Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2011:1065 - Security Advisory
Issued:
2011-07-21
Updated:
2011-07-21

RHSA-2011:1065 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat Enterprise Linux 5.7 kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the seventh regular update.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the way the Xen hypervisor implementation handled

instruction emulation during virtual machine exits. A malicious user-space
process running in an SMP guest could trick the emulator into reading a
different instruction than the one that caused the virtual machine to exit.
An unprivileged guest user could trigger this flaw to crash the host. This
only affects systems with both an AMD x86 processor and the AMD
Virtualization (AMD-V) extensions enabled. (CVE-2011-1780, Important)

  • A flaw allowed the tc_fill_qdisc() function in the Linux kernel's packet

scheduler API implementation to be called on built-in qdisc structures. A
local, unprivileged user could use this flaw to trigger a NULL pointer
dereference, resulting in a denial of service. (CVE-2011-2525, Moderate)

  • A flaw was found in the way space was allocated in the Linux kernel's

Global File System 2 (GFS2) implementation. If the file system was almost
full, and a local, unprivileged user made an fallocate() request, it could
result in a denial of service. Note: Setting quotas to prevent users from
using all available disk space would prevent exploitation of this flaw.
(CVE-2011-2689, Moderate)

These updated kernel packages include a number of bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Refer to the Red Hat Enterprise Linux 5.7 Technical Notes for
information about the most significant bug fixes and enhancements included
in this update:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1065

