Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:0833 - Security Advisory
Issued:
2011-05-31
Updated:
2011-05-31

RHSA-2011:0833 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw in the dccp_rcv_state_process() function could allow a remote

attacker to cause a denial of service, even when the socket was already
closed. (CVE-2011-1093, Important)

  • Multiple buffer overflow flaws were found in the Linux kernel's

Management Module Support for Message Passing Technology (MPT) based
controllers. A local, unprivileged user could use these flaws to cause a
denial of service, an information leak, or escalate their privileges.
(CVE-2011-1494, CVE-2011-1495, Important)

  • A missing validation of a null-terminated string data structure element

in the bnep_sock_ioctl() function could allow a local user to cause an
information leak or a denial of service. (CVE-2011-1079, Moderate)

  • Missing error checking in the way page tables were handled in the Xen

hypervisor implementation could allow a privileged guest user to cause the
host, and the guests, to lock up. (CVE-2011-1166, Moderate)

  • A flaw was found in the way the Xen hypervisor implementation checked for

the upper boundary when getting a new event channel port. A privileged
guest user could use this flaw to cause a denial of service or escalate
their privileges. (CVE-2011-1763, Moderate)

  • The start_code and end_code values in "/proc/[pid]/stat" were not

protected. In certain scenarios, this flaw could be used to defeat Address
Space Layout Randomization (ASLR). (CVE-2011-0726, Low)

  • A missing initialization flaw in the sco_sock_getsockopt() function could

allow a local, unprivileged user to cause an information leak.
(CVE-2011-1078, Low)

  • A missing validation of a null-terminated string data structure element

in the do_replace() function could allow a local user who has the
CAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1080, Low)

  • A buffer overflow flaw in the DEC Alpha OSF partition implementation in

the Linux kernel could allow a local attacker to cause an information leak
by mounting a disk that contains specially-crafted partition tables.
(CVE-2011-1163, Low)

  • Missing validations of null-terminated string data structure elements in

the do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(),
and do_arpt_get_ctl() functions could allow a local user who has the
CAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170,
CVE-2011-1171, CVE-2011-1172, Low)

  • A heap overflow flaw in the Linux kernel's EFI GUID Partition Table (GPT)

implementation could allow a local attacker to cause a denial of service
by mounting a disk that contains specially-crafted partition tables.
(CVE-2011-1577, Low)

Red Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and
CVE-2011-1495; Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1078,
CVE-2011-1080, CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172; Kees Cook
for reporting CVE-2011-0726; and Timo Warns for reporting CVE-2011-1163
and CVE-2011-1577.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x

Fixes

  • BZ - 681259 - CVE-2011-1078 kernel: bt sco_conninfo infoleak
  • BZ - 681260 - CVE-2011-1079 kernel: bnep device field missing NULL terminator
  • BZ - 681262 - CVE-2011-1080 kernel: ebtables stack infoleak
  • BZ - 682954 - CVE-2011-1093 kernel: dccp: fix oops on Reset after close
  • BZ - 684569 - CVE-2011-0726 kernel: proc: protect mm start_code/end_code in /proc/pid/stat
  • BZ - 688021 - CVE-2011-1163 kernel: fs/partitions: Corrupted OSF partition table infoleak
  • BZ - 688156 - [5.6][REG]for some uses of 'nfsservctl' system call, the kernel crashes. [rhel-5.6.z]
  • BZ - 688579 - CVE-2011-1166 kernel: xen: x86_64: fix error checking in arch_set_info_guest()
  • BZ - 689321 - CVE-2011-1170 ipv4: netfilter: arp_tables: fix infoleak to userspace
  • BZ - 689327 - CVE-2011-1171 ipv4: netfilter: ip_tables: fix infoleak to userspace
  • BZ - 689345 - CVE-2011-1172 ipv6: netfilter: ip6_tables: fix infoleak to userspace
  • BZ - 689699 - Deadlock between device driver attachment and device removal with a USB device [rhel-5.6.z]
  • BZ - 689700 - [NetApp 5.6 Bug] QLogic 8G FC firmware dumps seen during IO [rhel-5.6.z]
  • BZ - 690134 - Time runs too fast in a VM on processors with > 4GHZ freq [rhel-5.6.z]
  • BZ - 690239 - gfs2: creating large files suddenly slow to a crawl [rhel-5.6.z]
  • BZ - 694021 - CVE-2011-1494 CVE-2011-1495 kernel: drivers/scsi/mpt2sas: prevent heap overflows
  • BZ - 695976 - CVE-2011-1577 kernel: corrupted GUID partition tables can cause kernel oops
  • BZ - 696136 - RHEL 5.6 (kernel -238) causes audio issues [rhel-5.6.z]
  • BZ - 697448 - slab corruption after seeing some nfs-related BUG: warning [rhel-5.6.z]
  • BZ - 699808 - dasd: fix race between open and offline [rhel-5.6.z]
  • BZ - 701240 - CVE-2011-1763 kernel: xen: improper upper boundary check in get_free_port() function

CVEs

  • CVE-2011-1080
  • CVE-2011-0726
  • CVE-2011-1078
  • CVE-2011-1172
  • CVE-2011-1163
  • CVE-2011-1171
  • CVE-2011-1093
  • CVE-2011-1170
  • CVE-2011-1079
  • CVE-2011-1494
  • CVE-2011-1495
  • CVE-2011-1763
  • CVE-2011-1577
  • CVE-2011-1166

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/kernel.html#RHSA-2011-0833
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
x86_64
kernel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
ia64
kernel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 16df790fd91b0f69a0ff91f2735adbb7da014e518df84bd4c466a159cfe558e5
kernel-debug-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 282c2dbf4e6a0f48a8747390a3f998b886df7b699b8836db7e9e087806a457d1
kernel-debug-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: d04741526e2e2dc142811b8a3bff32be599734cad110dc4836963630f8316f8f
kernel-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 5bb0b88bdc1f3ae798e2cc10e102c02f06a94656639cd13baf09183f1816293a
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 71e68f2e6dc9b2e8fba528c5ed40ab5924dcab6b6bad1818768bc75421947a2d
kernel-xen-2.6.18-238.12.1.el5.ia64.rpm SHA-256: f45b4e49fbbf0b1bc212c4c7e8d35ebb93f808e0442efd452bb7c5eff2146bf0
kernel-xen-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 578a476c3050dc815c16001f725997e742e33eeae18d6f1a2583d1e881dd4374
i386
kernel-2.6.18-238.12.1.el5.i686.rpm SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
x86_64
kernel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
ia64
kernel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 16df790fd91b0f69a0ff91f2735adbb7da014e518df84bd4c466a159cfe558e5
kernel-debug-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 282c2dbf4e6a0f48a8747390a3f998b886df7b699b8836db7e9e087806a457d1
kernel-debug-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: d04741526e2e2dc142811b8a3bff32be599734cad110dc4836963630f8316f8f
kernel-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 5bb0b88bdc1f3ae798e2cc10e102c02f06a94656639cd13baf09183f1816293a
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 71e68f2e6dc9b2e8fba528c5ed40ab5924dcab6b6bad1818768bc75421947a2d
kernel-xen-2.6.18-238.12.1.el5.ia64.rpm SHA-256: f45b4e49fbbf0b1bc212c4c7e8d35ebb93f808e0442efd452bb7c5eff2146bf0
kernel-xen-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 578a476c3050dc815c16001f725997e742e33eeae18d6f1a2583d1e881dd4374
i386
kernel-2.6.18-238.12.1.el5.i686.rpm SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
ia64
kernel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 16df790fd91b0f69a0ff91f2735adbb7da014e518df84bd4c466a159cfe558e5
kernel-debug-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 282c2dbf4e6a0f48a8747390a3f998b886df7b699b8836db7e9e087806a457d1
kernel-debug-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: d04741526e2e2dc142811b8a3bff32be599734cad110dc4836963630f8316f8f
kernel-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 5bb0b88bdc1f3ae798e2cc10e102c02f06a94656639cd13baf09183f1816293a
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 71e68f2e6dc9b2e8fba528c5ed40ab5924dcab6b6bad1818768bc75421947a2d
kernel-xen-2.6.18-238.12.1.el5.ia64.rpm SHA-256: f45b4e49fbbf0b1bc212c4c7e8d35ebb93f808e0442efd452bb7c5eff2146bf0
kernel-xen-devel-2.6.18-238.12.1.el5.ia64.rpm SHA-256: 578a476c3050dc815c16001f725997e742e33eeae18d6f1a2583d1e881dd4374
x86_64
kernel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
i386
kernel-2.6.18-238.12.1.el5.i686.rpm SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
x86_64
kernel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
i386
kernel-2.6.18-238.12.1.el5.i686.rpm SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
x86_64
kernel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
i386
kernel-2.6.18-238.12.1.el5.i686.rpm SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
s390x
kernel-2.6.18-238.12.1.el5.s390x.rpm SHA-256: 48fad836b190c85615060a6eb3863b718c7335233efb8c98447b5f67bd89e987
kernel-debug-2.6.18-238.12.1.el5.s390x.rpm SHA-256: c68fcd40835e3a3f6c753190e4da6a8244e35a9114524d21f0e1379fa0db6e05
kernel-debug-devel-2.6.18-238.12.1.el5.s390x.rpm SHA-256: 420994329f4ef0604ead7000b2b5caeab1f7a4c96ecc39f49d2556ecc758e5f8
kernel-devel-2.6.18-238.12.1.el5.s390x.rpm SHA-256: e666d1c0fcba50d1613df6471c7b736d0b899db5fc6d254be46ac64e3e898fe2
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.s390x.rpm SHA-256: 87c36234f4596ed8da8940636b868ca4bd51e4f8fc191324827026dbb24d0362
kernel-kdump-2.6.18-238.12.1.el5.s390x.rpm SHA-256: 1888ff632fbf0c990e21a62b6c7f1b589e45f409b6ed2f73d7a9dbd0dfa6abf9
kernel-kdump-devel-2.6.18-238.12.1.el5.s390x.rpm SHA-256: fa8bb396d5b867bd8fc852af6d0b86630986c663d7cf102075b5ff4c393b3914

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
ppc
kernel-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: 45b9585ef851f679d01b10a67f03a82e16895bad6856ee33cda06da48bf9720d
kernel-debug-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: bca50937dd6ab88a777e853b419737569c558c1322abd983612bfb52616c228f
kernel-debug-devel-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: c72cdbc749c6ca05276aa21c2456fb41de0d5e648e786cd3977fb84552ea61f0
kernel-devel-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: 7a72945fab2befe6f1408267097e5b70cfafc25ec1dab3ff7be7930747bc5c35
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ppc.rpm SHA-256: 9b09437089804e1791e5bd7dc34bedfa3448a8bd426e38090dfcfd7665cef435
kernel-headers-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: 7abae94619c48a2f586ab943541821c3a38c58922274c68b3f5c0c5836321371
kernel-kdump-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: a8f788b555b32c43522f45ddb7419bd68bdbb3cb7449484e00f7a26d2cf4338b
kernel-kdump-devel-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: 00f9438c10d29b08c66fdeb92b94a0e9e875e71a48398b4a2859fe3818072634

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
ppc
kernel-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: 45b9585ef851f679d01b10a67f03a82e16895bad6856ee33cda06da48bf9720d
kernel-debug-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: bca50937dd6ab88a777e853b419737569c558c1322abd983612bfb52616c228f
kernel-debug-devel-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: c72cdbc749c6ca05276aa21c2456fb41de0d5e648e786cd3977fb84552ea61f0
kernel-devel-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: 7a72945fab2befe6f1408267097e5b70cfafc25ec1dab3ff7be7930747bc5c35
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.ppc.rpm SHA-256: 9b09437089804e1791e5bd7dc34bedfa3448a8bd426e38090dfcfd7665cef435
kernel-headers-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: 7abae94619c48a2f586ab943541821c3a38c58922274c68b3f5c0c5836321371
kernel-kdump-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: a8f788b555b32c43522f45ddb7419bd68bdbb3cb7449484e00f7a26d2cf4338b
kernel-kdump-devel-2.6.18-238.12.1.el5.ppc64.rpm SHA-256: 00f9438c10d29b08c66fdeb92b94a0e9e875e71a48398b4a2859fe3818072634

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
x86_64
kernel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
i386
kernel-2.6.18-238.12.1.el5.i686.rpm SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
x86_64
kernel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 373e50ced2e5aa32121f558b49bd0ecda56c077867db20fef734f66d7afe0e2e
kernel-debug-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: 753de40930587542a561b05107352efff8c5090436b1be4699b683b627e4f3c3
kernel-debug-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: c7183fc6eda021b18819da2f25376ac94520ed11216abf6e0982fc90871519a1
kernel-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: ee3755cb63b245e3547966d8eda9a82621a9c534866b0a709d719f9414b28261
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: f4a9168a3ebbcad90bf3e3d130e19aae71b858355ccafaa99fe3467ade897ce3
kernel-xen-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: cf13b02eaed51238e74f74e8c03431131355a3983155c5980775ecbb5aa94925
kernel-xen-devel-2.6.18-238.12.1.el5.x86_64.rpm SHA-256: faaa5b9bcdf251b1b2a4cbb3d850de698a36c5cace5dcfdb78fc2d2fc61708de
i386
kernel-2.6.18-238.12.1.el5.i686.rpm SHA-256: aeeb6a744209c8809108ee7902da1f94ff694e26cd47b938c72b8e7b6a2cd76d
kernel-PAE-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1cf660ba664565b371494ac438c69b414ba2e4ebc3fe5f8c1f850b496e379ca7
kernel-PAE-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 1de2b724fb412bf3541d3380fcaccd0549962826aeb12e126b871332782ca732
kernel-debug-2.6.18-238.12.1.el5.i686.rpm SHA-256: e5b53230539165e757b09f5deb281dd7528af41f2c92de03d70c70c3ddd43a13
kernel-debug-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 805375c29305c09e2b1f8fcab29ee50117f22382f99ecb07629f53dff97077b6
kernel-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: a3e032d7e4b24159fdf84cdb992050cbb255185e29195ac8bad3dc4d9a819f69
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.i386.rpm SHA-256: 8b43fb500ca16e97e6e397ccfa641216fb93c89de30fdbbb1a5c320bd7d48b33
kernel-xen-2.6.18-238.12.1.el5.i686.rpm SHA-256: 6ad1e42d90cea2e549f271d5a7e4a43e7be80b71741270bbb3674d8f26b54040
kernel-xen-devel-2.6.18-238.12.1.el5.i686.rpm SHA-256: 86d8d33c3e0e55a57496cebbf070a3a056fbe8c21db84c2c47eb36bc53ead7ba

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-238.12.1.el5.src.rpm SHA-256: 53768d50f77b9e1c75fdf3d9055751fbd2450815a6e3d9c134fd831d0f649d24
s390x
kernel-2.6.18-238.12.1.el5.s390x.rpm SHA-256: 48fad836b190c85615060a6eb3863b718c7335233efb8c98447b5f67bd89e987
kernel-debug-2.6.18-238.12.1.el5.s390x.rpm SHA-256: c68fcd40835e3a3f6c753190e4da6a8244e35a9114524d21f0e1379fa0db6e05
kernel-debug-devel-2.6.18-238.12.1.el5.s390x.rpm SHA-256: 420994329f4ef0604ead7000b2b5caeab1f7a4c96ecc39f49d2556ecc758e5f8
kernel-devel-2.6.18-238.12.1.el5.s390x.rpm SHA-256: e666d1c0fcba50d1613df6471c7b736d0b899db5fc6d254be46ac64e3e898fe2
kernel-doc-2.6.18-238.12.1.el5.noarch.rpm SHA-256: 7566d554a2aed0885a5b857ecbf931a6803c4595cf817f8f0d450073655b0600
kernel-headers-2.6.18-238.12.1.el5.s390x.rpm SHA-256: 87c36234f4596ed8da8940636b868ca4bd51e4f8fc191324827026dbb24d0362
kernel-kdump-2.6.18-238.12.1.el5.s390x.rpm SHA-256: 1888ff632fbf0c990e21a62b6c7f1b589e45f409b6ed2f73d7a9dbd0dfa6abf9
kernel-kdump-devel-2.6.18-238.12.1.el5.s390x.rpm SHA-256: fa8bb396d5b867bd8fc852af6d0b86630986c663d7cf102075b5ff4c393b3914

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter