Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:1212 - Security Advisory
Issued:
2011-09-06
Updated:
2011-09-06

RHSA-2011:1212 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A NULL pointer dereference flaw was found in the Linux kernel's Stream

Control Transmission Protocol (SCTP) implementation. A remote attacker
could send a specially-crafted SCTP packet to a target system, resulting in
a denial of service. (CVE-2011-2482, Important)

  • A flaw in the Linux kernel's client-side NFS Lock Manager (NLM)

implementation could allow a local, unprivileged user to cause a denial of
service. (CVE-2011-2491, Important)

  • Buffer overflow flaws in the Linux kernel's netlink-based wireless

configuration interface implementation could allow a local user, who has
the CAP_NET_ADMIN capability, to cause a denial of service or escalate
their privileges on systems that have an active wireless interface.
(CVE-2011-2517, Important)

  • A flaw was found in the way the Linux kernel's Xen hypervisor

implementation emulated the SAHF instruction. When using a
fully-virtualized guest on a host that does not use hardware assisted
paging (HAP), such as those running CPUs that do not have support for (or
those that have it disabled) Intel Extended Page Tables (EPT) or AMD
Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged
guest user could trigger this flaw to cause the hypervisor to crash.
(CVE-2011-2519, Moderate)

  • An off-by-one flaw was found in the __addr_ok() macro in the Linux

kernel's Xen hypervisor implementation when running on 64-bit systems. A
privileged guest user could trigger this flaw to cause the hypervisor to
crash. (CVE-2011-2901, Moderate)

  • /proc/[PID]/io is world-readable by default. Previously, these files

could be read without any further restrictions. A local, unprivileged user
could read these files, belonging to other, possibly privileged processes
to gather confidential information, such as the length of a password used
in a process. (CVE-2011-2495, Low)

Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and
Vasiliy Kulikov of Openwall for reporting CVE-2011-2495.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share
  • BZ - 712885 - RHEL6.1 32bit xen hvm guest crash randomly
  • BZ - 714867 - CVE-2011-2482 kernel: sctp dos
  • BZ - 716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak
  • BZ - 718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations
  • BZ - 718882 - CVE-2011-2519 kernel: xen: x86_emulate: fix SAHF emulation
  • BZ - 727590 - [xfs] mis-sized O_DIRECT I/O results in hung task timeouts [rhel-5.7.z]
  • BZ - 727835 - xfs_error_report() oops when passed-in mp is NULL [rhel-5.7.z]
  • BZ - 728042 - CVE-2011-2901 kernel: xen: off-by-one shift in x86_64 __addr_ok()

CVEs

  • CVE-2011-2517
  • CVE-2011-2495
  • CVE-2011-2491
  • CVE-2011-2519
  • CVE-2011-2482
  • CVE-2011-2901

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1212
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
x86_64
kernel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
ia64
kernel-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 538f040db3c5534d678a8616bc911d328d00d4031106d47d4b0f33b61455e3f6
kernel-debug-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 4f789c732301ebea8c3bc1ce183ce2b63d027710c81afa6bbdb09461c2329a32
kernel-debug-devel-2.6.18-274.3.1.el5.ia64.rpm SHA-256: eae6dd1001d9270c86a92f2206ec914aac6ed233cab1e95c39d41a12b1a82079
kernel-devel-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 70bbb0116007dd4833b38cd5ee5516a8e4fcfe13cae83d5a328d0d39764165ff
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 8d0452b36fb413e314c9559194205ea87061b09ca2bfc6c4f59f8429c6b02ff7
kernel-xen-2.6.18-274.3.1.el5.ia64.rpm SHA-256: beca198a6baef6b562ff6976278650fa157d691544f814bdc01139de781d5803
kernel-xen-devel-2.6.18-274.3.1.el5.ia64.rpm SHA-256: 253e132ce35b11a01920e83a53690ada6c03c365a47ef48e543a1a1905fe147c
i386
kernel-2.6.18-274.3.1.el5.i686.rpm SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
x86_64
kernel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
i386
kernel-2.6.18-274.3.1.el5.i686.rpm SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
x86_64
kernel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
i386
kernel-2.6.18-274.3.1.el5.i686.rpm SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
s390x
kernel-2.6.18-274.3.1.el5.s390x.rpm SHA-256: e32d9631c98702b7bbb772a435adc154c4eb1179d5f273a9981e532a371ec8b9
kernel-debug-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 4f54fbeef71b65d4463b5eaa5fc02aecaba118daf76afceba1fa7e5b422e9a51
kernel-debug-devel-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 2fff6d4b3d1003d4ef9bfd9099825ee2c85e24af91cf50b3b48071890c82b771
kernel-devel-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 1a4726ca726b3fe92ffec349ad2e6c23e159cc8ae0da29b1d1457cbdd033fc26
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 0e515099efce7c495f0f3a17a2cd3644e143ab2908a0593bf04d3e0c2ba7c547
kernel-kdump-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 4a8c87c337561bc5c891d999f75a06a487333d1512b65988791849cecefcd6c2
kernel-kdump-devel-2.6.18-274.3.1.el5.s390x.rpm SHA-256: 10812e8a4166a7ae9178de735c4acb90ff425a90d8e731f1b77c8ffaaec18899

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
ppc
kernel-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 77b545f3adbd1a7636e2a59ef80ddc27a114022cb338607164a42104dd0da717
kernel-debug-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 99cea545e70d5911427b589bea386385b4ca7311a604233fa9fc7a454cb9ade5
kernel-debug-devel-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 2cf0c32fc579767e7bf1bdd543bd4e8dc55736ed90266b2003a9e60d4af8911f
kernel-devel-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 705fd34c78ea992b98724bf721d7ddb1a3d261f0a025bda34f805f95c37db887
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.ppc.rpm SHA-256: 2a65f8dddbc2774dd95cb534cc342a6f07508b824ec551288da4bd4226f8b408
kernel-headers-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: ffc62301ea3c948c06e0cc79b040060672edd33e4bc69236928a00a4264d249f
kernel-kdump-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: e9e41d7d6bec55fc416cff528276d4b19470e010bc7a0be9b40645ba246365fe
kernel-kdump-devel-2.6.18-274.3.1.el5.ppc64.rpm SHA-256: 002684a7b0953b63d85fb5f42308dbbd23982fe059f33a35a612a900c36c8748

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-274.3.1.el5.src.rpm SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
x86_64
kernel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
i386
kernel-2.6.18-274.3.1.el5.i686.rpm SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter