Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:0429 - Security Advisory
Issued:
2011-04-12
Updated:
2011-04-12

RHSA-2011:0429 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A missing boundary check was found in the dvb_ca_ioctl() function in the

Linux kernel's av7110 module. On systems that use old DVB cards that
require the av7110 module, a local, unprivileged user could use this flaw
to cause a denial of service or escalate their privileges. (CVE-2011-0521,
Important)

  • An inconsistency was found in the interaction between the Linux kernel's

method for allocating NFSv4 (Network File System version 4) ACL data and
the method by which it was freed. This inconsistency led to a kernel panic
which could be triggered by a local, unprivileged user with files owned by
said user on an NFSv4 share. (CVE-2011-1090, Moderate)

  • A NULL pointer dereference flaw was found in the Generic Receive Offload

(GRO) functionality in the Linux kernel's networking implementation. If
both GRO and promiscuous mode were enabled on an interface in a virtual LAN
(VLAN), it could result in a denial of service when a malformed VLAN frame
is received on that interface. (CVE-2011-1478, Moderate)

  • A missing security check in the Linux kernel's implementation of the

install_special_mapping() function could allow a local, unprivileged user
to bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low)

  • An information leak was found in the Linux kernel's task_show_regs()

implementation. On IBM S/390 systems, a local, unprivileged user could use
this flaw to read /proc/[PID]/status files, allowing them to discover the
CPU register values of processes. (CVE-2011-0710, Low)

  • A missing validation check was found in the Linux kernel's

mac_partition() implementation, used for supporting file systems created
on Mac OS operating systems. A local attacker could use this flaw to cause
a denial of service by mounting a disk that contains specially-crafted
partitions. (CVE-2011-1010, Low)

Red Hat would like to thank Ryan Sweat for reporting CVE-2011-1478; Tavis
Ormandy for reporting CVE-2010-4346; and Timo Warns for reporting
CVE-2011-1010.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x

Fixes

  • BZ - 662189 - CVE-2010-4346 kernel: install_special_mapping skips security_file_mmap check
  • BZ - 672398 - CVE-2011-0521 kernel: av7110 negative array offset
  • BZ - 675664 - Kernel panic when restart network on vlan with bonding [rhel-5.6.z]
  • BZ - 675909 - GFS2: Blocks not marked free on delete [rhel-5.6.z]
  • BZ - 677173 - mpctl module doesn't release fasync_struct at file close [rhel-5.6.z]
  • BZ - 677850 - CVE-2011-0710 kernel: s390 task_show_regs infoleak
  • BZ - 679282 - CVE-2011-1010 kernel: fs/partitions: Validate map_count in Mac partition tables
  • BZ - 680043 - [usb-audio] unable to set capture mixer levels [rhel-5.6.z]
  • BZ - 680350 - WARNING: APIC timer calibration may be wrong [rhel-5.6.z]
  • BZ - 681795 - [NetApp 5.6 Bug] Erroneous TPG ID check in SCSI ALUA Handler [rhel-5.6.z]
  • BZ - 682641 - CVE-2011-1090 kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab
  • BZ - 682673 - system fails to boot do to x86-64 kernel corrupting bios memory area [rhel-5.6.z]
  • BZ - 683443 - kernel panic in pg_init_done - pgpath already deleted [rhel-5.6.z]
  • BZ - 684128 - HP_GETHOSTINFO ioctl always causes mpt controller reset [rhel-5.6.z]
  • BZ - 691270 - CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse

CVEs

  • CVE-2011-0521
  • CVE-2010-4346
  • CVE-2011-1478
  • CVE-2011-0710
  • CVE-2011-1090
  • CVE-2011-1010

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0429
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
x86_64
kernel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d34d452c684ba19e5a5648bdeaa105a6fe9ed14ba9836e60491b3ea3d3de1ce5
kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: b10a9da01c068518bacedc42950f7b5cab9298f0718bdb3d99257116d92655e6
kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 801b8b6ea900afef2278b483bd88f121ae1f7e75f923ee15850e00efb263db83
kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d85b9d7635d8449b91fbc25af202908bb037a88d600a3a4e8ef5a99582239562
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 64f4e10b47d3e3222069cbac13c238537f5583f98e4043a75505ccae06da9d32
kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: a9d159ff4ecf5d7c88ab61e385dbe0df6df7bf069661b30016eebcf4f35c1da5
kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 09a5dde50d603002be2876bc523478f7b3fbdae20b82afc06b03211f87f93cd3
ia64
kernel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 293d53b00c1c4be4362169779776f3711e80b770b7abbb87720d6188219cce8a
kernel-debug-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 43678f03da336fb78bf1b0bb3f81f2ada7c05a18ce4df71025d7496d912350e1
kernel-debug-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 0c18e5674754d44fe460243e3895a10aaca0d58888dc8d835d25e6e2e4c4ce03
kernel-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 514f788a449badab2b27caa3c9581807e44152b2790aae06b5ad85d3c7702464
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 32af0359a37cdae94ff52cf7c4a27e1dd3eaf4ffd4cca64e8cb14659dbd00acb
kernel-xen-2.6.18-238.9.1.el5.ia64.rpm SHA-256: c894d07a61a00e84dff61cdaf83214905e44b12ed628ee614236ec10a18b3bbf
kernel-xen-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: d1362b001f57fb61e29f378425a4d3669ab33a079f9cc51d3820e7760aec51bb
i386
kernel-2.6.18-238.9.1.el5.i686.rpm SHA-256: b660754c1eb3e7644e14483294461931ebb41098233f72d24c006ef85fb1c05c
kernel-PAE-2.6.18-238.9.1.el5.i686.rpm SHA-256: 1586a98cac6b433c4f21edae7e832fed0378052895b964dbd9d210af85a702f0
kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 6900e9b2eb888461eb3ae9f128fc86678eb2c54f41191637cc7634cb1e571655
kernel-debug-2.6.18-238.9.1.el5.i686.rpm SHA-256: 97109b6b2fa831ebfb7fa619f17e4d27bf85c6915b181abc10e14d37501a57ab
kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 55b51c5325b7c0d90ef12edd1f076376cb5a0d9b923cc482d451d35e31e5d9d0
kernel-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 70282388bdfe3588f8b9f94f076bdc34bb193fc02b149c53b598b48b44f0017c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.i386.rpm SHA-256: d476961c6fba9dfa09ad2fbe254fc86ea75981c795e2295d715ac6e16c3b3020
kernel-xen-2.6.18-238.9.1.el5.i686.rpm SHA-256: 7cdc2c093e6bc504935db54ec729a23a899f75ef43d998d325aacdb57ab2c523
kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 3b64bf3921c82b0d2861475c7c8a2f9e1a81b81cc94790be03ea0603b6f44551

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
x86_64
kernel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d34d452c684ba19e5a5648bdeaa105a6fe9ed14ba9836e60491b3ea3d3de1ce5
kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: b10a9da01c068518bacedc42950f7b5cab9298f0718bdb3d99257116d92655e6
kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 801b8b6ea900afef2278b483bd88f121ae1f7e75f923ee15850e00efb263db83
kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d85b9d7635d8449b91fbc25af202908bb037a88d600a3a4e8ef5a99582239562
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 64f4e10b47d3e3222069cbac13c238537f5583f98e4043a75505ccae06da9d32
kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: a9d159ff4ecf5d7c88ab61e385dbe0df6df7bf069661b30016eebcf4f35c1da5
kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 09a5dde50d603002be2876bc523478f7b3fbdae20b82afc06b03211f87f93cd3
ia64
kernel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 293d53b00c1c4be4362169779776f3711e80b770b7abbb87720d6188219cce8a
kernel-debug-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 43678f03da336fb78bf1b0bb3f81f2ada7c05a18ce4df71025d7496d912350e1
kernel-debug-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 0c18e5674754d44fe460243e3895a10aaca0d58888dc8d835d25e6e2e4c4ce03
kernel-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 514f788a449badab2b27caa3c9581807e44152b2790aae06b5ad85d3c7702464
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 32af0359a37cdae94ff52cf7c4a27e1dd3eaf4ffd4cca64e8cb14659dbd00acb
kernel-xen-2.6.18-238.9.1.el5.ia64.rpm SHA-256: c894d07a61a00e84dff61cdaf83214905e44b12ed628ee614236ec10a18b3bbf
kernel-xen-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: d1362b001f57fb61e29f378425a4d3669ab33a079f9cc51d3820e7760aec51bb
i386
kernel-2.6.18-238.9.1.el5.i686.rpm SHA-256: b660754c1eb3e7644e14483294461931ebb41098233f72d24c006ef85fb1c05c
kernel-PAE-2.6.18-238.9.1.el5.i686.rpm SHA-256: 1586a98cac6b433c4f21edae7e832fed0378052895b964dbd9d210af85a702f0
kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 6900e9b2eb888461eb3ae9f128fc86678eb2c54f41191637cc7634cb1e571655
kernel-debug-2.6.18-238.9.1.el5.i686.rpm SHA-256: 97109b6b2fa831ebfb7fa619f17e4d27bf85c6915b181abc10e14d37501a57ab
kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 55b51c5325b7c0d90ef12edd1f076376cb5a0d9b923cc482d451d35e31e5d9d0
kernel-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 70282388bdfe3588f8b9f94f076bdc34bb193fc02b149c53b598b48b44f0017c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.i386.rpm SHA-256: d476961c6fba9dfa09ad2fbe254fc86ea75981c795e2295d715ac6e16c3b3020
kernel-xen-2.6.18-238.9.1.el5.i686.rpm SHA-256: 7cdc2c093e6bc504935db54ec729a23a899f75ef43d998d325aacdb57ab2c523
kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 3b64bf3921c82b0d2861475c7c8a2f9e1a81b81cc94790be03ea0603b6f44551

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
ia64
kernel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 293d53b00c1c4be4362169779776f3711e80b770b7abbb87720d6188219cce8a
kernel-debug-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 43678f03da336fb78bf1b0bb3f81f2ada7c05a18ce4df71025d7496d912350e1
kernel-debug-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 0c18e5674754d44fe460243e3895a10aaca0d58888dc8d835d25e6e2e4c4ce03
kernel-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 514f788a449badab2b27caa3c9581807e44152b2790aae06b5ad85d3c7702464
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.ia64.rpm SHA-256: 32af0359a37cdae94ff52cf7c4a27e1dd3eaf4ffd4cca64e8cb14659dbd00acb
kernel-xen-2.6.18-238.9.1.el5.ia64.rpm SHA-256: c894d07a61a00e84dff61cdaf83214905e44b12ed628ee614236ec10a18b3bbf
kernel-xen-devel-2.6.18-238.9.1.el5.ia64.rpm SHA-256: d1362b001f57fb61e29f378425a4d3669ab33a079f9cc51d3820e7760aec51bb
x86_64
kernel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d34d452c684ba19e5a5648bdeaa105a6fe9ed14ba9836e60491b3ea3d3de1ce5
kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: b10a9da01c068518bacedc42950f7b5cab9298f0718bdb3d99257116d92655e6
kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 801b8b6ea900afef2278b483bd88f121ae1f7e75f923ee15850e00efb263db83
kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d85b9d7635d8449b91fbc25af202908bb037a88d600a3a4e8ef5a99582239562
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 64f4e10b47d3e3222069cbac13c238537f5583f98e4043a75505ccae06da9d32
kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: a9d159ff4ecf5d7c88ab61e385dbe0df6df7bf069661b30016eebcf4f35c1da5
kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 09a5dde50d603002be2876bc523478f7b3fbdae20b82afc06b03211f87f93cd3
i386
kernel-2.6.18-238.9.1.el5.i686.rpm SHA-256: b660754c1eb3e7644e14483294461931ebb41098233f72d24c006ef85fb1c05c
kernel-PAE-2.6.18-238.9.1.el5.i686.rpm SHA-256: 1586a98cac6b433c4f21edae7e832fed0378052895b964dbd9d210af85a702f0
kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 6900e9b2eb888461eb3ae9f128fc86678eb2c54f41191637cc7634cb1e571655
kernel-debug-2.6.18-238.9.1.el5.i686.rpm SHA-256: 97109b6b2fa831ebfb7fa619f17e4d27bf85c6915b181abc10e14d37501a57ab
kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 55b51c5325b7c0d90ef12edd1f076376cb5a0d9b923cc482d451d35e31e5d9d0
kernel-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 70282388bdfe3588f8b9f94f076bdc34bb193fc02b149c53b598b48b44f0017c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.i386.rpm SHA-256: d476961c6fba9dfa09ad2fbe254fc86ea75981c795e2295d715ac6e16c3b3020
kernel-xen-2.6.18-238.9.1.el5.i686.rpm SHA-256: 7cdc2c093e6bc504935db54ec729a23a899f75ef43d998d325aacdb57ab2c523
kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 3b64bf3921c82b0d2861475c7c8a2f9e1a81b81cc94790be03ea0603b6f44551

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
x86_64
kernel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d34d452c684ba19e5a5648bdeaa105a6fe9ed14ba9836e60491b3ea3d3de1ce5
kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: b10a9da01c068518bacedc42950f7b5cab9298f0718bdb3d99257116d92655e6
kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 801b8b6ea900afef2278b483bd88f121ae1f7e75f923ee15850e00efb263db83
kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d85b9d7635d8449b91fbc25af202908bb037a88d600a3a4e8ef5a99582239562
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 64f4e10b47d3e3222069cbac13c238537f5583f98e4043a75505ccae06da9d32
kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: a9d159ff4ecf5d7c88ab61e385dbe0df6df7bf069661b30016eebcf4f35c1da5
kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 09a5dde50d603002be2876bc523478f7b3fbdae20b82afc06b03211f87f93cd3
i386
kernel-2.6.18-238.9.1.el5.i686.rpm SHA-256: b660754c1eb3e7644e14483294461931ebb41098233f72d24c006ef85fb1c05c
kernel-PAE-2.6.18-238.9.1.el5.i686.rpm SHA-256: 1586a98cac6b433c4f21edae7e832fed0378052895b964dbd9d210af85a702f0
kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 6900e9b2eb888461eb3ae9f128fc86678eb2c54f41191637cc7634cb1e571655
kernel-debug-2.6.18-238.9.1.el5.i686.rpm SHA-256: 97109b6b2fa831ebfb7fa619f17e4d27bf85c6915b181abc10e14d37501a57ab
kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 55b51c5325b7c0d90ef12edd1f076376cb5a0d9b923cc482d451d35e31e5d9d0
kernel-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 70282388bdfe3588f8b9f94f076bdc34bb193fc02b149c53b598b48b44f0017c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.i386.rpm SHA-256: d476961c6fba9dfa09ad2fbe254fc86ea75981c795e2295d715ac6e16c3b3020
kernel-xen-2.6.18-238.9.1.el5.i686.rpm SHA-256: 7cdc2c093e6bc504935db54ec729a23a899f75ef43d998d325aacdb57ab2c523
kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 3b64bf3921c82b0d2861475c7c8a2f9e1a81b81cc94790be03ea0603b6f44551

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
x86_64
kernel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d34d452c684ba19e5a5648bdeaa105a6fe9ed14ba9836e60491b3ea3d3de1ce5
kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: b10a9da01c068518bacedc42950f7b5cab9298f0718bdb3d99257116d92655e6
kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 801b8b6ea900afef2278b483bd88f121ae1f7e75f923ee15850e00efb263db83
kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d85b9d7635d8449b91fbc25af202908bb037a88d600a3a4e8ef5a99582239562
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 64f4e10b47d3e3222069cbac13c238537f5583f98e4043a75505ccae06da9d32
kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: a9d159ff4ecf5d7c88ab61e385dbe0df6df7bf069661b30016eebcf4f35c1da5
kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 09a5dde50d603002be2876bc523478f7b3fbdae20b82afc06b03211f87f93cd3
i386
kernel-2.6.18-238.9.1.el5.i686.rpm SHA-256: b660754c1eb3e7644e14483294461931ebb41098233f72d24c006ef85fb1c05c
kernel-PAE-2.6.18-238.9.1.el5.i686.rpm SHA-256: 1586a98cac6b433c4f21edae7e832fed0378052895b964dbd9d210af85a702f0
kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 6900e9b2eb888461eb3ae9f128fc86678eb2c54f41191637cc7634cb1e571655
kernel-debug-2.6.18-238.9.1.el5.i686.rpm SHA-256: 97109b6b2fa831ebfb7fa619f17e4d27bf85c6915b181abc10e14d37501a57ab
kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 55b51c5325b7c0d90ef12edd1f076376cb5a0d9b923cc482d451d35e31e5d9d0
kernel-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 70282388bdfe3588f8b9f94f076bdc34bb193fc02b149c53b598b48b44f0017c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.i386.rpm SHA-256: d476961c6fba9dfa09ad2fbe254fc86ea75981c795e2295d715ac6e16c3b3020
kernel-xen-2.6.18-238.9.1.el5.i686.rpm SHA-256: 7cdc2c093e6bc504935db54ec729a23a899f75ef43d998d325aacdb57ab2c523
kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 3b64bf3921c82b0d2861475c7c8a2f9e1a81b81cc94790be03ea0603b6f44551

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
s390x
kernel-2.6.18-238.9.1.el5.s390x.rpm SHA-256: b28af64d5f5f221284ac2af6fea1a4920669e50d02c70deba540fe363f949b43
kernel-debug-2.6.18-238.9.1.el5.s390x.rpm SHA-256: f50a0c5928f412ec27bd9e386a9c61c17fc2ae159483ec5fbac25b6bd8570e6f
kernel-debug-devel-2.6.18-238.9.1.el5.s390x.rpm SHA-256: db2c3055986c324e8c1d90fd2fe14c6c8eea59d4fcd67cb273455cf2a0dc3d12
kernel-devel-2.6.18-238.9.1.el5.s390x.rpm SHA-256: 32142fb78991dc07cdedd04da2bc9d5984737a0934a9d4a3f1cbde6dfa28135c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.s390x.rpm SHA-256: a5716b72679ec35ca1e9b72b9acc477147721314dc7e6382157e13dcd2887726
kernel-kdump-2.6.18-238.9.1.el5.s390x.rpm SHA-256: ed9d0d301c97f85b1510235c49ce950469388a769a705f84ac4ee1ecae4de5c0
kernel-kdump-devel-2.6.18-238.9.1.el5.s390x.rpm SHA-256: 180f476e0e0967b9638d6e7d1290eaf833bb36878eb8785fbef072476d00af39

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
ppc
kernel-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: c730e2f63aecf64b56b1f6b8b42dcced1b6f5a276f61c134b25fd0bb53df6295
kernel-debug-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: 7bac043bad223dead883abab9a09a037be879191aabad5e3e338a272cef0c897
kernel-debug-devel-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: cb9e2353b5d9638616bd11745ef33edd601a0d6d497f7ef7e067d6552d1ddc10
kernel-devel-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: 947ce9469f337cdd371c580b3e7c26ea2e660bac01ffa790f7c21818ff1381b9
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.ppc.rpm SHA-256: 53b1f8b17def16452aa57fb5244619949def703bf2550b7e945038d04541ae13
kernel-headers-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: c9123e5399c82afdbcce1d43edb39bbe4461889b98622f3958c53a1d10b8f7a3
kernel-kdump-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: 48119b0ca6794cf7d1cbedf69dc421b8dfadd78927d6e8097b63a9ac798c4070
kernel-kdump-devel-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: d49f4837fc83040bc9f0c8fa7c37d49fee72b9f4829c7247fe4fda74366b2bc4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
ppc
kernel-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: c730e2f63aecf64b56b1f6b8b42dcced1b6f5a276f61c134b25fd0bb53df6295
kernel-debug-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: 7bac043bad223dead883abab9a09a037be879191aabad5e3e338a272cef0c897
kernel-debug-devel-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: cb9e2353b5d9638616bd11745ef33edd601a0d6d497f7ef7e067d6552d1ddc10
kernel-devel-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: 947ce9469f337cdd371c580b3e7c26ea2e660bac01ffa790f7c21818ff1381b9
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.ppc.rpm SHA-256: 53b1f8b17def16452aa57fb5244619949def703bf2550b7e945038d04541ae13
kernel-headers-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: c9123e5399c82afdbcce1d43edb39bbe4461889b98622f3958c53a1d10b8f7a3
kernel-kdump-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: 48119b0ca6794cf7d1cbedf69dc421b8dfadd78927d6e8097b63a9ac798c4070
kernel-kdump-devel-2.6.18-238.9.1.el5.ppc64.rpm SHA-256: d49f4837fc83040bc9f0c8fa7c37d49fee72b9f4829c7247fe4fda74366b2bc4

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
x86_64
kernel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d34d452c684ba19e5a5648bdeaa105a6fe9ed14ba9836e60491b3ea3d3de1ce5
kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: b10a9da01c068518bacedc42950f7b5cab9298f0718bdb3d99257116d92655e6
kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 801b8b6ea900afef2278b483bd88f121ae1f7e75f923ee15850e00efb263db83
kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d85b9d7635d8449b91fbc25af202908bb037a88d600a3a4e8ef5a99582239562
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 64f4e10b47d3e3222069cbac13c238537f5583f98e4043a75505ccae06da9d32
kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: a9d159ff4ecf5d7c88ab61e385dbe0df6df7bf069661b30016eebcf4f35c1da5
kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 09a5dde50d603002be2876bc523478f7b3fbdae20b82afc06b03211f87f93cd3
i386
kernel-2.6.18-238.9.1.el5.i686.rpm SHA-256: b660754c1eb3e7644e14483294461931ebb41098233f72d24c006ef85fb1c05c
kernel-PAE-2.6.18-238.9.1.el5.i686.rpm SHA-256: 1586a98cac6b433c4f21edae7e832fed0378052895b964dbd9d210af85a702f0
kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 6900e9b2eb888461eb3ae9f128fc86678eb2c54f41191637cc7634cb1e571655
kernel-debug-2.6.18-238.9.1.el5.i686.rpm SHA-256: 97109b6b2fa831ebfb7fa619f17e4d27bf85c6915b181abc10e14d37501a57ab
kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 55b51c5325b7c0d90ef12edd1f076376cb5a0d9b923cc482d451d35e31e5d9d0
kernel-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 70282388bdfe3588f8b9f94f076bdc34bb193fc02b149c53b598b48b44f0017c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.i386.rpm SHA-256: d476961c6fba9dfa09ad2fbe254fc86ea75981c795e2295d715ac6e16c3b3020
kernel-xen-2.6.18-238.9.1.el5.i686.rpm SHA-256: 7cdc2c093e6bc504935db54ec729a23a899f75ef43d998d325aacdb57ab2c523
kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 3b64bf3921c82b0d2861475c7c8a2f9e1a81b81cc94790be03ea0603b6f44551

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
x86_64
kernel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d34d452c684ba19e5a5648bdeaa105a6fe9ed14ba9836e60491b3ea3d3de1ce5
kernel-debug-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: b10a9da01c068518bacedc42950f7b5cab9298f0718bdb3d99257116d92655e6
kernel-debug-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 801b8b6ea900afef2278b483bd88f121ae1f7e75f923ee15850e00efb263db83
kernel-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: d85b9d7635d8449b91fbc25af202908bb037a88d600a3a4e8ef5a99582239562
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 64f4e10b47d3e3222069cbac13c238537f5583f98e4043a75505ccae06da9d32
kernel-xen-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: a9d159ff4ecf5d7c88ab61e385dbe0df6df7bf069661b30016eebcf4f35c1da5
kernel-xen-devel-2.6.18-238.9.1.el5.x86_64.rpm SHA-256: 09a5dde50d603002be2876bc523478f7b3fbdae20b82afc06b03211f87f93cd3
i386
kernel-2.6.18-238.9.1.el5.i686.rpm SHA-256: b660754c1eb3e7644e14483294461931ebb41098233f72d24c006ef85fb1c05c
kernel-PAE-2.6.18-238.9.1.el5.i686.rpm SHA-256: 1586a98cac6b433c4f21edae7e832fed0378052895b964dbd9d210af85a702f0
kernel-PAE-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 6900e9b2eb888461eb3ae9f128fc86678eb2c54f41191637cc7634cb1e571655
kernel-debug-2.6.18-238.9.1.el5.i686.rpm SHA-256: 97109b6b2fa831ebfb7fa619f17e4d27bf85c6915b181abc10e14d37501a57ab
kernel-debug-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 55b51c5325b7c0d90ef12edd1f076376cb5a0d9b923cc482d451d35e31e5d9d0
kernel-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 70282388bdfe3588f8b9f94f076bdc34bb193fc02b149c53b598b48b44f0017c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.i386.rpm SHA-256: d476961c6fba9dfa09ad2fbe254fc86ea75981c795e2295d715ac6e16c3b3020
kernel-xen-2.6.18-238.9.1.el5.i686.rpm SHA-256: 7cdc2c093e6bc504935db54ec729a23a899f75ef43d998d325aacdb57ab2c523
kernel-xen-devel-2.6.18-238.9.1.el5.i686.rpm SHA-256: 3b64bf3921c82b0d2861475c7c8a2f9e1a81b81cc94790be03ea0603b6f44551

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-238.9.1.el5.src.rpm SHA-256: 89e002ef995ff01a853e3028b558f12d244337ae7c8ef948097b9b3f95a0116c
s390x
kernel-2.6.18-238.9.1.el5.s390x.rpm SHA-256: b28af64d5f5f221284ac2af6fea1a4920669e50d02c70deba540fe363f949b43
kernel-debug-2.6.18-238.9.1.el5.s390x.rpm SHA-256: f50a0c5928f412ec27bd9e386a9c61c17fc2ae159483ec5fbac25b6bd8570e6f
kernel-debug-devel-2.6.18-238.9.1.el5.s390x.rpm SHA-256: db2c3055986c324e8c1d90fd2fe14c6c8eea59d4fcd67cb273455cf2a0dc3d12
kernel-devel-2.6.18-238.9.1.el5.s390x.rpm SHA-256: 32142fb78991dc07cdedd04da2bc9d5984737a0934a9d4a3f1cbde6dfa28135c
kernel-doc-2.6.18-238.9.1.el5.noarch.rpm SHA-256: 41d41825d33f392b04fc026a655fcde67a4376787c823f8c80262677e866a553
kernel-headers-2.6.18-238.9.1.el5.s390x.rpm SHA-256: a5716b72679ec35ca1e9b72b9acc477147721314dc7e6382157e13dcd2887726
kernel-kdump-2.6.18-238.9.1.el5.s390x.rpm SHA-256: ed9d0d301c97f85b1510235c49ce950469388a769a705f84ac4ee1ecae4de5c0
kernel-kdump-devel-2.6.18-238.9.1.el5.s390x.rpm SHA-256: 180f476e0e0967b9638d6e7d1290eaf833bb36878eb8785fbef072476d00af39

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter