- Issued:
- 2011-07-21
- Updated:
- 2011-07-21
RHSA-2011:1065 - Security Advisory
Synopsis
Important: Red Hat Enterprise Linux 5.7 kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix multiple security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the seventh regular update.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
- A flaw was found in the way the Xen hypervisor implementation handled
instruction emulation during virtual machine exits. A malicious user-space
process running in an SMP guest could trick the emulator into reading a
different instruction than the one that caused the virtual machine to exit.
An unprivileged guest user could trigger this flaw to crash the host. This
only affects systems with both an AMD x86 processor and the AMD
Virtualization (AMD-V) extensions enabled. (CVE-2011-1780, Important)
- A flaw allowed the tc_fill_qdisc() function in the Linux kernel's packet
scheduler API implementation to be called on built-in qdisc structures. A
local, unprivileged user could use this flaw to trigger a NULL pointer
dereference, resulting in a denial of service. (CVE-2011-2525, Moderate)
- A flaw was found in the way space was allocated in the Linux kernel's
Global File System 2 (GFS2) implementation. If the file system was almost
full, and a local, unprivileged user made an fallocate() request, it could
result in a denial of service. Note: Setting quotas to prevent users from
using all available disk space would prevent exploitation of this flaw.
(CVE-2011-2689, Moderate)
These updated kernel packages include a number of bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Refer to the Red Hat Enterprise Linux 5.7 Technical Notes for
information about the most significant bug fixes and enhancements included
in this update:
All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which correct these issues. The system must be rebooted for this
update to take effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 390451 - Pick up paging performance improvements from upstream Xen
- BZ - 431738 - lsattr doesn't show attributes of ext3 quota files
- BZ - 441730 - [rhts] connectathon nfsidem test failing
- BZ - 452650 - [RHEL5.2]: Blktap is limited to 100 disks total
- BZ - 460821 - pv-on-hvm: disk shows up twice.
- BZ - 465876 - NMI Watchdog detected LOCKUP in :sctp:sctp_copy_local_addr_list
- BZ - 477032 - kdump hang on HP xw9400
- BZ - 481546 - HTB qdisc miscalculates bandwidth with TSO enabled
- BZ - 481629 - update myri10g driver from 1.3.2 to 1.5.2
- BZ - 491740 - export of an NFSV3 file system via kerberos requires AUTH_SYS as well
- BZ - 491786 - s2io should check inputs for rx_ring_sz
- BZ - 494927 - Read-only filesystem after 'ext3_free_blocks_sb: bit already cleared for block' errors
- BZ - 501314 - No beep when running xen kernel
- BZ - 511901 - [NFS]: silly renamed .nfs0000* files can be left on fs forever
- BZ - 517629 - Sequence id issue with nfs4/kerberos between RHEL kernel and Fedora 11
- BZ - 525898 - soft lockups with kswapd in RHEL 5.4 kernel 2.6.18-164.el5 x86_64
- BZ - 537277 - KERNEL: QLA2XXX 0000:0E:00.0: RISC PAUSED -- HCCR=0, DUMPING FIRMWARE!
- BZ - 553411 - xts crypto module missing from RHEL5 installer runtime
- BZ - 553803 - GFS2: recovery stuck on transaction lock
- BZ - 567449 - RHEL5.6: iw_cxgb4 driver inclusion
- BZ - 567540 - unregister_netdevice: waiting for veth5 to become free when I remove netloop
- BZ - 579000 - [RFE] Support L2 packets under bonding layer
- BZ - 579858 - Wrong RX bytes/packet count on vlan interface with igb driver
- BZ - 589512 - slab corruption after seeing some nfs-related BUG: warning
- BZ - 603345 - i5k_amb does not work for Intel 5000 Chipset (kernel)
- BZ - 607114 - System panic in pskb_expand_head When arp_validate option is specified in bonding ARP monitor mode
- BZ - 611407 - kvm guest unable to kdump without noapic
- BZ - 621916 - Host panic on cross-vendor migration (RHEL 5.5 guest)
- BZ - 622542 - Xorg failures on machines using intel video card driver
- BZ - 622647 - Reading /proc/locks yelds corrupt data
- BZ - 623979 - synch arch/i386/pci/irq-xen.c
- BZ - 626585 - GFS2: [RFE] fallocate support for GFS2
- BZ - 626974 - nfs: too many GETATTR and ACCESS calls after direct i/o
- BZ - 626977 - [nfs] make close(2) asynchronous when closing nfs o_direct files
- BZ - 627496 - Fix shrinking windows with window scaling
- BZ - 631950 - remove FS-Cache code from NFS
- BZ - 632399 - Misleading message from fs/nfs/file.c:do_vfs_lock()
- BZ - 633196 - testing NMI watchdog ... <4>WARNING: CPU#0: NMI appears to be stuck (62->62)!
- BZ - 635992 - Areca driver, arcmsr, update
- BZ - 637970 - GFS2: Not enough space reserved in gfs2_write_begin and possibly elsewhere.
- BZ - 642388 - ip_nat_ftp not working if ack for "227 Enter Passive mode" packet is lost
- BZ - 643292 - [netfront] ethtool -i should return proper information for netfront device
- BZ - 643872 - [netback] ethtool -i should return proper information for netback device
- BZ - 645343 - ISCSI/multipath hang - must propagate SCSI device deletion to DM mpath
- BZ - 645528 - SIGPROF keeps a large task from ever completing a fork()
- BZ - 645646 - RFE: Virtio nic should be support "ethtool -i virtio nic"
- BZ - 646513 - HP_GETHOSTINFO ioctl always causes mpt controller reset
- BZ - 648572 - virtio GSO makes IPv6 very slow
- BZ - 648657 - fseek()/NFS performance regression between RHEL4 and RHEL5
- BZ - 648854 - linux-2.6.18: netback: take net_schedule_list_lock when removing entry from net_schedule_list
- BZ - 651333 - RHEL5.6: EHCI: AMD periodic frame list table quirk
- BZ - 651409 - BAD SEQID error messages returned by the NFS server
- BZ - 651512 - e1000 driver tracebacks when running under VMware ESX4
- BZ - 652321 - jbd2_stats_proc_init has wrong location.
- BZ - 652369 - temporary loss of path to SAN results in persistent EIO with msync
- BZ - 653286 - [5.6][REG]for some uses of 'nfsservctl' system call, the kernel crashes.
- BZ - 653828 - bonding failover in every monitor interval with virtio-net driver
- BZ - 654293 - sunrpc: need a better way to set tcp_slot_table_entries in RHEL 5
- BZ - 656836 - Memory leak in virtio-console driver if driver probe routine fails
- BZ - 657166 - XFS causes kernel panic due to double free of log tickets
- BZ - 658012 - NMI panic during xfs forced shutdown
- BZ - 658418 - Kernel warning at boot: i7core_edac: probe of 0000:80:14.0 failed with error -22
- BZ - 659594 - Kernel panic when restart network on vlan with bonding
- BZ - 659715 - cifs: ia64 kernel unaligned access
- BZ - 659816 - Performance counters don't work on HP Magnycours machines
- BZ - 660368 - dm-crypt: backport changes to support xts crypto mode
- BZ - 660661 - fsck.gfs2 reported statfs error after gfs2_grow
- BZ - 660728 - [LSI 5.7 feat] Update megaraid_sas to 5.34 and Include "Thunderbolt" support
- BZ - 660871 - mpctl module doesn't release fasync_struct at file close
- BZ - 661300 - xfstest 222: filesystem on /dev/loop0 is inconsistent
- BZ - 661306 - [Cisco 5.7 FEAT] Update enic driver to version 2.1.1.9
- BZ - 661904 - GFS2: Kernel changes necessary to allow growing completely full filesystems.
- BZ - 663041 - gfs2 FIEMAP oops
- BZ - 663123 - /proc/partitions not updating after creating LUNs via hpacucli
- BZ - 663563 - [ext4/xfstests] 011 caused filesystem corruption after running many times in a loop
- BZ - 664592 - a test unit ready causes a panic on 5.6 (CCISS driver)
- BZ - 664931 - COW corruption using popen(3).
- BZ - 665197 - WARNING: APIC timer calibration may be wrong
- BZ - 665972 - ISVM bit (ECX:31) for CPUID 0x00000001 is missing for HVM on AMD
- BZ - 666080 - GFS2: Blocks not marked free on delete
- BZ - 666304 - scsi_dh_emc gives "error attaching hardware handler" for EMC active-active SANs
- BZ - 666866 - Heavy load on ath5k wireless device makes system unresponsive
- BZ - 667327 - lib: fix vscnprintf() if @size is == 0
- BZ - 667660 - [NetApp 5.7 Bug] Include new NetApp PID entry to the alua_dev_list array in the ALUA hardware handler
- BZ - 667810 - "modprobe ip_conntrack hashsize=NNNN" panics kernel if /etc/modprobe.conf has hashsize=MMMM
- BZ - 668934 - UDP transmit under VLAN causes guest freeze
- BZ - 669603 - incomplete local port reservation
- BZ - 669961 - [NetApp 5.6 Bug] Erroneous TPG ID check in SCSI ALUA Handler
- BZ - 670367 - scsi_dh_emc get_req function should set REQ_FAILFAST flags same as upstream and other modules
- BZ - 670373 - panic in kfree() due to race condition in acpi_bus_receive_event()
- BZ - 671238 - [bonding] crash when adding/removing slaves with master interface down
- BZ - 671595 - Flapping errors (and panic) with bonding and arp_interval while using be2net included in 2.6.18-238
- BZ - 672619 - transmission stops when tap does not consume
- BZ - 672724 - mmapping a read only file on a gfs2 filesystem incorrectly acquires an exclusive glock
- BZ - 672981 - lseek() over NFS is returning an incorrect file length under some circumstances
- BZ - 673058 - kernel panic in pg_init_done - pgpath already deleted
- BZ - 673242 - Time runs too fast in a VM on processors with > 4GHZ freq
- BZ - 673459 - virtio_console driver never returns from selecting for write when the queue is full
- BZ - 673616 - vdso gettimeofday causes a segmentation fault
- BZ - 674175 - Impossible to load sctp module with ipv6 disable=1
- BZ - 674226 - Panic in selinux_bprm_post_apply_creds() due to an empty tty_files list
- BZ - 674298 - [NetApp 5.6 Bug] QLogic 8G FC firmware dumps seen during IO
- BZ - 674514 - xenctx shows nonsensical values for 32-on-64 and HVM domains
- BZ - 675727 - vdso: missing wall_to_monotomic export
- BZ - 675986 - Fix block based fiemap
- BZ - 677703 - [RHEL5.5] Panic in iscsi_sw_tcp_data_ready()
- BZ - 677893 - [TestOnly] gfs regression testing for 5.7 beta
- BZ - 677902 - Incorrect "Speed" is recorded in the file "/proc/net/bonding/bondX"
- BZ - 678073 - qeth: allow channel path changes in recovery
- BZ - 678074 - [usb-audio] unable to set capture mixer levels
- BZ - 678359 - online disk resizing may cause data corruption
- BZ - 678571 - hap_gva_to_gfn_* do not preserve domain context
- BZ - 678618 - gdbsx hypervisor part backport
- BZ - 679120 - qeth: remove needless IPA-commands in offline
- BZ - 679407 - [5.7] niu: Fix races between up/down and get_stats.
- BZ - 679487 - [5.7] net: Fix netdev_run_todo serialization
- BZ - 680329 - sunrpc: reconnect race can lead to socket read corruption
- BZ - 681303 - backport vzalloc and vzalloc_node in support of drivers needing these functions
- BZ - 681586 - Out of vmalloc space
- BZ - 683155 - gfs2: creating large files suddenly slow to a crawl
- BZ - 683978 - need to backport common vpd infrastructure to rhel 5
- BZ - 684795 - missed unlock_page() in gfs2_write_begin()
- BZ - 688646 - intel_iommu domain id exhaustion
- BZ - 688989 - [5.6] sysctl tcp_syn_retries is not honored
- BZ - 689860 - guest with passthrough nic got kernel panic when send system_reset signal in QEMU monitor
- BZ - 689943 - GFS2 causes kernel panic in spectator mode
- BZ - 690555 - GFS2: resource group bitmap corruption resulting in panics and withdraws
- BZ - 692946 - need to backport debugfs_remove_recursive functionality
- BZ - 695357 - dasd: fix race between open and offline
- BZ - 696411 - Missing patch for full use of tcp_rto_min parameter
- BZ - 698432 - [Emulex 5.7] Update lpfc driver to version 8.2.0.96.1p
- BZ - 698879 - The pci resource for vf is not released after hot-removing Intel 82576 NIC
- BZ - 700546 - RHEL5: apparent file system corruption of snapshot fs with qla2xxx driver
- BZ - 702355 - NFS: Fix build break with CONFIG_NFS_V4=n
- BZ - 702652 - provide option to disable HPET
- BZ - 702657 - CVE-2011-1780 kernel: xen: svm: insufficiencies in handling emulated instructions during vm exits
- BZ - 703213 - GFS2: Add "dlm callback owed" glock flag
- BZ - 703416 - host kernel panic while guest running on 10G public bridge.
- BZ - 704497 - VT-d: Fix resource leaks on error paths in intremap code
- BZ - 705324 - cifs: regression in unicode conversion routines when mounting with -o mapchars
- BZ - 705455 - intel-iommu: missing flush prior to removing domains + avoid broken vm/si domain unlinking
- BZ - 705725 - hvm guest time may go backwards on some hosts
- BZ - 706414 - Adding slave to balance-tlb bond device results in soft lockup
- BZ - 709224 - setfacl does not update ctime when changing file permission on ext3/4
- BZ - 711450 - 12% degradation running IOzone with Outcache testing
- BZ - 717068 - Kernel panics during Veritas SF testing.
- BZ - 717742 - [RHEL5.7][kernel-xen] HVM guests hang during installation on AMD systems
- BZ - 720552 - CVE-2011-2525 kernel: kernel: net_sched: fix qdisc_notify()
- BZ - 720861 - CVE-2011-2689 kernel: gfs2: make sure fallocate bytes is a multiple of blksize
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kernel-2.6.18-274.el5.src.rpm | SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8 |
x86_64 | |
kernel-2.6.18-274.el5.x86_64.rpm | SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2 |
kernel-debug-2.6.18-274.el5.x86_64.rpm | SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36 |
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9 |
kernel-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92 |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.x86_64.rpm | SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a |
kernel-xen-2.6.18-274.el5.x86_64.rpm | SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b |
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9 |
ia64 | |
kernel-2.6.18-274.el5.ia64.rpm | SHA-256: f8f7ac033db153fa664727eff31414ff422f55a1cfb4544cf90c5e2a095c2970 |
kernel-debug-2.6.18-274.el5.ia64.rpm | SHA-256: cee72357fa6fcdea4efbb8f39b4bc3c0b333c998d60e334007773e40284e9ea7 |
kernel-debug-devel-2.6.18-274.el5.ia64.rpm | SHA-256: 4ea4bb4e168bd4a2920fd6c3360c90d1ab46254bd621a9e90b4069fbcfa5663a |
kernel-devel-2.6.18-274.el5.ia64.rpm | SHA-256: 0cc22314c10ba4a8e53a94b5ca4cb715bf336dc68611110ef201fa27056e80f3 |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.ia64.rpm | SHA-256: 0c65b7c5ca7c56305462b05ef48eb1d2da7d83f98344ffc0d023fd671872a9a9 |
kernel-xen-2.6.18-274.el5.ia64.rpm | SHA-256: 38773710ae866e3c8a6f91c90e566deaa59e3f84f29ae8679c6d11869961bfae |
kernel-xen-devel-2.6.18-274.el5.ia64.rpm | SHA-256: dd4a9c917cb771d92d76c29689999e409fa22bb2cd7236ddbf282351329933ae |
i386 | |
kernel-2.6.18-274.el5.i686.rpm | SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f |
kernel-PAE-2.6.18-274.el5.i686.rpm | SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982 |
kernel-PAE-devel-2.6.18-274.el5.i686.rpm | SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17 |
kernel-debug-2.6.18-274.el5.i686.rpm | SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2 |
kernel-debug-devel-2.6.18-274.el5.i686.rpm | SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b |
kernel-devel-2.6.18-274.el5.i686.rpm | SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.i386.rpm | SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f |
kernel-xen-2.6.18-274.el5.i686.rpm | SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc |
kernel-xen-devel-2.6.18-274.el5.i686.rpm | SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kernel-2.6.18-274.el5.src.rpm | SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8 |
x86_64 | |
kernel-2.6.18-274.el5.x86_64.rpm | SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2 |
kernel-debug-2.6.18-274.el5.x86_64.rpm | SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36 |
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9 |
kernel-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92 |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.x86_64.rpm | SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a |
kernel-xen-2.6.18-274.el5.x86_64.rpm | SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b |
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9 |
i386 | |
kernel-2.6.18-274.el5.i686.rpm | SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f |
kernel-PAE-2.6.18-274.el5.i686.rpm | SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982 |
kernel-PAE-devel-2.6.18-274.el5.i686.rpm | SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17 |
kernel-debug-2.6.18-274.el5.i686.rpm | SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2 |
kernel-debug-devel-2.6.18-274.el5.i686.rpm | SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b |
kernel-devel-2.6.18-274.el5.i686.rpm | SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.i386.rpm | SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f |
kernel-xen-2.6.18-274.el5.i686.rpm | SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc |
kernel-xen-devel-2.6.18-274.el5.i686.rpm | SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
kernel-2.6.18-274.el5.src.rpm | SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8 |
x86_64 | |
kernel-2.6.18-274.el5.x86_64.rpm | SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2 |
kernel-debug-2.6.18-274.el5.x86_64.rpm | SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36 |
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9 |
kernel-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92 |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.x86_64.rpm | SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a |
kernel-xen-2.6.18-274.el5.x86_64.rpm | SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b |
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9 |
i386 | |
kernel-2.6.18-274.el5.i686.rpm | SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f |
kernel-PAE-2.6.18-274.el5.i686.rpm | SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982 |
kernel-PAE-devel-2.6.18-274.el5.i686.rpm | SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17 |
kernel-debug-2.6.18-274.el5.i686.rpm | SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2 |
kernel-debug-devel-2.6.18-274.el5.i686.rpm | SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b |
kernel-devel-2.6.18-274.el5.i686.rpm | SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.i386.rpm | SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f |
kernel-xen-2.6.18-274.el5.i686.rpm | SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc |
kernel-xen-devel-2.6.18-274.el5.i686.rpm | SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
kernel-2.6.18-274.el5.src.rpm | SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8 |
s390x | |
kernel-2.6.18-274.el5.s390x.rpm | SHA-256: d0354a7b66c0541dd63ab296344509ffdf7625c7f85c2fa635d2ab089eb5823a |
kernel-debug-2.6.18-274.el5.s390x.rpm | SHA-256: e9e666892f50c3b143930b9a1ff51493be3709c6eccaeba4936807d73cda3053 |
kernel-debug-devel-2.6.18-274.el5.s390x.rpm | SHA-256: 12199fb71a4fa53c85c95baa981afe1d19de5dc6d8d85e771fadf2937ff9afd7 |
kernel-devel-2.6.18-274.el5.s390x.rpm | SHA-256: 139368e15bd79f539fce46290535ceb9fe2fbbf5299db5b3cbbaccd13415cf00 |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.s390x.rpm | SHA-256: 47ac2fd1b79332858a8315d19d1fcb337d8a0e5ba4578faf5becd02e348408c0 |
kernel-kdump-2.6.18-274.el5.s390x.rpm | SHA-256: 7f499eebac7b001dd3ee8e182e448d40affa2476999c9ad235ff44aaac813f57 |
kernel-kdump-devel-2.6.18-274.el5.s390x.rpm | SHA-256: ce271eeba644b013d5fdb88c1241833e79e6e5d137b04bce254f7d8fb1519a24 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
kernel-2.6.18-274.el5.src.rpm | SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8 |
ppc | |
kernel-2.6.18-274.el5.ppc64.rpm | SHA-256: 9fbcc5dee444513ad868128a62910f54002200722834788782c7fbed08968a6c |
kernel-debug-2.6.18-274.el5.ppc64.rpm | SHA-256: 59b3a3a90288b8bc3587cb98b162d0bbaf0ae06624a06f79d18b7583af574270 |
kernel-debug-devel-2.6.18-274.el5.ppc64.rpm | SHA-256: a617b0c8fcde6ec713184c3eae922a2182c7e05a39b04eac3a1e12d0600f2801 |
kernel-devel-2.6.18-274.el5.ppc64.rpm | SHA-256: 2930bf8824c32c8e1a95c1c70768ac9caea0af2163a8fd0b7b4921002a419244 |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.ppc.rpm | SHA-256: 11e76a6d365c30ad256004c45bfb463e0b18a70b503df8135888c79bc40c2d35 |
kernel-headers-2.6.18-274.el5.ppc64.rpm | SHA-256: 4d40859303a37bae0b670659933247bc97320542f10de2d6badf034e8950ed0d |
kernel-kdump-2.6.18-274.el5.ppc64.rpm | SHA-256: 49ff584ce491432fbc8f70a4f525a9617773e949b2119bdc575b9933c646c57d |
kernel-kdump-devel-2.6.18-274.el5.ppc64.rpm | SHA-256: 4a2644e52a1d83e1acb7abbf538770936d4295331f4039fc78abfa89d8d940cf |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
kernel-2.6.18-274.el5.src.rpm | SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8 |
x86_64 | |
kernel-2.6.18-274.el5.x86_64.rpm | SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2 |
kernel-debug-2.6.18-274.el5.x86_64.rpm | SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36 |
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9 |
kernel-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92 |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.x86_64.rpm | SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a |
kernel-xen-2.6.18-274.el5.x86_64.rpm | SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b |
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm | SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9 |
i386 | |
kernel-2.6.18-274.el5.i686.rpm | SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f |
kernel-PAE-2.6.18-274.el5.i686.rpm | SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982 |
kernel-PAE-devel-2.6.18-274.el5.i686.rpm | SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17 |
kernel-debug-2.6.18-274.el5.i686.rpm | SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2 |
kernel-debug-devel-2.6.18-274.el5.i686.rpm | SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b |
kernel-devel-2.6.18-274.el5.i686.rpm | SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b |
kernel-doc-2.6.18-274.el5.noarch.rpm | SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13 |
kernel-headers-2.6.18-274.el5.i386.rpm | SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f |
kernel-xen-2.6.18-274.el5.i686.rpm | SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc |
kernel-xen-devel-2.6.18-274.el5.i686.rpm | SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.