Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:1017 - Security Advisory
Issued:
2008-12-16
Updated:
2008-12-16

RHSA-2008:1017 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that resolve several security issues and fix
various bugs are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • Olaf Kirch reported a flaw in the i915 kernel driver. This flaw could,

potentially, lead to local privilege escalation. Note: the flaw only
affects systems based on the Intel G33 Express Chipset and newer.
(CVE-2008-3831, Important)

  • Miklos Szeredi reported a missing check for files opened with O_APPEND in

the sys_splice(). This could allow a local, unprivileged user to bypass the
append-only file restrictions. (CVE-2008-4554, Important)

  • a deficiency was found in the Linux kernel Stream Control Transmission

Protocol (SCTP) implementation. This could lead to a possible denial of
service if one end of a SCTP connection did not support the AUTH extension.
(CVE-2008-4576, Important)

In addition, these updated packages fix the following bugs:

  • on Itanium(r) systems, when a multithreaded program was traced using the

command "strace -f", messages such as

PANIC: attached pid 10740 exited
PANIC: handle_group_exit: 10740 leader 10721
...

will be displayed, and after which the trace would stop. With these
updated packages, "strace -f" command no longer results in these error
messages, and strace terminates normally after tracing all threads.

  • on big-endian systems such as PowerPC, the getsockopt() function

incorrectly returned 0 depending on the parameters passed to it when the
time to live (TTL) value equaled 255.

  • when using an NFSv4 file system, accessing the same file with two

separate processes simultaneously resulted in the NFS client process
becoming unresponsive.

  • on AMD64 and Intel(r) 64 hypervisor-enabled systems, when a syscall

correctly returned '-1' in code compiled on Red Hat Enterprise Linux 5, the
same code, when run with the strace utility, would incorrectly return an
invalid return value. This has been fixed: on AMD64 and Intel(r) 64
hypervisor-enabled systems, syscalls in compiled code return the same,
correct values as syscalls run with strace.

  • on the Itanium(r) architecture, fully-virtualized guest domains created

using more than 64 GB of memory caused other guest domains not to receive
interrupts. This caused soft lockups on other guests. All guest domains are
now able to receive interrupts regardless of their allotted memory.

  • when user-space used SIGIO notification, which was not disabled before

closing a file descriptor and was then re-enabled in a different process,
an attempt by the kernel to dereference a stale pointer led to a kernel
crash. With this fix, such a situation no longer causes a kernel crash.

  • modifications to certain pages made through a memory-mapped region could

have been lost in cases when the NFS client needed to invalidate the page
cache for that particular memory-mapped file.

  • fully-virtualized Windows(r) guests became unresponsive due to the vIOSAPIC

component being multiprocessor-unsafe. With this fix, vIOSAPIC is
multiprocessor-safe and Windows guests do not become unresponsive.

  • on certain systems, keyboard controllers could not withstand continuous

requests to switch keyboard LEDs on or off. This resulted in some or all
key presses not being registered by the system.

  • on the Itanium(r) architecture, setting the "vm.nr_hugepages" sysctl

parameter caused a kernel stack overflow resulting in a kernel panic, and
possibly stack corruption. With this fix, setting vm.nr_hugepages works
correctly.

  • hugepages allow the Linux kernel to utilize the multiple page size

capabilities of modern hardware architectures. In certain configurations,
systems with large amounts of memory could fail to allocate most of this
memory for hugepages even if it was free. This could result, for example,
in database restart failures.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 248710 - Local keyboard DoS through LED switching
  • BZ - 450335 - LTC41974-Pages of a memory mapped NFS file get corrupted.
  • BZ - 459080 - [Xen][5.2.z] softlockup occurs while creating a guest which has large memory.
  • BZ - 464502 - CVE-2008-3831 kernel: i915 kernel drm driver arbitrary ioremap
  • BZ - 465744 - kernel: rtc: fix kernel panic on second use of SIGIO notification
  • BZ - 466079 - CVE-2008-4576 kernel: sctp: Fix oops when INIT-ACK indicates that peer doesn't support AUTH
  • BZ - 466707 - CVE-2008-4554 kernel: don't allow splice() to files opened with O_APPEND
  • BZ - 467727 - [Xen][5.2] Network Performance Test causes Guest Hang.
  • BZ - 469150 - [REG][5.2] The trace of some threads unexpectedly stops when being traced by 'strace -f'.
  • BZ - 469649 - getsockopt() returning incorrectly in PPC
  • BZ - 469650 - [REG][5.2][NFSv4] Accessing the same file at the same time causes NFSv4 open() call to stall forever on NFS4ERR_DELAY
  • BZ - 470853 - [RHEL5.2]: Running strace with a bad syscall doesn't return -ENOSYS
  • BZ - 474347 - [REG][5.3] Kernel panics when you prepare hugepages.
  • BZ - 474760 - [RHEL5 patch] Allow hugepage allocation to use most of memory.

CVEs

  • CVE-2008-4554
  • CVE-2008-3831
  • CVE-2008-4576

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-92.1.22.el5.src.rpm SHA-256: 8cb140baf2ecd1bfb64e217e61b3cc0179f1d2f9b8cff13d8e4ea8239ec597a5
x86_64
kernel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: aba55a3bd3a8c5ab163c1138fcdfdb437780797795d744fcff8451b03c1141d2
kernel-debug-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: a5c2ca05b74f7ba6a09faaa76a0b01b648c42d6aa4119b7f4e699659b5438579
kernel-debug-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 3955b805265069f0ae9515d36f3a6e3b5477d83b280b5c5f67e1850b47ade0ff
kernel-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 0823814c1fb9efd9f95f4fc304ca35a4c8a3fa43259f20b3e83a1f98c217d470
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 4abd33757fb8a41ebc9632041b54255bb066a96c16565568a44f57d14b8176f2
kernel-xen-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 19cc260540b9e822e34a3df0221dea6bfc119f2e55ac592ba6fe5afd1ff5f1ab
kernel-xen-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 1f3ec1c0dbe78d6fa3f6a3e58925dfb87ee519164692fdbdb41838b7e9e2cb12
ia64
kernel-2.6.18-92.1.22.el5.ia64.rpm SHA-256: 58315e346fa8b951e62322e213bbbbeeb3d8e6bc1382ccf7eb9a50cdc46d388c
kernel-debug-2.6.18-92.1.22.el5.ia64.rpm SHA-256: 5dcf55afc13b6e51828beb6bd0fd2938f90f5e9fb2b853319c59ad75106ba5f0
kernel-debug-devel-2.6.18-92.1.22.el5.ia64.rpm SHA-256: b7dbb36521e8bce60f7e35bbe0cee645b4548f100c5b66491394da8d6bb9fb36
kernel-devel-2.6.18-92.1.22.el5.ia64.rpm SHA-256: 4452b17052037e3f3c11b948de5352760c73a1d7b8257130dfd9f4610d793cfa
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.ia64.rpm SHA-256: 3e2c19c6224830a3e65fada02ede5a5d71f179d9d5ab830460a178b9a99de435
kernel-xen-2.6.18-92.1.22.el5.ia64.rpm SHA-256: 54e7232ccfb876e859a2759f2f627cb25d3381432377a725fa6cdc15985e768a
kernel-xen-devel-2.6.18-92.1.22.el5.ia64.rpm SHA-256: bbc9b06bb71116dab64a54516000dc67f0097b96fe2b6f32e61db1e046fe7214
i386
kernel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 8161474b369d76af0b1a6e154b949705b5bb86e766ddc32731ec578f290bc938
kernel-PAE-2.6.18-92.1.22.el5.i686.rpm SHA-256: aa9f337b9a3b96aa12f94a357709dfd4d5d49a74b9eaeeb6c7715f7e447eb74c
kernel-PAE-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 57eb97e3d1dae769d1d19ba6d43432a11180f0c35b5dce4060502cb940244610
kernel-debug-2.6.18-92.1.22.el5.i686.rpm SHA-256: b7b1be1a14133c52ae0aed97643c3dbc49fb2efd6adf190988f76b7ebdfaec84
kernel-debug-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 43fbebfca516d57a77c9461aa5fb45cdc0e18dab9722d858e652df2d5e2be371
kernel-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 45adcadc3a21eee35382027254d85ff2dd462524945d303150c26c430487b12b
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.i386.rpm SHA-256: 3d044e5e6564893f7a4cb9d77252f9cb5b2261a2a2ee52526b4c49803587b0d3
kernel-xen-2.6.18-92.1.22.el5.i686.rpm SHA-256: cbc98833efa0b512b2f6d059317f2843ea43c3e634d7baeee8cdddd335cfde59
kernel-xen-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: ab14d837301b721ec67ae742367bb39adc7c4e16ef829ee916f8107170337b0a

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-92.1.22.el5.src.rpm SHA-256: 8cb140baf2ecd1bfb64e217e61b3cc0179f1d2f9b8cff13d8e4ea8239ec597a5
x86_64
kernel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: aba55a3bd3a8c5ab163c1138fcdfdb437780797795d744fcff8451b03c1141d2
kernel-debug-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: a5c2ca05b74f7ba6a09faaa76a0b01b648c42d6aa4119b7f4e699659b5438579
kernel-debug-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 3955b805265069f0ae9515d36f3a6e3b5477d83b280b5c5f67e1850b47ade0ff
kernel-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 0823814c1fb9efd9f95f4fc304ca35a4c8a3fa43259f20b3e83a1f98c217d470
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 4abd33757fb8a41ebc9632041b54255bb066a96c16565568a44f57d14b8176f2
kernel-xen-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 19cc260540b9e822e34a3df0221dea6bfc119f2e55ac592ba6fe5afd1ff5f1ab
kernel-xen-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 1f3ec1c0dbe78d6fa3f6a3e58925dfb87ee519164692fdbdb41838b7e9e2cb12
i386
kernel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 8161474b369d76af0b1a6e154b949705b5bb86e766ddc32731ec578f290bc938
kernel-PAE-2.6.18-92.1.22.el5.i686.rpm SHA-256: aa9f337b9a3b96aa12f94a357709dfd4d5d49a74b9eaeeb6c7715f7e447eb74c
kernel-PAE-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 57eb97e3d1dae769d1d19ba6d43432a11180f0c35b5dce4060502cb940244610
kernel-debug-2.6.18-92.1.22.el5.i686.rpm SHA-256: b7b1be1a14133c52ae0aed97643c3dbc49fb2efd6adf190988f76b7ebdfaec84
kernel-debug-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 43fbebfca516d57a77c9461aa5fb45cdc0e18dab9722d858e652df2d5e2be371
kernel-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 45adcadc3a21eee35382027254d85ff2dd462524945d303150c26c430487b12b
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.i386.rpm SHA-256: 3d044e5e6564893f7a4cb9d77252f9cb5b2261a2a2ee52526b4c49803587b0d3
kernel-xen-2.6.18-92.1.22.el5.i686.rpm SHA-256: cbc98833efa0b512b2f6d059317f2843ea43c3e634d7baeee8cdddd335cfde59
kernel-xen-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: ab14d837301b721ec67ae742367bb39adc7c4e16ef829ee916f8107170337b0a

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-92.1.22.el5.src.rpm SHA-256: 8cb140baf2ecd1bfb64e217e61b3cc0179f1d2f9b8cff13d8e4ea8239ec597a5
x86_64
kernel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: aba55a3bd3a8c5ab163c1138fcdfdb437780797795d744fcff8451b03c1141d2
kernel-debug-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: a5c2ca05b74f7ba6a09faaa76a0b01b648c42d6aa4119b7f4e699659b5438579
kernel-debug-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 3955b805265069f0ae9515d36f3a6e3b5477d83b280b5c5f67e1850b47ade0ff
kernel-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 0823814c1fb9efd9f95f4fc304ca35a4c8a3fa43259f20b3e83a1f98c217d470
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 4abd33757fb8a41ebc9632041b54255bb066a96c16565568a44f57d14b8176f2
kernel-xen-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 19cc260540b9e822e34a3df0221dea6bfc119f2e55ac592ba6fe5afd1ff5f1ab
kernel-xen-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 1f3ec1c0dbe78d6fa3f6a3e58925dfb87ee519164692fdbdb41838b7e9e2cb12
i386
kernel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 8161474b369d76af0b1a6e154b949705b5bb86e766ddc32731ec578f290bc938
kernel-PAE-2.6.18-92.1.22.el5.i686.rpm SHA-256: aa9f337b9a3b96aa12f94a357709dfd4d5d49a74b9eaeeb6c7715f7e447eb74c
kernel-PAE-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 57eb97e3d1dae769d1d19ba6d43432a11180f0c35b5dce4060502cb940244610
kernel-debug-2.6.18-92.1.22.el5.i686.rpm SHA-256: b7b1be1a14133c52ae0aed97643c3dbc49fb2efd6adf190988f76b7ebdfaec84
kernel-debug-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 43fbebfca516d57a77c9461aa5fb45cdc0e18dab9722d858e652df2d5e2be371
kernel-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 45adcadc3a21eee35382027254d85ff2dd462524945d303150c26c430487b12b
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.i386.rpm SHA-256: 3d044e5e6564893f7a4cb9d77252f9cb5b2261a2a2ee52526b4c49803587b0d3
kernel-xen-2.6.18-92.1.22.el5.i686.rpm SHA-256: cbc98833efa0b512b2f6d059317f2843ea43c3e634d7baeee8cdddd335cfde59
kernel-xen-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: ab14d837301b721ec67ae742367bb39adc7c4e16ef829ee916f8107170337b0a

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-92.1.22.el5.src.rpm SHA-256: 8cb140baf2ecd1bfb64e217e61b3cc0179f1d2f9b8cff13d8e4ea8239ec597a5
s390x
kernel-2.6.18-92.1.22.el5.s390x.rpm SHA-256: 2188087385e5a1de5c847d786f11b80695f5dce3313df09da5b8bc591b1fe85e
kernel-debug-2.6.18-92.1.22.el5.s390x.rpm SHA-256: 32092ad4cba644c58b8445c3723ca4effaf83b5831c51633c9e63fb8b11c7318
kernel-debug-devel-2.6.18-92.1.22.el5.s390x.rpm SHA-256: bf9b90d03f9ef7726f6c7a6f9aad236ef1a71f0c673db89b05da0dd1151fcd29
kernel-devel-2.6.18-92.1.22.el5.s390x.rpm SHA-256: 841ae59b5a3d017936d110565e2ee19028a1dd226584384fc31a5db3e4fb7415
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.s390x.rpm SHA-256: 5f3f21111785b8f801a8f36a09abdc44f52dd74267461d91ba062a3c50314969
kernel-kdump-2.6.18-92.1.22.el5.s390x.rpm SHA-256: a5e8e5361b4bbc6bf8662c818cb8b1beefef4ffb6acfb8b1590867888a4165b5
kernel-kdump-devel-2.6.18-92.1.22.el5.s390x.rpm SHA-256: 71f4d21176bb73d377b0a31bd7f1df71da98623672807e3555db83f1773212e9

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-92.1.22.el5.src.rpm SHA-256: 8cb140baf2ecd1bfb64e217e61b3cc0179f1d2f9b8cff13d8e4ea8239ec597a5
ppc
kernel-2.6.18-92.1.22.el5.ppc64.rpm SHA-256: cc174f1665cb4ef78df1ad70149d744ec4fc55d16b159be051132b3cf22413ef
kernel-debug-2.6.18-92.1.22.el5.ppc64.rpm SHA-256: 10ee9b1be23678e630c013d5e1f5328892f5e1919a5042410a202d1089610765
kernel-debug-devel-2.6.18-92.1.22.el5.ppc64.rpm SHA-256: 212a8b52acd9daeacbc842fb3588821ee4b3541c314babbf8a8026d5b5f7df1e
kernel-devel-2.6.18-92.1.22.el5.ppc64.rpm SHA-256: 95732280350237b13a4965ce81cefebb83ed7f4c188e42a9dfdd60a5b912b0af
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.ppc.rpm SHA-256: 3dc840eee0df4556fd084a41f7be6017b709d5858d56f72e3924a681014a11de
kernel-headers-2.6.18-92.1.22.el5.ppc64.rpm SHA-256: e8f4820eb3c61de40d33cb64ea378bbbebb1b8eb8f92a9f80ed7dd68d828e63a
kernel-kdump-2.6.18-92.1.22.el5.ppc64.rpm SHA-256: cfff3af2f28f1842b0d9b5d06f37aa44f9f7f76212345dd60b0a5503ad7c7bb8
kernel-kdump-devel-2.6.18-92.1.22.el5.ppc64.rpm SHA-256: 7515af0916e7f13e4cc7810407b606c6781282746b3cb4640321d17b06a25fcb

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-92.1.22.el5.src.rpm SHA-256: 8cb140baf2ecd1bfb64e217e61b3cc0179f1d2f9b8cff13d8e4ea8239ec597a5
x86_64
kernel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: aba55a3bd3a8c5ab163c1138fcdfdb437780797795d744fcff8451b03c1141d2
kernel-debug-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: a5c2ca05b74f7ba6a09faaa76a0b01b648c42d6aa4119b7f4e699659b5438579
kernel-debug-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 3955b805265069f0ae9515d36f3a6e3b5477d83b280b5c5f67e1850b47ade0ff
kernel-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 0823814c1fb9efd9f95f4fc304ca35a4c8a3fa43259f20b3e83a1f98c217d470
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 4abd33757fb8a41ebc9632041b54255bb066a96c16565568a44f57d14b8176f2
kernel-xen-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 19cc260540b9e822e34a3df0221dea6bfc119f2e55ac592ba6fe5afd1ff5f1ab
kernel-xen-devel-2.6.18-92.1.22.el5.x86_64.rpm SHA-256: 1f3ec1c0dbe78d6fa3f6a3e58925dfb87ee519164692fdbdb41838b7e9e2cb12
i386
kernel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 8161474b369d76af0b1a6e154b949705b5bb86e766ddc32731ec578f290bc938
kernel-PAE-2.6.18-92.1.22.el5.i686.rpm SHA-256: aa9f337b9a3b96aa12f94a357709dfd4d5d49a74b9eaeeb6c7715f7e447eb74c
kernel-PAE-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 57eb97e3d1dae769d1d19ba6d43432a11180f0c35b5dce4060502cb940244610
kernel-debug-2.6.18-92.1.22.el5.i686.rpm SHA-256: b7b1be1a14133c52ae0aed97643c3dbc49fb2efd6adf190988f76b7ebdfaec84
kernel-debug-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 43fbebfca516d57a77c9461aa5fb45cdc0e18dab9722d858e652df2d5e2be371
kernel-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: 45adcadc3a21eee35382027254d85ff2dd462524945d303150c26c430487b12b
kernel-doc-2.6.18-92.1.22.el5.noarch.rpm SHA-256: 2e688d13d49ca1c3c74e6877dd7728966641b097bb466d084b938ed20d3eafbd
kernel-headers-2.6.18-92.1.22.el5.i386.rpm SHA-256: 3d044e5e6564893f7a4cb9d77252f9cb5b2261a2a2ee52526b4c49803587b0d3
kernel-xen-2.6.18-92.1.22.el5.i686.rpm SHA-256: cbc98833efa0b512b2f6d059317f2843ea43c3e634d7baeee8cdddd335cfde59
kernel-xen-devel-2.6.18-92.1.22.el5.i686.rpm SHA-256: ab14d837301b721ec67ae742367bb39adc7c4e16ef829ee916f8107170337b0a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility