Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0178 - Security Advisory
Issued:
2010-03-30
Updated:
2010-03-30

RHSA-2010:0178 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat Enterprise Linux 5.5 kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix three security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the fifth regular update.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • a race condition was found in the mac80211 implementation, a framework

used for writing drivers for wireless devices. An attacker could trigger
this flaw by sending a Delete Block ACK (DELBA) packet to a target system,
resulting in a remote denial of service. Note: This issue only affected
users on 802.11n networks, and that also use the iwlagn driver with Intel
wireless hardware. (CVE-2009-4027, Important)

  • a flaw was found in the gfs2_lock() implementation. The GFS2 locking code

could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged user
on a system that has a GFS2 file system mounted could use this flaw to
cause a kernel panic. (CVE-2010-0727, Moderate)

  • a divide-by-zero flaw was found in the ext4 file system code. A local

attacker could use this flaw to cause a denial of service by mounting a
specially-crafted ext4 file system. (CVE-2009-4307, Low)

These updated packages also include several hundred bug fixes for and
enhancements to the Linux kernel. Space precludes documenting each of these
changes in this advisory and users are directed to the Red Hat Enterprise
Linux 5.5 Release Notes for information on the most significant of these
changes:

http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/

Also, for details concerning every bug fixed in and every enhancement added
to the kernel for this release, refer to the kernel chapter in the Red Hat
Enterprise Linux 5.5 Technical Notes:

http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html

All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which address these vulnerabilities as well as fixing the bugs
and adding the enhancements noted in the Red Hat Enterprise Linux 5.5
Release Notes and Technical Notes. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 250561 - w83627ehf sensor not supported by 2.6.18-8.1.8.el5 kernel
  • BZ - 322881 - /proc/self/smaps unreadable after setuid
  • BZ - 427709 - dump and large file ops are slow, please implement kernel workaround
  • BZ - 446061 - IT87 hwmon module does not support later chipset revisions.
  • BZ - 448130 - 50-75 % drop in cfq read performance compared to rhel 4.6+
  • BZ - 450121 - RFE: Symbol pci_domain_nr needs to be added the whitelist for ppc64
  • BZ - 452129 - memory mapped files not updating timestamps
  • BZ - 456181 - Read speed of /sbin/dump command is critically slow with CFQ I/O scheduler
  • BZ - 461100 - [PATCH]RHEL5:fix dio write returning EIO due to bh race
  • BZ - 461442 - VLAN driver logs excessive messages in kernel message log (dmesg)
  • BZ - 461506 - kernel BUG at mm/mempool.c:121! caused by lvcreate
  • BZ - 466681 - pygrub uses cached and eventually outdated grub.conf, kernel and initrd
  • BZ - 469976 - The EDAC driver not support The Intel 3200 and 3210 Chipsets
  • BZ - 473404 - [5.3] Kdump Kernel Hangs on Dell AMD Machines
  • BZ - 475457 - [FUJITSU 5.5] More tracepoints support - networking
  • BZ - 476075 - use KVM pvclock code to detect/correct lost ticks
  • BZ - 481658 - Backport partition table sanity checks to RHEL5
  • BZ - 482756 - GFS2: After gfs2_grow, new size is not seen immediately
  • BZ - 483646 - bridge: Fix LRO crash with tun (tun_chr_read())
  • BZ - 485016 - HP6510b close lid cause system crash
  • BZ - 485099 - Inconsistent behaviour in stripping SUID/SGID flags when chmod/chgrp directories
  • BZ - 486092 - httpd Sendfile troubles reading from a CIFS share
  • BZ - 486975 - kernel: Unable to write to file as non-root user with setuid and setgid bit set
  • BZ - 487346 - ifdown bond0 causes a deadlock
  • BZ - 487763 - Adding bonding in balance-alb mode to bridge causes host network connectivity to be lost
  • BZ - 488161 - (direct_io) __blockdev_direct_IO calls kzalloc for dio struct causes OLTP performance regression
  • BZ - 489566 - when booted with P-state limit, limit can never be increased
  • BZ - 489774 - AVC denied 0x100000 for a directory with eCryptFS and Apache
  • BZ - 489931 - NFS umount deadlock in rpciod with rpc_shutdown_client()
  • BZ - 491010 - ip_vs module (LVS) routes demasqueraded packets out wrong interface on multihomed directors
  • BZ - 493517 - get_partstats() returns NULL and causes panic
  • BZ - 494120 - XEN NMI detection fails on Dell 1950 server
  • BZ - 495059 - deadlock with NFSv4 reclaimer thread reconnecting socket
  • BZ - 496716 - GFS2 ">>" will not update ctime,mtime after appending to the file
  • BZ - 496847 - [Patch] jbd slab cache creation/deletion is racey
  • BZ - 497200 - definition of file-nr differs from sysctl/fs.txt to filesystems/proc.txt
  • BZ - 497257 - The tmpfs filesystem goes on readonly mode.
  • BZ - 498461 - I/O scheduler setting via elevator kernel option not picked up by Xen guest
  • BZ - 498489 - blktrace stops working after a trace-file-directory replacement
  • BZ - 498510 - don't OOM kill task during fresh huge page allocation
  • BZ - 498532 - RHEL5 cmirror tracker: multiple device failure of fully synced cmirror causes corruption
  • BZ - 498976 - GFS2 - probably lost glock call back
  • BZ - 499019 - CRM 1908390 - BUG: warning at fs/inotify.c:181/set_dentry_child_flags()
  • BZ - 499063 - [RHEL5] undefined reference to `__udivdi3'
  • BZ - 499253 - kernel leaves initrd in vmalloc space
  • BZ - 499884 - A bond's preferred primary setting is lost after bringing down and up of the primary slave.
  • BZ - 500346 - Please update mlx4_en driver for performance improvements and bug fixes
  • BZ - 500653 - NFS: problems with virtual IP and locking
  • BZ - 500838 - CIFS update for RHEL5.5
  • BZ - 501030 - Need to display the current settings of the options bits in st driver.
  • BZ - 501075 - soft lockups with software RAID6 create and re-sync'
  • BZ - 502491 - rtl8139 doesn't work with bonding in alb mode
  • BZ - 502531 - GFS2: smbd proccess hangs with flock() call.
  • BZ - 502572 - cat stop responding after 1st cat and CTRL+C interrupt.
  • BZ - 502822 - OOPS in "inet_select_addr" on ICMP when "icmp_errors_use_inbound_ifaddr" is turned on
  • BZ - 502826 - [RHEL-5 Xen]: F-11 Xen 64-bit domU cannot be started with > 2047MB of memory
  • BZ - 502927 - dm-raid1 can return write request as finished and later revert the data
  • BZ - 502965 - Snapshot creation in VG with 1k extent size can fail
  • BZ - 503837 - [Intel 5.4 Bug] Function dependency link calculated incorrectly for integrated endpoint
  • BZ - 505331 - GFS2: genesis stuck writing to unlinked file
  • BZ - 506200 - ahci: add device ID for 82801JI sata controller
  • BZ - 506217 - Implement blkdev_releasepage() to release the buffer_heads and pages after we release private data belonging to a mounted filesystem.
  • BZ - 506799 - Serial ports don't function on 4838-310 without pnpacpi=off boot option
  • BZ - 506899 - timeout with physical cdrom on a PV guest
  • BZ - 507159 - Cannot increase open file limit greater then 1024 * 1024 (1048576)
  • BZ - 507549 - Bug in lockd prevents a locks being freed.
  • BZ - 509625 - kernel: fd leak if pipe() is called with an invalid address [rhel-5.4]
  • BZ - 509713 - getdents() reports /proc/1/task/1/ as DT_UNKNOWN.
  • BZ - 509809 - Host panic when try to run kvm guest on a host which restored from suspend.
  • BZ - 509866 - [RHEL5.3] Even if a process have received data but schedule() in select() cannot return
  • BZ - 509962 - RHEL 5.4 Beta fails to activate sw raid devices, unable to install to sw raid
  • BZ - 510225 - Segfault/Infinite loop in TLS double access
  • BZ - 510257 - allow more flexibility for read_ahead_kb store
  • BZ - 510686 - xen does not build on gcc 4.4
  • BZ - 510746 - BUG: warning at kernel/softirq.c:138/local_bh_enable() (Tainted: G )
  • BZ - 510814 - CPU hotplug notifiers for KVM (for suspend and cpu hotplug support)
  • BZ - 510818 - cxgb3 driver fixes
  • BZ - 511170 - [NetApp 5.5 bug] nfs_readdir() may fail to return all the files in the directory
  • BZ - 511211 - cpuspeed behave strangely after suspend/resume on intel machine hp-dl580g5-01.rhts.bos.redhat.com
  • BZ - 511278 - /proc/self/exe reports wrong path after fstat on NFSv4
  • BZ - 511374 - ExpressCards should be detected and useful
  • BZ - 512006 - [LTC 5.5 FEAT] AF_IUCV SOCK_SEQPACKET support [201885]
  • BZ - 512013 - [LTC 5.5 FEAT] Support ACPI S3/S4 Sleeping States [201941]
  • BZ - 512203 - [LTC 5.5 FEAT] Update ibmvscsi driver with upstream multipath enhancements [201916]
  • BZ - 512361 - Server should return NFS4ERR_ATTRNOTSUPP if attribute 'ACL' is not supported
  • BZ - 512552 - Can't write to XFS mount during raid5 resync
  • BZ - 513136 - [RHEL5.4 Snapshot1] File write performance degradation in RHEL5.4 Snapshot1 compared to RHEL5.3 GA
  • BZ - 513203 - system fails to go into s4
  • BZ - 513410 - cifs: panic when mounting DFS referral with hostname that can't be resolved
  • BZ - 513692 - ifdown on nVidia CK804 (rev f3) NIC doesn't work
  • BZ - 513827 - Out of SW-IOMMU space: External hard disk inaccessible
  • BZ - 514141 - mlx4_core fails to load on systems with32 cores
  • BZ - 514147 - TCP traffic for VLAN interfaces fails over mlx4_en parent interface.
  • BZ - 514250 - e100: return PCI_ERS_RESULT_DISCONNECT on permanent failure
  • BZ - 514256 - igb: return PCI_ERS_RESULT_DISCONNECT on permanent failure
  • BZ - 514589 - r8169 stopping all activity until the link is reset
  • BZ - 514654 - nfsv4-server return NFS4ERR_BAD_STATEID, but return NFS4ERR_EXPIRED when it has invalid stateID
  • BZ - 515176 - scsi_transport_fc: fc_user_scan can loop forever, needs mutex with rport list changes
  • BZ - 515252 - CIFS multiuser mount fails to locate smbid
  • BZ - 515312 - [Broadcom 5.5 feat] Update tg3 and add support for 5717/5718 and 57765 asic revs
  • BZ - 515405 - [PATCH RHEL5.5] :NFS Handle putpubfh operation correctly.
  • BZ - 515408 - Code under CONFIG_X86_VSMP incorrect after an incorrect patch pull from upstream
  • BZ - 515529 - ENOSPC during fsstress leads to filesystem corruption on ext2, ext3, and ext4
  • BZ - 515716 - [Broadcom 5.5 FEAT] Update bnx2x to 1.52.1-5
  • BZ - 515753 - kdump corefile cannot be backtraced in IA64
  • BZ - 515812 - [Emulex 5.5 feat] Three scsi_nl APIs should be added to kabi_whitelist
  • BZ - 515863 - FEAT RHEL5.5: Make MegaRAID SAS driver legacy I/O port free
  • BZ - 516541 - [NetApp 5.5 bug] Emulex FC ports on RHEL 5.4 GA offlined during target controller faults
  • BZ - 516589 - Kernel netlink neighbor updates not sent to multicast group (RTMGRP_NEIGH)
  • BZ - 516833 - [QLogic 5.5 feat] netxen - P3 updates
  • BZ - 516881 - [Promise 5.5 feat] Update stex driver to version 4.6.0102.4
  • BZ - 517238 - [RHEL5 Xen]: Fix for array out-of-bounds in blkfront
  • BZ - 517377 - [Broadcom 5.5 FEAT] Update bnx2 to 2.0.2
  • BZ - 517378 - [Broadcom 5.5 FEAT] Update bnx2i and cnic drivers
  • BZ - 517454 - Add Support for Huawei EC1260 to the RHEL5 kernel
  • BZ - 517504 - SCTP Messages out of order
  • BZ - 517893 - [QLogic 5.5 bug] qlge - fix hangs and read perfromance
  • BZ - 517922 - [QLogic 5.5 bug] qla2xxx - allow use of MSI when MSI-X disabled.
  • BZ - 517928 - bare-metal and xen: /proc/cpuinfo does not list all CPU flags presented by CPU
  • BZ - 518103 - VTD IOMMU 1:1 mapping performance and bug fixes
  • BZ - 518106 - [RFE] GFS2: New mount option: -o errors=withdraw|panic
  • BZ - 518496 - Add kernel (scsi_dh_rdac) support for Sun 6540 storage arrays.
  • BZ - 519049 - GFS2 Filesystem Withdrawal: fatal: invalid metadata block
  • BZ - 519076 - Update for HighPoint RocketRAID hptiop driver in RHEL 5.5 kernel
  • BZ - 519086 - [Cisco 5.5 FEAT] Include/Update support for enic version 1.1.0.100
  • BZ - 519091 - [Cisco 5.5 FEAT] Update fnic to version x.y.z
  • BZ - 519112 - statfs on NFS partition always returns 0
  • BZ - 519184 - nfsnobody == 4294967294 causes idmapd to stop responding
  • BZ - 519447 - [QLogic 5.5 bug] qla2xxx - updates and fixes from upstream or testing.
  • BZ - 519453 - [QLogic 5.5 bug] qlge - updates and fixes from upstream or testing.
  • BZ - 519771 - pvclock return bogus wallclock values
  • BZ - 520192 - kernel panics from list corruption when using a tape drive connected through cciss adapter
  • BZ - 520297 - kernel: ipv4: make ip_append_data() handle NULL routing table [rhel-5.5]
  • BZ - 520867 - glibc should call pselect() and ppoll() on ia64 kernel
  • BZ - 521081 - [RHEL5.4 RC2] KMP for xen kernel cannot be applied
  • BZ - 521093 - Cluster hangs after node rejoins from simulated network outage
  • BZ - 521203 - Update arcmsr driver
  • BZ - 521345 - vlan with sky2 is not possible anymore with kernel-xen 2.6.18-164
  • BZ - 521865 - Xen fails to boot on ia64 with > 128GB memory
  • BZ - 522600 - bnx2x: increase coalescing granularity to 4us instead of 12us
  • BZ - 522629 - [LTC 5.5 FEAT] Provide balloon driver for KVM guests [202025]
  • BZ - 522745 - thinkpad_acpi: CMOS NVRAM (7) and EC (5) do not agree on display brightness level
  • BZ - 522846 - Nehalem Turbo Boost "ida" flag not present in Xen kernel's /proc/cpuinfo output
  • BZ - 523335 - sound no longer works after upgrade to RHEL 5.4
  • BZ - 523450 - cpu1 didn't come online in a kvm i686 guest
  • BZ - 523888 - [RFE] Add qcserial module to RHEL 5 kernel
  • BZ - 523982 - kernel: ipt_recent: sanity check hit count [rhel-5.5]
  • BZ - 524052 - Boot hang when installing HVM DomU
  • BZ - 524129 - LVS master and backup director - Synchronised connections on backup director have unsuitable timeout value
  • BZ - 524335 - [LSI 5.5 feat] update rdac scsi device handler to upstream
  • BZ - 524651 - Lost the network in a KVM VM on top of 5.4
  • BZ - 524702 - kvm_clock patches are slowing guests' shutdown to unusable levels
  • BZ - 524787 - cannot compile kernel with CONFIG_ACPI_DEBUG=y
  • BZ - 525100 - resize2fs online resize hangs
  • BZ - 525390 - FEAT: RHEL 5.5 - update ALSA HDA audio driver from upstream
  • BZ - 525467 - Xen panic in msi_msg_read_remap_rte with acpi=off
  • BZ - 526043 - Implement smp_call_function_[single|many] in x86_64 and i386
  • BZ - 526092 - rw_semaphore bug
  • BZ - 526259 - [Cisco 5.5 feat] libfc bug fixes and improvements
  • BZ - 526481 - bnx2: panic in bnx2_poll_work()
  • BZ - 526612 - kernel: BUG: soft lockup with dcache_lock
  • BZ - 526751 - xset b as well as setterm -bfreq set beep to wrong pitch with CONFIG_HDA_INPUT_BEEP
  • BZ - 526819 - system crashes in audit_update_watch()
  • BZ - 526888 - NFSv4 reclaimer thread in an infinite loop
  • BZ - 527424 - igb driver does not work with kexec
  • BZ - 527496 - pci_dev->is_enabled is not set in RHEL5.4
  • BZ - 527748 - /proc/net/dev sometimes contains bogus values (BCM5706)
  • BZ - 528054 - ext4: tech preview refresh
  • BZ - 528070 - skip inodes without pages to free in drop_pagecache_sb()
  • BZ - 528153 - scsi: export symbol scsilun_to_int
  • BZ - 529431 - Update to 2.6.18-164.el5PAE causes working CIFS mount to fail
  • BZ - 529796 - GFS2: Enhance statfs and quota usability
  • BZ - 530537 - dlm_recv deadlock under memory pressure while processing GFP_KERNEL locks.
  • BZ - 531016 - NFS: stale nfs_fattr passed to nfs_readdir_lookup()
  • BZ - 531268 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour
  • BZ - 531488 - [scsi] Fix inconsistent usage of max_lun
  • BZ - 531552 - threads on pthread_mutex_lock wake in fifo order, but posix specifies by priority
  • BZ - 531593 - [QLogic 5.5 bug] qla2xxx - enable MSI-X and correct/cleanup irq request code
  • BZ - 531784 - ipoib: null tx/rx_ring skb pointers on free
  • BZ - 532701 - dprintk macro in NFS code doesn't work in some files
  • BZ - 533489 - [Cisco 5.5 feat] Need scsi and libfc symbols to be added to whitelist_file
  • BZ - 533496 - xen server crashes when used with network bonding modes 5 or 6
  • BZ - 534018 - kernel: sysctl: require CAP_SYS_RAWIO to set mmap_min_addr [rhel-5.5]
  • BZ - 534158 - Updates for mlx4 drivers
  • BZ - 537514 - [LSI 5.5 feat] make scsi_dh_activate asynchronous to address the slower lun failovers with large number of luns
  • BZ - 537734 - Backporting MSI-X mask bit acceleration
  • BZ - 537876 - Kernel panic when using GRO through ixgbe driver and xen bridge
  • BZ - 538407 - PCI AER code introduced a compile problem in powerpc
  • BZ - 538484 - gfs2 rename rgrp lock issue
  • BZ - 539240 - glock_workqueue -- glock ref count via gfs2_glock_hold
  • BZ - 539521 - Call trace error display when resume from suspend to disk (ide block) - pvclock related
  • BZ - 540811 - [RHEL5 Xen]: PV guest crash on poweroff
  • BZ - 541149 - CVE-2009-4026 CVE-2009-4027 kernel: mac80211: fix spurious delBA handling
  • BZ - 541213 - Possible access to invalid memory
  • BZ - 541325 - [RHEL5]: A new xenfb thread is created on every save/restore
  • BZ - 541953 - kernel panic when doing cpu offline/online frequently on hp-dl785g5-01.rhts.eng.bos.redhat.com
  • BZ - 541956 - kernel: sleeping vfs_check_frozen in called in atomic context from do_wp_page [rhel-5.5]
  • BZ - 542593 - recursive lock of devlist_mtx
  • BZ - 542746 - [QLogic 5.5 feat] netxen P3 - updates from 2.6.32
  • BZ - 542834 - [QLogic 5.5 bug] qla2xxx - further testing updates for 5.5
  • BZ - 543057 - [QLogic 5.5 bug] qla2xxx - testing updates #3
  • BZ - 543270 - Fix deadlock in multipath when removing a device
  • BZ - 543307 - Lock snapshot while reporting status
  • BZ - 544138 - PTRACE_KILL hangs in 100% cpu loop
  • BZ - 544349 - RHEL5: fallocate on XFS returns incorrect value on ENOSPC
  • BZ - 544417 - cifs: possible NULL pointer dereference in mount-time DFS referral chasing code
  • BZ - 544448 - Strange vm performance degradation moving 32 bit app from RHEL 4.6 32bit to 5.4 64bit
  • BZ - 545121 - possible null pointer dereference in ieee80211_change_iface
  • BZ - 545135 - [Broadcom 5.5 feat] Add support for 57765 asic revs
  • BZ - 545612 - Please implement upstream fix for potential filesystem corruption bug
  • BZ - 545899 - rtl8180 shows 0% signal strength while connected
  • BZ - 546281 - wireless: report reasonable bitrate for MCS rates through wext
  • BZ - 546326 - bnx2: panic in bnx2_free_tx_skbs() because of wrong frags index
  • BZ - 546624 - RFE: Add debug to bonding driver as module option
  • BZ - 547251 - CVE-2009-4307 kernel: ext4: avoid divide by zero when trying to mount a corrupted file system
  • BZ - 547762 - PCI AER: HEST FIRMWARE FIRST support
  • BZ - 547980 - [SR-IOV] VF can not be enabled in Dom0
  • BZ - 548079 - [RHEL5.4][REGRESSION] iptables --reject-with tcp-reset doesn't work
  • BZ - 548565 - aio: eventfd support introduced a 0.5% performance regression
  • BZ - 549397 - I/O errors while accessing loop devices or file-based Xen images from GFS volume after Update from RHEL 5.3 to 5.4
  • BZ - 549460 - [Emulex 5.5 bug] Multiple bug fixes for be2net
  • BZ - 549465 - Cannot run NVIDIA display driver on 32-bit RHEL 5.3 or 5.4
  • BZ - 549750 - audit rule with directory auditing crashes the kernel
  • BZ - 549763 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63 FC/FCoE
  • BZ - 550014 - khungtaskd not stopped during suspend
  • BZ - 550148 - [Cisco 5.5 bug] Update enic driver to version 1.1.0.241a
  • BZ - 552675 - ipmi_watchdog deadlock
  • BZ - 553324 - [RHEL5 Xen]: Cpu frequency scaling is broken on Intel
  • BZ - 553447 - GFS2: fatal: filesystem consistency error in gfs2_ri_update
  • BZ - 553670 - filesystem mounted with ecryptfs_xattr option could not be written
  • BZ - 554078 - Lost the network in a KVM VM on top of 5.4
  • BZ - 554545 - [Emulex 5.5 bug] Update be2iscsi driver for bugfixes
  • BZ - 555120 - dm-raid1: dmsetup stuck at suspending failed mirror device
  • BZ - 555171 - dm-raid1: kernel panic when bio on recovery failed region is released
  • BZ - 555604 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.1p FC/FCoE
  • BZ - 557095 - kvm pvclock on i386 suffers from double registering
  • BZ - 557109 - [5.4] VLAN performance issue with 10gbE Mellanox NICs
  • BZ - 557172 - inserting w83627hf kernel module results in panic
  • BZ - 557792 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.2p FC/FCoE
  • BZ - 557974 - e1000e: wol is broken on 2.6.18-185.el5
  • BZ - 558809 - e1000 & e1000e: Memory corruption/paging error when tx hang occurs
  • BZ - 559329 - [sky2] initial carrier state is always on
  • BZ - 559410 - posix_fadvise() handles its arguments incorrectly in 32-bit compat mode.
  • BZ - 559711 - Add wireless fixes from 2.6.32.y tree
  • BZ - 560944 - kernel panic during modprobe smsc47m1
  • BZ - 561076 - igb: fix warning in drivers/net/igb/igb_ethtool.c:2090
  • BZ - 561322 - [Emulex 5.5 bug] be2net bug fixes for be3 hardware from Alpha testing
  • BZ - 561578 - [Broadcom 5.5 feat] Update bnx2 firmware
  • BZ - 562006 - WARNING: APIC timer calibration may be wrong
  • BZ - 562947 - late breaking CIFS patches for RHEL5.5
  • BZ - 564145 - [Emulex 5.5 bug] Fix scsi eh callouts and add support for new chip to be2iscsi driver
  • BZ - 564399 - f71805f hwmon driver passes '&sio_data' to platform_device_add_data()
  • BZ - 564506 - [Emulex 5.5 bug] Update lpfc driver to 8.2.0.63.3p FC/FCoE
  • BZ - 565494 - "dmraid -ay" panics kernel
  • BZ - 565594 - [Cisco 5.5 bug] Update fnic to 1.4.0.98 to fix FIP crash/hang issues
  • BZ - 565964 - [Broadcom 5.5 bug] tg3: 5717 and 57765 asic revs can panic under load
  • BZ - 565965 - [Broadcom 5.5 bug] tg3: Race condition - performance / panic with 57765 devices
  • BZ - 566016 - [Broadcom 5.5 bug] tg3: 57765 LED does not work correctly
  • BZ - 566221 - GFS2: Use correct GFP for alloc page on write
  • BZ - 566696 - iwl5000/5300 fail to transmit data on N-only netwrok
  • BZ - 567718 - [Emulex 5.5 bug] be2net bug fixes for be3 hardware from Alpha testing
  • BZ - 568040 - network does not work with rhel 5.5 snap1 x64 server, xen kernel, and r8169 driver
  • BZ - 568153 - ixgbe: stop unmapping DMA buffers too early
  • BZ - 569610 - GFS2 - fiemap - Kernel BUG at fs/gfs2/bmap.c:433
  • BZ - 570814 - Disk performance regression in CFQ
  • BZ - 570863 - CVE-2010-0727 bug in GFS/GFS2 locking code leads to dos
  • BZ - 571818 - Iozone Outcache testing has a greater than 5 % performance regression on reads
  • BZ - 573098 - [5.4] VLAN performance issue with 10gbE Mellanox NICs

CVEs

  • CVE-2009-4307
  • CVE-2009-4027
  • CVE-2010-0727
  • CVE-2010-1188

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/
  • http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-194.el5.src.rpm SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f
x86_64
kernel-2.6.18-194.el5.x86_64.rpm SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95
kernel-debug-2.6.18-194.el5.x86_64.rpm SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8
kernel-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.x86_64.rpm SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a
kernel-xen-2.6.18-194.el5.x86_64.rpm SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782
ia64
kernel-2.6.18-194.el5.ia64.rpm SHA-256: 54601729cc3bfe1f9a26e15249e3f11e4b62241b9e4be2a9bfca71b816085f42
kernel-debug-2.6.18-194.el5.ia64.rpm SHA-256: 8fa8326f79d5223862880793a239fadb742beee7b43199227bd6ddd76679b70a
kernel-debug-devel-2.6.18-194.el5.ia64.rpm SHA-256: dd842c74761b4dc73573e1ecb444d7abab2d521a7b4af8a37ca99f6c77248ebd
kernel-devel-2.6.18-194.el5.ia64.rpm SHA-256: fb05a88d78de9696b52433cc8fe05288a14331b5ded414ef4e65e87e7419ffa7
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.ia64.rpm SHA-256: 1b17403282e0daef28a3a57fcccef5e306d16ecf67a6fefde24a1a783e597867
kernel-xen-2.6.18-194.el5.ia64.rpm SHA-256: 1dd9064dbefb78fc9ee83b4f07db23a15bdd26a124198e5dae7dd129254d0548
kernel-xen-devel-2.6.18-194.el5.ia64.rpm SHA-256: 21b19915293be9f7d33a2c2d8a2af091f9dfa0f8838e41a653b6909b903f1ca7
i386
kernel-2.6.18-194.el5.i686.rpm SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c
kernel-PAE-2.6.18-194.el5.i686.rpm SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2
kernel-PAE-devel-2.6.18-194.el5.i686.rpm SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7
kernel-debug-2.6.18-194.el5.i686.rpm SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f
kernel-debug-devel-2.6.18-194.el5.i686.rpm SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc
kernel-devel-2.6.18-194.el5.i686.rpm SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.i386.rpm SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4
kernel-xen-2.6.18-194.el5.i686.rpm SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a
kernel-xen-devel-2.6.18-194.el5.i686.rpm SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-194.el5.src.rpm SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f
x86_64
kernel-2.6.18-194.el5.x86_64.rpm SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95
kernel-debug-2.6.18-194.el5.x86_64.rpm SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8
kernel-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.x86_64.rpm SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a
kernel-xen-2.6.18-194.el5.x86_64.rpm SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782
i386
kernel-2.6.18-194.el5.i686.rpm SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c
kernel-PAE-2.6.18-194.el5.i686.rpm SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2
kernel-PAE-devel-2.6.18-194.el5.i686.rpm SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7
kernel-debug-2.6.18-194.el5.i686.rpm SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f
kernel-debug-devel-2.6.18-194.el5.i686.rpm SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc
kernel-devel-2.6.18-194.el5.i686.rpm SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.i386.rpm SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4
kernel-xen-2.6.18-194.el5.i686.rpm SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a
kernel-xen-devel-2.6.18-194.el5.i686.rpm SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-194.el5.src.rpm SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f
x86_64
kernel-2.6.18-194.el5.x86_64.rpm SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95
kernel-debug-2.6.18-194.el5.x86_64.rpm SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8
kernel-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.x86_64.rpm SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a
kernel-xen-2.6.18-194.el5.x86_64.rpm SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782
i386
kernel-2.6.18-194.el5.i686.rpm SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c
kernel-PAE-2.6.18-194.el5.i686.rpm SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2
kernel-PAE-devel-2.6.18-194.el5.i686.rpm SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7
kernel-debug-2.6.18-194.el5.i686.rpm SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f
kernel-debug-devel-2.6.18-194.el5.i686.rpm SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc
kernel-devel-2.6.18-194.el5.i686.rpm SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.i386.rpm SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4
kernel-xen-2.6.18-194.el5.i686.rpm SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a
kernel-xen-devel-2.6.18-194.el5.i686.rpm SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-194.el5.src.rpm SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f
s390x
kernel-2.6.18-194.el5.s390x.rpm SHA-256: fb3efedad26d2f5df192eeb856dd112765209a4168843584ed8dab548f689e2b
kernel-debug-2.6.18-194.el5.s390x.rpm SHA-256: 843c6266765bf325a694dc41b9bb0016a5b47e6a1ec315685c1184cdd94855a9
kernel-debug-devel-2.6.18-194.el5.s390x.rpm SHA-256: a9dea16a8f865a7b3a1c4f0d9d1ee6b8c25e787eacf732f16de209706766b7e0
kernel-devel-2.6.18-194.el5.s390x.rpm SHA-256: 9ecefc25bd450878f25139f671f06dd469ab8d0c4711179988b074ea2ef687b4
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.s390x.rpm SHA-256: 7c214912866394379e28562cdd74c2356414a5fd5785aa4eb3b517d30e33df43
kernel-kdump-2.6.18-194.el5.s390x.rpm SHA-256: c233a3025d505384f0f3b3672dfbfe65f224ed38fcf0488d020c3e4ce9a2798c
kernel-kdump-devel-2.6.18-194.el5.s390x.rpm SHA-256: f8f24af1ad75b215c85a2b005450dff93ce08d4dbe20e96fbce25a386c649d16

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-194.el5.src.rpm SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f
ppc
kernel-2.6.18-194.el5.ppc64.rpm SHA-256: de34cc79c204d99c6a234e1c2a67c3522a924b5e8e95511a0de5275eefb40ab8
kernel-debug-2.6.18-194.el5.ppc64.rpm SHA-256: 858b4e187da982bea23774730de79e24e53bf19ce6ac3136014dc93b915eaa2d
kernel-debug-devel-2.6.18-194.el5.ppc64.rpm SHA-256: fe4b9afeec455d8d95953237f8f84211d05070965a60fc0f2975a8d8505e3233
kernel-devel-2.6.18-194.el5.ppc64.rpm SHA-256: 5105802dea90e7db86361d8f3e2b3f18564ad90eb905694beaf385acc6d5a311
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.ppc.rpm SHA-256: 4c6756cf6b87b8fd41902d0d3c04bd290b45f44bc97b46ae0ee86a6f6bb290ff
kernel-headers-2.6.18-194.el5.ppc64.rpm SHA-256: ab56e79999f460c09bf3394cce48a5a96e0c50e00e7193341ebb7186820054b6
kernel-kdump-2.6.18-194.el5.ppc64.rpm SHA-256: 10ecb1f69c83bdb147151d997d8b16563addfb7d20255e12a2a84a8df1cc8352
kernel-kdump-devel-2.6.18-194.el5.ppc64.rpm SHA-256: 595fd31a236366d00dcaa9894593f92bef5ec895de86b8f032ec6af4a955fa55

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-194.el5.src.rpm SHA-256: 8660d190a59888c31ea610ae2441f95185d6deb691f02b1b2b52efd583dc142f
x86_64
kernel-2.6.18-194.el5.x86_64.rpm SHA-256: 6f89b1f97c299dd490d7505588a8a330752d5955233f4c9daa8c1d26e837eb95
kernel-debug-2.6.18-194.el5.x86_64.rpm SHA-256: 867e37efc5d4f0f6e3d038d1e6efbaeeaa0eb3b2f3b5ce1174df3e5141b2cfc0
kernel-debug-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 134821945b870b28521271df54dfc1c205466881794884902911a53a58e3dbb8
kernel-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 84f52290af35755403dafff8b819ff4a8827f4586bc39f34f6c0fe7cfaa5a37a
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.x86_64.rpm SHA-256: 3f08c38d98b85ec766c64e244bc9c65b93176a8688869375391ebbb298a5a67a
kernel-xen-2.6.18-194.el5.x86_64.rpm SHA-256: 6728986bd9f6387e3188355abe1c61954482b525a1bccaf64b3b326e250d2915
kernel-xen-devel-2.6.18-194.el5.x86_64.rpm SHA-256: 321c7094605a84df5ef91fd3770a0faacfc0e8d0370e26c7309eb949739b9782
i386
kernel-2.6.18-194.el5.i686.rpm SHA-256: 6b9c688482f5f47e5f5f3ef912545844bf86e6074b15c44f8a136ce33301058c
kernel-PAE-2.6.18-194.el5.i686.rpm SHA-256: 0a68ad5e5fdf02716c1108955ca1b3a1ca19691f1b9acd3d1bf694022a8e98c2
kernel-PAE-devel-2.6.18-194.el5.i686.rpm SHA-256: 0c56d40e22a41aa5852170f710448243a8d59e54c88d051ca17b4cc99bd6a5e7
kernel-debug-2.6.18-194.el5.i686.rpm SHA-256: 50262eea59b236bbbd8051e1fad44d0bb5edcbf4466d99b411bdf405282bce9f
kernel-debug-devel-2.6.18-194.el5.i686.rpm SHA-256: 829e82f402c46e2521e9a145b6e390d4cdd704f01429d839bdf365390ed4d5dc
kernel-devel-2.6.18-194.el5.i686.rpm SHA-256: 01128b67107d6d9b4c2f4b5d30ae94c86a973aeb3eaf4d2b512f0edb5f5987d5
kernel-doc-2.6.18-194.el5.noarch.rpm SHA-256: 597d978f3da3bad0604fc12dc96c5239e5c70d30fcf5b78e4efa223608b3b4f4
kernel-headers-2.6.18-194.el5.i386.rpm SHA-256: a6fd88fe1c25dfd1a2162738f35709fbdcd553ca8cf50248b0e36d0cc7135cd4
kernel-xen-2.6.18-194.el5.i686.rpm SHA-256: 7db1b2d8d261acc1175dace71f82309e13d312b2a3816315a468bbe7c039525a
kernel-xen-devel-2.6.18-194.el5.i686.rpm SHA-256: 7f3b21dfc96a3094ac993cc675d8f84b05c406e3a33c3f1a30cafc4ff6215d10

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility