Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:1321 - Security Advisory
Issued:
2011-09-20
Updated:
2011-09-20

RHSA-2011:1321 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel.

Security fix:

  • A flaw in skb_gro_header_slow() in the Linux kernel could lead to GRO

(Generic Receive Offload) fields being left in an inconsistent state. An
attacker on the local network could use this flaw to trigger a denial of
service. (CVE-2011-2723, Moderate)

Red Hat would like to thank Brent Meshier for reporting this issue.

Bug fixes:

  • When reading a file from a subdirectory in /proc/bus/pci/ while

hot-unplugging the device related to that file, the system will crash. Now,
the kernel correctly handles the simultaneous removal of a device and
access to the representation of that device in the proc file system.
(BZ#713454)

  • RHSA-2011:0017 introduced a regression: Non-disk SCSI devices (except for

tape drives) such as enclosure or CD-ROM devices were hidden when attached
to a SAS based RAID controller that uses the megaraid_sas driver. With this
update, such devices are accessible, as expected. (BZ#726487)

  • The fix for CVE-2010-3432 provided in RHSA-2011:0004 introduced a

regression: Information in sctp_packet_config(), which was called before
appending data chunks to a packet, was not reset, causing considerably poor
SCTP (Stream Control Transmission Protocol) performance. With this update,
the packet information is reset after transmission. (BZ#727591)

  • Certain systems do not correctly set the ACPI FADT APIC mode bit. They

set the bit to "cluster" mode instead of "physical" mode which caused these
systems to boot without the TSC (Time Stamp Counter). With this update, the
ACPI FADT check has been removed due to its unreliability. (BZ#728162)

  • Performance when invalidating and rereading cached data as a glock moves

around the cluster with GFS2 is improved. (BZ#729082)

  • Performance issues occurred when multiple nodes attempted to call mmap()

on the same inode at the same time on a GFS2 file system, as it was using
an exclusive glock. With this update, a shared lock is used when "noatime"
is set on the mount, allowing mmap() operations to occur in parallel,
fixing this bug. Note that this issue only refers to mmap() system calls,
and not to subsequent page faults. (BZ#729090)

  • Some of the functions in the GFS2 file system were not reserving enough

space for the resource group header in a transaction and for resource
groups bit blocks that get added when a memory allocation is performed.
That resulted in failed write and allocation operations. With this update,
GFS2 makes sure to reserve space in the described scenario, using the new
gfs2_rg_blocks() inline function. (BZ#729092)

  • When GFS2 grew the file system, it never reread the rindex file during

the grow. This is necessary for large grows when the file system is almost
full, and GFS2 needs to use some of the space allocated earlier in the grow
to complete it. Now, if GFS2 fails to reserve the necessary space and the
rindex data is not up-to-date, it rereads it. (BZ#729094)

  • Previously, when the Xen hypervisor split a 2 MB page into 4 KB pages, it

linked the new page from PDE (Page Directory Entry) before it filled
entries of the page with appropriate data. Consequently, when doing a live
migration with EPT (Extended Page Tables) enabled on a non-idle guest
running with more than two virtual CPUs, the guest often terminated
unexpectedly. With this update, the Xen hypervisor prepares the page table
entry first, and then links it in. (BZ#730684)

  • Changes made to TSC as a clock source for IRQs caused virtual machines

running under the VMware ESX or ESXi hypervisors to become unresponsive
during the initial kernel boot process. With this update, the
enable_tsc_timer flag enables the do_timer_tsc_timekeeping() function to be
called in the do_timer_interrupt_hook() function, preventing a deadlock in
the timer interrupt handler. (BZ#730688)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc

Fixes

  • BZ - 726552 - CVE-2011-2723 kernel: gro: only reset frag0 when skb can be pulled
  • BZ - 729090 - mmapping a read only file on a gfs2 filesystem incorrectly acquires an exclusive glock
  • BZ - 729092 - GFS2: Not enough space reserved in gfs2_write_begin and possibly elsewhere.
  • BZ - 729094 - GFS2: Kernel changes necessary to allow growing completely full filesystems.

CVEs

  • CVE-2011-2723

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
x86_64
kernel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 452ad1ff04c711c06808bd2e24a1635f5be1889262c13167bfd5440175bbb9dd
kernel-debug-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 7a7af7fe782f8688e958fb7149a59a2419e895eea846dd6f797f293dd222c313
kernel-debug-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: a2bcf77e238d65d41f5bb796c26f148fa9d73ad06b5db0283e61dc2813834da7
kernel-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: cbcf971931f0db5d7bf94ece3788c90d76b368c38ef6b341cce91f1def41b198
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 9d7875f74a6407bf883cc821397879c824db38ce67dd1ae5a8c0f49d0be2e00b
kernel-xen-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: b833a23b05b31d46c267011c6db4ec3348080deb27535507228764acf0b479c9
kernel-xen-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 37080a9e5d2e060e98f13da824834d3ce504fbd55af78c5005b1e4fa367b611f
ia64
kernel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 2f8c277043be08fc42dfec81756f4122bbd152b8eb7fd8aa23944fe8a81dd848
kernel-debug-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 8b0b9178a0df31896e6e6a2d4c721eb1ce44570cc8e287e839722d9ba4b1be4f
kernel-debug-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 9431ebeffe80f95c00c8d12ce08133247ece044058d3408beb7f0c7fd8456502
kernel-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 386a02ea635be480a40f4345c3d69ecb955e2674f371ab634a172c83c9ee0eda
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ia64.rpm SHA-256: a3c53d196eeb971fa67e5b1089b9fc6deb40b7bf942f719aee92d730a8f042ba
kernel-xen-2.6.18-238.27.1.el5.ia64.rpm SHA-256: da838344bd1003077e58783adac2edbeb33586de9a21c555595aa9378d71f9c2
kernel-xen-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 9dfa64b1aa6897ca2f53c0d8fc48cbe5bdde9a055480506f0f32af73b05afe83
i386
kernel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 097567137218b57cda73120e7eceecd9b9a3a88626bc8422f024794049393cf5
kernel-PAE-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5205d26ab88d0c60971c069ac0643cc168e2b143811bce2c5f9bdfa861a2368a
kernel-PAE-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: dffd874f1c8f46a5cad745378c36e9464e0bbbdb61e4a2b04af1f2533fdfecd0
kernel-debug-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5e22ef0a8e0baa7a85c882f80cb766f51195c87bd88fa23d17c2d49e2fd9bb75
kernel-debug-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 0d871182725418cb0ffc28303f00c353bcbec72d1a6b59be194c8e5092427dd0
kernel-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 9f3a0f2ff58291dc1ae5806599df38f246d61f40d30c391c9bd06557f78cdaa1
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.i386.rpm SHA-256: 7135eb35ad98bddc9307577821c244108cb2e426ab0cfa259c49032b5a7619fd
kernel-xen-2.6.18-238.27.1.el5.i686.rpm SHA-256: 49fb2bae1f7e2aef95b4235772a8e1b1cebe3c29a292aa64c877a7cc94325177
kernel-xen-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: ca4b5b3115d2a910f0e8fe9107d4566fa7c3c99a81ff7ad77e7a11f588c8853d

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
x86_64
kernel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 452ad1ff04c711c06808bd2e24a1635f5be1889262c13167bfd5440175bbb9dd
kernel-debug-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 7a7af7fe782f8688e958fb7149a59a2419e895eea846dd6f797f293dd222c313
kernel-debug-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: a2bcf77e238d65d41f5bb796c26f148fa9d73ad06b5db0283e61dc2813834da7
kernel-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: cbcf971931f0db5d7bf94ece3788c90d76b368c38ef6b341cce91f1def41b198
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 9d7875f74a6407bf883cc821397879c824db38ce67dd1ae5a8c0f49d0be2e00b
kernel-xen-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: b833a23b05b31d46c267011c6db4ec3348080deb27535507228764acf0b479c9
kernel-xen-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 37080a9e5d2e060e98f13da824834d3ce504fbd55af78c5005b1e4fa367b611f
ia64
kernel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 2f8c277043be08fc42dfec81756f4122bbd152b8eb7fd8aa23944fe8a81dd848
kernel-debug-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 8b0b9178a0df31896e6e6a2d4c721eb1ce44570cc8e287e839722d9ba4b1be4f
kernel-debug-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 9431ebeffe80f95c00c8d12ce08133247ece044058d3408beb7f0c7fd8456502
kernel-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 386a02ea635be480a40f4345c3d69ecb955e2674f371ab634a172c83c9ee0eda
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ia64.rpm SHA-256: a3c53d196eeb971fa67e5b1089b9fc6deb40b7bf942f719aee92d730a8f042ba
kernel-xen-2.6.18-238.27.1.el5.ia64.rpm SHA-256: da838344bd1003077e58783adac2edbeb33586de9a21c555595aa9378d71f9c2
kernel-xen-devel-2.6.18-238.27.1.el5.ia64.rpm SHA-256: 9dfa64b1aa6897ca2f53c0d8fc48cbe5bdde9a055480506f0f32af73b05afe83
i386
kernel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 097567137218b57cda73120e7eceecd9b9a3a88626bc8422f024794049393cf5
kernel-PAE-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5205d26ab88d0c60971c069ac0643cc168e2b143811bce2c5f9bdfa861a2368a
kernel-PAE-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: dffd874f1c8f46a5cad745378c36e9464e0bbbdb61e4a2b04af1f2533fdfecd0
kernel-debug-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5e22ef0a8e0baa7a85c882f80cb766f51195c87bd88fa23d17c2d49e2fd9bb75
kernel-debug-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 0d871182725418cb0ffc28303f00c353bcbec72d1a6b59be194c8e5092427dd0
kernel-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 9f3a0f2ff58291dc1ae5806599df38f246d61f40d30c391c9bd06557f78cdaa1
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.i386.rpm SHA-256: 7135eb35ad98bddc9307577821c244108cb2e426ab0cfa259c49032b5a7619fd
kernel-xen-2.6.18-238.27.1.el5.i686.rpm SHA-256: 49fb2bae1f7e2aef95b4235772a8e1b1cebe3c29a292aa64c877a7cc94325177
kernel-xen-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: ca4b5b3115d2a910f0e8fe9107d4566fa7c3c99a81ff7ad77e7a11f588c8853d

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
s390x
kernel-2.6.18-238.27.1.el5.s390x.rpm SHA-256: 954f7c3f6651ad856a8a4a0e840da2a692f9c7065b4521cc5a63fd12df010875
kernel-debug-2.6.18-238.27.1.el5.s390x.rpm SHA-256: e107f873a585ff1ca82f75d9ecd82e48a1b420f316d4e4a13275043204644ab3
kernel-debug-devel-2.6.18-238.27.1.el5.s390x.rpm SHA-256: 568955ced9732049517033a4ffd255a7802dbc78dce0c672d8de0154209c00e8
kernel-devel-2.6.18-238.27.1.el5.s390x.rpm SHA-256: b3429590d17daa41ef7a724f00254131a01e3040bc09d576fcde8e3bda7b3aca
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.s390x.rpm SHA-256: b2b68caaacd1f2e089383c998a1f28e0dacec8507c7a19f4441b884eb15ef3cd
kernel-kdump-2.6.18-238.27.1.el5.s390x.rpm SHA-256: 0a3af46fa7e31ddb7dcf9a9c0990a6897d9b4cd1c2f17276f89060776fc94695
kernel-kdump-devel-2.6.18-238.27.1.el5.s390x.rpm SHA-256: 95070e777bcb015873b90eee931bcbd37cc4bdd40b6258cb336b04651f6790d9

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
ppc
kernel-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 691f59213c8183da56c0f3fe71ea3ba3bc3edd79b2febc588bc59240affacc36
kernel-debug-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 609a3f3b5bd4adf0fb87cef9a8ef08cfc3f37c7b752375e413572e77a23b2938
kernel-debug-devel-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 72259b821ede9ba282e000d1ad8f60b227b53f110d3854b7b68e6b5b0085554c
kernel-devel-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 311073c8af0dd942c8fbb58665c4e1bcf41459cbcdc7c7c605b4c91a927c860d
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.ppc.rpm SHA-256: 174706f0e52590d398b55264d45b0a4c735c39c3635000ee3c242921f1d1d807
kernel-headers-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 1b2bacc8d6d17a6e0d49a13f20831df45dc8dd9f702d4a5bf751c5e70defd46d
kernel-kdump-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: c3bf6b690abd3c03afb85bd1a96435141c7e37b6785505c8646508651fe39351
kernel-kdump-devel-2.6.18-238.27.1.el5.ppc64.rpm SHA-256: 1b60c633dcf1c73dfe7d4fddda408e4b4c6cd1fde5a0941cad270304ad66c058

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.27.1.el5.src.rpm SHA-256: b6a57c55bceb7941dd86398d63dc4775f5a279f52483de35d950e44afd66f62d
x86_64
kernel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 452ad1ff04c711c06808bd2e24a1635f5be1889262c13167bfd5440175bbb9dd
kernel-debug-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 7a7af7fe782f8688e958fb7149a59a2419e895eea846dd6f797f293dd222c313
kernel-debug-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: a2bcf77e238d65d41f5bb796c26f148fa9d73ad06b5db0283e61dc2813834da7
kernel-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: cbcf971931f0db5d7bf94ece3788c90d76b368c38ef6b341cce91f1def41b198
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 9d7875f74a6407bf883cc821397879c824db38ce67dd1ae5a8c0f49d0be2e00b
kernel-xen-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: b833a23b05b31d46c267011c6db4ec3348080deb27535507228764acf0b479c9
kernel-xen-devel-2.6.18-238.27.1.el5.x86_64.rpm SHA-256: 37080a9e5d2e060e98f13da824834d3ce504fbd55af78c5005b1e4fa367b611f
i386
kernel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 097567137218b57cda73120e7eceecd9b9a3a88626bc8422f024794049393cf5
kernel-PAE-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5205d26ab88d0c60971c069ac0643cc168e2b143811bce2c5f9bdfa861a2368a
kernel-PAE-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: dffd874f1c8f46a5cad745378c36e9464e0bbbdb61e4a2b04af1f2533fdfecd0
kernel-debug-2.6.18-238.27.1.el5.i686.rpm SHA-256: 5e22ef0a8e0baa7a85c882f80cb766f51195c87bd88fa23d17c2d49e2fd9bb75
kernel-debug-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 0d871182725418cb0ffc28303f00c353bcbec72d1a6b59be194c8e5092427dd0
kernel-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: 9f3a0f2ff58291dc1ae5806599df38f246d61f40d30c391c9bd06557f78cdaa1
kernel-doc-2.6.18-238.27.1.el5.noarch.rpm SHA-256: 3495bfa6ec9693a2b807094b34571159538acefe5ffc494aab21cb5ad1e24609
kernel-headers-2.6.18-238.27.1.el5.i386.rpm SHA-256: 7135eb35ad98bddc9307577821c244108cb2e426ab0cfa259c49032b5a7619fd
kernel-xen-2.6.18-238.27.1.el5.i686.rpm SHA-256: 49fb2bae1f7e2aef95b4235772a8e1b1cebe3c29a292aa64c877a7cc94325177
kernel-xen-devel-2.6.18-238.27.1.el5.i686.rpm SHA-256: ca4b5b3115d2a910f0e8fe9107d4566fa7c3c99a81ff7ad77e7a11f588c8853d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter