Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2011:1212 - Security Advisory
Issued:
2011-09-06
Updated:
2011-09-06

RHSA-2011:1212 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A NULL pointer dereference flaw was found in the Linux kernel's Stream
    Control Transmission Protocol (SCTP) implementation. A remote attacker
    could send a specially-crafted SCTP packet to a target system, resulting in
    a denial of service. (CVE-2011-2482, Important)
  • A flaw in the Linux kernel's client-side NFS Lock Manager (NLM)
    implementation could allow a local, unprivileged user to cause a denial of
    service. (CVE-2011-2491, Important)
  • Buffer overflow flaws in the Linux kernel's netlink-based wireless
    configuration interface implementation could allow a local user, who has
    the CAP_NET_ADMIN capability, to cause a denial of service or escalate
    their privileges on systems that have an active wireless interface.
    (CVE-2011-2517, Important)
  • A flaw was found in the way the Linux kernel's Xen hypervisor
    implementation emulated the SAHF instruction. When using a
    fully-virtualized guest on a host that does not use hardware assisted
    paging (HAP), such as those running CPUs that do not have support for (or
    those that have it disabled) Intel Extended Page Tables (EPT) or AMD
    Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged
    guest user could trigger this flaw to cause the hypervisor to crash.
    (CVE-2011-2519, Moderate)
  • An off-by-one flaw was found in the __addr_ok() macro in the Linux
    kernel's Xen hypervisor implementation when running on 64-bit systems. A
    privileged guest user could trigger this flaw to cause the hypervisor to
    crash. (CVE-2011-2901, Moderate)
  • /proc/[PID]/io is world-readable by default. Previously, these files
    could be read without any further restrictions. A local, unprivileged user
    could read these files, belonging to other, possibly privileged processes
    to gather confidential information, such as the length of a password used
    in a process. (CVE-2011-2495, Low)

Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and
Vasiliy Kulikov of Openwall for reporting CVE-2011-2495.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share
  • BZ - 712885 - RHEL6.1 32bit xen hvm guest crash randomly
  • BZ - 714867 - CVE-2011-2482 kernel: sctp dos
  • BZ - 716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak
  • BZ - 718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations
  • BZ - 718882 - CVE-2011-2519 kernel: xen: x86_emulate: fix SAHF emulation
  • BZ - 727590 - [xfs] mis-sized O_DIRECT I/O results in hung task timeouts [rhel-5.7.z]
  • BZ - 727835 - xfs_error_report() oops when passed-in mp is NULL [rhel-5.7.z]
  • BZ - 728042 - CVE-2011-2901 kernel: xen: off-by-one shift in x86_64 __addr_ok()

CVEs

  • CVE-2011-2517
  • CVE-2011-2495
  • CVE-2011-2491
  • CVE-2011-2519
  • CVE-2011-2482
  • CVE-2011-2901

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1212
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
x86_64
kernel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
ia64
kernel-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 538f040db3c5534d678a8616bc911d328d00d4031106d47d4b0f33b61455e3f6
kernel-debug-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 4f789c732301ebea8c3bc1ce183ce2b63d027710c81afa6bbdb09461c2329a32
kernel-debug-devel-2.6.18-274.3.1.el5.ia64.rpm SHA-256: eae6dd1001d9270c86a92f2206ec914aac6ed233cab1e95c39d41a12b1a82079
kernel-devel-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 70bbb0116007dd4833b38cd5ee5516a8e4fcfe13cae83d5a328d0d39764165ff
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 8d0452b36fb413e314c9559194205ea87061b09ca2bfc6c4f59f8429c6b02ff7
kernel-xen-2.6.18-274.3.1.el5.ia64.rpm SHA-256: beca198a6baef6b562ff6976278650fa157d691544f814bdc01139de781d5803
kernel-xen-devel-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 253e132ce35b11a01920e83a53690ada6c03c365a47ef48e543a1a1905fe147c
i386
kernel-2.6.18-274.3.1.el5.i686.rpm SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
x86_64
kernel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
i386
kernel-2.6.18-274.3.1.el5.i686.rpm SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
x86_64
kernel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
i386
kernel-2.6.18-274.3.1.el5.i686.rpm SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
s390x
kernel-2.6.18-274.3.1.el5.s390x.rpm SHA-256: e32d9631c98702b7bbb772a435adc154c4eb1179d5f273a9981e532a371ec8b9
kernel-debug-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 4f54fbeef71b65d4463b5eaa5fc02aecaba118daf76afceba1fa7e5b422e9a51
kernel-debug-devel-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 2fff6d4b3d1003d4ef9bfd9099825ee2c85e24af91cf50b3b48071890c82b771
kernel-devel-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 1a4726ca726b3fe92ffec349ad2e6c23e159cc8ae0da29b1d1457cbdd033fc26
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 0e515099efce7c495f0f3a17a2cd3644e143ab2908a0593bf04d3e0c2ba7c547
kernel-kdump-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 4a8c87c337561bc5c891d999f75a06a487333d1512b65988791849cecefcd6c2
kernel-kdump-devel-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 10812e8a4166a7ae9178de735c4acb90ff425a90d8e731f1b77c8ffaaec18899

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
ppc
kernel-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 77b545f3adbd1a7636e2a59ef80ddc27a114022cb338607164a42104dd0da717
kernel-debug-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 99cea545e70d5911427b589bea386385b4ca7311a604233fa9fc7a454cb9ade5
kernel-debug-devel-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 2cf0c32fc579767e7bf1bdd543bd4e8dc55736ed90266b2003a9e60d4af8911f
kernel-devel-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 705fd34c78ea992b98724bf721d7ddb1a3d261f0a025bda34f805f95c37db887
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.ppc.rpm SHA-256: 2a65f8dddbc2774dd95cb534cc342a6f07508b824ec551288da4bd4226f8b408
kernel-headers-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: ffc62301ea3c948c06e0cc79b040060672edd33e4bc69236928a00a4264d249f
kernel-kdump-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: e9e41d7d6bec55fc416cff528276d4b19470e010bc7a0be9b40645ba246365fe
kernel-kdump-devel-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 002684a7b0953b63d85fb5f42308dbbd23982fe059f33a35a612a900c36c8748

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
x86_64
kernel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
i386
kernel-2.6.18-274.3.1.el5.i686.rpm SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+