Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0792 - Security Advisory
Issued:
2010-10-25
Updated:
2010-10-25

RHSA-2010:0792 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • The rds_page_copy_user() function in the Linux kernel Reliable Datagram

Sockets (RDS) protocol implementation was missing sanity checks. A local,
unprivileged user could use this flaw to escalate their privileges.
(CVE-2010-3904, Important)

Red Hat would like to thank Dan Rosenberg of Virtual Security Research for
reporting this issue.

Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 642896 - CVE-2010-3904 RDS sockets local privilege escalation

CVEs

  • CVE-2010-3904

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-194.17.4.el5.src.rpm SHA-256: a20bccdad9d454b19fc5c5701b099a60fbaa363f4823ee167c01402f4cac0d73
x86_64
kernel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: d721e5a13701939ea2bda150684428c7fefa02a1df14f7104d5f8776294a441e
kernel-debug-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 7e294df1f786aca9aeb53bbde9a0d15a19649e41fa5ccc52818daaa173e709f1
kernel-debug-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 87e557a7fe29169febf6b47cd66d314b559a39c8e3e1c29638db70da4331024a
kernel-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: fcdfe37bee426e86bca1bc7c4e5cf77650d8a1fe5183703bb7fd8fa71fad053c
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 9029d555e6adafce5089ab99c1d7501dd8fc9d8fd3afe3ceede4243987623166
kernel-xen-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 84c04eab4061983fe2946e1ef5d622a91c4d3d5883c5e4c9307f2ff334224734
kernel-xen-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 8dfacefded18dd460d98081ff72212f043ca21833c3733089a631ae3cd24226d
ia64
kernel-2.6.18-194.17.4.el5.ia64.rpm SHA-256: d1fb9076e171f9e8bb20c797b68ff7ef4a3bf73afe0c8c00b3d2d410db39e111
kernel-debug-2.6.18-194.17.4.el5.ia64.rpm SHA-256: 65f21f94ea24049857bef299904b8c6edee7b92087a0dd701951789d3d0b0a96
kernel-debug-devel-2.6.18-194.17.4.el5.ia64.rpm SHA-256: a17eda0804a903d1a7b5ef3d34dd6cf9a8e2e1b3425bcd902aa3d7f0576df428
kernel-devel-2.6.18-194.17.4.el5.ia64.rpm SHA-256: 27cedd1e1d7830751242a77becb249be33a82162b9673642e120bb577bc65ff3
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.ia64.rpm SHA-256: 1a1685a630af6193ed3ecd81b114160f2e9135350cc663137d0697d41461417e
kernel-xen-2.6.18-194.17.4.el5.ia64.rpm SHA-256: a79eca6136c91fb70df84a5a29d2153c79d48f8a2df61faf513730745fa49f27
kernel-xen-devel-2.6.18-194.17.4.el5.ia64.rpm SHA-256: a5cdafd0fa434fe60089eb597725c972c26553c158b5f5659f892460b92b51ec
i386
kernel-2.6.18-194.17.4.el5.i686.rpm SHA-256: f0a41dc1941f1ba03cb01ab877697c2abd259175133270380957eaa47abfef00
kernel-PAE-2.6.18-194.17.4.el5.i686.rpm SHA-256: 1bc7efdfe4596db8a13fc67658326f9196070821b4f354bf5a85a2494318f547
kernel-PAE-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: f34350bf415e31bd8b3785f5123c2c430da4863c224ac2ac746e73ca505be187
kernel-debug-2.6.18-194.17.4.el5.i686.rpm SHA-256: 503ef9bacfb85ca2ce4552338bac91c32721a40517c165114d6aeecf05d06c01
kernel-debug-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 0f4ffc6d19d0e937b39918d5f86a1039724482e207799d2871d54996a9beab82
kernel-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 546dcab040cef7637274cd609f1084064977d90be946d801ff2ec51b1988857c
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.i386.rpm SHA-256: 52f62770580cff254409a3ffb1561dd86c11e497a0b246a4b8452400d1a2e60e
kernel-xen-2.6.18-194.17.4.el5.i686.rpm SHA-256: a2a2de41c4966d17e8daa85cc69a19355fd2d121d76ab916ebbaf505d5a326a4
kernel-xen-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 1ddbc1376d7a694b948a7ec08a3e1055f0f0ef59393f4d72e3847e81588e547c

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-194.17.4.el5.src.rpm SHA-256: a20bccdad9d454b19fc5c5701b099a60fbaa363f4823ee167c01402f4cac0d73
x86_64
kernel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: d721e5a13701939ea2bda150684428c7fefa02a1df14f7104d5f8776294a441e
kernel-debug-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 7e294df1f786aca9aeb53bbde9a0d15a19649e41fa5ccc52818daaa173e709f1
kernel-debug-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 87e557a7fe29169febf6b47cd66d314b559a39c8e3e1c29638db70da4331024a
kernel-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: fcdfe37bee426e86bca1bc7c4e5cf77650d8a1fe5183703bb7fd8fa71fad053c
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 9029d555e6adafce5089ab99c1d7501dd8fc9d8fd3afe3ceede4243987623166
kernel-xen-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 84c04eab4061983fe2946e1ef5d622a91c4d3d5883c5e4c9307f2ff334224734
kernel-xen-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 8dfacefded18dd460d98081ff72212f043ca21833c3733089a631ae3cd24226d
i386
kernel-2.6.18-194.17.4.el5.i686.rpm SHA-256: f0a41dc1941f1ba03cb01ab877697c2abd259175133270380957eaa47abfef00
kernel-PAE-2.6.18-194.17.4.el5.i686.rpm SHA-256: 1bc7efdfe4596db8a13fc67658326f9196070821b4f354bf5a85a2494318f547
kernel-PAE-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: f34350bf415e31bd8b3785f5123c2c430da4863c224ac2ac746e73ca505be187
kernel-debug-2.6.18-194.17.4.el5.i686.rpm SHA-256: 503ef9bacfb85ca2ce4552338bac91c32721a40517c165114d6aeecf05d06c01
kernel-debug-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 0f4ffc6d19d0e937b39918d5f86a1039724482e207799d2871d54996a9beab82
kernel-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 546dcab040cef7637274cd609f1084064977d90be946d801ff2ec51b1988857c
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.i386.rpm SHA-256: 52f62770580cff254409a3ffb1561dd86c11e497a0b246a4b8452400d1a2e60e
kernel-xen-2.6.18-194.17.4.el5.i686.rpm SHA-256: a2a2de41c4966d17e8daa85cc69a19355fd2d121d76ab916ebbaf505d5a326a4
kernel-xen-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 1ddbc1376d7a694b948a7ec08a3e1055f0f0ef59393f4d72e3847e81588e547c

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-194.17.4.el5.src.rpm SHA-256: a20bccdad9d454b19fc5c5701b099a60fbaa363f4823ee167c01402f4cac0d73
x86_64
kernel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: d721e5a13701939ea2bda150684428c7fefa02a1df14f7104d5f8776294a441e
kernel-debug-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 7e294df1f786aca9aeb53bbde9a0d15a19649e41fa5ccc52818daaa173e709f1
kernel-debug-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 87e557a7fe29169febf6b47cd66d314b559a39c8e3e1c29638db70da4331024a
kernel-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: fcdfe37bee426e86bca1bc7c4e5cf77650d8a1fe5183703bb7fd8fa71fad053c
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 9029d555e6adafce5089ab99c1d7501dd8fc9d8fd3afe3ceede4243987623166
kernel-xen-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 84c04eab4061983fe2946e1ef5d622a91c4d3d5883c5e4c9307f2ff334224734
kernel-xen-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 8dfacefded18dd460d98081ff72212f043ca21833c3733089a631ae3cd24226d
i386
kernel-2.6.18-194.17.4.el5.i686.rpm SHA-256: f0a41dc1941f1ba03cb01ab877697c2abd259175133270380957eaa47abfef00
kernel-PAE-2.6.18-194.17.4.el5.i686.rpm SHA-256: 1bc7efdfe4596db8a13fc67658326f9196070821b4f354bf5a85a2494318f547
kernel-PAE-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: f34350bf415e31bd8b3785f5123c2c430da4863c224ac2ac746e73ca505be187
kernel-debug-2.6.18-194.17.4.el5.i686.rpm SHA-256: 503ef9bacfb85ca2ce4552338bac91c32721a40517c165114d6aeecf05d06c01
kernel-debug-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 0f4ffc6d19d0e937b39918d5f86a1039724482e207799d2871d54996a9beab82
kernel-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 546dcab040cef7637274cd609f1084064977d90be946d801ff2ec51b1988857c
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.i386.rpm SHA-256: 52f62770580cff254409a3ffb1561dd86c11e497a0b246a4b8452400d1a2e60e
kernel-xen-2.6.18-194.17.4.el5.i686.rpm SHA-256: a2a2de41c4966d17e8daa85cc69a19355fd2d121d76ab916ebbaf505d5a326a4
kernel-xen-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 1ddbc1376d7a694b948a7ec08a3e1055f0f0ef59393f4d72e3847e81588e547c

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-194.17.4.el5.src.rpm SHA-256: a20bccdad9d454b19fc5c5701b099a60fbaa363f4823ee167c01402f4cac0d73
s390x
kernel-2.6.18-194.17.4.el5.s390x.rpm SHA-256: 400496c2999460f1d9d261133cbf7258f0b7bf8147a7cda73be665aa930fd857
kernel-debug-2.6.18-194.17.4.el5.s390x.rpm SHA-256: 5cebed11c76a8ce2bf49d8176c6cbe9188bc1eb3b80c14b66f0ac9d9c1351380
kernel-debug-devel-2.6.18-194.17.4.el5.s390x.rpm SHA-256: ccafb143e4db7852a4bf49d4154e45f70b41879afa610d3c88908abb7c3c1926
kernel-devel-2.6.18-194.17.4.el5.s390x.rpm SHA-256: 2bcad6211145f499939533021a9b25e1bf5e15cbaad08a3cb843294f11b403d5
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.s390x.rpm SHA-256: 391ab69eb2e343827bf3ccfb2d6cadc0dcf09344cb4614b058e9323bbce8e843
kernel-kdump-2.6.18-194.17.4.el5.s390x.rpm SHA-256: c240b8e59a2900f76aa9f012d8410e71fea6d7d3ab00b0a0e64f6cf2f0377d6b
kernel-kdump-devel-2.6.18-194.17.4.el5.s390x.rpm SHA-256: 785b7ad1fbd7d25d345f86d47175a400d0280af574e191beb60db1775023092a

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-194.17.4.el5.src.rpm SHA-256: a20bccdad9d454b19fc5c5701b099a60fbaa363f4823ee167c01402f4cac0d73
ppc
kernel-2.6.18-194.17.4.el5.ppc64.rpm SHA-256: 5bc2a47de21d8044cf6c9d5671f27b8cd2c5b2258a818ec0ccab03bde353faec
kernel-debug-2.6.18-194.17.4.el5.ppc64.rpm SHA-256: d19f6fd51e05410f69a4e72b04aa7005c443408a116403b308e4d5efbee586ef
kernel-debug-devel-2.6.18-194.17.4.el5.ppc64.rpm SHA-256: 7325767183148a3686d8bd8ab319f0bd1b00c28a5c2647d1045618c5de44d2f3
kernel-devel-2.6.18-194.17.4.el5.ppc64.rpm SHA-256: 8a2995694e4737e3f6df6c8ea226a764fa83995877a088e701a4949a53975bbe
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.ppc.rpm SHA-256: 24a7f710a257f7615d2252fa10348ee43665c69b72eb5ee6fe7115aacabf4306
kernel-headers-2.6.18-194.17.4.el5.ppc64.rpm SHA-256: 9fe641c4e4a29c6e7bfa50eccf2c19387aaa0e1e4501dc9cd50bb1e0832d2f7a
kernel-kdump-2.6.18-194.17.4.el5.ppc64.rpm SHA-256: 0c828e14b18fb0ecdf90b620e0eca5a8bbf07bc217a24d3007563441ee1379e2
kernel-kdump-devel-2.6.18-194.17.4.el5.ppc64.rpm SHA-256: f8389ce3ae81bf2bead8b73d5d82b6d2fc5c0cca821cf39fbf8bfb5a430c9a14

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-194.17.4.el5.src.rpm SHA-256: a20bccdad9d454b19fc5c5701b099a60fbaa363f4823ee167c01402f4cac0d73
x86_64
kernel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: d721e5a13701939ea2bda150684428c7fefa02a1df14f7104d5f8776294a441e
kernel-debug-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 7e294df1f786aca9aeb53bbde9a0d15a19649e41fa5ccc52818daaa173e709f1
kernel-debug-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 87e557a7fe29169febf6b47cd66d314b559a39c8e3e1c29638db70da4331024a
kernel-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: fcdfe37bee426e86bca1bc7c4e5cf77650d8a1fe5183703bb7fd8fa71fad053c
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 9029d555e6adafce5089ab99c1d7501dd8fc9d8fd3afe3ceede4243987623166
kernel-xen-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 84c04eab4061983fe2946e1ef5d622a91c4d3d5883c5e4c9307f2ff334224734
kernel-xen-devel-2.6.18-194.17.4.el5.x86_64.rpm SHA-256: 8dfacefded18dd460d98081ff72212f043ca21833c3733089a631ae3cd24226d
i386
kernel-2.6.18-194.17.4.el5.i686.rpm SHA-256: f0a41dc1941f1ba03cb01ab877697c2abd259175133270380957eaa47abfef00
kernel-PAE-2.6.18-194.17.4.el5.i686.rpm SHA-256: 1bc7efdfe4596db8a13fc67658326f9196070821b4f354bf5a85a2494318f547
kernel-PAE-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: f34350bf415e31bd8b3785f5123c2c430da4863c224ac2ac746e73ca505be187
kernel-debug-2.6.18-194.17.4.el5.i686.rpm SHA-256: 503ef9bacfb85ca2ce4552338bac91c32721a40517c165114d6aeecf05d06c01
kernel-debug-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 0f4ffc6d19d0e937b39918d5f86a1039724482e207799d2871d54996a9beab82
kernel-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 546dcab040cef7637274cd609f1084064977d90be946d801ff2ec51b1988857c
kernel-doc-2.6.18-194.17.4.el5.noarch.rpm SHA-256: 477eb172caf1aebdc8ab4f4ff1573e59ff2e5ac8372e393919f77191ed342f5e
kernel-headers-2.6.18-194.17.4.el5.i386.rpm SHA-256: 52f62770580cff254409a3ffb1561dd86c11e497a0b246a4b8452400d1a2e60e
kernel-xen-2.6.18-194.17.4.el5.i686.rpm SHA-256: a2a2de41c4966d17e8daa85cc69a19355fd2d121d76ab916ebbaf505d5a326a4
kernel-xen-devel-2.6.18-194.17.4.el5.i686.rpm SHA-256: 1ddbc1376d7a694b948a7ec08a3e1055f0f0ef59393f4d72e3847e81588e547c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility