Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2010:0839 - Security Advisory
Issued:
2010-11-09
Updated:
2010-11-09

RHSA-2010:0839 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A NULL pointer dereference flaw was found in the io_submit_one() function

in the Linux kernel asynchronous I/O implementation. A local, unprivileged
user could use this flaw to cause a denial of service. (CVE-2010-3066,
Moderate)

  • A flaw was found in the xfs_ioc_fsgetxattr() function in the Linux kernel

XFS file system implementation. A data structure in xfs_ioc_fsgetxattr()
was not initialized properly before being copied to user-space. A local,
unprivileged user could use this flaw to cause an information leak.
(CVE-2010-3078, Moderate)

  • The exception fixup code for the __futex_atomic_op1, __futex_atomic_op2,

and futex_atomic_cmpxchg_inatomic() macros replaced the LOCK prefix with a
NOP instruction. A local, unprivileged user could use this flaw to cause a
denial of service. (CVE-2010-3086, Moderate)

  • A flaw was found in the tcf_act_police_dump() function in the Linux

kernel network traffic policing implementation. A data structure in
tcf_act_police_dump() was not initialized properly before being copied to
user-space. A local, unprivileged user could use this flaw to cause an
information leak. (CVE-2010-3477, Moderate)

  • A missing upper bound integer check was found in the sys_io_submit()

function in the Linux kernel asynchronous I/O implementation. A local,
unprivileged user could use this flaw to cause an information leak.
(CVE-2010-3067, Low)

Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3066,
CVE-2010-3086, and CVE-2010-3067, and Dan Rosenberg for reporting
CVE-2010-3078.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 619365 - [LSI 5.6 feat] update megaraid_sas to version 4.31 [rhel-5.5.z]
  • BZ - 628889 - [NetApp 5.6 bug] RHEL NFS clients disconnected from NetApp NFSv4 shares with: v4 server returned a bad sequence-id error! [rhel-5.5.z]
  • BZ - 629241 - kernel: thinkpad-acpi: lock down video output state access [rhel-5.5.z]
  • BZ - 629441 - CVE-2010-3067 kernel: do_io_submit() infoleak
  • BZ - 629861 - Reserve PNP enumerated system board iomem resources [rhel-5.5.z]
  • BZ - 630540 - [RHEL5.5] soft lockup on vlan with bonding in balance-alb mode [rhel-5.5.z]
  • BZ - 630804 - CVE-2010-3078 kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
  • BZ - 630989 - HVM guest w/ UP and PV driver hangs after live migration or suspend/resume [rhel-5.5.z]
  • BZ - 631716 - CVE-2010-3066 kernel: io_submit_one() NULL ptr deref
  • BZ - 632255 - RHEVH - Vdsm - Storage: lvextend fails during VMs intensive power up [rhel-5.5.z]
  • BZ - 633170 - CVE-2010-3086 kernel panic via futex
  • BZ - 634976 - icmpmsg_put() in kernel writes beyond array bounds, leading to junk in /proc/net/snmp and memory corruption [rhel-5.5.z]
  • BZ - 634977 - Spinning up disk for device on standby path causing long boot up [rhel-5.5.z]
  • BZ - 636386 - CVE-2010-3477 kernel: net/sched/act_police.c infoleak
  • BZ - 637069 - time drift with VXTIME_PMTMR mode in case of early / short real ticks [rhel-5.5.z]
  • BZ - 637206 - system crashes due to corrupt net_device_wrapper structure [rhel-5.5.z]
  • BZ - 637220 - [RHEL5 IA64 XEN] netfront driver: alloc_dev: Private data too big. [rhel-5.5.z]
  • BZ - 637727 - lpfc ioctl crash in lpfc_nlp_put() [rhel-5.5.z]
  • BZ - 638579 - dasd: fix race between tasklet and dasd_sleep_on [rhel-5.5.z]
  • BZ - 638866 - [5.5] a race in pid generation that causes pids to be reused immediately. [rhel-5.5.z]
  • BZ - 639073 - GFS1 vs GFS2 performance issue [rhel-5.5.z]
  • BZ - 640973 - Bonded interface doesn't issue IGMP report (join) on slave interface during failover [rhel-5.5.z]
  • BZ - 641915 - backward time drift in RHEL4, 5, and 6 Xen HVM guests that use PM timer / bug in hypervisor routine pmt_update_time() [rhel-5.5.z]
  • BZ - 642465 - CVE-2010-2963 kernel: v4l: VIDIOCSMICROCODE arbitrary write
  • BZ - 642470 - CVE-2010-2963 kernel: v4l: VIDIOCSMICROCODE arbitrary write [rhel-5.5.z]
  • BZ - 642628 - [5.6 FEAT] NFSv4 remove does not wait for close. Silly rename [rhel-5.5.z]
  • BZ - 643135 - [NetApp/QLogic 5.5.z bug] Kernel panic hit on RHEL 5.5 QLogic FC host at qla2x00_abort_fcport_cmds [rhel-5.5.z]
  • BZ - 643571 - [EMC 5.6 bug] severe fragmentation with xfs file system [rhel-5.5.z]
  • BZ - 643806 - Add OFED-1.5.2 patch to increase log_mtts_per_seg for 5.5z-stream [rhel-5.5.z]
  • BZ - 644822 - 802.3ad link aggregation won't work with newer (2.6.194-8.1.el5) kernel and ixgbe driver [rhel-5.5.z]
  • BZ - 647601 - Direct IO write to a file on an nfs mount does not work [rhel-5.5.z]

CVEs

  • CVE-2010-3067
  • CVE-2010-3477
  • CVE-2010-3066
  • CVE-2010-3086
  • CVE-2010-3078
  • CVE-2010-3448

References

  • http://www.redhat.com/security/updates/classification/#moderate
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html-single/5.5_Technical_Notes/index.html#RHSA-2010:0839
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-194.26.1.el5.src.rpm SHA-256: 8a6775a9d5c9d8cd0acce190a3ae08fbe1d450430ade7f25b98c6c22e7a3defa
x86_64
kernel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 77643aa9c5b99df8a3f871d81536faccaa4b7d2a8f11351357d016af4de87a0d
kernel-debug-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 5aa94c0d542a213715f94734df466ce5c0e540838d226e25ba0d2b7d6247e818
kernel-debug-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 877611c028f534d018579c878e0d4679983e62ba53ec5d2f0228f00b8132e966
kernel-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 238a25448ccd2d8d671d06c994142de8305af1daac1923f8ed4fb2e9f01a24a5
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 3d0544bb937b0a3a9d3827795d67614f9f02e12d45ae5b11df564418f5c85322
kernel-xen-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 9721aef0f6bfeedd4b089a6fccbfa432f65f7089dea4cbf21fd2b0f4ef6fab70
kernel-xen-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 4a55791bca602738b57f08805d236cbe2159b44c97b72d394ea18f939fa39f2a
ia64
kernel-2.6.18-194.26.1.el5.ia64.rpm SHA-256: 6f22cc9cba6d921b85da61b9c14ce3582f173589e70bdc45212b20efc0144180
kernel-debug-2.6.18-194.26.1.el5.ia64.rpm SHA-256: 70bc3103f0dc2ff13c7c9a3f78b9a853adbf6b73ee0e1e08c409a1e33b903ac9
kernel-debug-devel-2.6.18-194.26.1.el5.ia64.rpm SHA-256: 157e073bc630aaa9731d6e05857994f4d0899baa90f6277d6ce1a793cb2b8cc6
kernel-devel-2.6.18-194.26.1.el5.ia64.rpm SHA-256: 149783b945f0cb62931f98097dccefdc2c86bd9fce3f934666ace74526bc106b
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.ia64.rpm SHA-256: a942794ab690b485d5d8cfd3d042ddb8d7bd13e3a4e5a13041613b5acb7f7153
kernel-xen-2.6.18-194.26.1.el5.ia64.rpm SHA-256: 8a022543ca91ceb992df74dd58234f72d339e4b18043291974ab5019ddf5d7d8
kernel-xen-devel-2.6.18-194.26.1.el5.ia64.rpm SHA-256: 907b44e8f3073e2678df9aaf83d72b94fd41b57f7fd123631602cdc1cc8288aa
i386
kernel-2.6.18-194.26.1.el5.i686.rpm SHA-256: a2f3f03facef62d0f2cda3929d3bd11a32f0b0f66cf9e5ed552b63392c659a02
kernel-PAE-2.6.18-194.26.1.el5.i686.rpm SHA-256: 64193f8d3966add5e9fb17c973a630c1ffa91fdc164b53a1f21a78936d176f64
kernel-PAE-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 453f999f118ebd452e510631338dd7e53b927d7c6e510aa92888babbdfdcd75f
kernel-debug-2.6.18-194.26.1.el5.i686.rpm SHA-256: 4f69eb45e8a8f76679ccb77d9720fc1897430aff0ac4cf83ee90a781b4e6249d
kernel-debug-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 1d1dd271ff1681fcbf7b265697b1bdb957796cefc7b53735a24cfeb494081a0e
kernel-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: aa70ddbe8997d9cea4974d896d0a44a9b9c2b6309fcbf28b3a82c12748679b40
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.i386.rpm SHA-256: 947a9da5abe43c3ab2bbb0d8f92f3c38814afdb3a08b8966687bc5ee3ddfdb18
kernel-xen-2.6.18-194.26.1.el5.i686.rpm SHA-256: bf1a7774099783d7c3457d4ff042509e543adbadb609c465951748260b82a3e8
kernel-xen-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 72b4129275ba77f4064ba5aa080cce283c4e3f7890c0b05e922e34857707272b

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-194.26.1.el5.src.rpm SHA-256: 8a6775a9d5c9d8cd0acce190a3ae08fbe1d450430ade7f25b98c6c22e7a3defa
x86_64
kernel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 77643aa9c5b99df8a3f871d81536faccaa4b7d2a8f11351357d016af4de87a0d
kernel-debug-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 5aa94c0d542a213715f94734df466ce5c0e540838d226e25ba0d2b7d6247e818
kernel-debug-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 877611c028f534d018579c878e0d4679983e62ba53ec5d2f0228f00b8132e966
kernel-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 238a25448ccd2d8d671d06c994142de8305af1daac1923f8ed4fb2e9f01a24a5
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 3d0544bb937b0a3a9d3827795d67614f9f02e12d45ae5b11df564418f5c85322
kernel-xen-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 9721aef0f6bfeedd4b089a6fccbfa432f65f7089dea4cbf21fd2b0f4ef6fab70
kernel-xen-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 4a55791bca602738b57f08805d236cbe2159b44c97b72d394ea18f939fa39f2a
i386
kernel-2.6.18-194.26.1.el5.i686.rpm SHA-256: a2f3f03facef62d0f2cda3929d3bd11a32f0b0f66cf9e5ed552b63392c659a02
kernel-PAE-2.6.18-194.26.1.el5.i686.rpm SHA-256: 64193f8d3966add5e9fb17c973a630c1ffa91fdc164b53a1f21a78936d176f64
kernel-PAE-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 453f999f118ebd452e510631338dd7e53b927d7c6e510aa92888babbdfdcd75f
kernel-debug-2.6.18-194.26.1.el5.i686.rpm SHA-256: 4f69eb45e8a8f76679ccb77d9720fc1897430aff0ac4cf83ee90a781b4e6249d
kernel-debug-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 1d1dd271ff1681fcbf7b265697b1bdb957796cefc7b53735a24cfeb494081a0e
kernel-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: aa70ddbe8997d9cea4974d896d0a44a9b9c2b6309fcbf28b3a82c12748679b40
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.i386.rpm SHA-256: 947a9da5abe43c3ab2bbb0d8f92f3c38814afdb3a08b8966687bc5ee3ddfdb18
kernel-xen-2.6.18-194.26.1.el5.i686.rpm SHA-256: bf1a7774099783d7c3457d4ff042509e543adbadb609c465951748260b82a3e8
kernel-xen-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 72b4129275ba77f4064ba5aa080cce283c4e3f7890c0b05e922e34857707272b

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-194.26.1.el5.src.rpm SHA-256: 8a6775a9d5c9d8cd0acce190a3ae08fbe1d450430ade7f25b98c6c22e7a3defa
x86_64
kernel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 77643aa9c5b99df8a3f871d81536faccaa4b7d2a8f11351357d016af4de87a0d
kernel-debug-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 5aa94c0d542a213715f94734df466ce5c0e540838d226e25ba0d2b7d6247e818
kernel-debug-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 877611c028f534d018579c878e0d4679983e62ba53ec5d2f0228f00b8132e966
kernel-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 238a25448ccd2d8d671d06c994142de8305af1daac1923f8ed4fb2e9f01a24a5
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 3d0544bb937b0a3a9d3827795d67614f9f02e12d45ae5b11df564418f5c85322
kernel-xen-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 9721aef0f6bfeedd4b089a6fccbfa432f65f7089dea4cbf21fd2b0f4ef6fab70
kernel-xen-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 4a55791bca602738b57f08805d236cbe2159b44c97b72d394ea18f939fa39f2a
i386
kernel-2.6.18-194.26.1.el5.i686.rpm SHA-256: a2f3f03facef62d0f2cda3929d3bd11a32f0b0f66cf9e5ed552b63392c659a02
kernel-PAE-2.6.18-194.26.1.el5.i686.rpm SHA-256: 64193f8d3966add5e9fb17c973a630c1ffa91fdc164b53a1f21a78936d176f64
kernel-PAE-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 453f999f118ebd452e510631338dd7e53b927d7c6e510aa92888babbdfdcd75f
kernel-debug-2.6.18-194.26.1.el5.i686.rpm SHA-256: 4f69eb45e8a8f76679ccb77d9720fc1897430aff0ac4cf83ee90a781b4e6249d
kernel-debug-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 1d1dd271ff1681fcbf7b265697b1bdb957796cefc7b53735a24cfeb494081a0e
kernel-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: aa70ddbe8997d9cea4974d896d0a44a9b9c2b6309fcbf28b3a82c12748679b40
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.i386.rpm SHA-256: 947a9da5abe43c3ab2bbb0d8f92f3c38814afdb3a08b8966687bc5ee3ddfdb18
kernel-xen-2.6.18-194.26.1.el5.i686.rpm SHA-256: bf1a7774099783d7c3457d4ff042509e543adbadb609c465951748260b82a3e8
kernel-xen-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 72b4129275ba77f4064ba5aa080cce283c4e3f7890c0b05e922e34857707272b

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-194.26.1.el5.src.rpm SHA-256: 8a6775a9d5c9d8cd0acce190a3ae08fbe1d450430ade7f25b98c6c22e7a3defa
s390x
kernel-2.6.18-194.26.1.el5.s390x.rpm SHA-256: 01ea46d06923c815b1f788f0cce2a9307f8db79b2dff198256da52b1b9ebe16b
kernel-debug-2.6.18-194.26.1.el5.s390x.rpm SHA-256: 31a93c10e6cc68d1bac07793df524aeaa50e80d55a05a179afd91153bfb3bab0
kernel-debug-devel-2.6.18-194.26.1.el5.s390x.rpm SHA-256: cad96ea2aa26daa15631ad651fc85454309cdd589fb547303c3cdeb86a599a1e
kernel-devel-2.6.18-194.26.1.el5.s390x.rpm SHA-256: ecc131158be916e460cc6adbbae11fee471349219f66fb99ece86e4f9d8d1ed1
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.s390x.rpm SHA-256: a04045b1c10c4121e1f8f2656ca47520899e2b5e4c9a0f06a0607d05d0f485e1
kernel-kdump-2.6.18-194.26.1.el5.s390x.rpm SHA-256: 0c349d7009fe0b568df35e33064ef5953daf7b7ff5c737b3b22251faae640e3b
kernel-kdump-devel-2.6.18-194.26.1.el5.s390x.rpm SHA-256: 20d8973024577bcb94b5ae88c84e2fdd0c4b73371eabd1d39848c365095ea89d

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-194.26.1.el5.src.rpm SHA-256: 8a6775a9d5c9d8cd0acce190a3ae08fbe1d450430ade7f25b98c6c22e7a3defa
ppc
kernel-2.6.18-194.26.1.el5.ppc64.rpm SHA-256: 204497cb51be7e0a7588e8aad056313246598cba52bd99f0cf53c8913fe8450d
kernel-debug-2.6.18-194.26.1.el5.ppc64.rpm SHA-256: 0dbf825842be0cf357f999d5905a6e974146eddeda176921cc5076339057ea35
kernel-debug-devel-2.6.18-194.26.1.el5.ppc64.rpm SHA-256: 1f6c9dfcd698910c9a08c569d48c86031b13c3bbdf0c73f9fb5e1f22d70eba45
kernel-devel-2.6.18-194.26.1.el5.ppc64.rpm SHA-256: b6783d5d266152457bc8a99981384e4a53b4ba0743652f3e8b399f5b7da2d78e
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.ppc.rpm SHA-256: 150cfe0d93b09323247a4a16fb041920f940945d26bc884cca90780db863d5a2
kernel-headers-2.6.18-194.26.1.el5.ppc64.rpm SHA-256: 8a43af8f850492798edd82563cba54f711d35c33017daa9e5be969ce479351fe
kernel-kdump-2.6.18-194.26.1.el5.ppc64.rpm SHA-256: c7fef8d4cbde0c6c69b2b0d2a4a7187c051e6d160d872091f9f8680d7ba91cec
kernel-kdump-devel-2.6.18-194.26.1.el5.ppc64.rpm SHA-256: e69cc89d507eda00e4cc0e2eded54eabe103a13ba957d39e2c2b599e4a02aeb6

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-194.26.1.el5.src.rpm SHA-256: 8a6775a9d5c9d8cd0acce190a3ae08fbe1d450430ade7f25b98c6c22e7a3defa
x86_64
kernel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 77643aa9c5b99df8a3f871d81536faccaa4b7d2a8f11351357d016af4de87a0d
kernel-debug-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 5aa94c0d542a213715f94734df466ce5c0e540838d226e25ba0d2b7d6247e818
kernel-debug-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 877611c028f534d018579c878e0d4679983e62ba53ec5d2f0228f00b8132e966
kernel-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 238a25448ccd2d8d671d06c994142de8305af1daac1923f8ed4fb2e9f01a24a5
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 3d0544bb937b0a3a9d3827795d67614f9f02e12d45ae5b11df564418f5c85322
kernel-xen-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 9721aef0f6bfeedd4b089a6fccbfa432f65f7089dea4cbf21fd2b0f4ef6fab70
kernel-xen-devel-2.6.18-194.26.1.el5.x86_64.rpm SHA-256: 4a55791bca602738b57f08805d236cbe2159b44c97b72d394ea18f939fa39f2a
i386
kernel-2.6.18-194.26.1.el5.i686.rpm SHA-256: a2f3f03facef62d0f2cda3929d3bd11a32f0b0f66cf9e5ed552b63392c659a02
kernel-PAE-2.6.18-194.26.1.el5.i686.rpm SHA-256: 64193f8d3966add5e9fb17c973a630c1ffa91fdc164b53a1f21a78936d176f64
kernel-PAE-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 453f999f118ebd452e510631338dd7e53b927d7c6e510aa92888babbdfdcd75f
kernel-debug-2.6.18-194.26.1.el5.i686.rpm SHA-256: 4f69eb45e8a8f76679ccb77d9720fc1897430aff0ac4cf83ee90a781b4e6249d
kernel-debug-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 1d1dd271ff1681fcbf7b265697b1bdb957796cefc7b53735a24cfeb494081a0e
kernel-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: aa70ddbe8997d9cea4974d896d0a44a9b9c2b6309fcbf28b3a82c12748679b40
kernel-doc-2.6.18-194.26.1.el5.noarch.rpm SHA-256: bae6ab48219c81c718640fb217168511a202aa0bb2b8d5a324325eb0d30d4dc4
kernel-headers-2.6.18-194.26.1.el5.i386.rpm SHA-256: 947a9da5abe43c3ab2bbb0d8f92f3c38814afdb3a08b8966687bc5ee3ddfdb18
kernel-xen-2.6.18-194.26.1.el5.i686.rpm SHA-256: bf1a7774099783d7c3457d4ff042509e543adbadb609c465951748260b82a3e8
kernel-xen-devel-2.6.18-194.26.1.el5.i686.rpm SHA-256: 72b4129275ba77f4064ba5aa080cce283c4e3f7890c0b05e922e34857707272b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter