Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:0017 - Security Advisory
Issued:
2011-01-13
Updated:
2011-01-13

RHSA-2011:0017 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat Enterprise Linux 5.6 kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the sixth regular update.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A NULL pointer dereference flaw was found in the igb driver in the Linux

kernel. If both the Single Root I/O Virtualization (SR-IOV) feature and
promiscuous mode were enabled on an interface using igb, it could result in
a denial of service when a tagged VLAN packet is received on that
interface. (CVE-2010-4263, Important)

  • A missing sanity check was found in vbd_create() in the Xen hypervisor

implementation. As CD-ROM drives are not supported by the blkback back-end
driver, attempting to use a virtual CD-ROM drive with blkback could trigger
a denial of service (crash) on the host system running the Xen hypervisor.
(CVE-2010-4238, Moderate)

  • A flaw was found in the Linux kernel execve() system call implementation.

A local, unprivileged user could cause large amounts of memory to be
allocated but not visible to the OOM (Out of Memory) killer, triggering a
denial of service. (CVE-2010-4243, Moderate)

  • A flaw was found in fixup_page_fault() in the Xen hypervisor

implementation. If a 64-bit para-virtualized guest accessed a certain area
of memory, it could cause a denial of service on the host system running
the Xen hypervisor. (CVE-2010-4255, Moderate)

  • A missing initialization flaw was found in the bfa driver used by Brocade

Fibre Channel Host Bus Adapters. A local, unprivileged user could use this
flaw to cause a denial of service by reading a file in the
"/sys/class/fc_host/host#/statistics/" directory. (CVE-2010-4343, Moderate)

  • Missing initialization flaws in the Linux kernel could lead to

information leaks. (CVE-2010-3296, CVE-2010-3877, CVE-2010-4072,
CVE-2010-4073, CVE-2010-4075, CVE-2010-4080, CVE-2010-4081, CVE-2010-4158,
Low)

Red Hat would like to thank Kosuke Tatsukawa for reporting CVE-2010-4263;
Vladymyr Denysov for reporting CVE-2010-4238; Brad Spengler for reporting
CVE-2010-4243; Dan Rosenberg for reporting CVE-2010-3296, CVE-2010-4073,
CVE-2010-4075, CVE-2010-4080, CVE-2010-4081, and CVE-2010-4158; Vasiliy
Kulikov for reporting CVE-2010-3877; and Kees Cook for reporting
CVE-2010-4072.

These updated packages also include several hundred bug fixes for and
enhancements to the Linux kernel. Space precludes documenting each of these
changes in this advisory and users are directed to the Red Hat Enterprise
Linux 5.6 Release Notes for information on the most significant of these
changes:

http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Release_Notes/index.html

Refer to the kernel chapter in the Red Hat Enterprise Linux 5.6 Technical
Notes for further information:

http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html

All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which address these vulnerabilities as well as fixing the bugs
and adding the enhancements noted in the Red Hat Enterprise Linux 5.6
Release Notes and Technical Notes. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 237372 - Marvell PATA not supported
  • BZ - 429102 - Allocations on resume path can cause deadlock due to attempting to swap
  • BZ - 441243 - kernel keyring quotas exceeded
  • BZ - 455323 - No support for upstream /proc/sys/kernel/nmi_watchdog.
  • BZ - 456765 - kabitool blocks custom kernel builds when kernel version > 2.6.18-53.1.21.el5
  • BZ - 459901 - race condition between AIO and setresuid()
  • BZ - 466088 - dm-snapshot: very slow write to snapshot origin when copy-on-write occurs
  • BZ - 466157 - kernel doesn't supply memory fields in getrusage, /usr/bin/time anything shows "... (0avgtext+0avgdata 0maxresident)k ..."
  • BZ - 470801 - Read from /proc/xen/xenbus does not honor O_NONBLOCK
  • BZ - 479418 - second cifs mount to samba server fails when samba using security=ADS
  • BZ - 485903 - [RHEL5] Netfilter modules unloading hangs
  • BZ - 488882 - cxgb3 driver very slow under Xen with HW acceleration enabled
  • BZ - 493047 - Oprofile - Add Dunnington processors to the list of ppro cores
  • BZ - 494400 - TCP: Treason uncloaked! during Network Stress Testing
  • BZ - 496127 - [RHEL5.5] e1000e devices fail to initialize interrupts properly
  • BZ - 499553 - Cannot generate proper stacktrace on xen-ia64
  • BZ - 503864 - The USB storage cannot use >2TB.
  • BZ - 504188 - GFS1 vs GFS2 performance issue
  • BZ - 506694 - kdump hangs up if INIT is received while kdump is starting
  • BZ - 507846 - Balloon driver gives up too easily when ballooning up under memory pressure
  • BZ - 513934 - Keyboard LEDs constantly lit
  • BZ - 516289 - bonding: backport code to allow user-controlled output slave detection.
  • BZ - 516851 - [Stratus 5.6 bug] System crashes at uhci_scan_schedule().
  • BZ - 516985 - When bonding is used and IPV6 is enabled the message of 'kernel: bond0: duplicate address detected!' is output
  • BZ - 521878 - Fix instances of #!/usr/bin/env python in kernel-devel-packages
  • BZ - 523341 - PCI SR-IOV BAR resources can't be reliably mapped
  • BZ - 523920 - [Adaptec/HCL 5.6 bug] Problems with aacraid - File system going into read-only.
  • BZ - 529914 - GFS2 fatal: filesystem consistency error on rename
  • BZ - 530123 - [Dell 5.5 FEAT] autoload tpm_tis driver
  • BZ - 533093 - Certain newer WDC SATA drives identified as SEMB
  • BZ - 533391 - Kernel panic: EDAC MC0: INTERNAL ERROR: channel-b out of range
  • BZ - 538022 - java.util.concurrent: long delay and intervals drift since kernel update to 164
  • BZ - 539560 - tcp_disconnect should clear all of tp->rx_opt ....
  • BZ - 539626 - default txqueuelen of vif device is too small
  • BZ - 540786 - support supplementary groups of tun/tap devices
  • BZ - 541224 - net: possible leak of dst_entry (ipv4)
  • BZ - 546060 - soft lockup while unmounting a read-only filesystem with errors (As per Redhat Bug #429054)
  • BZ - 546455 - kernel bug: quota file size not a multiple of struct gfs2_quota
  • BZ - 546554 - kernel: no clue to find what is happening when hitting a lockdep limit
  • BZ - 546700 - Deadlock in aio
  • BZ - 551028 - nfsv4 hangs -- kernel: decode_op_hdr: reply buffer overflowed in line 2121
  • BZ - 552574 - Guest could not join the multicast group with virtio NIC
  • BZ - 552886 - [RHEL5] ip_mc_sf_allow() has a lock problem
  • BZ - 553407 - nanosleep() is unstable on xen kernel and ntpd with -x option
  • BZ - 554706 - Kernel: network: bonding: scheduling while atomic: ifdown-eth/0x00000100/21775
  • BZ - 554872 - Periodic ata exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x6 frozen messages
  • BZ - 555197 - dm-raid1: fix data lost at mirror log failure
  • BZ - 555708 - kABI whitelist request for Fujitsu modules
  • BZ - 555910 - xen migration fails when a full virt guest uses the xen-vnif driver
  • BZ - 556476 - Update sfc driver (add SFC9000 support)
  • BZ - 557423 - nfs: sys_read sometimes returns -EIO
  • BZ - 558999 - [Broadcom 5.6 bug] kABI whitelist request for bnx2i
  • BZ - 559815 - ACPI _SDD failed (AE 0x5) messages on boot
  • BZ - 560540 - Reserve PNP enumerated system board iomem resources
  • BZ - 560870 - Update Neighbor Cache when IPv6 RA is received on a router
  • BZ - 562220 - IP PACKET DOES NOT TRANSMIT USING RAW SOCKETS
  • BZ - 563271 - ITE it887x chipset serial ports don't work
  • BZ - 564249 - [LSI 5.6 feat] update megaraid_sas to version 4.31
  • BZ - 565560 - [5.6 FEAT] KVM network performance: Defer skb allocation in virtio-net
  • BZ - 565973 - [EMC 5.6 bug] security and PSF update patch for EMC CKD ioctl
  • BZ - 565974 - [5.6 FEAT] NFSv4 remove does not wait for close. Silly rename
  • BZ - 566104 - route: BUG at include/linux/timer.h:82 (call from rt_secret_rebuild_oneshot)
  • BZ - 566144 - Loading NAT module with/without rules affects ping behaviour
  • BZ - 566767 - [Emulex 5.6 bug] kABI whitelist request for lpfc
  • BZ - 567092 - possible recursive locking of inode by nfsd
  • BZ - 567428 - [QLogic 5.6 FEAT] Update qla2xxx driver to version 8.03.01.05.05.06-k
  • BZ - 567444 - RHEL5.6: cxgb3i driver update
  • BZ - 567462 - [Broadcom 5.6 feat] Update tg3 to version 3.108+ and add 5718 B0, 5719 support
  • BZ - 567479 - fasync_helper patch causing problems with GPFS
  • BZ - 567604 - [Regression] bonding: 802.3ad problems with link detection
  • BZ - 568111 - [Cisco 5.6 FEAT] Update enic driver to version 1.4.1.2
  • BZ - 568601 - [Broadcom 5.6 FEAT] Update bnx2 to 2.0.8+
  • BZ - 568606 - [Broadcom 5.6 FEAT] Update bnx2i driver and add 57712 support
  • BZ - 569106 - netconsole fails with tg3
  • BZ - 569342 - [5.4] nfsd dereferences uninitialized list head on error exit in nfsd4_list_rec_dir()
  • BZ - 569643 - [Emulex 5.6 feat] Add be2iscsi driver for BE3 asic
  • BZ - 569654 - boot hangs if scsi read capacity fails on faulty non system drive
  • BZ - 570044 - kernel panic when rmmod and insmod rpcsec_gss_krb5 module
  • BZ - 570091 - cpu flags missing from /proc/cpuinfo
  • BZ - 570491 - vmalloc ENOMEM caused by iptables
  • BZ - 570604 - X can't get signals with DRI
  • BZ - 570610 - [RHEL5]: Add thread_siblings_list to /sys
  • BZ - 570645 - [RHEL5] bonding mode 0 doesn't resend IGMP after a failure
  • BZ - 570681 - REGRESSION: Fix iscsi failover time
  • BZ - 570824 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour
  • BZ - 571518 - revalidate dentries provided by LAST_BIND symlinks
  • BZ - 571735 - backports of virtio_blk barrier support
  • BZ - 571862 - [Emulex 5.6 feat] Update lpfc driver to version 8.2.0.73.1p and include BE3 asic
  • BZ - 571864 - RHEL5: coretemp: fix cpu model output
  • BZ - 572004 - [LSI 5.6 FEAT] Update 3w-9xxx driver to v2.26.08.007-2.6.18RH
  • BZ - 572011 - [LSI 5.6 FEAT] Add 3w-sas driver and update to v3.26.00.028-2.6.18RH
  • BZ - 572285 - Add /sys/devices/system/node/nodeX/cpulist files
  • BZ - 572930 - Bad ext4 sync performance on 16 TB GPT partition
  • BZ - 573106 - [Stratus 5.6 bug] task md0_resync:18061 blocked for more than 120 seconds
  • BZ - 573185 - large storage data corruption on 32 bit
  • BZ - 573652 - Regression: AUTH_SYS cannot be requested using the 'sec=sys' export option.
  • BZ - 573771 - should set ISVM bit (ECX:31) for CPUID leaf 0x00000001
  • BZ - 574285 - 25% performance regression of concurrent O_DIRECT writes.
  • BZ - 574557 - [Cisco 5.6 bug] kABI request for fcoe
  • BZ - 574913 - memory leak when ipv6 interface disabled in sysctl.conf
  • BZ - 575309 - Kernel panic - not syncing: IO-APIC + timer doesn't work!
  • BZ - 575817 - nfsv4 hangs -- client/server deadlock between commit and delegation return
  • BZ - 576246 - missing power_meter release() function
  • BZ - 576709 - [Cisco 5.6 bug] fnic: flush Tx queue bug fix
  • BZ - 577182 - vxge: not enough MMIO resources for SR-IOV error
  • BZ - 578005 - [Broadcom 5.6 bug] Cannot login to iSCSI target when bnx2i is loaded last
  • BZ - 578259 - Network throughput drops seriously on DomU to DomU node traffic on RHEL5.3 Xen when NIC performs RSC.
  • BZ - 578261 - [5.5] SCTP: Check if the file structure is valid before checking the non-blocking flag
  • BZ - 578492 - e1000_clean_tx_irq: Detected Tx Unit Hang
  • BZ - 578531 - [RHEL5.5] soft lockup on vlan with bonding in balance-alb mode
  • BZ - 578905 - RHEL 5.3 on DL585 G6: testing NMI watchdog fails on bootup
  • BZ - 580699 - hwmon: (coretemp) Get TjMax value from MSR for i series CPUs
  • BZ - 581396 - [PATCH][RHEL5.5] Fix Time drift on KVM x86_64 RHEL5.5 Guest using PV clock
  • BZ - 581654 - RTL-8169 Gigatit Ethernet network devices mac address changes after soft reboot.
  • BZ - 581933 - pci_mmcfg_init() making some of main memory uncacheable
  • BZ - 582003 - Enable LED support in iwlagn and iwl3945 drivers (IWLWIFI_LEDS)
  • BZ - 582237 - "hung_task" feature port is incomplete
  • BZ - 582321 - VFS: Busy inodes after unmount issue.
  • BZ - 582367 - implement dev_disable_lro for RHEL5
  • BZ - 582435 - [Stratus 5.6 bug] Circular lock dep warning on cfq_exit_lock
  • BZ - 582722 - TCP socket premature timeout with FRTO and TSO
  • BZ - 582886 - The assigned VF cannot be found in PV guest.
  • BZ - 583673 - set-cpu_llc_id-on-amd-cpus patch: undefined variable 'cpu' in in amd_detect_cmp()
  • BZ - 583767 - dev_set_name() undefined in net/wireless/cfg80211.ko in some cases
  • BZ - 584412 - transmission stops when tap does not consume
  • BZ - 584679 - The kvm clock couldn't go back after stop/continue
  • BZ - 585431 - Add log message for unhandled sense error REPORTED_LUNS_DATA_CHANGED
  • BZ - 586482 - ATIIXP IDE driver reuses ide_lock unsafely
  • BZ - 588015 - x86_64 host on Nehalem-EX machines will panic when installing a 4.8 GA kvm guest
  • BZ - 588599 - Kernel BUG at fs/ext3/super.c:425
  • BZ - 590760 - compiling a xen config produces lots of pud_present warnings
  • BZ - 590763 - PG_error bit is never cleared, even when a fresh I/O to the page succeeds
  • BZ - 590864 - Unkillable processes
  • BZ - 591548 - netback does not properly get to the Connected state after it's been Closed
  • BZ - 591674 - [Emulex 5.6 bug] Update lpfc driver to version 8.2.0.76.1p
  • BZ - 592322 - [RHEL 5] Errors when Accessing iSCSI luns via iSER - timing out command
  • BZ - 592908 - Memory leak when nfs shares are mounted with option "nolock"
  • BZ - 592961 - ext3: fsync() does not flush disk caches
  • BZ - 593040 - TCP: avoid to send keepalive probes if receiving data
  • BZ - 593801 - [RHEL5.5] TCP bandwidth problems with TPA and bnx2x cards
  • BZ - 593862 - [RHEL5.5] Self-test using 'ethtool -t ethX' fails with "Cannot test: Operation not supported"
  • BZ - 594404 - [RHEL 5.5] vxge: unable to create VLAN
  • BZ - 594546 - [Intel 5.6 Bug] CPU synchronization required when doing MTRR register update
  • BZ - 594635 - kernel: security: testing the wrong variable in create_by_name() [rhel-5.6]
  • BZ - 595397 - GFS2: stuck in inode wait, no glocks stuck
  • BZ - 595548 - [Broadcom 5.6 bug] bnx2i: MTU change does not work
  • BZ - 595862 - [Broadcom 5.6 bug] cnic: Panic in cnic_iscsi_nl_msg_recv()
  • BZ - 596548 - dcache unused accounting problem
  • BZ - 596626 - Create reliable implementation of cancel_(delayed)_work_sync() in RHEL5
  • BZ - 597143 - [LSI 5.6 bug] kABI request for mptsas, mpt2sas
  • BZ - 597334 - reg_regdb_search_lock calls kmalloc while holding spinlock
  • BZ - 598946 - [NetApp 5.6 bug] QLogic FC firmware errors seen on RHEL 5.5
  • BZ - 599295 - Significant MSI performance issue due to redundant interrupt masking
  • BZ - 600387 - gfs2 kernel - Better error reporting when mounting a gfs fs without enough journals
  • BZ - 601692 - RFE virtio balloon driver does not include extended memory statistics
  • BZ - 601800 - NFS-over-GFS out-of-order GETATTR Reply causes corruption
  • BZ - 602402 - bnx2x panic dumps with multiple interfaces enabled
  • BZ - 603706 - cifs: busy file renames across directories should fail with error
  • BZ - 603806 - [Emulex 5.6 bug] Update lpfc driver to version 8.2.0.77
  • BZ - 604044 - NFS4 breaks when server returns NFS4ERR_FILE_OPEN
  • BZ - 604779 - Page out activity when there is no current VM load
  • BZ - 605259 - tcp: sending reset to the already closed socket
  • BZ - 605265 - kernel bug in cfq merge logic
  • BZ - 605305 - need to backport 2e3219b5c8a2e44e0b83ae6e04f52f20a82ac0f2
  • BZ - 605697 - [RHEL 5.5] 32-bit pvhvm guest on 64-bit host crash w/xm mem-set
  • BZ - 605720 - [RHEL 5.5] nfs: fix compatibility with hpux clients
  • BZ - 605816 - [RHEL 5.6] move Tausworthe net_random generator to lib/random32
  • BZ - 606851 - Wrong /proc/cpuinfo for Pentium D reported on RHEL 4.8 (only x86_64) and RHEL 5.5 (both i386 and x86_64)
  • BZ - 607443 - soft lockup inside rhel5 guest
  • BZ - 608641 - vegas and veno possible division by zero bug
  • BZ - 608801 - [Emulex 5.6 bug] be2iscsi: IO stalls if any SGE size=65536
  • BZ - 609668 - kswapd hung in D state with fragmented memory and large order allocations
  • BZ - 610234 - [5u6] Bonding in ALB mode sends ARP in loop
  • BZ - 611938 - [RHEL5u3] System panic at sunrpc xprt_autoclose()
  • BZ - 612212 - igb: typo in igb aer code
  • BZ - 613134 - [QLogic 5.6 FEAT] Add P3+ AER support to qla2xxx
  • BZ - 613187 - xen Windows 2008 guest crashes on RHEL 5.4
  • BZ - 613667 - always print the number of triggered NMI during test at boot
  • BZ - 613780 - [RHEL 5.5] igb driver re-order UDP packets when multi-queue is enabled
  • BZ - 614281 - [QLogic 5.6 FEAT] Feature Updates and Bug Fixes for qlcnic
  • BZ - 614957 - ext4: mount error path corrupts slab memory
  • BZ - 615227 - fix oops in clusterip_seq_stop when memory allocation fails.
  • BZ - 615229 - fix oops in dl_seq_stop when memory allocation fails.
  • BZ - 616512 - [Emulex 5.6 feat] Update be2net to version 2.102.404r
  • BZ - 617024 - [Broadcom 5.6 FEAT] bnx2: add AER support.
  • BZ - 617268 - kernel crash in br_nf_pre_routing_finish
  • BZ - 617690 - ext4 and xfs wrong data returned on read after write if file size was changed with ftruncate
  • BZ - 618075 - RHEL5.5 boot fail with IDE controller enabled on Cobia
  • BZ - 618114 - Kernel panic on reading from /proc/bus/pci/XX/YY while hot-removing the device.
  • BZ - 618512 - [QLogic 5.6] kABI whitelist request for qla4xxx
  • BZ - 619070 - 802.3ad link aggregation won't work with newer (2.6.194-8.1.el5) kernel and ixgbe driver
  • BZ - 619112 - CIFS mount to samba3x share shows differing ownership on sequential stat() calls to same file
  • BZ - 619361 - [NetApp 5.6 bug] SCSI ALUA handler fails to handle ALUA transitioning properly
  • BZ - 619767 - Update cnic to 2.1.3
  • BZ - 619814 - [Qlogic 5.6 bug] qla2xxx: Back port of upstream fixes
  • BZ - 619917 - [Emulex 5.6 feat] Update lpfc driver to version 8.2.0.80
  • BZ - 620037 - virtio-serial - need to back port guest driver to RHEL 5
  • BZ - 620502 - [NetApp 5.6 bug] RHEL NFS clients disconnected from NetApp NFSv4 shares with: v4 server returned a bad sequence-id error!
  • BZ - 620508 - system crashes due to corrupt net_device_wrapper structure
  • BZ - 621105 - backport wireless upstream 2.6.32.18 fixes
  • BZ - 621280 - [5u5] bonding: fix a race condition in calls to slave MII ioctls
  • BZ - 622024 - 64-bit kernel unable to oprofile 32-bit processes
  • BZ - 622559 - libata: fix suspend/resume for ATA SEMB devices
  • BZ - 623519 - ENOPERM when reading /proc/sys/vm/mmap_min_addr
  • BZ - 623595 - move iscsi/iser to passthrough mode, fix functioning and failover time under DM multipath
  • BZ - 623675 - [QLogic 5.6 feat] qla4xxx: Update driver to 5.02.03.00.05.06-d1
  • BZ - 624598 - Win7 and Windows 2008 R2 xen guests with multiple vcpus can't restart
  • BZ - 624710 - [QLogic 5.6 FEAT] qla4xxx: Add PCIe AER support
  • BZ - 624862 - [rhel5.6] XFS incorrectly validates inodes
  • BZ - 625061 - igb doesn't see link status changes on 82580 NIC
  • BZ - 625079 - [QLogic 5.6 bug] netxen: Fix enabling VLAN TSO/LSO
  • BZ - 625084 - [QLogic 5.6 bug] qlcnic: Fix netdev features and other fixes
  • BZ - 625688 - CVE-2010-4243 kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads
  • BZ - 625841 - lpfc ioctl crash in lpfc_nlp_put()
  • BZ - 625902 - [Xen] backport NMI injection for HVM guests
  • BZ - 625903 - [Xen] backport hardware task switching for HVM guests
  • BZ - 626018 - Allow using crc32c hardware accelerated engine on Intel Nehalem processor
  • BZ - 626566 - IPR driver needs fixes to support the new Cubic-R adapter
  • BZ - 626963 - AIO uses igrab in the submission path, which causes undue lock contention
  • BZ - 627612 - [QLogic 5.6 BUG] qla2xxx: Correctly displaying the link state for disconnected port.
  • BZ - 627836 - retry rather than fastfail DID_REQUEUE scsi errors with dm-multipath
  • BZ - 627974 - Scheduling while atomic when removing slave tg3 interface from bonding
  • BZ - 628828 - Fix hot-unplug handling of virtio-console ports
  • BZ - 628831 - Enable NAPI for forcedeth driver
  • BZ - 629081 - Bug 466441 reintroduced in kernel 2.6.18-194.el5
  • BZ - 629176 - kernel: Problem with execve(2) reintroduced [rhel-5.6]
  • BZ - 629457 - vlan: control vlan device TSO status with ethtool
  • BZ - 629626 - groups_search() cannot handle large gid correctly
  • BZ - 629634 - add pr_*(), netdev_*(), netif_*() printk helper macros
  • BZ - 629638 - kernel panic in devinet_sysctl_forward when changing the /proc/sys/net/ipv4/conf/eth*/forwarding
  • BZ - 629761 - [RHEL 5.5] e100/e1000*/igb*/ixgb*: Add missing read memory barrier
  • BZ - 629773 - HVM guest w/ UP and PV driver hangs after live migration or suspend/resume
  • BZ - 630124 - Detect and recover from cxgb3 adapter parity errors
  • BZ - 630129 - [RHEL5 IA64 XEN] netfront driver: alloc_dev: Private data too big.
  • BZ - 630563 - kernel: additional stack guard patches [rhel-5.6]
  • BZ - 630680 - [Emulex 5.6 feat] Update be2net to version 2.102.453r
  • BZ - 631963 - [Broadcom 5.6 bug] tg3: 5717 / 57765 / 5719 devices leak memory
  • BZ - 632057 - [Broadcom 5.6 bug] bnx2: Remove some unnecessary smp_mb() in tx fast path
  • BZ - 633149 - CVE-2010-3296 kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory
  • BZ - 633388 - sfc: creates too many queues
  • BZ - 634320 - [Broadcom 5.6 feat] tg3: Re-enable 5717 B0 support
  • BZ - 634325 - [Broadcom 5.6 bug] tg3: Incorrect FW version displayed and FW handshake update
  • BZ - 635027 - [RHEL5.6] Verify that driver version strings for updated network drivers
  • BZ - 635782 - Add dirty_background_bytes and dirty_bytes sysctls to RHEL 5
  • BZ - 636020 - PATCH: virtio_console: Fix poll blocking even though there is data to read
  • BZ - 636046 - Disallow 0-sized writes to virtio ports to go through to host (leading to VM crash)
  • BZ - 636053 - read from virtio-serial returns if the host side is not connect to pipe
  • BZ - 636100 - TPM driver is not enabled in kernel-xen
  • BZ - 636760 - TPM driver complains about IRQ mismatches
  • BZ - 637194 - [Qlogic 5.6 bug] qlcnic: fix kernel NULL pointer dereference __qlcnic_shutdown+0xe/0x8a
  • BZ - 637764 - Bonded interface doesn't issue IGMP report (join) on slave interface during failover
  • BZ - 637826 - belkin usb nic card fails - module catc.ko
  • BZ - 638082 - Backport HVMOP_get_time hypercall
  • BZ - 639028 - [Emulex 5.6 feat] Update lpfc driver to version 8.2.0.85
  • BZ - 640026 - bnx2 adapter periodically dropping received packets
  • BZ - 640586 - sata_sil24 - add support for Adaptec 1225SA RAID eSATA controller
  • BZ - 641086 - mpt2sas driver update causes boot failure with Dell PERC H200 SAS HBA
  • BZ - 641193 - [NetApp 5.6 bug] regression: allow offlined devs to be set to running
  • BZ - 643080 - tasks blocked after putting Nehalem CPU offline
  • BZ - 643165 - GFS2: BUG_ON kernel panic in gfs2_glock_hold on 2.6.18-226
  • BZ - 643254 - [QLogic 5.6 bug] kdump: netxen_nic doesn't work in network dumping
  • BZ - 643426 - Stack size mapping is decreased through mlock/munlock call
  • BZ - 643707 - [kdump] soft lockup occurs when nmi watchdog lockup is being triggered
  • BZ - 644129 - Kernel build from source leaves kabideps file droppings in _tmppath
  • BZ - 644136 - [QLogic 5.6 bug] qla2xxx: Fix incorrect test for zero
  • BZ - 644438 - bnx2: Out of order arrival of UDP packets in application
  • BZ - 644726 - panic in find_ge_pid() due to race between lseek() and readdir() on /proc
  • BZ - 644735 - writing to a virtio serial port while no one is listening on the host side hangs the guest
  • BZ - 644863 - [NetApp 5.6 bug] qla2xxx: Kernel panic on qla24xx_queuecommand
  • BZ - 644879 - RHEL5.6 Include DL580 G7 in bfsort whitelist
  • BZ - 645284 - modprobe igb max_vfs>7(Max support is 7) leads to host reboot in loop
  • BZ - 645881 - [Emulex 5.6 feat] Update lpfc driver to version 8.2.0.86
  • BZ - 646708 - regression: bnx2i driver returns garbage in host param callout and could oops
  • BZ - 647259 - [Emulex 5.6 bug] Update be2net to version 2.102.512r
  • BZ - 647297 - Direct IO write to a file on an nfs mount does not work
  • BZ - 648656 - CVE-2010-4072 kernel: ipc/shm.c: reading uninitialized stack memory
  • BZ - 648658 - CVE-2010-4073 kernel: ipc/compat*.c: reading uninitialized stack memory
  • BZ - 648660 - CVE-2010-4075 kernel: drivers/serial/serial_core.c: reading uninitialized stack memory
  • BZ - 648669 - CVE-2010-4080 kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory
  • BZ - 648670 - CVE-2010-4081 kernel: drivers/sound/pci/rme9652/hdspm.c: reading uninitialized stack memory
  • BZ - 649489 - [Emulex 5.6 bug] Update lpfc driver to version 8.2.0.87
  • BZ - 649717 - CVE-2010-3877 kernel: net/tipc/socket.c: reading uninitialized stack memory
  • BZ - 651287 - [Broadcom 5.6 bug] cnic: Panic in uio_release()
  • BZ - 651698 - CVE-2010-4158 kernel: socket filters infoleak
  • BZ - 651869 - probe-remove loop of i7core_edac module causes oops
  • BZ - 652165 - ALSA: fix sysfs related issues (modules cannot be reloaded) and mutex problem in OSS mixer emulation
  • BZ - 652279 - [5.6 FEAT] POWER7 added to Aux Vextor
  • BZ - 653250 - kernel: restrict unprivileged access to kernel syslog [rhel-5.6]
  • BZ - 653262 - [5.6 Regression] network is lost after balloon-up fails
  • BZ - 653501 - netback tries to balloon up even if front-end doesn't do flipping
  • BZ - 653991 - [Broadcom 5.6 bug] bnx2i: add upstream bug fixes to 2.6.2.2
  • BZ - 654420 - [QLogic 5.6 bug] qlge: Update driver to 1.0.0.27
  • BZ - 654948 - RHEL5.6 : 10Gb network card (AD144 &AD385)will be missing in installation and can not be drived in system
  • BZ - 655119 - [Emulex 5.6 bug] Update lpfc driver to version 8.2.0.87.1p
  • BZ - 655623 - CVE-2010-4238 kernel: Xen Dom0 crash with Windows 2008 R2 64bit DomU + GPLPV
  • BZ - 656008 - [Qlogic 5.6 bug] qlcnic: Fix kdump issues
  • BZ - 657097 - [Broadcom 5.6 bug] tg3: Fix 5719 bugs
  • BZ - 658155 - CVE-2010-4255 xen: 64-bit PV xen guest can crash host by accessing hypervisor per-domain memory area
  • BZ - 658434 - forcedeth driver panics while booting debug kernel
  • BZ - 658801 - [REG][5.6] igb never counts up the number of tx packets
  • BZ - 659571 - CVE-2010-4258 kernel: failure to revert address limit override in OOPS error path [rhel-5.6]
  • BZ - 660188 - CVE-2010-4263 kernel: igb panics when receiving tag vlan packet
  • BZ - 660506 - [Broadcom 5.6 bug] tg3: Increase tx jumbo bd flag threshold
  • BZ - 660580 - [REG][5.6] kernel panic occurs by writing a file on optional mount "sync/noac" of NFSv4.
  • BZ - 661182 - CVE-2010-4343 kernel: bfa driver sysfs crash
  • BZ - 661393 - [IPv6] a specific route is ignored if the default gateway is reachable
  • BZ - 663509 - [Broadcom 5.6 bug] bnx2: calling pci_map_page() twice in tx path
  • BZ - 663853 - [REG][5.6] kernel panic occurs by reading an empty file on optional mount "sync/noac" of NFSv4.

CVEs

  • CVE-2010-4080
  • CVE-2010-4073
  • CVE-2010-4075
  • CVE-2010-4072
  • CVE-2010-4158
  • CVE-2010-4081
  • CVE-2010-4263
  • CVE-2010-4343
  • CVE-2010-4255
  • CVE-2010-4238
  • CVE-2010-3877
  • CVE-2010-3296
  • CVE-2010-4243

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Release_Notes/index.html
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-238.el5.src.rpm SHA-256: 6df5e768f26f328961c44ee12cebfc8e379ba678d49ec90e4be0f05b17d8694c
x86_64
kernel-2.6.18-238.el5.x86_64.rpm SHA-256: 452d9b1d08f2bfc1f5641089f5ca9a24514a4ad339059fb8cb10f2732ac296cb
kernel-debug-2.6.18-238.el5.x86_64.rpm SHA-256: f6497904fd25264d1dfbb9df7fcc0d9cdce909c87c8f9e059a653e8c23a52a63
kernel-debug-devel-2.6.18-238.el5.x86_64.rpm SHA-256: b566cec93f157c22851daac822316e3fdee73df2f6da3d8ec92bac32853d7fbf
kernel-devel-2.6.18-238.el5.x86_64.rpm SHA-256: 32de34d8a2256052fefacf477a1dac09f2304c71b190091ccaebcdef6e35c913
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.x86_64.rpm SHA-256: 18cad7ed7cc7b3061b25e0a36e65074913a13f8557765c62a5ba566887d7496c
kernel-xen-2.6.18-238.el5.x86_64.rpm SHA-256: 20492c4eba69e7a49249ad861dec652d949108df4c88137a159b0a7d3320ee3f
kernel-xen-devel-2.6.18-238.el5.x86_64.rpm SHA-256: 7c2a4d53cce4c222c20cdf1bbe85f26346903c3c1a585d08b6f803729024c207
ia64
kernel-2.6.18-238.el5.ia64.rpm SHA-256: 16bf1f4819bbda8c58a4361772c9265b988a9219b57900193e4a939ee89c6058
kernel-debug-2.6.18-238.el5.ia64.rpm SHA-256: 638dd40ca1fc4807cfbdebb95e4a341d5b16d66b190b163fe87f55ad51536776
kernel-debug-devel-2.6.18-238.el5.ia64.rpm SHA-256: 255c8d70f1a5503af4f043e9968b28d78c96bd746ffd5bf0ff5a9ecb0c33ea72
kernel-devel-2.6.18-238.el5.ia64.rpm SHA-256: 371065f59aab337802ad737b29d119968f34094ca0a8c9733b41b5ec96d88374
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.ia64.rpm SHA-256: 2b83352a3b897e0cdb74eec77d264c2ceda799414f35bf55a1bb238831a0de1a
kernel-xen-2.6.18-238.el5.ia64.rpm SHA-256: fa3e5bd53bc638fc3724144777c808e49c65e6360e11f60c387284caf7dd4dbd
kernel-xen-devel-2.6.18-238.el5.ia64.rpm SHA-256: d174d9aabb42f64243ce2082e1cd5629d985d429bb681b9bb605a842a37976b4
i386
kernel-2.6.18-238.el5.i686.rpm SHA-256: e162016005cf0bb01f10894e158087ed0611694524cbed4e4eb8c883a45fe810
kernel-PAE-2.6.18-238.el5.i686.rpm SHA-256: fe77666fc3ecd9795631c6e931e62627cfce2c9c75e6747231ed526447dc19dc
kernel-PAE-devel-2.6.18-238.el5.i686.rpm SHA-256: be8e27b602c5e45e5efc7f466f612126b16192b6596eca05691cc20f80c1ea4b
kernel-debug-2.6.18-238.el5.i686.rpm SHA-256: 2e612f2250cb88126f150e686b9b474a8a59fda90a580568f96300eacaebdabe
kernel-debug-devel-2.6.18-238.el5.i686.rpm SHA-256: 0cbadc1aa332fe1069062105771184f7aab5be8807c039d2c9cf2907904f1df6
kernel-devel-2.6.18-238.el5.i686.rpm SHA-256: b8e2212158196d294ab03e7e3f40502fbd146f1f48f5a3c2151daa09aaefb493
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.i386.rpm SHA-256: ce27293f8c89dd5f06fd7bf0f163fcf7843300bf29cae1f073bed73a7e38d983
kernel-xen-2.6.18-238.el5.i686.rpm SHA-256: c3c9660737e1079c6d7514ef80a8d866572ec6d8ac79ff47448cf8eb60b3e131
kernel-xen-devel-2.6.18-238.el5.i686.rpm SHA-256: 1a2f3092f15abb1506142a049e63a753fc207c59fb41ab873e28bba3d6cda0cd

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-238.el5.src.rpm SHA-256: 6df5e768f26f328961c44ee12cebfc8e379ba678d49ec90e4be0f05b17d8694c
x86_64
kernel-2.6.18-238.el5.x86_64.rpm SHA-256: 452d9b1d08f2bfc1f5641089f5ca9a24514a4ad339059fb8cb10f2732ac296cb
kernel-debug-2.6.18-238.el5.x86_64.rpm SHA-256: f6497904fd25264d1dfbb9df7fcc0d9cdce909c87c8f9e059a653e8c23a52a63
kernel-debug-devel-2.6.18-238.el5.x86_64.rpm SHA-256: b566cec93f157c22851daac822316e3fdee73df2f6da3d8ec92bac32853d7fbf
kernel-devel-2.6.18-238.el5.x86_64.rpm SHA-256: 32de34d8a2256052fefacf477a1dac09f2304c71b190091ccaebcdef6e35c913
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.x86_64.rpm SHA-256: 18cad7ed7cc7b3061b25e0a36e65074913a13f8557765c62a5ba566887d7496c
kernel-xen-2.6.18-238.el5.x86_64.rpm SHA-256: 20492c4eba69e7a49249ad861dec652d949108df4c88137a159b0a7d3320ee3f
kernel-xen-devel-2.6.18-238.el5.x86_64.rpm SHA-256: 7c2a4d53cce4c222c20cdf1bbe85f26346903c3c1a585d08b6f803729024c207
i386
kernel-2.6.18-238.el5.i686.rpm SHA-256: e162016005cf0bb01f10894e158087ed0611694524cbed4e4eb8c883a45fe810
kernel-PAE-2.6.18-238.el5.i686.rpm SHA-256: fe77666fc3ecd9795631c6e931e62627cfce2c9c75e6747231ed526447dc19dc
kernel-PAE-devel-2.6.18-238.el5.i686.rpm SHA-256: be8e27b602c5e45e5efc7f466f612126b16192b6596eca05691cc20f80c1ea4b
kernel-debug-2.6.18-238.el5.i686.rpm SHA-256: 2e612f2250cb88126f150e686b9b474a8a59fda90a580568f96300eacaebdabe
kernel-debug-devel-2.6.18-238.el5.i686.rpm SHA-256: 0cbadc1aa332fe1069062105771184f7aab5be8807c039d2c9cf2907904f1df6
kernel-devel-2.6.18-238.el5.i686.rpm SHA-256: b8e2212158196d294ab03e7e3f40502fbd146f1f48f5a3c2151daa09aaefb493
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.i386.rpm SHA-256: ce27293f8c89dd5f06fd7bf0f163fcf7843300bf29cae1f073bed73a7e38d983
kernel-xen-2.6.18-238.el5.i686.rpm SHA-256: c3c9660737e1079c6d7514ef80a8d866572ec6d8ac79ff47448cf8eb60b3e131
kernel-xen-devel-2.6.18-238.el5.i686.rpm SHA-256: 1a2f3092f15abb1506142a049e63a753fc207c59fb41ab873e28bba3d6cda0cd

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-238.el5.src.rpm SHA-256: 6df5e768f26f328961c44ee12cebfc8e379ba678d49ec90e4be0f05b17d8694c
x86_64
kernel-2.6.18-238.el5.x86_64.rpm SHA-256: 452d9b1d08f2bfc1f5641089f5ca9a24514a4ad339059fb8cb10f2732ac296cb
kernel-debug-2.6.18-238.el5.x86_64.rpm SHA-256: f6497904fd25264d1dfbb9df7fcc0d9cdce909c87c8f9e059a653e8c23a52a63
kernel-debug-devel-2.6.18-238.el5.x86_64.rpm SHA-256: b566cec93f157c22851daac822316e3fdee73df2f6da3d8ec92bac32853d7fbf
kernel-devel-2.6.18-238.el5.x86_64.rpm SHA-256: 32de34d8a2256052fefacf477a1dac09f2304c71b190091ccaebcdef6e35c913
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.x86_64.rpm SHA-256: 18cad7ed7cc7b3061b25e0a36e65074913a13f8557765c62a5ba566887d7496c
kernel-xen-2.6.18-238.el5.x86_64.rpm SHA-256: 20492c4eba69e7a49249ad861dec652d949108df4c88137a159b0a7d3320ee3f
kernel-xen-devel-2.6.18-238.el5.x86_64.rpm SHA-256: 7c2a4d53cce4c222c20cdf1bbe85f26346903c3c1a585d08b6f803729024c207
i386
kernel-2.6.18-238.el5.i686.rpm SHA-256: e162016005cf0bb01f10894e158087ed0611694524cbed4e4eb8c883a45fe810
kernel-PAE-2.6.18-238.el5.i686.rpm SHA-256: fe77666fc3ecd9795631c6e931e62627cfce2c9c75e6747231ed526447dc19dc
kernel-PAE-devel-2.6.18-238.el5.i686.rpm SHA-256: be8e27b602c5e45e5efc7f466f612126b16192b6596eca05691cc20f80c1ea4b
kernel-debug-2.6.18-238.el5.i686.rpm SHA-256: 2e612f2250cb88126f150e686b9b474a8a59fda90a580568f96300eacaebdabe
kernel-debug-devel-2.6.18-238.el5.i686.rpm SHA-256: 0cbadc1aa332fe1069062105771184f7aab5be8807c039d2c9cf2907904f1df6
kernel-devel-2.6.18-238.el5.i686.rpm SHA-256: b8e2212158196d294ab03e7e3f40502fbd146f1f48f5a3c2151daa09aaefb493
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.i386.rpm SHA-256: ce27293f8c89dd5f06fd7bf0f163fcf7843300bf29cae1f073bed73a7e38d983
kernel-xen-2.6.18-238.el5.i686.rpm SHA-256: c3c9660737e1079c6d7514ef80a8d866572ec6d8ac79ff47448cf8eb60b3e131
kernel-xen-devel-2.6.18-238.el5.i686.rpm SHA-256: 1a2f3092f15abb1506142a049e63a753fc207c59fb41ab873e28bba3d6cda0cd

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-238.el5.src.rpm SHA-256: 6df5e768f26f328961c44ee12cebfc8e379ba678d49ec90e4be0f05b17d8694c
s390x
kernel-2.6.18-238.el5.s390x.rpm SHA-256: 4d6e0f39874a0023df5282ab016400f8740d9609e10034c47646cf8be9a0304d
kernel-debug-2.6.18-238.el5.s390x.rpm SHA-256: 25fece407ae745c9207a017601a1590e303cab457c8fa52220889250ac30fbc9
kernel-debug-devel-2.6.18-238.el5.s390x.rpm SHA-256: 58b57b15bfd27dda1bd16719553ed1d01c0f76bda3bfee7ea885386036bae88f
kernel-devel-2.6.18-238.el5.s390x.rpm SHA-256: f606bcbd050afca8f73455635edcd61de778e3148e01d7453153e09eecc55d22
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.s390x.rpm SHA-256: 35b29920511a04e455ff35d631b4a807c2949a333ab7bd55a13e52cc010a4822
kernel-kdump-2.6.18-238.el5.s390x.rpm SHA-256: 3fe7041405259e324f8f061d4776f9f79b837f4cf94b414ef6c3df4241408830
kernel-kdump-devel-2.6.18-238.el5.s390x.rpm SHA-256: 1cccbc7fb4c5201382bfe0ae6ac3db43fae967d6067fad6beeca597c1d4b34df

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-238.el5.src.rpm SHA-256: 6df5e768f26f328961c44ee12cebfc8e379ba678d49ec90e4be0f05b17d8694c
ppc
kernel-2.6.18-238.el5.ppc64.rpm SHA-256: be1f1f404ff7e364ee1109cb3279c5289f201dce9e1a796bf87ea2572fcaee21
kernel-debug-2.6.18-238.el5.ppc64.rpm SHA-256: c775c3c2f1c7abb0a6e2c41e4d664fa61edc4664c0b61b265e79316ee82c7138
kernel-debug-devel-2.6.18-238.el5.ppc64.rpm SHA-256: 0b35a7bce50c8c4bd3e430c25053afdaa40ce8b782f6916947ef91d46a40ef6d
kernel-devel-2.6.18-238.el5.ppc64.rpm SHA-256: 090a3eda11c71db4d8413616cd1e8286495beae0d073c389f0f3617a26a147d9
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.ppc.rpm SHA-256: fab73320ece2f2e6b4607bc9c711dd8e74662c6cadf50a5310acf24c273d1e93
kernel-headers-2.6.18-238.el5.ppc64.rpm SHA-256: 9751789a0b5b0d1b7ea80c40b8fa08bcb3c75c50f26d2a87cf8a43a32accaf9d
kernel-kdump-2.6.18-238.el5.ppc64.rpm SHA-256: 542e33ca8af8644c9e601c1f9dba8536ce1bfd8d01c9e83d8dc4d05f31bb025a
kernel-kdump-devel-2.6.18-238.el5.ppc64.rpm SHA-256: 58fd72a9952fb104e32399ef72a9296ef008856b891bfe65f35568dbb8a6a75b

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-238.el5.src.rpm SHA-256: 6df5e768f26f328961c44ee12cebfc8e379ba678d49ec90e4be0f05b17d8694c
x86_64
kernel-2.6.18-238.el5.x86_64.rpm SHA-256: 452d9b1d08f2bfc1f5641089f5ca9a24514a4ad339059fb8cb10f2732ac296cb
kernel-debug-2.6.18-238.el5.x86_64.rpm SHA-256: f6497904fd25264d1dfbb9df7fcc0d9cdce909c87c8f9e059a653e8c23a52a63
kernel-debug-devel-2.6.18-238.el5.x86_64.rpm SHA-256: b566cec93f157c22851daac822316e3fdee73df2f6da3d8ec92bac32853d7fbf
kernel-devel-2.6.18-238.el5.x86_64.rpm SHA-256: 32de34d8a2256052fefacf477a1dac09f2304c71b190091ccaebcdef6e35c913
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.x86_64.rpm SHA-256: 18cad7ed7cc7b3061b25e0a36e65074913a13f8557765c62a5ba566887d7496c
kernel-xen-2.6.18-238.el5.x86_64.rpm SHA-256: 20492c4eba69e7a49249ad861dec652d949108df4c88137a159b0a7d3320ee3f
kernel-xen-devel-2.6.18-238.el5.x86_64.rpm SHA-256: 7c2a4d53cce4c222c20cdf1bbe85f26346903c3c1a585d08b6f803729024c207
i386
kernel-2.6.18-238.el5.i686.rpm SHA-256: e162016005cf0bb01f10894e158087ed0611694524cbed4e4eb8c883a45fe810
kernel-PAE-2.6.18-238.el5.i686.rpm SHA-256: fe77666fc3ecd9795631c6e931e62627cfce2c9c75e6747231ed526447dc19dc
kernel-PAE-devel-2.6.18-238.el5.i686.rpm SHA-256: be8e27b602c5e45e5efc7f466f612126b16192b6596eca05691cc20f80c1ea4b
kernel-debug-2.6.18-238.el5.i686.rpm SHA-256: 2e612f2250cb88126f150e686b9b474a8a59fda90a580568f96300eacaebdabe
kernel-debug-devel-2.6.18-238.el5.i686.rpm SHA-256: 0cbadc1aa332fe1069062105771184f7aab5be8807c039d2c9cf2907904f1df6
kernel-devel-2.6.18-238.el5.i686.rpm SHA-256: b8e2212158196d294ab03e7e3f40502fbd146f1f48f5a3c2151daa09aaefb493
kernel-doc-2.6.18-238.el5.noarch.rpm SHA-256: 1735f5de07140c3f726825880e0b0821f8468fdbabeeed9f653de3c879c1c395
kernel-headers-2.6.18-238.el5.i386.rpm SHA-256: ce27293f8c89dd5f06fd7bf0f163fcf7843300bf29cae1f073bed73a7e38d983
kernel-xen-2.6.18-238.el5.i686.rpm SHA-256: c3c9660737e1079c6d7514ef80a8d866572ec6d8ac79ff47448cf8eb60b3e131
kernel-xen-devel-2.6.18-238.el5.i686.rpm SHA-256: 1a2f3092f15abb1506142a049e63a753fc207c59fb41ab873e28bba3d6cda0cd

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter