Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2011:1419 - Security Advisory
Issued:
2011-11-01
Updated:
2011-11-01

RHSA-2011:1419 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

Updated kernel packages that fix two security issues and four bugs are now
available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • The way IPv4 and IPv6 protocol sequence numbers and fragment IDs were
    generated could allow a man-in-the-middle attacker to inject packets and
    possibly hijack connections. Protocol sequence numbers and fragment IDs are
    now more random. (CVE-2011-3188, Moderate)
  • A flaw was found in the Linux kernel's clock implementation on 32-bit,
    SMP (symmetric multiprocessing) systems. A local, unprivileged user could
    use this flaw to cause a divide error fault, resulting in a denial of
    service. (CVE-2011-3209, Moderate)

Red Hat would like to thank Dan Kaminsky for reporting CVE-2011-3188, and
Yasuaki Ishimatsu for reporting CVE-2011-3209.

In addition, this update fixes the following bugs:

  • When the Global File System 2 (GFS2) file system is suspended, its delete
    work queue is also suspended, along with any pending work on the queue.
    Prior to this update, if GFS2's transaction lock was demoted while the
    delete work queue was suspended, a deadlock could occur on the file system
    because the file system tried to flush the work queue in the lock demotion
    code. With this update, the delete work queue is no longer flushed by the
    lock demotion code, and a deadlock no longer occurs. Instead, the work
    queue is flushed by the unmount operation, so that pending work is properly
    completed. (BZ#733678)
  • A previously applied patch introduced a regression for third-party file
    systems that do not set the FS_HAS_IODONE2 flag, specifically, Oracle
    Cluster File System 2 (OCFS2). The patch removed a call to the aio_complete
    function, resulting in no completion events being processed, causing
    user-space applications to become unresponsive. This update reintroduces
    the aio_complete function call, fixing this issue. (BZ#734156)
  • Certain devices support multiple operation modes. For example, EMC
    CLARiiON disk arrays support ALUA mode and their own vendor specific mode
    for failover. In Red Hat Enterprise Linux 5.5, a bug was discovered that
    prevented tools such as multipath from being able to select the
    device/hardware handler plug-in to use. This resulted in the application
    (for example, multipath) not working properly. With this update, the kernel
    has been modified to allow applications to select the device/hardware
    handler to use, thus resolving this issue. (BZ#739900)
  • This update improves the performance of delete/unlink operations in a
    GFS2 file system with large files by adding a layer of metadata read-ahead
    for indirect blocks. (BZ#743805)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc

Fixes

  • BZ - 732658 - CVE-2011-3188 kernel: net: improve sequence number generation
  • BZ - 732878 - CVE-2011-3209 kernel: panic occurs when clock_gettime() is called
  • BZ - 733678 - GFS2: recovery stuck on transaction lock [rhel-5.6.z]
  • BZ - 739900 - scsi_dh_emc gives "error attaching hardware handler" for EMC active-active SANs [rhel-5.6.z]

CVEs

  • CVE-2011-3188
  • CVE-2011-3209

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.28.1.el5.src.rpm SHA-256: d14f11e8ffe89c12bbb077c0a811afb77f3ef30956f8cfb41a6d933b8535c09e
x86_64
kernel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 1f7e07386e26bf400cf7c24c5f9ace8ea273a4115e0af39c683f05aecb2c6a0d
kernel-debug-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 950be4d36224c1791145b8a5d816f75874f5e796d471a25a10175a124d136198
kernel-debug-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 9d20c4d7053c682ca38da77cf5e2c04d66851a975a98f3f5fcca430419b60881
kernel-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: dee3c6e74da5c58804cede2a6c35b9c142f5396c1e51ab0c7b7fa808cc4bc05c
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: c1ef74fbaa7c6413b6a7c63cd876b16726ea1c07f58a460534c2e2a582a9adb9
kernel-xen-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: e74f5c2b4cdf369406a75254f1cd2f5b3402bdd2d283cb997494db04c0fd486c
kernel-xen-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 24c04e671d31a003090a549e8dc60e7ba8a45caec75f543def131789fb4bf86d
ia64
kernel-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 602330275f8c645af04901791f3ea1df3f1163251d03bd87c42c207ac8c95018
kernel-debug-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 416f8a2d7d9649188814d69334e03b0e49cc9867a80a0ac677d481399b8f87c2
kernel-debug-devel-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 1d9753075e8396060119c8cc32733bd806b6dbc7602310d91f57e068bf020de3
kernel-devel-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 8885e593b85d2e0c60bf5e2f764ee14ca7415d4f72ac20f5ca89fce818efb458
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 8a7a23e7db80929046758e10e99d571749bbe00388f4a604b05089e9de7e669e
kernel-xen-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 4fdc89e4653463ec25e3e436a7d9f267766730919d543eedf5c7baffd3e4d2cd
kernel-xen-devel-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 6d2724afda5d981e8393419375c15ee3b4b8913df23ea6c99e01f62530b2267e
i386
kernel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 5aea964a295b3f39d8c47ce001bb8684e0e464a6e276b4c24ea293a504fd199b
kernel-PAE-2.6.18-238.28.1.el5.i686.rpm SHA-256: e2028e4b015c04f107d2ee0bef00fc888179702d4614d02a75033a4f3d88de8e
kernel-PAE-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 8815484a29f859cb16a98f03c6f15e3aea1be314120eb2cbd1faf69831b2a36d
kernel-debug-2.6.18-238.28.1.el5.i686.rpm SHA-256: 72ef0ae84665eae1b7acd05cb015ff55792705a258962dd95ffaf9719795635e
kernel-debug-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: e407f7fe5adcfc7e2c161fa10485b610f713f0cafbc898344842386e4f961783
kernel-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 96bea3b111c21a65a2bc49b980fcd168bb6d917bd21f1d7d0230f684a9dd7e12
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.i386.rpm SHA-256: f29905d45d9ac02e4c52dbedaec8a45f8f803c59bc4ce8e5f5ad40abf81c3a02
kernel-xen-2.6.18-238.28.1.el5.i686.rpm SHA-256: f610996faf779c3241c4ffe781190132472fa6d447b6fd689c3e8f3f66a415cd
kernel-xen-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: e2ce277e076628d8dbb22b82a2e5dc1acf36a53aa366b5fef6f1950bff79cda5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.28.1.el5.src.rpm SHA-256: d14f11e8ffe89c12bbb077c0a811afb77f3ef30956f8cfb41a6d933b8535c09e
s390x
kernel-2.6.18-238.28.1.el5.s390x.rpm SHA-256: d35906a19cfc58785b87c7094ab9c1ae73c7d2e10ac335134ad90027ce5c8dc9
kernel-debug-2.6.18-238.28.1.el5.s390x.rpm SHA-256: 458807965c90d44d9d91e281c04678b25bd53091022822d9586601b8780c7436
kernel-debug-devel-2.6.18-238.28.1.el5.s390x.rpm SHA-256: a2601ede9f11693d8db154db1d4855b7dc8c7eda0388abe98343a6454b0e678e
kernel-devel-2.6.18-238.28.1.el5.s390x.rpm SHA-256: c0e7e2cd80210e435b64868357eac6ba793f54a5c01afe80b80424dce11308fc
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.s390x.rpm SHA-256: 56172714eb9ee9b1c822e103a6b2551db0b12fdc1dccfa89fca094dda246dac7
kernel-kdump-2.6.18-238.28.1.el5.s390x.rpm SHA-256: 27ef0d16c9e7ff02853ef20c9540119c418dd003c98ec634e0fb81aae12e5a26
kernel-kdump-devel-2.6.18-238.28.1.el5.s390x.rpm SHA-256: 41b5b0750140fee1f7473b26c129519bc51d2aa63b86c070d637949c1363af79

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.28.1.el5.src.rpm SHA-256: d14f11e8ffe89c12bbb077c0a811afb77f3ef30956f8cfb41a6d933b8535c09e
ppc
kernel-2.6.18-238.28.1.el5.ppc64.rpm SHA-256: 22b32b8b2e9ba5a4c0511bb6975766d1858b52fa5164e1eb4bb1dd252e5d2b91
kernel-debug-2.6.18-238.28.1.el5.ppc64.rpm SHA-256: de4e4657cc88c93c7165ac416c9137841dc3d064dcd2482c5819d3cc6d7043f2
kernel-debug-devel-2.6.18-238.28.1.el5.ppc64.rpm SHA-256: 8fd373b2959f69276c35675ec5ad42a94124b934bf091379781a26a682c4a2c5
kernel-devel-2.6.18-238.28.1.el5.ppc64.rpm SHA-256: 58037c3814475e858a19dc53347e83277c3bfa5a9c4d6fd596ded62418e4fe68
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.ppc.rpm SHA-256: 3f7befbccdf1a4189e40ea8c7131f88f0a3ac9905bb020724a98dc4718f7473d
kernel-headers-2.6.18-238.28.1.el5.ppc64.rpm SHA-256: f1c74e8f73dda124ea638721615b4d30b85b8cfcd9a1c7ffff29053acf9b196d
kernel-kdump-2.6.18-238.28.1.el5.ppc64.rpm SHA-256: 95bfe97c4e66ba3b0ff7100ef1a0cca003e9c4b90f401bb193d46f42eff8f301
kernel-kdump-devel-2.6.18-238.28.1.el5.ppc64.rpm SHA-256: 9a868f17e86fe6397b8e0f28494ffd38e70f1ade60a8a7dfe0659eef187d9cf7

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.28.1.el5.src.rpm SHA-256: d14f11e8ffe89c12bbb077c0a811afb77f3ef30956f8cfb41a6d933b8535c09e
x86_64
kernel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 1f7e07386e26bf400cf7c24c5f9ace8ea273a4115e0af39c683f05aecb2c6a0d
kernel-debug-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 950be4d36224c1791145b8a5d816f75874f5e796d471a25a10175a124d136198
kernel-debug-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 9d20c4d7053c682ca38da77cf5e2c04d66851a975a98f3f5fcca430419b60881
kernel-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: dee3c6e74da5c58804cede2a6c35b9c142f5396c1e51ab0c7b7fa808cc4bc05c
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: c1ef74fbaa7c6413b6a7c63cd876b16726ea1c07f58a460534c2e2a582a9adb9
kernel-xen-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: e74f5c2b4cdf369406a75254f1cd2f5b3402bdd2d283cb997494db04c0fd486c
kernel-xen-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 24c04e671d31a003090a549e8dc60e7ba8a45caec75f543def131789fb4bf86d
i386
kernel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 5aea964a295b3f39d8c47ce001bb8684e0e464a6e276b4c24ea293a504fd199b
kernel-PAE-2.6.18-238.28.1.el5.i686.rpm SHA-256: e2028e4b015c04f107d2ee0bef00fc888179702d4614d02a75033a4f3d88de8e
kernel-PAE-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 8815484a29f859cb16a98f03c6f15e3aea1be314120eb2cbd1faf69831b2a36d
kernel-debug-2.6.18-238.28.1.el5.i686.rpm SHA-256: 72ef0ae84665eae1b7acd05cb015ff55792705a258962dd95ffaf9719795635e
kernel-debug-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: e407f7fe5adcfc7e2c161fa10485b610f713f0cafbc898344842386e4f961783
kernel-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 96bea3b111c21a65a2bc49b980fcd168bb6d917bd21f1d7d0230f684a9dd7e12
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.i386.rpm SHA-256: f29905d45d9ac02e4c52dbedaec8a45f8f803c59bc4ce8e5f5ad40abf81c3a02
kernel-xen-2.6.18-238.28.1.el5.i686.rpm SHA-256: f610996faf779c3241c4ffe781190132472fa6d447b6fd689c3e8f3f66a415cd
kernel-xen-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: e2ce277e076628d8dbb22b82a2e5dc1acf36a53aa366b5fef6f1950bff79cda5

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.28.1.el5.src.rpm SHA-256: d14f11e8ffe89c12bbb077c0a811afb77f3ef30956f8cfb41a6d933b8535c09e
x86_64
kernel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 1f7e07386e26bf400cf7c24c5f9ace8ea273a4115e0af39c683f05aecb2c6a0d
kernel-debug-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 950be4d36224c1791145b8a5d816f75874f5e796d471a25a10175a124d136198
kernel-debug-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 9d20c4d7053c682ca38da77cf5e2c04d66851a975a98f3f5fcca430419b60881
kernel-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: dee3c6e74da5c58804cede2a6c35b9c142f5396c1e51ab0c7b7fa808cc4bc05c
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: c1ef74fbaa7c6413b6a7c63cd876b16726ea1c07f58a460534c2e2a582a9adb9
kernel-xen-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: e74f5c2b4cdf369406a75254f1cd2f5b3402bdd2d283cb997494db04c0fd486c
kernel-xen-devel-2.6.18-238.28.1.el5.x86_64.rpm SHA-256: 24c04e671d31a003090a549e8dc60e7ba8a45caec75f543def131789fb4bf86d
ia64
kernel-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 602330275f8c645af04901791f3ea1df3f1163251d03bd87c42c207ac8c95018
kernel-debug-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 416f8a2d7d9649188814d69334e03b0e49cc9867a80a0ac677d481399b8f87c2
kernel-debug-devel-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 1d9753075e8396060119c8cc32733bd806b6dbc7602310d91f57e068bf020de3
kernel-devel-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 8885e593b85d2e0c60bf5e2f764ee14ca7415d4f72ac20f5ca89fce818efb458
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 8a7a23e7db80929046758e10e99d571749bbe00388f4a604b05089e9de7e669e
kernel-xen-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 4fdc89e4653463ec25e3e436a7d9f267766730919d543eedf5c7baffd3e4d2cd
kernel-xen-devel-2.6.18-238.28.1.el5.ia64.rpm SHA-256: 6d2724afda5d981e8393419375c15ee3b4b8913df23ea6c99e01f62530b2267e
i386
kernel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 5aea964a295b3f39d8c47ce001bb8684e0e464a6e276b4c24ea293a504fd199b
kernel-PAE-2.6.18-238.28.1.el5.i686.rpm SHA-256: e2028e4b015c04f107d2ee0bef00fc888179702d4614d02a75033a4f3d88de8e
kernel-PAE-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 8815484a29f859cb16a98f03c6f15e3aea1be314120eb2cbd1faf69831b2a36d
kernel-debug-2.6.18-238.28.1.el5.i686.rpm SHA-256: 72ef0ae84665eae1b7acd05cb015ff55792705a258962dd95ffaf9719795635e
kernel-debug-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: e407f7fe5adcfc7e2c161fa10485b610f713f0cafbc898344842386e4f961783
kernel-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: 96bea3b111c21a65a2bc49b980fcd168bb6d917bd21f1d7d0230f684a9dd7e12
kernel-doc-2.6.18-238.28.1.el5.noarch.rpm SHA-256: 73143b29613e61b53aa309970b771e7c5a238be57718bda9ae0878a9fd59cc74
kernel-headers-2.6.18-238.28.1.el5.i386.rpm SHA-256: f29905d45d9ac02e4c52dbedaec8a45f8f803c59bc4ce8e5f5ad40abf81c3a02
kernel-xen-2.6.18-238.28.1.el5.i686.rpm SHA-256: f610996faf779c3241c4ffe781190132472fa6d447b6fd689c3e8f3f66a415cd
kernel-xen-devel-2.6.18-238.28.1.el5.i686.rpm SHA-256: e2ce277e076628d8dbb22b82a2e5dc1acf36a53aa366b5fef6f1950bff79cda5

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+