Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2011:1321 - Security Advisory
Issued:
2011-09-20
Updated:
2011-09-20

RHSA-2011:1321 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel.

Security fix:

  • A flaw in skb_gro_header_slow() in the Linux kernel could lead to GRO
    (Generic Receive Offload) fields being left in an inconsistent state. An
    attacker on the local network could use this flaw to trigger a denial of
    service. (CVE-2011-2723, Moderate)

Red Hat would like to thank Brent Meshier for reporting this issue.

Bug fixes:

  • When reading a file from a subdirectory in /proc/bus/pci/ while
    hot-unplugging the device related to that file, the system will crash. Now,
    the kernel correctly handles the simultaneous removal of a device and
    access to the representation of that device in the proc file system.
    (BZ#713454)
  • RHSA-2011:0017 introduced a regression: Non-disk SCSI devices (except for
    tape drives) such as enclosure or CD-ROM devices were hidden when attached
    to a SAS based RAID controller that uses the megaraid_sas driver. With this
    update, such devices are accessible, as expected. (BZ#726487)
  • The fix for CVE-2010-3432 provided in RHSA-2011:0004 introduced a
    regression: Information in sctp_packet_config(), which was called before
    appending data chunks to a packet, was not reset, causing considerably poor
    SCTP (Stream Control Transmission Protocol) performance. With this update,
    the packet information is reset after transmission. (BZ#727591)
  • Certain systems do not correctly set the ACPI FADT APIC mode bit. They
    set the bit to "cluster" mode instead of "physical" mode which caused these
    systems to boot without the TSC (Time Stamp Counter). With this update, the
    ACPI FADT check has been removed due to its unreliability. (BZ#728162)
  • Performance when invalidating and rereading cached data as a glock moves
    around the cluster with GFS2 is improved. (BZ#729082)
  • Performance issues occurred when multiple nodes attempted to call mmap()
    on the same inode at the same time on a GFS2 file system, as it was using
    an exclusive glock. With this update, a shared lock is used when "noatime"
    is set on the mount, allowing mmap() operations to occur in parallel,
    fixing this bug. Note that this issue only refers to mmap() system calls,
    and not to subsequent page faults. (BZ#729090)
  • Some of the functions in the GFS2 file system were not reserving enough
    space for the resource group header in a transaction and for resource
    groups bit blocks that get added when a memory allocation is performed.
    That resulted in failed write and allocation operations. With this update,
    GFS2 makes sure to reserve space in the described scenario, using the new
    gfs2_rg_blocks() inline function. (BZ#729092)
  • When GFS2 grew the file system, it never reread the rindex file during
    the grow. This is necessary for large grows when the file system is almost
    full, and GFS2 needs to use some of the space allocated earlier in the grow
    to complete it. Now, if GFS2 fails to reserve the necessary space and the
    rindex data is not up-to-date, it rereads it. (BZ#729094)
  • Previously, when the Xen hypervisor split a 2 MB page into 4 KB pages, it
    linked the new page from PDE (Page Directory Entry) before it filled
    entries of the page with appropriate data. Consequently, when doing a live
    migration with EPT (Extended Page Tables) enabled on a non-idle guest
    running with more than two virtual CPUs, the guest often terminated
    unexpectedly. With this update, the Xen hypervisor prepares the page table
    entry first, and then links it in. (BZ#730684)
  • Changes made to TSC as a clock source for IRQs caused virtual machines
    running under the VMware ESX or ESXi hypervisors to become unresponsive
    during the initial kernel boot process. With this update, the
    enable_tsc_timer flag enables the do_timer_tsc_timekeeping() function to be
    called in the do_timer_interrupt_hook() function, preventing a deadlock in
    the timer interrupt handler. (BZ#730688)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc

Fixes

  • BZ - 726552 - CVE-2011-2723 kernel: gro: only reset frag0 when skb can be pulled
  • BZ - 729090 - mmapping a read only file on a gfs2 filesystem incorrectly acquires an exclusive glock
  • BZ - 729092 - GFS2: Not enough space reserved in gfs2_write_begin and possibly elsewhere.
  • BZ - 729094 - GFS2: Kernel changes necessary to allow growing completely full filesystems.

CVEs

  • CVE-2011-2723

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
x86_64
kernel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 452ad1ff04c711c06808bd2e24a1635f5be1889262c13167bfd5440175bbb9dd
kernel-debug-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 7a7af7fe782f8688e958fb7149a59a2419e895eea846dd6f797f293dd222c313
kernel-debug-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: a2bcf77e238d65d41f5bb796c26f148fa9d73ad06b5db0283e61dc2813834da7
kernel-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: cbcf971931f0db5d7bf94ece3788c90d76b368c38ef6b341cce91f1def41b198
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 9d7875f74a6407bf883cc821397879c824db38ce67dd1ae5a8c0f49d0be2e00b
kernel-xen-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: b833a23b05b31d46c267011c6db4ec3348080deb27535507228764acf0b479c9
kernel-xen-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 37080a9e5d2e060e98f13da824834d3ce504fbd55af78c5005b1e4fa367b611f
ia64
kernel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 2f8c277043be08fc42dfec81756f4122bbd152b8eb7fd8aa23944fe8a81dd848
kernel-debug-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 8b0b9178a0df31896e6e6a2d4c721eb1ce44570cc8e287e839722d9ba4b1be4f
kernel-debug-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 9431ebeffe80f95c00c8d12ce08133247ece044058d3408beb7f0c7fd8456502
kernel-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 386a02ea635be480a40f4345c3d69ecb955e2674f371ab634a172c83c9ee0eda
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ia64.rpm SHA-256: a3c53d196eeb971fa67e5b1089b9fc6deb40b7bf942f719aee92d730a8f042ba
kernel-xen-2.6.18-238.27.1.el5.ia64.rpm SHA-256: da838344bd1003077e58783adac2edbeb33586de9a21c555595aa9378d71f9c2
kernel-xen-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 9dfa64b1aa6897ca2f53c0d8fc48cbe5bdde9a055480506f0f32af73b05afe83
i386
kernel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 097567137218b57cda73120e7eceecd9b9a3a88626bc8422f024794049393cf5
kernel-PAE-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5205d26ab88d0c60971c069ac0643cc168e2b143811bce2c5f9bdfa861a2368a
kernel-PAE-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: dffd874f1c8f46a5cad745378c36e9464e0bbbdb61e4a2b04af1f2533fdfecd0
kernel-debug-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5e22ef0a8e0baa7a85c882f80cb766f51195c87bd88fa23d17c2d49e2fd9bb75
kernel-debug-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 0d871182725418cb0ffc28303f00c353bcbec72d1a6b59be194c8e5092427dd0
kernel-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 9f3a0f2ff58291dc1ae5806599df38f246d61f40d30c391c9bd06557f78cdaa1
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.i386.rpm SHA-256: 7135eb35ad98bddc9307577821c244108cb2e426ab0cfa259c49032b5a7619fd
kernel-xen-2.6.18-238.27.1.el5.i686.rpm SHA-256: 49fb2bae1f7e2aef95b4235772a8e1b1cebe3c29a292aa64c877a7cc94325177
kernel-xen-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: ca4b5b3115d2a910f0e8fe9107d4566fa7c3c99a81ff7ad77e7a11f588c8853d

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
s390x
kernel-2.6.18-238.27.1.el5.s390x.rpm SHA-256: 954f7c3f6651ad856a8a4a0e840da2a692f9c7065b4521cc5a63fd12df010875
kernel-debug-2.6.18-238.27.1.el5.s390x.rpm SHA-256: e107f873a585ff1ca82f75d9ecd82e48a1b420f316d4e4a13275043204644ab3
kernel-debug-devel-2.6.18-238.27.1.el5.s390x.rpm SHA-256: 568955ced9732049517033a4ffd255a7802dbc78dce0c672d8de0154209c00e8
kernel-devel-2.6.18-238.27.1.el5.s390x.rpm SHA-256: b3429590d17daa41ef7a724f00254131a01e3040bc09d576fcde8e3bda7b3aca
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.s390x.rpm SHA-256: b2b68caaacd1f2e089383c998a1f28e0dacec8507c7a19f4441b884eb15ef3cd
kernel-kdump-2.6.18-238.27.1.el5.s390x.rpm SHA-256: 0a3af46fa7e31ddb7dcf9a9c0990a6897d9b4cd1c2f17276f89060776fc94695
kernel-kdump-devel-2.6.18-238.27.1.el5.s390x.rpm SHA-256: 95070e777bcb015873b90eee931bcbd37cc4bdd40b6258cb336b04651f6790d9

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
ppc
kernel-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 691f59213c8183da56c0f3fe71ea3ba3bc3edd79b2febc588bc59240affacc36
kernel-debug-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 609a3f3b5bd4adf0fb87cef9a8ef08cfc3f37c7b752375e413572e77a23b2938
kernel-debug-devel-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 72259b821ede9ba282e000d1ad8f60b227b53f110d3854b7b68e6b5b0085554c
kernel-devel-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 311073c8af0dd942c8fbb58665c4e1bcf41459cbcdc7c7c605b4c91a927c860d
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ppc.rpm SHA-256: 174706f0e52590d398b55264d45b0a4c735c39c3635000ee3c242921f1d1d807
kernel-headers-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 1b2bacc8d6d17a6e0d49a13f20831df45dc8dd9f702d4a5bf751c5e70defd46d
kernel-kdump-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: c3bf6b690abd3c03afb85bd1a96435141c7e37b6785505c8646508651fe39351
kernel-kdump-devel-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 1b60c633dcf1c73dfe7d4fddda408e4b4c6cd1fde5a0941cad270304ad66c058

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
x86_64
kernel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 452ad1ff04c711c06808bd2e24a1635f5be1889262c13167bfd5440175bbb9dd
kernel-debug-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 7a7af7fe782f8688e958fb7149a59a2419e895eea846dd6f797f293dd222c313
kernel-debug-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: a2bcf77e238d65d41f5bb796c26f148fa9d73ad06b5db0283e61dc2813834da7
kernel-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: cbcf971931f0db5d7bf94ece3788c90d76b368c38ef6b341cce91f1def41b198
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 9d7875f74a6407bf883cc821397879c824db38ce67dd1ae5a8c0f49d0be2e00b
kernel-xen-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: b833a23b05b31d46c267011c6db4ec3348080deb27535507228764acf0b479c9
kernel-xen-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 37080a9e5d2e060e98f13da824834d3ce504fbd55af78c5005b1e4fa367b611f
i386
kernel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 097567137218b57cda73120e7eceecd9b9a3a88626bc8422f024794049393cf5
kernel-PAE-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5205d26ab88d0c60971c069ac0643cc168e2b143811bce2c5f9bdfa861a2368a
kernel-PAE-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: dffd874f1c8f46a5cad745378c36e9464e0bbbdb61e4a2b04af1f2533fdfecd0
kernel-debug-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5e22ef0a8e0baa7a85c882f80cb766f51195c87bd88fa23d17c2d49e2fd9bb75
kernel-debug-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 0d871182725418cb0ffc28303f00c353bcbec72d1a6b59be194c8e5092427dd0
kernel-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 9f3a0f2ff58291dc1ae5806599df38f246d61f40d30c391c9bd06557f78cdaa1
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.i386.rpm SHA-256: 7135eb35ad98bddc9307577821c244108cb2e426ab0cfa259c49032b5a7619fd
kernel-xen-2.6.18-238.27.1.el5.i686.rpm SHA-256: 49fb2bae1f7e2aef95b4235772a8e1b1cebe3c29a292aa64c877a7cc94325177
kernel-xen-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: ca4b5b3115d2a910f0e8fe9107d4566fa7c3c99a81ff7ad77e7a11f588c8853d

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
x86_64
kernel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 452ad1ff04c711c06808bd2e24a1635f5be1889262c13167bfd5440175bbb9dd
kernel-debug-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 7a7af7fe782f8688e958fb7149a59a2419e895eea846dd6f797f293dd222c313
kernel-debug-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: a2bcf77e238d65d41f5bb796c26f148fa9d73ad06b5db0283e61dc2813834da7
kernel-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: cbcf971931f0db5d7bf94ece3788c90d76b368c38ef6b341cce91f1def41b198
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 9d7875f74a6407bf883cc821397879c824db38ce67dd1ae5a8c0f49d0be2e00b
kernel-xen-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: b833a23b05b31d46c267011c6db4ec3348080deb27535507228764acf0b479c9
kernel-xen-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 37080a9e5d2e060e98f13da824834d3ce504fbd55af78c5005b1e4fa367b611f
ia64
kernel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 2f8c277043be08fc42dfec81756f4122bbd152b8eb7fd8aa23944fe8a81dd848
kernel-debug-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 8b0b9178a0df31896e6e6a2d4c721eb1ce44570cc8e287e839722d9ba4b1be4f
kernel-debug-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 9431ebeffe80f95c00c8d12ce08133247ece044058d3408beb7f0c7fd8456502
kernel-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 386a02ea635be480a40f4345c3d69ecb955e2674f371ab634a172c83c9ee0eda
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ia64.rpm SHA-256: a3c53d196eeb971fa67e5b1089b9fc6deb40b7bf942f719aee92d730a8f042ba
kernel-xen-2.6.18-238.27.1.el5.ia64.rpm SHA-256: da838344bd1003077e58783adac2edbeb33586de9a21c555595aa9378d71f9c2
kernel-xen-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 9dfa64b1aa6897ca2f53c0d8fc48cbe5bdde9a055480506f0f32af73b05afe83
i386
kernel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 097567137218b57cda73120e7eceecd9b9a3a88626bc8422f024794049393cf5
kernel-PAE-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5205d26ab88d0c60971c069ac0643cc168e2b143811bce2c5f9bdfa861a2368a
kernel-PAE-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: dffd874f1c8f46a5cad745378c36e9464e0bbbdb61e4a2b04af1f2533fdfecd0
kernel-debug-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5e22ef0a8e0baa7a85c882f80cb766f51195c87bd88fa23d17c2d49e2fd9bb75
kernel-debug-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 0d871182725418cb0ffc28303f00c353bcbec72d1a6b59be194c8e5092427dd0
kernel-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 9f3a0f2ff58291dc1ae5806599df38f246d61f40d30c391c9bd06557f78cdaa1
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.i386.rpm SHA-256: 7135eb35ad98bddc9307577821c244108cb2e426ab0cfa259c49032b5a7619fd
kernel-xen-2.6.18-238.27.1.el5.i686.rpm SHA-256: 49fb2bae1f7e2aef95b4235772a8e1b1cebe3c29a292aa64c877a7cc94325177
kernel-xen-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: ca4b5b3115d2a910f0e8fe9107d4566fa7c3c99a81ff7ad77e7a11f588c8853d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+