All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 390451 - Pick up paging performance improvements from upstream Xen
  • BZ - 431738 - lsattr doesn't show attributes of ext3 quota files
  • BZ - 441730 - [rhts] connectathon nfsidem test failing
  • BZ - 452650 - [RHEL5.2]: Blktap is limited to 100 disks total
  • BZ - 460821 - pv-on-hvm: disk shows up twice.
  • BZ - 465876 - NMI Watchdog detected LOCKUP in :sctp:sctp_copy_local_addr_list
  • BZ - 477032 - kdump hang on HP xw9400
  • BZ - 481546 - HTB qdisc miscalculates bandwidth with TSO enabled
  • BZ - 481629 - update myri10g driver from 1.3.2 to 1.5.2
  • BZ - 491740 - export of an NFSV3 file system via kerberos requires AUTH_SYS as well
  • BZ - 491786 - s2io should check inputs for rx_ring_sz
  • BZ - 494927 - Read-only filesystem after 'ext3_free_blocks_sb: bit already cleared for block' errors
  • BZ - 501314 - No beep when running xen kernel
  • BZ - 511901 - [NFS]: silly renamed .nfs0000* files can be left on fs forever
  • BZ - 517629 - Sequence id issue with nfs4/kerberos between RHEL kernel and Fedora 11
  • BZ - 525898 - soft lockups with kswapd in RHEL 5.4 kernel 2.6.18-164.el5 x86_64
  • BZ - 537277 - KERNEL: QLA2XXX 0000:0E:00.0: RISC PAUSED -- HCCR=0, DUMPING FIRMWARE!
  • BZ - 553411 - xts crypto module missing from RHEL5 installer runtime
  • BZ - 553803 - GFS2: recovery stuck on transaction lock
  • BZ - 567449 - RHEL5.6: iw_cxgb4 driver inclusion
  • BZ - 567540 - unregister_netdevice: waiting for veth5 to become free when I remove netloop
  • BZ - 579000 - [RFE] Support L2 packets under bonding layer
  • BZ - 579858 - Wrong RX bytes/packet count on vlan interface with igb driver
  • BZ - 589512 - slab corruption after seeing some nfs-related BUG: warning
  • BZ - 603345 - i5k_amb does not work for Intel 5000 Chipset (kernel)
  • BZ - 607114 - System panic in pskb_expand_head When arp_validate option is specified in bonding ARP monitor mode
  • BZ - 611407 - kvm guest unable to kdump without noapic
  • BZ - 621916 - Host panic on cross-vendor migration (RHEL 5.5 guest)
  • BZ - 622542 - Xorg failures on machines using intel video card driver
  • BZ - 622647 - Reading /proc/locks yelds corrupt data
  • BZ - 623979 - synch arch/i386/pci/irq-xen.c
  • BZ - 626585 - GFS2: [RFE] fallocate support for GFS2
  • BZ - 626974 - nfs: too many GETATTR and ACCESS calls after direct i/o
  • BZ - 626977 - [nfs] make close(2) asynchronous when closing nfs o_direct files
  • BZ - 627496 - Fix shrinking windows with window scaling
  • BZ - 631950 - remove FS-Cache code from NFS
  • BZ - 632399 - Misleading message from fs/nfs/file.c:do_vfs_lock()
  • BZ - 633196 - testing NMI watchdog ... <4>WARNING: CPU#0: NMI appears to be stuck (62->62)!
  • BZ - 635992 - Areca driver, arcmsr, update
  • BZ - 637970 - GFS2: Not enough space reserved in gfs2_write_begin and possibly elsewhere.
  • BZ - 642388 - ip_nat_ftp not working if ack for "227 Enter Passive mode" packet is lost
  • BZ - 643292 - [netfront] ethtool -i should return proper information for netfront device
  • BZ - 643872 - [netback] ethtool -i should return proper information for netback device
  • BZ - 645343 - ISCSI/multipath hang - must propagate SCSI device deletion to DM mpath
  • BZ - 645528 - SIGPROF keeps a large task from ever completing a fork()
  • BZ - 645646 - RFE: Virtio nic should be support "ethtool -i virtio nic"
  • BZ - 646513 - HP_GETHOSTINFO ioctl always causes mpt controller reset
  • BZ - 648572 - virtio GSO makes IPv6 very slow
  • BZ - 648657 - fseek()/NFS performance regression between RHEL4 and RHEL5
  • BZ - 648854 - linux-2.6.18: netback: take net_schedule_list_lock when removing entry from net_schedule_list
  • BZ - 651333 - RHEL5.6: EHCI: AMD periodic frame list table quirk
  • BZ - 651409 - BAD SEQID error messages returned by the NFS server
  • BZ - 651512 - e1000 driver tracebacks when running under VMware ESX4
  • BZ - 652321 - jbd2_stats_proc_init has wrong location.
  • BZ - 652369 - temporary loss of path to SAN results in persistent EIO with msync
  • BZ - 653286 - [5.6][REG]for some uses of 'nfsservctl' system call, the kernel crashes.
  • BZ - 653828 - bonding failover in every monitor interval with virtio-net driver
  • BZ - 654293 - sunrpc: need a better way to set tcp_slot_table_entries in RHEL 5
  • BZ - 656836 - Memory leak in virtio-console driver if driver probe routine fails
  • BZ - 657166 - XFS causes kernel panic due to double free of log tickets
  • BZ - 658012 - NMI panic during xfs forced shutdown
  • BZ - 658418 - Kernel warning at boot: i7core_edac: probe of 0000:80:14.0 failed with error -22
  • BZ - 659594 - Kernel panic when restart network on vlan with bonding
  • BZ - 659715 - cifs: ia64 kernel unaligned access
  • BZ - 659816 - Performance counters don't work on HP Magnycours machines
  • BZ - 660368 - dm-crypt: backport changes to support xts crypto mode
  • BZ - 660661 - fsck.gfs2 reported statfs error after gfs2_grow
  • BZ - 660728 - [LSI 5.7 feat] Update megaraid_sas to 5.34 and Include "Thunderbolt" support
  • BZ - 660871 - mpctl module doesn't release fasync_struct at file close
  • BZ - 661300 - xfstest 222: filesystem on /dev/loop0 is inconsistent
  • BZ - 661306 - [Cisco 5.7 FEAT] Update enic driver to version 2.1.1.9
  • BZ - 661904 - GFS2: Kernel changes necessary to allow growing completely full filesystems.
  • BZ - 663041 - gfs2 FIEMAP oops
  • BZ - 663123 - /proc/partitions not updating after creating LUNs via hpacucli
  • BZ - 663563 - [ext4/xfstests] 011 caused filesystem corruption after running many times in a loop
  • BZ - 664592 - a test unit ready causes a panic on 5.6 (CCISS driver)
  • BZ - 664931 - COW corruption using popen(3).
  • BZ - 665197 - WARNING: APIC timer calibration may be wrong
  • BZ - 665972 - ISVM bit (ECX:31) for CPUID 0x00000001 is missing for HVM on AMD
  • BZ - 666080 - GFS2: Blocks not marked free on delete
  • BZ - 666304 - scsi_dh_emc gives "error attaching hardware handler" for EMC active-active SANs
  • BZ - 666866 - Heavy load on ath5k wireless device makes system unresponsive
  • BZ - 667327 - lib: fix vscnprintf() if @size is == 0
  • BZ - 667660 - [NetApp 5.7 Bug] Include new NetApp PID entry to the alua_dev_list array in the ALUA hardware handler
  • BZ - 667810 - "modprobe ip_conntrack hashsize=NNNN" panics kernel if /etc/modprobe.conf has hashsize=MMMM
  • BZ - 668934 - UDP transmit under VLAN causes guest freeze
  • BZ - 669603 - incomplete local port reservation
  • BZ - 669961 - [NetApp 5.6 Bug] Erroneous TPG ID check in SCSI ALUA Handler
  • BZ - 670367 - scsi_dh_emc get_req function should set REQ_FAILFAST flags same as upstream and other modules
  • BZ - 670373 - panic in kfree() due to race condition in acpi_bus_receive_event()
  • BZ - 671238 - [bonding] crash when adding/removing slaves with master interface down
  • BZ - 671595 - Flapping errors (and panic) with bonding and arp_interval while using be2net included in 2.6.18-238
  • BZ - 672619 - transmission stops when tap does not consume
  • BZ - 672724 - mmapping a read only file on a gfs2 filesystem incorrectly acquires an exclusive glock
  • BZ - 672981 - lseek() over NFS is returning an incorrect file length under some circumstances
  • BZ - 673058 - kernel panic in pg_init_done - pgpath already deleted
  • BZ - 673242 - Time runs too fast in a VM on processors with > 4GHZ freq
  • BZ - 673459 - virtio_console driver never returns from selecting for write when the queue is full
  • BZ - 673616 - vdso gettimeofday causes a segmentation fault
  • BZ - 674175 - Impossible to load sctp module with ipv6 disable=1
  • BZ - 674226 - Panic in selinux_bprm_post_apply_creds() due to an empty tty_files list
  • BZ - 674298 - [NetApp 5.6 Bug] QLogic 8G FC firmware dumps seen during IO
  • BZ - 674514 - xenctx shows nonsensical values for 32-on-64 and HVM domains
  • BZ - 675727 - vdso: missing wall_to_monotomic export
  • BZ - 675986 - Fix block based fiemap
  • BZ - 677703 - [RHEL5.5] Panic in iscsi_sw_tcp_data_ready()
  • BZ - 677893 - [TestOnly] gfs regression testing for 5.7 beta
  • BZ - 677902 - Incorrect "Speed" is recorded in the file "/proc/net/bonding/bondX"
  • BZ - 678073 - qeth: allow channel path changes in recovery
  • BZ - 678074 - [usb-audio] unable to set capture mixer levels
  • BZ - 678359 - online disk resizing may cause data corruption
  • BZ - 678571 - hap_gva_to_gfn_* do not preserve domain context
  • BZ - 678618 - gdbsx hypervisor part backport
  • BZ - 679120 - qeth: remove needless IPA-commands in offline
  • BZ - 679407 - [5.7] niu: Fix races between up/down and get_stats.
  • BZ - 679487 - [5.7] net: Fix netdev_run_todo serialization
  • BZ - 680329 - sunrpc: reconnect race can lead to socket read corruption
  • BZ - 681303 - backport vzalloc and vzalloc_node in support of drivers needing these functions
  • BZ - 681586 - Out of vmalloc space
  • BZ - 683155 - gfs2: creating large files suddenly slow to a crawl
  • BZ - 683978 - need to backport common vpd infrastructure to rhel 5
  • BZ - 684795 - missed unlock_page() in gfs2_write_begin()
  • BZ - 688646 - intel_iommu domain id exhaustion
  • BZ - 688989 - [5.6] sysctl tcp_syn_retries is not honored
  • BZ - 689860 - guest with passthrough nic got kernel panic when send system_reset signal in QEMU monitor
  • BZ - 689943 - GFS2 causes kernel panic in spectator mode
  • BZ - 690555 - GFS2: resource group bitmap corruption resulting in panics and withdraws
  • BZ - 692946 - need to backport debugfs_remove_recursive functionality
  • BZ - 695357 - dasd: fix race between open and offline
  • BZ - 696411 - Missing patch for full use of tcp_rto_min parameter
  • BZ - 698432 - [Emulex 5.7] Update lpfc driver to version 8.2.0.96.1p
  • BZ - 698879 - The pci resource for vf is not released after hot-removing Intel 82576 NIC
  • BZ - 700546 - RHEL5: apparent file system corruption of snapshot fs with qla2xxx driver
  • BZ - 702355 - NFS: Fix build break with CONFIG_NFS_V4=n
  • BZ - 702652 - provide option to disable HPET
  • BZ - 702657 - CVE-2011-1780 kernel: xen: svm: insufficiencies in handling emulated instructions during vm exits
  • BZ - 703213 - GFS2: Add "dlm callback owed" glock flag
  • BZ - 703416 - host kernel panic while guest running on 10G public bridge.
  • BZ - 704497 - VT-d: Fix resource leaks on error paths in intremap code
  • BZ - 705324 - cifs: regression in unicode conversion routines when mounting with -o mapchars
  • BZ - 705455 - intel-iommu: missing flush prior to removing domains + avoid broken vm/si domain unlinking
  • BZ - 705725 - hvm guest time may go backwards on some hosts
  • BZ - 706414 - Adding slave to balance-tlb bond device results in soft lockup
  • BZ - 709224 - setfacl does not update ctime when changing file permission on ext3/4
  • BZ - 711450 - 12% degradation running IOzone with Outcache testing
  • BZ - 717068 - Kernel panics during Veritas SF testing.
  • BZ - 717742 - [RHEL5.7][kernel-xen] HVM guests hang during installation on AMD systems
  • BZ - 720552 - CVE-2011-2525 kernel: kernel: net_sched: fix qdisc_notify()
  • BZ - 720861 - CVE-2011-2689 kernel: gfs2: make sure fallocate bytes is a multiple of blksize

CVEs

  • CVE-2011-2525
  • CVE-2011-2689
  • CVE-2011-1780

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1065
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-274.el5.src.rpm SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8
x86_64
kernel-2.6.18-274.el5.x86_64.rpm SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2
kernel-debug-2.6.18-274.el5.x86_64.rpm SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9
kernel-devel-2.6.18-274.el5.x86_64.rpm SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.x86_64.rpm SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a
kernel-xen-2.6.18-274.el5.x86_64.rpm SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9
ia64
kernel-2.6.18-274.el5.ia64.rpm SHA-256: f8f7ac033db153fa664727eff31414ff422f55a1cfb4544cf90c5e2a095c2970
kernel-debug-2.6.18-274.el5.ia64.rpm SHA-256: cee72357fa6fcdea4efbb8f39b4bc3c0b333c998d60e334007773e40284e9ea7
kernel-debug-devel-2.6.18-274.el5.ia64.rpm SHA-256: 4ea4bb4e168bd4a2920fd6c3360c90d1ab46254bd621a9e90b4069fbcfa5663a
kernel-devel-2.6.18-274.el5.ia64.rpm SHA-256: 0cc22314c10ba4a8e53a94b5ca4cb715bf336dc68611110ef201fa27056e80f3
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.ia64.rpm SHA-256: 0c65b7c5ca7c56305462b05ef48eb1d2da7d83f98344ffc0d023fd671872a9a9
kernel-xen-2.6.18-274.el5.ia64.rpm SHA-256: 38773710ae866e3c8a6f91c90e566deaa59e3f84f29ae8679c6d11869961bfae
kernel-xen-devel-2.6.18-274.el5.ia64.rpm SHA-256: dd4a9c917cb771d92d76c29689999e409fa22bb2cd7236ddbf282351329933ae
i386
kernel-2.6.18-274.el5.i686.rpm SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f
kernel-PAE-2.6.18-274.el5.i686.rpm SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982
kernel-PAE-devel-2.6.18-274.el5.i686.rpm SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17
kernel-debug-2.6.18-274.el5.i686.rpm SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2
kernel-debug-devel-2.6.18-274.el5.i686.rpm SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b
kernel-devel-2.6.18-274.el5.i686.rpm SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.i386.rpm SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f
kernel-xen-2.6.18-274.el5.i686.rpm SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc
kernel-xen-devel-2.6.18-274.el5.i686.rpm SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-274.el5.src.rpm SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8
x86_64
kernel-2.6.18-274.el5.x86_64.rpm SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2
kernel-debug-2.6.18-274.el5.x86_64.rpm SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9
kernel-devel-2.6.18-274.el5.x86_64.rpm SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.x86_64.rpm SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a
kernel-xen-2.6.18-274.el5.x86_64.rpm SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9
i386
kernel-2.6.18-274.el5.i686.rpm SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f
kernel-PAE-2.6.18-274.el5.i686.rpm SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982
kernel-PAE-devel-2.6.18-274.el5.i686.rpm SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17
kernel-debug-2.6.18-274.el5.i686.rpm SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2
kernel-debug-devel-2.6.18-274.el5.i686.rpm SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b
kernel-devel-2.6.18-274.el5.i686.rpm SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.i386.rpm SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f
kernel-xen-2.6.18-274.el5.i686.rpm SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc
kernel-xen-devel-2.6.18-274.el5.i686.rpm SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-274.el5.src.rpm SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8
x86_64
kernel-2.6.18-274.el5.x86_64.rpm SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2
kernel-debug-2.6.18-274.el5.x86_64.rpm SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9
kernel-devel-2.6.18-274.el5.x86_64.rpm SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.x86_64.rpm SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a
kernel-xen-2.6.18-274.el5.x86_64.rpm SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9
i386
kernel-2.6.18-274.el5.i686.rpm SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f
kernel-PAE-2.6.18-274.el5.i686.rpm SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982
kernel-PAE-devel-2.6.18-274.el5.i686.rpm SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17
kernel-debug-2.6.18-274.el5.i686.rpm SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2
kernel-debug-devel-2.6.18-274.el5.i686.rpm SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b
kernel-devel-2.6.18-274.el5.i686.rpm SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.i386.rpm SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f
kernel-xen-2.6.18-274.el5.i686.rpm SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc
kernel-xen-devel-2.6.18-274.el5.i686.rpm SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-274.el5.src.rpm SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8
s390x
kernel-2.6.18-274.el5.s390x.rpm SHA-256: d0354a7b66c0541dd63ab296344509ffdf7625c7f85c2fa635d2ab089eb5823a
kernel-debug-2.6.18-274.el5.s390x.rpm SHA-256: e9e666892f50c3b143930b9a1ff51493be3709c6eccaeba4936807d73cda3053
kernel-debug-devel-2.6.18-274.el5.s390x.rpm SHA-256: 12199fb71a4fa53c85c95baa981afe1d19de5dc6d8d85e771fadf2937ff9afd7
kernel-devel-2.6.18-274.el5.s390x.rpm SHA-256: 139368e15bd79f539fce46290535ceb9fe2fbbf5299db5b3cbbaccd13415cf00
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.s390x.rpm SHA-256: 47ac2fd1b79332858a8315d19d1fcb337d8a0e5ba4578faf5becd02e348408c0
kernel-kdump-2.6.18-274.el5.s390x.rpm SHA-256: 7f499eebac7b001dd3ee8e182e448d40affa2476999c9ad235ff44aaac813f57
kernel-kdump-devel-2.6.18-274.el5.s390x.rpm SHA-256: ce271eeba644b013d5fdb88c1241833e79e6e5d137b04bce254f7d8fb1519a24

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-274.el5.src.rpm SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8
ppc
kernel-2.6.18-274.el5.ppc64.rpm SHA-256: 9fbcc5dee444513ad868128a62910f54002200722834788782c7fbed08968a6c
kernel-debug-2.6.18-274.el5.ppc64.rpm SHA-256: 59b3a3a90288b8bc3587cb98b162d0bbaf0ae06624a06f79d18b7583af574270
kernel-debug-devel-2.6.18-274.el5.ppc64.rpm SHA-256: a617b0c8fcde6ec713184c3eae922a2182c7e05a39b04eac3a1e12d0600f2801
kernel-devel-2.6.18-274.el5.ppc64.rpm SHA-256: 2930bf8824c32c8e1a95c1c70768ac9caea0af2163a8fd0b7b4921002a419244
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.ppc.rpm SHA-256: 11e76a6d365c30ad256004c45bfb463e0b18a70b503df8135888c79bc40c2d35
kernel-headers-2.6.18-274.el5.ppc64.rpm SHA-256: 4d40859303a37bae0b670659933247bc97320542f10de2d6badf034e8950ed0d
kernel-kdump-2.6.18-274.el5.ppc64.rpm SHA-256: 49ff584ce491432fbc8f70a4f525a9617773e949b2119bdc575b9933c646c57d
kernel-kdump-devel-2.6.18-274.el5.ppc64.rpm SHA-256: 4a2644e52a1d83e1acb7abbf538770936d4295331f4039fc78abfa89d8d940cf

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-274.el5.src.rpm SHA-256: 5f681e4aa06d2091af1250c1d502ef6285d81e13597c26b7ad55686fb4f162d8
x86_64
kernel-2.6.18-274.el5.x86_64.rpm SHA-256: 6afa979d21a0e0f36a9bb0115e73519e23bb7550c93b26abd7a688bdcd8f8ab2
kernel-debug-2.6.18-274.el5.x86_64.rpm SHA-256: 5e48af3829b79f5de59c11e935827cc8ae60cc73f87753aab7c5af6bb20d1f36
kernel-debug-devel-2.6.18-274.el5.x86_64.rpm SHA-256: 6b3d333aba2c5acfa655063d08cf4fba4fe5985e041a286421ab8868ba8f5cc9
kernel-devel-2.6.18-274.el5.x86_64.rpm SHA-256: fd84660da365d6a3a7225b1b72ae5a7dd40c982f222a46f09e921b51d229cf92
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.x86_64.rpm SHA-256: f3c08058fa7240a93bf5469c0fbdeeb55d90d22248288d1795fd56d0b53adc5a
kernel-xen-2.6.18-274.el5.x86_64.rpm SHA-256: 1de343d0d2c9b9a7ab6ca844cf3670b1281f0a20b9a0945a2d142fc33f280f2b
kernel-xen-devel-2.6.18-274.el5.x86_64.rpm SHA-256: c828c51a32a8ace80abfac28bc908447d5a158f1c661e292274c893f7aefffd9
i386
kernel-2.6.18-274.el5.i686.rpm SHA-256: 16eec62e6f202016970c347cd5f2a515a783ef4337c9475e99f63be64c4dbf1f
kernel-PAE-2.6.18-274.el5.i686.rpm SHA-256: 7eaba33277cc61887ef53b9476f41c2f1676b8bc69aeea18c9b4093bfb153982
kernel-PAE-devel-2.6.18-274.el5.i686.rpm SHA-256: c5af25dfd50cd8782b4fb5a929f0bd4fda5c66e72ca4de7dc35308a3c6898d17
kernel-debug-2.6.18-274.el5.i686.rpm SHA-256: bec4776532c81217790e62201deffadc58a27c5a0815f8e7b74ba2cd225c9df2
kernel-debug-devel-2.6.18-274.el5.i686.rpm SHA-256: 212e4d858bd7ad7d7ed962c706cee094558672d9876183b93477d78bb60acb4b
kernel-devel-2.6.18-274.el5.i686.rpm SHA-256: 9010077ad71c23aa43b2751a921dec2061e0cb6597e7128c6cdfe85c9c916b0b
kernel-doc-2.6.18-274.el5.noarch.rpm SHA-256: 31d6de89b17271e191b816b996af588861f7c781f0f68d49a03fe8d4303a3a13
kernel-headers-2.6.18-274.el5.i386.rpm SHA-256: 6df3424d384d82a3ab47b2cb6ca3b94d6eae39739da75785a8b4a59e3a38cd6f
kernel-xen-2.6.18-274.el5.i686.rpm SHA-256: 14a6f3a3b3d527636e20654b3ae9c3e16ca41f03ea8472497749bac25442cfbc
kernel-xen-devel-2.6.18-274.el5.i686.rpm SHA-256: 5948c777af021ddf7412cfe93439c85c1cc9a1606a299e45f1244e73a8d6a235

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility