Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0704 - Security Advisory
Issued:
2010-09-21
Updated:
2010-09-21

RHSA-2010:0704 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • The compat_alloc_user_space() function in the Linux kernel 32/64-bit

compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel if its length argument
can be controlled from user-space. On 64-bit systems, a local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)

Red Hat would like to thank Ben Hawkes for reporting this issue.

Red Hat is aware that a public exploit for this issue is available. Refer
to Knowledgebase article DOC-40265 for further details:
https://access.redhat.com/kb/docs/DOC-40265

Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 634457 - CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow

CVEs

  • CVE-2010-3081

References

  • http://www.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/kb/docs/DOC-40265
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-194.11.4.el5.src.rpm SHA-256: 098109b2fbabeec4a3229287520d6e06b46ae1a2df7163a6de280a62a5b79c1a
x86_64
kernel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 742b6c299ad5a793c0e78452341849bacbb1ba35a503d5b2634fcd1051320973
kernel-debug-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: c5e867856aa121b2680dc16cf145ea6e3cd2a72f410bbaf72c14cca1a8787072
kernel-debug-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 55111d7c7cb749530352464506f80973166469ee4340b3fb7f1882be4d3943ef
kernel-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: b49b9a1df8149f91aac1f6d29779abc61682ef7fa28d624f3cadd0adf594140e
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: e9d94db6c2ab7c5e649fb2d001f2243fcc3c6ac228f80dcc4b7131de87b08007
kernel-xen-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 45779561dd9cc24576c3dcbdd20ee358b2c90e3bc6615afe8de4b224ea4ad3d2
kernel-xen-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 81eb81f102ca863024124a544b102ec0a12a52212edbb2a79f80e09b2c77f4cc
ia64
kernel-2.6.18-194.11.4.el5.ia64.rpm SHA-256: 891befe22f0dcf246a79dbf9ebe44c58a659d20ec2f4d32c26fe081855acf492
kernel-debug-2.6.18-194.11.4.el5.ia64.rpm SHA-256: 2bba5ac901f58432b707006504f7849ef30eb776ecd2e1f236ab11e89e677eac
kernel-debug-devel-2.6.18-194.11.4.el5.ia64.rpm SHA-256: 60665ed8908f87bf01e73c178d7f5af4ae7a1de09c6e1801ee61d6d9682854dc
kernel-devel-2.6.18-194.11.4.el5.ia64.rpm SHA-256: 20168857aede4076b5b05d06db814db5c4a9ff94be584c6e06b256ff3ce959cb
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.ia64.rpm SHA-256: 6343eb98d98957e0f2650715d536c493022cc89d028e9e9416d5d58f6ac2c8d2
kernel-xen-2.6.18-194.11.4.el5.ia64.rpm SHA-256: 62ff78a9cb0d39e70d47ca10310ae9b1468f3a4c7d3d9128d3de2b96459887ac
kernel-xen-devel-2.6.18-194.11.4.el5.ia64.rpm SHA-256: d2cb4eea8a54fd59668e737b5b0399f8d28c043986e25e2360ccba812c10ca5c
i386
kernel-2.6.18-194.11.4.el5.i686.rpm SHA-256: b484a801cfea8db450f501c579c8e1cd5a830aafcd33d25b80029d547e117d85
kernel-PAE-2.6.18-194.11.4.el5.i686.rpm SHA-256: 4c3f6b75841f9ccc4ba493c25ac66cdee274af7d710f936acc600afbd6c1cb1a
kernel-PAE-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 53b9bec9a6d74b6f1b26d98a7ed2348d7bafa7778749951f93a6794151e48547
kernel-debug-2.6.18-194.11.4.el5.i686.rpm SHA-256: 8d399713f081f68a1aa9ae98a0d8bc4e62fd4581ba5ff106c55fcb9e107f365a
kernel-debug-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: dbf43680f23a9979e6d74ccd1d19980526351add722dafecb6db0e95a7bff79c
kernel-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 853d2a87df35cbc799d860e6d67630714bb2286cf3ca5d594f28acb071c3c3b0
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.i386.rpm SHA-256: 68aabb4cfe3fe2c2a17d808451e67748dc089f8ff7560b6c767a1d0b88d8d652
kernel-xen-2.6.18-194.11.4.el5.i686.rpm SHA-256: be992d79601d877c9785913691475895ff59aea9dbb1dfb987049b3d8648b4a9
kernel-xen-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 099d7ee2ee26c02b2c96688735afc4d5e783fe5161ed8a64190b6c55a3e95d10

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-194.11.4.el5.src.rpm SHA-256: 098109b2fbabeec4a3229287520d6e06b46ae1a2df7163a6de280a62a5b79c1a
x86_64
kernel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 742b6c299ad5a793c0e78452341849bacbb1ba35a503d5b2634fcd1051320973
kernel-debug-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: c5e867856aa121b2680dc16cf145ea6e3cd2a72f410bbaf72c14cca1a8787072
kernel-debug-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 55111d7c7cb749530352464506f80973166469ee4340b3fb7f1882be4d3943ef
kernel-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: b49b9a1df8149f91aac1f6d29779abc61682ef7fa28d624f3cadd0adf594140e
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: e9d94db6c2ab7c5e649fb2d001f2243fcc3c6ac228f80dcc4b7131de87b08007
kernel-xen-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 45779561dd9cc24576c3dcbdd20ee358b2c90e3bc6615afe8de4b224ea4ad3d2
kernel-xen-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 81eb81f102ca863024124a544b102ec0a12a52212edbb2a79f80e09b2c77f4cc
i386
kernel-2.6.18-194.11.4.el5.i686.rpm SHA-256: b484a801cfea8db450f501c579c8e1cd5a830aafcd33d25b80029d547e117d85
kernel-PAE-2.6.18-194.11.4.el5.i686.rpm SHA-256: 4c3f6b75841f9ccc4ba493c25ac66cdee274af7d710f936acc600afbd6c1cb1a
kernel-PAE-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 53b9bec9a6d74b6f1b26d98a7ed2348d7bafa7778749951f93a6794151e48547
kernel-debug-2.6.18-194.11.4.el5.i686.rpm SHA-256: 8d399713f081f68a1aa9ae98a0d8bc4e62fd4581ba5ff106c55fcb9e107f365a
kernel-debug-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: dbf43680f23a9979e6d74ccd1d19980526351add722dafecb6db0e95a7bff79c
kernel-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 853d2a87df35cbc799d860e6d67630714bb2286cf3ca5d594f28acb071c3c3b0
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.i386.rpm SHA-256: 68aabb4cfe3fe2c2a17d808451e67748dc089f8ff7560b6c767a1d0b88d8d652
kernel-xen-2.6.18-194.11.4.el5.i686.rpm SHA-256: be992d79601d877c9785913691475895ff59aea9dbb1dfb987049b3d8648b4a9
kernel-xen-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 099d7ee2ee26c02b2c96688735afc4d5e783fe5161ed8a64190b6c55a3e95d10

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-194.11.4.el5.src.rpm SHA-256: 098109b2fbabeec4a3229287520d6e06b46ae1a2df7163a6de280a62a5b79c1a
x86_64
kernel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 742b6c299ad5a793c0e78452341849bacbb1ba35a503d5b2634fcd1051320973
kernel-debug-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: c5e867856aa121b2680dc16cf145ea6e3cd2a72f410bbaf72c14cca1a8787072
kernel-debug-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 55111d7c7cb749530352464506f80973166469ee4340b3fb7f1882be4d3943ef
kernel-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: b49b9a1df8149f91aac1f6d29779abc61682ef7fa28d624f3cadd0adf594140e
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: e9d94db6c2ab7c5e649fb2d001f2243fcc3c6ac228f80dcc4b7131de87b08007
kernel-xen-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 45779561dd9cc24576c3dcbdd20ee358b2c90e3bc6615afe8de4b224ea4ad3d2
kernel-xen-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 81eb81f102ca863024124a544b102ec0a12a52212edbb2a79f80e09b2c77f4cc
i386
kernel-2.6.18-194.11.4.el5.i686.rpm SHA-256: b484a801cfea8db450f501c579c8e1cd5a830aafcd33d25b80029d547e117d85
kernel-PAE-2.6.18-194.11.4.el5.i686.rpm SHA-256: 4c3f6b75841f9ccc4ba493c25ac66cdee274af7d710f936acc600afbd6c1cb1a
kernel-PAE-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 53b9bec9a6d74b6f1b26d98a7ed2348d7bafa7778749951f93a6794151e48547
kernel-debug-2.6.18-194.11.4.el5.i686.rpm SHA-256: 8d399713f081f68a1aa9ae98a0d8bc4e62fd4581ba5ff106c55fcb9e107f365a
kernel-debug-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: dbf43680f23a9979e6d74ccd1d19980526351add722dafecb6db0e95a7bff79c
kernel-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 853d2a87df35cbc799d860e6d67630714bb2286cf3ca5d594f28acb071c3c3b0
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.i386.rpm SHA-256: 68aabb4cfe3fe2c2a17d808451e67748dc089f8ff7560b6c767a1d0b88d8d652
kernel-xen-2.6.18-194.11.4.el5.i686.rpm SHA-256: be992d79601d877c9785913691475895ff59aea9dbb1dfb987049b3d8648b4a9
kernel-xen-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 099d7ee2ee26c02b2c96688735afc4d5e783fe5161ed8a64190b6c55a3e95d10

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-194.11.4.el5.src.rpm SHA-256: 098109b2fbabeec4a3229287520d6e06b46ae1a2df7163a6de280a62a5b79c1a
s390x
kernel-2.6.18-194.11.4.el5.s390x.rpm SHA-256: 2ec14296e342c7bfbb82987842728905d0130b3312c42ad07c58b51904ac3fc1
kernel-debug-2.6.18-194.11.4.el5.s390x.rpm SHA-256: 7bbc88da9ea5fcc8e587d2fb3f50b21ee956be77c9a446b1bec04856a3721c68
kernel-debug-devel-2.6.18-194.11.4.el5.s390x.rpm SHA-256: ad8f151e3f4c97cbaaed12e62dd8ad2cea3e44865c5ab6ea7013f9cc25a43f5c
kernel-devel-2.6.18-194.11.4.el5.s390x.rpm SHA-256: 7f8688a64513cfb30567326a353fa41d5b3afdc53865df926ab1f65bcae13741
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.s390x.rpm SHA-256: 99c840281f2ab87c63e53bd9d2a2b360d0fecee41015d1b1a56720c7bc9e4a94
kernel-kdump-2.6.18-194.11.4.el5.s390x.rpm SHA-256: a33792b148a1b1ccc4ad9c312dc3a3b1937c3684e1283d7c3fa0b5f912dcb89a
kernel-kdump-devel-2.6.18-194.11.4.el5.s390x.rpm SHA-256: b4c9d75f440b956e0bfe448be2cc3fbbb22e97c9d23609ea8ac6f65cc36f3c31

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-194.11.4.el5.src.rpm SHA-256: 098109b2fbabeec4a3229287520d6e06b46ae1a2df7163a6de280a62a5b79c1a
ppc
kernel-2.6.18-194.11.4.el5.ppc64.rpm SHA-256: 8d1a819494d86923865d77de9d693859c678817718f53b6ce5c310001bccd0b5
kernel-debug-2.6.18-194.11.4.el5.ppc64.rpm SHA-256: 2b76287673ab8298343c6975ac0720d20829c081535b9a6c25f8d1ca33076853
kernel-debug-devel-2.6.18-194.11.4.el5.ppc64.rpm SHA-256: 9b14e0e13865dc0fffd68b1cf5c78e1dad73ebbe287ff669a005a8b2509e20c4
kernel-devel-2.6.18-194.11.4.el5.ppc64.rpm SHA-256: 4d121c39010a70b6517dd7b751761c8a073abf08cc91aa24178771b4af4265dc
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.ppc.rpm SHA-256: 8f0c738d5ca261cdebb4e8661bf94b124f12ac3ec7a1770ea42a7fbc0996da51
kernel-headers-2.6.18-194.11.4.el5.ppc64.rpm SHA-256: 0b83e9671c8394948fec32a76de35a1f0a65dd53d00d1f8ff6d3f9b09150043f
kernel-kdump-2.6.18-194.11.4.el5.ppc64.rpm SHA-256: d2575c27071a4c07a4ff3a9da7d6ae04308da1e20103bd255a2a0045c473780d
kernel-kdump-devel-2.6.18-194.11.4.el5.ppc64.rpm SHA-256: c2031c830fd8374f5d7cad8847e1d77602d2eee08153eadc18b1572d342bbc52

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-194.11.4.el5.src.rpm SHA-256: 098109b2fbabeec4a3229287520d6e06b46ae1a2df7163a6de280a62a5b79c1a
x86_64
kernel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 742b6c299ad5a793c0e78452341849bacbb1ba35a503d5b2634fcd1051320973
kernel-debug-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: c5e867856aa121b2680dc16cf145ea6e3cd2a72f410bbaf72c14cca1a8787072
kernel-debug-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 55111d7c7cb749530352464506f80973166469ee4340b3fb7f1882be4d3943ef
kernel-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: b49b9a1df8149f91aac1f6d29779abc61682ef7fa28d624f3cadd0adf594140e
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: e9d94db6c2ab7c5e649fb2d001f2243fcc3c6ac228f80dcc4b7131de87b08007
kernel-xen-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 45779561dd9cc24576c3dcbdd20ee358b2c90e3bc6615afe8de4b224ea4ad3d2
kernel-xen-devel-2.6.18-194.11.4.el5.x86_64.rpm SHA-256: 81eb81f102ca863024124a544b102ec0a12a52212edbb2a79f80e09b2c77f4cc
i386
kernel-2.6.18-194.11.4.el5.i686.rpm SHA-256: b484a801cfea8db450f501c579c8e1cd5a830aafcd33d25b80029d547e117d85
kernel-PAE-2.6.18-194.11.4.el5.i686.rpm SHA-256: 4c3f6b75841f9ccc4ba493c25ac66cdee274af7d710f936acc600afbd6c1cb1a
kernel-PAE-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 53b9bec9a6d74b6f1b26d98a7ed2348d7bafa7778749951f93a6794151e48547
kernel-debug-2.6.18-194.11.4.el5.i686.rpm SHA-256: 8d399713f081f68a1aa9ae98a0d8bc4e62fd4581ba5ff106c55fcb9e107f365a
kernel-debug-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: dbf43680f23a9979e6d74ccd1d19980526351add722dafecb6db0e95a7bff79c
kernel-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 853d2a87df35cbc799d860e6d67630714bb2286cf3ca5d594f28acb071c3c3b0
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.i386.rpm SHA-256: 68aabb4cfe3fe2c2a17d808451e67748dc089f8ff7560b6c767a1d0b88d8d652
kernel-xen-2.6.18-194.11.4.el5.i686.rpm SHA-256: be992d79601d877c9785913691475895ff59aea9dbb1dfb987049b3d8648b4a9
kernel-xen-devel-2.6.18-194.11.4.el5.i686.rpm SHA-256: 099d7ee2ee26c02b2c96688735afc4d5e783fe5161ed8a64190b6c55a3e95d10

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility