Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2010:0398 - Security Advisory
Issued:
2010-05-06
Updated:
2010-05-06

RHSA-2010:0398 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • a flaw was found in the Unidirectional Lightweight Encapsulation (ULE)

implementation. A remote attacker could send a specially-crafted ISO
MPEG-2 Transport Stream (TS) frame to a target system, resulting in an
infinite loop (denial of service). (CVE-2010-1086, Important)

  • on AMD64 systems, it was discovered that the kernel did not ensure the

ELF interpreter was available before making a call to the SET_PERSONALITY
macro. A local attacker could use this flaw to cause a denial of service by
running a 32-bit application that attempts to execute a 64-bit application.
(CVE-2010-0307, Moderate)

  • a flaw was found in the kernel connector implementation. A local,

unprivileged user could trigger this flaw by sending an arbitrary number
of notification requests using specially-crafted netlink messages,
resulting in a denial of service. (CVE-2010-0410, Moderate)

  • a flaw was found in the Memory-mapped I/O (MMIO) instruction decoder in

the Xen hypervisor implementation. An unprivileged guest user could use
this flaw to trick the hypervisor into emulating a certain instruction,
which could crash the guest (denial of service). (CVE-2010-0730, Moderate)

  • a divide-by-zero flaw was found in the azx_position_ok() function in the

driver for Intel High Definition Audio, snd-hda-intel. A local,
unprivileged user could trigger this flaw to cause a kernel crash (denial
of service). (CVE-2010-1085, Moderate)

This update also fixes the following bugs:

  • in some cases, booting a system with the "iommu=on" kernel parameter

resulted in a Xen hypervisor panic. (BZ#580199)

  • the fnic driver flushed the Rx queue instead of the Tx queue after

fabric login. This caused crashes in some cases. (BZ#580829)

  • "kernel unaligned access" warnings were logged to the dmesg log on some

systems. (BZ#580832)

  • the "Northbridge Error, node 1, core: -1 K8 ECC error" error occurred on

some systems using the amd64_edac driver. (BZ#580836)

  • in rare circumstances, when using kdump and booting a kernel with

"crashkernel=128M@16M", the kdump kernel did not boot after a crash.
(BZ#580838)

  • TLB page table entry flushing was done incorrectly on IBM System z,

possibly causing crashes, subtle data inconsistency, or other issues.
(BZ#580839)

  • iSCSI failover times were slower than in Red Hat Enterprise Linux 5.3.

(BZ#580840)

  • fixed floating point state corruption after signal. (BZ#580841)
  • in certain circumstances, under heavy load, certain network interface

cards using the bnx2 driver and configured to use MSI-X, could stop
processing interrupts and then network connectivity would cease.
(BZ#587799)

  • cnic parts resets could cause a deadlock when the bnx2 device was

enslaved in a bonding device and that device had an associated VLAN.
(BZ#581148)

  • some BIOS implementations initialized interrupt remapping hardware in a

way the Xen hypervisor implementation did not expect. This could have
caused a system hang during boot. (BZ#581150)

  • AMD Magny-Cours systems panicked when booting a 32-bit kernel.

(BZ#580846)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 560547 - CVE-2010-0307 kernel: DoS on x86_64
  • BZ - 561682 - CVE-2010-0410 kernel: OOM/crash in drivers/connector
  • BZ - 567168 - CVE-2010-1085 kernel: ALSA: hda-intel: Avoid divide by zero crash
  • BZ - 569237 - CVE-2010-1086 kernel: dvb-core: DoS bug in ULE decapsulation code
  • BZ - 572971 - CVE-2010-0730 xen: emulator instruction decoding inconsistency
  • BZ - 580199 - xen: clear ioapic registers on boot [rhel-5.5.z]
  • BZ - 580829 - [Cisco 5.6 bug] fnic: flush Tx queue bug fix [rhel-5.5.z]
  • BZ - 580832 - kernel unaligned messages from mptsas_firmware_event_work [rhel-5.5.z]
  • BZ - 580836 - EDAC driver error on system with bad memory [rhel-5.5.z]
  • BZ - 580838 - [5.4]System panic occurred during boot sequence with the server which carries 256GMB physical memory. [rhel-5.5.z]
  • BZ - 580839 - kernel: correct TLB flush of page table entries concurrently used by another cpu [rhel-5.5.z]
  • BZ - 580840 - REGRESSION: Fix iscsi failover time [rhel-5.5.z]
  • BZ - 580841 - floating point register state corruption after handling SIGSEGV [rhel-5.5.z]
  • BZ - 581148 - Kernel: network: bonding: scheduling while atomic: ifdown-eth/0x00000100/21775 [rhel-5.5.z]
  • BZ - 581150 - [Intel 5.6 Virt Bug] [VT-d] Dom0 booting may hang on Westmere-EP with intremap enabled [rhel-5.5.z]
  • BZ - 587799 - NIC doesn't register packets [rhel-5.5.z]

CVEs

  • CVE-2010-0307
  • CVE-2010-0410
  • CVE-2010-1086
  • CVE-2010-1085
  • CVE-2010-0730

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-194.3.1.el5.src.rpm SHA-256: 5e28d71e716588fcac5bfbd0077a1b782111b47cfda33983c32c8d7777469647
x86_64
kernel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 139ebe7babc9a24321e8c48c7e07030b589ddb8f3d4d0347c1b7dc4881691823
kernel-debug-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: cb7cdfa348f86af4d55e2376a7117c443386c5a418af71a8293f5e0214774232
kernel-debug-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 22cf7d1167c7d9b45538e8788615bce2ea6d71e34cd642aa8f5a6f750443fc95
kernel-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: e2b2a37871328d8d4a93179ceeee4f79cf3c4cf1289d93aa40e2511e3d1075fb
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 1399ab7608d5d005793ddc3e4a52d6917c075963019381284e95496645b17ec2
kernel-xen-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 090eb497ecf1c526d893821f0070aad4e739ad81b34eed535c37cd2b82b4683e
kernel-xen-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: cee70aa0c1dd44fdb9b1b7148fc04ab4aba8b0cdb2c6aac3a61003478fa9e8be
ia64
kernel-2.6.18-194.3.1.el5.ia64.rpm SHA-256: 068712c5afad946a4bd857596ecd50fbc9a52d5f6b986f756c213f847a0bf4b3
kernel-debug-2.6.18-194.3.1.el5.ia64.rpm SHA-256: fb61bd1bc0b43d1d18c41e9202798aeb49ced138e66e61327e69761a27c9fb3a
kernel-debug-devel-2.6.18-194.3.1.el5.ia64.rpm SHA-256: 83e7bf53321311cc30e1382293a02cfcbfa408d5f4a6f77d016c69ff09d51f3d
kernel-devel-2.6.18-194.3.1.el5.ia64.rpm SHA-256: a48c7273975aec217a568e06cac0e6042d639acbf6f5f0978009201c6d963475
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.ia64.rpm SHA-256: af209364dac213d77669da679102be23348988020499d5d81e7362da2ddcd40a
kernel-xen-2.6.18-194.3.1.el5.ia64.rpm SHA-256: 14a7d1db8e83c69d306d1ee582359e20c6eb3c4ed5a1ec044852c33e48767e15
kernel-xen-devel-2.6.18-194.3.1.el5.ia64.rpm SHA-256: b5d25fd93f72240d8023fe308f828ead0cb59bf85020d257af065c96393749d2
i386
kernel-2.6.18-194.3.1.el5.i686.rpm SHA-256: baaea9a9f08524f75ebd9490df41c9446a1e0bd3bb2fe99743ba1d7722a33bd1
kernel-PAE-2.6.18-194.3.1.el5.i686.rpm SHA-256: bd3d4d3300662d2bd558fbe5cc030c9c3de16c54f35d5be344f5fb723a896aea
kernel-PAE-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 03b1e67b976947b9192a8c637e45ce0597ddfb4db2180a98d4b689ab924d5601
kernel-debug-2.6.18-194.3.1.el5.i686.rpm SHA-256: ebd19698f9442ed53244fbe00b30b7c1a9bbfab85b120a6560dd219555cb4509
kernel-debug-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 965c66fa9182b8cc18aa04bfe27cd01c852c36c181f7130b8009548520b92ae9
kernel-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: a6595f48c6c10a154470bb44a0aadc64c07986a5c6895b242743cb75d161f846
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.i386.rpm SHA-256: ccfdee6563fce7649b1c0745633738e7854507c697e56a79b232a40eea6b13f9
kernel-xen-2.6.18-194.3.1.el5.i686.rpm SHA-256: 4fc4a552a87ab511e01f9844d17ca77bd75607e88064b6f4762ff20b9f28d6e8
kernel-xen-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 8f054db1134d3f26b53e00c73ee067ea0a3a3c56d2a6469250a1a0a628be45ac

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-194.3.1.el5.src.rpm SHA-256: 5e28d71e716588fcac5bfbd0077a1b782111b47cfda33983c32c8d7777469647
x86_64
kernel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 139ebe7babc9a24321e8c48c7e07030b589ddb8f3d4d0347c1b7dc4881691823
kernel-debug-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: cb7cdfa348f86af4d55e2376a7117c443386c5a418af71a8293f5e0214774232
kernel-debug-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 22cf7d1167c7d9b45538e8788615bce2ea6d71e34cd642aa8f5a6f750443fc95
kernel-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: e2b2a37871328d8d4a93179ceeee4f79cf3c4cf1289d93aa40e2511e3d1075fb
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 1399ab7608d5d005793ddc3e4a52d6917c075963019381284e95496645b17ec2
kernel-xen-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 090eb497ecf1c526d893821f0070aad4e739ad81b34eed535c37cd2b82b4683e
kernel-xen-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: cee70aa0c1dd44fdb9b1b7148fc04ab4aba8b0cdb2c6aac3a61003478fa9e8be
i386
kernel-2.6.18-194.3.1.el5.i686.rpm SHA-256: baaea9a9f08524f75ebd9490df41c9446a1e0bd3bb2fe99743ba1d7722a33bd1
kernel-PAE-2.6.18-194.3.1.el5.i686.rpm SHA-256: bd3d4d3300662d2bd558fbe5cc030c9c3de16c54f35d5be344f5fb723a896aea
kernel-PAE-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 03b1e67b976947b9192a8c637e45ce0597ddfb4db2180a98d4b689ab924d5601
kernel-debug-2.6.18-194.3.1.el5.i686.rpm SHA-256: ebd19698f9442ed53244fbe00b30b7c1a9bbfab85b120a6560dd219555cb4509
kernel-debug-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 965c66fa9182b8cc18aa04bfe27cd01c852c36c181f7130b8009548520b92ae9
kernel-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: a6595f48c6c10a154470bb44a0aadc64c07986a5c6895b242743cb75d161f846
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.i386.rpm SHA-256: ccfdee6563fce7649b1c0745633738e7854507c697e56a79b232a40eea6b13f9
kernel-xen-2.6.18-194.3.1.el5.i686.rpm SHA-256: 4fc4a552a87ab511e01f9844d17ca77bd75607e88064b6f4762ff20b9f28d6e8
kernel-xen-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 8f054db1134d3f26b53e00c73ee067ea0a3a3c56d2a6469250a1a0a628be45ac

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-194.3.1.el5.src.rpm SHA-256: 5e28d71e716588fcac5bfbd0077a1b782111b47cfda33983c32c8d7777469647
x86_64
kernel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 139ebe7babc9a24321e8c48c7e07030b589ddb8f3d4d0347c1b7dc4881691823
kernel-debug-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: cb7cdfa348f86af4d55e2376a7117c443386c5a418af71a8293f5e0214774232
kernel-debug-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 22cf7d1167c7d9b45538e8788615bce2ea6d71e34cd642aa8f5a6f750443fc95
kernel-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: e2b2a37871328d8d4a93179ceeee4f79cf3c4cf1289d93aa40e2511e3d1075fb
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 1399ab7608d5d005793ddc3e4a52d6917c075963019381284e95496645b17ec2
kernel-xen-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 090eb497ecf1c526d893821f0070aad4e739ad81b34eed535c37cd2b82b4683e
kernel-xen-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: cee70aa0c1dd44fdb9b1b7148fc04ab4aba8b0cdb2c6aac3a61003478fa9e8be
i386
kernel-2.6.18-194.3.1.el5.i686.rpm SHA-256: baaea9a9f08524f75ebd9490df41c9446a1e0bd3bb2fe99743ba1d7722a33bd1
kernel-PAE-2.6.18-194.3.1.el5.i686.rpm SHA-256: bd3d4d3300662d2bd558fbe5cc030c9c3de16c54f35d5be344f5fb723a896aea
kernel-PAE-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 03b1e67b976947b9192a8c637e45ce0597ddfb4db2180a98d4b689ab924d5601
kernel-debug-2.6.18-194.3.1.el5.i686.rpm SHA-256: ebd19698f9442ed53244fbe00b30b7c1a9bbfab85b120a6560dd219555cb4509
kernel-debug-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 965c66fa9182b8cc18aa04bfe27cd01c852c36c181f7130b8009548520b92ae9
kernel-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: a6595f48c6c10a154470bb44a0aadc64c07986a5c6895b242743cb75d161f846
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.i386.rpm SHA-256: ccfdee6563fce7649b1c0745633738e7854507c697e56a79b232a40eea6b13f9
kernel-xen-2.6.18-194.3.1.el5.i686.rpm SHA-256: 4fc4a552a87ab511e01f9844d17ca77bd75607e88064b6f4762ff20b9f28d6e8
kernel-xen-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 8f054db1134d3f26b53e00c73ee067ea0a3a3c56d2a6469250a1a0a628be45ac

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-194.3.1.el5.src.rpm SHA-256: 5e28d71e716588fcac5bfbd0077a1b782111b47cfda33983c32c8d7777469647
s390x
kernel-2.6.18-194.3.1.el5.s390x.rpm SHA-256: d3c4eb46d9feb1d12760e4c4c5c1664617e8692aa2669d099f545ce74d50646e
kernel-debug-2.6.18-194.3.1.el5.s390x.rpm SHA-256: f73eef2c96112f63087c0efb93371165f8c06ee343d5d0656cea513d2ee663f7
kernel-debug-devel-2.6.18-194.3.1.el5.s390x.rpm SHA-256: 2d06d77cc5922354538ec3caeee60e809e406455568b21f5535858d261cdfcd4
kernel-devel-2.6.18-194.3.1.el5.s390x.rpm SHA-256: 0406523a9ed4d085f4d1a3676e3af793aeda3ea3d4672c2d4f74a3d72ce80710
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.s390x.rpm SHA-256: 4fbb6c8fe526259120245cdaa66060ecbc2a8ed3e0464a82b99ec240f184639f
kernel-kdump-2.6.18-194.3.1.el5.s390x.rpm SHA-256: 3c2a203a0e9ec78dc9a324c246653a5a4ca1818165a39a164430318cae74bb57
kernel-kdump-devel-2.6.18-194.3.1.el5.s390x.rpm SHA-256: f44090e67244620d7958602431623fd19c7a00d41f8948e2aff029c6fdd09f4e

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-194.3.1.el5.src.rpm SHA-256: 5e28d71e716588fcac5bfbd0077a1b782111b47cfda33983c32c8d7777469647
ppc
kernel-2.6.18-194.3.1.el5.ppc64.rpm SHA-256: e4b258c2796b241fed00e09cbe1b1404de644ca970b6356712b15341973a4072
kernel-debug-2.6.18-194.3.1.el5.ppc64.rpm SHA-256: 8c6237824b9b36f04815855dad82879ccf345bf3cd183bcb6ae4af7faba1c1d3
kernel-debug-devel-2.6.18-194.3.1.el5.ppc64.rpm SHA-256: 463964c39db78acab9465c0e476688d0d55435913dfb39e3f81bc18dc62f2f35
kernel-devel-2.6.18-194.3.1.el5.ppc64.rpm SHA-256: 61b83b0df8fd09ae3de5e30c28b3549db5287db24f12669b15214bfe766d1ba9
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.ppc.rpm SHA-256: 16fea9bf8f16a0064bb7463fa3b8d5bcce25623541e349e23c0d5f2cc50341f5
kernel-headers-2.6.18-194.3.1.el5.ppc64.rpm SHA-256: 8037dd43ced71b032857b969df6321dd0d42a84b3704bbeae0af76f77c197989
kernel-kdump-2.6.18-194.3.1.el5.ppc64.rpm SHA-256: 76d2e66eea941c5e93bac5d80efa41a7b9138d935eb9a384879fe985180af590
kernel-kdump-devel-2.6.18-194.3.1.el5.ppc64.rpm SHA-256: 80c47446e0059998ce8856833977c70521749644ea63a620f8e9ff0083b124da

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-194.3.1.el5.src.rpm SHA-256: 5e28d71e716588fcac5bfbd0077a1b782111b47cfda33983c32c8d7777469647
x86_64
kernel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 139ebe7babc9a24321e8c48c7e07030b589ddb8f3d4d0347c1b7dc4881691823
kernel-debug-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: cb7cdfa348f86af4d55e2376a7117c443386c5a418af71a8293f5e0214774232
kernel-debug-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 22cf7d1167c7d9b45538e8788615bce2ea6d71e34cd642aa8f5a6f750443fc95
kernel-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: e2b2a37871328d8d4a93179ceeee4f79cf3c4cf1289d93aa40e2511e3d1075fb
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 1399ab7608d5d005793ddc3e4a52d6917c075963019381284e95496645b17ec2
kernel-xen-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: 090eb497ecf1c526d893821f0070aad4e739ad81b34eed535c37cd2b82b4683e
kernel-xen-devel-2.6.18-194.3.1.el5.x86_64.rpm SHA-256: cee70aa0c1dd44fdb9b1b7148fc04ab4aba8b0cdb2c6aac3a61003478fa9e8be
i386
kernel-2.6.18-194.3.1.el5.i686.rpm SHA-256: baaea9a9f08524f75ebd9490df41c9446a1e0bd3bb2fe99743ba1d7722a33bd1
kernel-PAE-2.6.18-194.3.1.el5.i686.rpm SHA-256: bd3d4d3300662d2bd558fbe5cc030c9c3de16c54f35d5be344f5fb723a896aea
kernel-PAE-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 03b1e67b976947b9192a8c637e45ce0597ddfb4db2180a98d4b689ab924d5601
kernel-debug-2.6.18-194.3.1.el5.i686.rpm SHA-256: ebd19698f9442ed53244fbe00b30b7c1a9bbfab85b120a6560dd219555cb4509
kernel-debug-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 965c66fa9182b8cc18aa04bfe27cd01c852c36c181f7130b8009548520b92ae9
kernel-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: a6595f48c6c10a154470bb44a0aadc64c07986a5c6895b242743cb75d161f846
kernel-doc-2.6.18-194.3.1.el5.noarch.rpm SHA-256: a173d44c1be137c92ec0669a9190492cc84f407f89abdc6d4cc27cc285e006c8
kernel-headers-2.6.18-194.3.1.el5.i386.rpm SHA-256: ccfdee6563fce7649b1c0745633738e7854507c697e56a79b232a40eea6b13f9
kernel-xen-2.6.18-194.3.1.el5.i686.rpm SHA-256: 4fc4a552a87ab511e01f9844d17ca77bd75607e88064b6f4762ff20b9f28d6e8
kernel-xen-devel-2.6.18-194.3.1.el5.i686.rpm SHA-256: 8f054db1134d3f26b53e00c73ee067ea0a3a3c56d2a6469250a1a0a628be45ac

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter