debug-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: b4c4e53c3cc88311ac0d1c8c15ecc1711d19142714ed7aab6fea11545b1f3578
kernel-debug-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 6b3cee3d45ef5b28b95757e3f364cf1d3bae46f1c9443e9d4514841ae3ae800b
kernel-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: c43275b0a53b396b24ae3cc88c8de6d72695835369c5b6baa35e8bcae6bf1461
kernel-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: c9dbbc4315ecdbe67ff8ec4fb0044fcd02b3dc4f5d11b608312e9eb5d01d920f
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: d71740a831109734ab005ab0ed02b4eeef7bc5f139c97d9b82b64c451ceea08a
kernel-headers-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 9878eb0013a49963a363367e95e6741f071b5441b22086c6567e0cefe20a0575
kernel-xen-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: d3abb78719f7cd55be29eba7c1331ce027bf8d846a8accbafdc129b6641996a6
kernel-xen-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: f1392ddffb4cf437fcfa685a59521bba09cd4b930ed22810794241174e94a4f0
kernel-xen-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: 8184e1ab6fb0f1570804667b1ca2f1c372ba2ebcca4f104625ecd97c80d871d1
kernel-xen-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 30e402c2fddeabf95cea03dc1fea5bcbc9ceffc48101ef3a069d6d932bf22149
i386
kernel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 8139a96275bae5c5d6933fe04e8ee8df1a28dd572821764699cc78fbe492c4b2
kernel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 5026061e2f76eb88b2e5e159cf94bca4f5f960cd39715f3b268b5dac7503d8f3
kernel-PAE-2.6.18-92.1.17.el5.i686.rpm SHA-256: 7907b1ee70ba20768fa8a66480b38767e818dd171329b94b5ffcc0036d35494c
kernel-PAE-2.6.18-92.1.18.el5.i686.rpm SHA-256: a5d8ac792cc7e891c62fb8315794439ad1f1aba3e5e4d0421fcd4deb3312ee14
kernel-PAE-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: ba1df45891720ff4be741f02b643dbb40cb634a20792c7f88a2c31bb324bf0c7
kernel-PAE-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: a09ad2fe010d32798901a601875c75b7ac295fd91f51ab159714c27f9c64cfcf
kernel-debug-2.6.18-92.1.17.el5.i686.rpm SHA-256: ee6581e7b247c5f3363d506b37ba028512d3f86b054b913bfdfa91e0ba427fbf
kernel-debug-2.6.18-92.1.18.el5.i686.rpm SHA-256: f365a0ca09938e1a29c4e6cc35bc208047b88dfa894a5a3929ac9f94921a0d09
kernel-debug-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 9196c5cab8abb917be8ad700b635f7bae9621fc525636119913648223f1bc1de
kernel-debug-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 575487af482333e11cb9e9bf6f7d046e72b857ce8dcd13aaf4e3e5fbb90b1794
kernel-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 07981437310a8776a50a4c87e294e474b2df178b413b8c1588439e3c7a9bd5e9
kernel-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: f578b9503c365e71a1d039b1d0df6a7d50bc1dddcdd0cad5c63852caf873e2fd
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.i386.rpm SHA-256: eaa72d1726a2ecdf0ca802041e3e536508b01d625a7fd167d728cf92a3c29cb3
kernel-headers-2.6.18-92.1.18.el5.i386.rpm SHA-256: a4ac978ae493c12826f20a3d1e38bc00443dd38ca56f7c8c3726957bb0bd8a9d
kernel-xen-2.6.18-92.1.17.el5.i686.rpm SHA-256: df0aff9d9aa11277f73d0698574befb8f9ddf9b54d976640a18427cf039bccb4
kernel-xen-2.6.18-92.1.18.el5.i686.rpm SHA-256: 1d521ae1391d3407d5d8de634434c41e5e531b0c3b717340327854dd81347a29
kernel-xen-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 0e9b95c3069470910d9118c854104c9ca34ef2d814541dc17da51dfbf781d3d0
kernel-xen-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 9b50af57e53551c053e0105b0f540108de18b090d85156b690120ea38ffef5c8

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-92.1.17.el5.src.rpm SHA-256: be2fbf71c3669c397692a4c6a992d622679a316c4490d7c617443be9b424b240
kernel-2.6.18-92.1.18.el5.src.rpm SHA-256: 959941aef25935dc551d4c19919dabd1a4af368f2ac2b493b5b07ff18227dc9d
s390x
kernel-2.6.18-92.1.17.el5.s390x.rpm SHA-256: b2c2635121a27beb45124ee91ecd185dac25224ab011649c693de8bc943fbfd7
kernel-2.6.18-92.1.18.el5.s390x.rpm SHA-256: 65bbd55648955699d6f51d1d2df9bcf2f74d71b81dfc6c882cabee8070a525db
kernel-debug-2.6.18-92.1.17.el5.s390x.rpm SHA-256: ced95ccd0d64a08eb1b351b6e35038976e892ad987edcbe851f9f13702490335
kernel-debug-2.6.18-92.1.18.el5.s390x.rpm SHA-256: 1a936056c0b8976e070d4f748dea2f3e6af58b2bfb555cb69028238a46088326
kernel-debug-devel-2.6.18-92.1.17.el5.s390x.rpm SHA-256: 11173821a15f4e3c5f4df2c690626628ebd9269433de0f853aec4ed1ced417e9
kernel-debug-devel-2.6.18-92.1.18.el5.s390x.rpm SHA-256: 55431dc35745d8c376addd7a50da90395360309b2c79eae19bbe770d99c43413
kernel-devel-2.6.18-92.1.17.el5.s390x.rpm SHA-256: fc0dccc4fb1d54e2cacbe8d7825dca0de3948e7e69f27b9d14c8cf03d72475e2
kernel-devel-2.6.18-92.1.18.el5.s390x.rpm SHA-256: 6e8e6859e88e8668a5172bc956e2ff6186ce88c125a8881f3848dc64574e9e5c
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.s390x.rpm SHA-256: 4366d5fb28fade4b8158590090a66825c0307822644c7f921a50e206efcbb7d8
kernel-headers-2.6.18-92.1.18.el5.s390x.rpm SHA-256: b6e3cb94f48db60052b46a314420a19c76f2dc04900c9d315d6255adad0f8980
kernel-kdump-2.6.18-92.1.17.el5.s390x.rpm SHA-256: 9f5672e75fd4758bec2d9813455e659a280690003d3d1af6ab6523613af5981c
kernel-kdump-2.6.18-92.1.18.el5.s390x.rpm SHA-256: f30b689393e29f8623da0fbf49a0dc0b457a079c92819a27d91c2260c9e817dd
kernel-kdump-devel-2.6.18-92.1.17.el5.s390x.rpm SHA-256: 06b4898c76e979b48cb414947f94dba0589ceedb9a00cc9c2889c66e4027f62f
kernel-kdump-devel-2.6.18-92.1.18.el5.s390x.rpm SHA-256: 4249817d3c3e1fde497a19f9686b922bfb7c2bc200350430bdbb3605241e6e6a

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-92.1.17.el5.src.rpm SHA-256: be2fbf71c3669c397692a4c6a992d622679a316c4490d7c617443be9b424b240
kernel-2.6.18-92.1.18.el5.src.rpm SHA-256: 959941aef25935dc551d4c19919dabd1a4af368f2ac2b493b5b07ff18227dc9d
ppc
kernel-2.6.18-92.1.17.el5.ppc64.rpm SHA-256: 5b213ce345ae595f12edb7a4b16b198c0282bf68fd2009f337c525694d5ea634
kernel-2.6.18-92.1.18.el5.ppc64.rpm SHA-256: 49a54e347a5fa92daeeca5cd21a44bb40b21ca21bff6b19eb3f936221b1a65d6
kernel-debug-2.6.18-92.1.17.el5.ppc64.rpm SHA-256: 69acecc161f9dc332b298a825614799754fb28d21d9a56b03009dd3454edb8d4
kernel-debug-2.6.18-92.1.18.el5.ppc64.rpm SHA-256: aeec44774a6cc301590f5b82ab74bfbd7e8ae6ba7fe59352944f7766f071fe55
kernel-debug-devel-2.6.18-92.1.17.el5.ppc64.rpm SHA-256: afbba468a4b7a0d65133228b5b02da08dfb382f418b937ae125224483c6c1a81
kernel-debug-devel-2.6.18-92.1.18.el5.ppc64.rpm SHA-256: 6d2957526d76a3ab5b4f4c5f019bce0b6e85dff974b5f2e34c10ec54eaaddf99
kernel-devel-2.6.18-92.1.17.el5.ppc64.rpm SHA-256: 437e74fe4640d81dfb669bea6d0547717aeb29c1b29c87987d70ec482407a3fb
kernel-devel-2.6.18-92.1.18.el5.ppc64.rpm SHA-256: 6661e566c02a190339546bcfaf40eba20b1ba920e192ff5eec63a1483a6150bc
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.ppc.rpm SHA-256: e95f878298db521d29cf9c0e4b2bfb543572d25585bc1505fc7480a284e40064
kernel-headers-2.6.18-92.1.17.el5.ppc64.rpm SHA-256: cf14d32f2ea33b09d6658aeceb163c5a098f072f3d83473355408bd768f11c81
kernel-headers-2.6.18-92.1.18.el5.ppc.rpm SHA-256: 2a427ac2fb191d79341f9ead77c3fb18703695dbe136d318d6cf04f0b22ad867
kernel-headers-2.6.18-92.1.18.el5.ppc64.rpm SHA-256: e8597c1f0cf44e5836fdff1232f814cdcec60081ff9695bc0935ed0bc200d266
kernel-kdump-2.6.18-92.1.17.el5.ppc64.rpm SHA-256: e3c18db245306f03ed13179d9ecd6c371ccb3f5e7cc98db7c541b1b2796d02e1
kernel-kdump-2.6.18-92.1.18.el5.ppc64.rpm SHA-256: bfd285f1ae3dc04aebfbeb56320bb8470ddc15086e8e238f6dd9625f02d6c0bc
kernel-kdump-devel-2.6.18-92.1.17.el5.ppc64.rpm SHA-256: 33ab4e0eac380611d553ce4739f6096b8ee5f7e30faa9d826ceee084a9ab290f
kernel-kdump-devel-2.6.18-92.1.18.el5.ppc64.rpm SHA-256: 240dfd2373802b5dfdfe63101551ec1e2240eca98bbdc8ad88924f33a6023713

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-92.1.17.el5.src.rpm SHA-256: be2fbf71c3669c397692a4c6a992d622679a316c4490d7c617443be9b424b240
kernel-2.6.18-92.1.18.el5.src.rpm SHA-256: 959941aef25935dc551d4c19919dabd1a4af368f2ac2b493b5b07ff18227dc9d
x86_64
kernel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: fd38b85aa4b2839aff72aac1d78dd95cf9acadda85ffb5a50ac4ef9cabf0c27b
kernel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 1fca590f1e285fb75b8709fa12f6af705bbd470c7bdc1c32ac44c155106a7ff0
kernel-debug-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: 9a4ffb38ebefc7589eeae4237b1840fc67dccf8dce758e9b415b58cdca9b367a
kernel-debug-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: a99631ffcdb4ad282d0300da04283c078b898b8c5f30b92cd0b56f409d296c11
kernel-debug-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: b4c4e53c3cc88311ac0d1c8c15ecc1711d19142714ed7aab6fea11545b1f3578
kernel-debug-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 6b3cee3d45ef5b28b95757e3f364cf1d3bae46f1c9443e9d4514841ae3ae800b
kernel-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: c43275b0a53b396b24ae3cc88c8de6d72695835369c5b6baa35e8bcae6bf1461
kernel-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: c9dbbc4315ecdbe67ff8ec4fb0044fcd02b3dc4f5d11b608312e9eb5d01d920f
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: d71740a831109734ab005ab0ed02b4eeef7bc5f139c97d9b82b64c451ceea08a
kernel-headers-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 9878eb0013a49963a363367e95e6741f071b5441b22086c6567e0cefe20a0575
kernel-xen-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: d3abb78719f7cd55be29eba7c1331ce027bf8d846a8accbafdc129b6641996a6
kernel-xen-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: f1392ddffb4cf437fcfa685a59521bba09cd4b930ed22810794241174e94a4f0
kernel-xen-devel-2.6.18-92.1.17.el5.x86_64.rpm SHA-256: 8184e1ab6fb0f1570804667b1ca2f1c372ba2ebcca4f104625ecd97c80d871d1
kernel-xen-devel-2.6.18-92.1.18.el5.x86_64.rpm SHA-256: 30e402c2fddeabf95cea03dc1fea5bcbc9ceffc48101ef3a069d6d932bf22149
i386
kernel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 8139a96275bae5c5d6933fe04e8ee8df1a28dd572821764699cc78fbe492c4b2
kernel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 5026061e2f76eb88b2e5e159cf94bca4f5f960cd39715f3b268b5dac7503d8f3
kernel-PAE-2.6.18-92.1.17.el5.i686.rpm SHA-256: 7907b1ee70ba20768fa8a66480b38767e818dd171329b94b5ffcc0036d35494c
kernel-PAE-2.6.18-92.1.18.el5.i686.rpm SHA-256: a5d8ac792cc7e891c62fb8315794439ad1f1aba3e5e4d0421fcd4deb3312ee14
kernel-PAE-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: ba1df45891720ff4be741f02b643dbb40cb634a20792c7f88a2c31bb324bf0c7
kernel-PAE-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: a09ad2fe010d32798901a601875c75b7ac295fd91f51ab159714c27f9c64cfcf
kernel-debug-2.6.18-92.1.17.el5.i686.rpm SHA-256: ee6581e7b247c5f3363d506b37ba028512d3f86b054b913bfdfa91e0ba427fbf
kernel-debug-2.6.18-92.1.18.el5.i686.rpm SHA-256: f365a0ca09938e1a29c4e6cc35bc208047b88dfa894a5a3929ac9f94921a0d09
kernel-debug-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 9196c5cab8abb917be8ad700b635f7bae9621fc525636119913648223f1bc1de
kernel-debug-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 575487af482333e11cb9e9bf6f7d046e72b857ce8dcd13aaf4e3e5fbb90b1794
kernel-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 07981437310a8776a50a4c87e294e474b2df178b413b8c1588439e3c7a9bd5e9
kernel-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: f578b9503c365e71a1d039b1d0df6a7d50bc1dddcdd0cad5c63852caf873e2fd
kernel-doc-2.6.18-92.1.17.el5.noarch.rpm SHA-256: 006f4525589f6d0a45c89ce5b007326a7ddcb008aaa18c119760c81e93114b63
kernel-doc-2.6.18-92.1.18.el5.noarch.rpm SHA-256: 855032fca7e0d48428b2b511ee3621f80e21777b275adf37235cf82b5145dab6
kernel-headers-2.6.18-92.1.17.el5.i386.rpm SHA-256: eaa72d1726a2ecdf0ca802041e3e536508b01d625a7fd167d728cf92a3c29cb3
kernel-headers-2.6.18-92.1.18.el5.i386.rpm SHA-256: a4ac978ae493c12826f20a3d1e38bc00443dd38ca56f7c8c3726957bb0bd8a9d
kernel-xen-2.6.18-92.1.17.el5.i686.rpm SHA-256: df0aff9d9aa11277f73d0698574befb8f9ddf9b54d976640a18427cf039bccb4
kernel-xen-2.6.18-92.1.18.el5.i686.rpm SHA-256: 1d521ae1391d3407d5d8de634434c41e5e531b0c3b717340327854dd81347a29
kernel-xen-devel-2.6.18-92.1.17.el5.i686.rpm SHA-256: 0e9b95c3069470910d9118c854104c9ca34ef2d814541dc17da51dfbf781d3d0
kernel-xen-devel-2.6.18-92.1.18.el5.i686.rpm SHA-256: 9b50af57e53551c053e0105b0f540108de18b090d85156b690120ea38ffef5c8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility