Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0107 - Security Advisory
Issued:
2012-02-09
Updated:
2012-02-09

RHSA-2012:0107 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and two bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • Using the SG_IO ioctl to issue SCSI requests to partitions or LVM volumes

resulted in the requests being passed to the underlying block device. If a
privileged user only had access to a single partition or LVM volume, they
could use this flaw to bypass those restrictions and gain read and write
access (and be able to issue other SCSI commands) to the entire block
device. Refer to Red Hat Knowledgebase article DOC-67874, linked to in the
References, for further details about this issue. (CVE-2011-4127,
Important)

  • A flaw was found in the way the Linux kernel handled robust list pointers

of user-space held futexes across exec() calls. A local, unprivileged user
could use this flaw to cause a denial of service or, eventually, escalate
their privileges. (CVE-2012-0028, Important)

  • A flaw was found in the Linux kernel in the way splitting two extents in

ext4_ext_convert_to_initialized() worked. A local, unprivileged user with
the ability to mount and unmount ext4 file systems could use this flaw to
cause a denial of service. (CVE-2011-3638, Moderate)

  • A flaw was found in the way the Linux kernel's journal_unmap_buffer()

function handled buffer head states. On systems that have an ext4 file
system with a journal mounted, a local, unprivileged user could use this
flaw to cause a denial of service. (CVE-2011-4086, Moderate)

  • A divide-by-zero flaw was found in the Linux kernel's igmp_heard_query()

function. An attacker able to send certain IGMP (Internet Group Management
Protocol) packets to a target system could use this flaw to cause a denial
of service. (CVE-2012-0207, Moderate)

Red Hat would like to thank Zheng Liu for reporting CVE-2011-3638, and
Simon McVittie for reporting CVE-2012-0207.

This update also fixes the following bugs:

  • When a host was in recovery mode and a SCSI scan operation was initiated,

the scan operation failed and provided no error output. This bug has been
fixed and the SCSI layer now waits for recovery of the host to complete
scan operations for devices. (BZ#772162)

  • SG_IO ioctls were not implemented correctly in the Red Hat Enterprise

Linux 5 virtio-blk driver. Sending an SG_IO ioctl request to a virtio-blk
disk caused the sending thread to enter an uninterruptible sleep state ("D"
state). With this update, SG_IO ioctls are rejected by the virtio-blk
driver: the ioctl system call will simply return an ENOTTY ("Inappropriate
ioctl for device") error and the thread will continue normally. (BZ#773322)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 747942 - CVE-2011-3638 kernel: ext4: ext4_ext_insert_extent() kernel oops
  • BZ - 749143 - CVE-2011-4086 kernel: jbd2: unmapped buffer with _Unwritten or _Delay flags set can lead to DoS
  • BZ - 752375 - CVE-2011-4127 kernel: possible privilege escalation via SG_IO ioctl
  • BZ - 771764 - CVE-2012-0028 kernel: futex: clear robust_list on execve
  • BZ - 772867 - CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries

CVEs

  • CVE-2011-3638
  • CVE-2011-4127
  • CVE-2012-0028
  • CVE-2012-0207
  • CVE-2011-4086

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/kb/docs/DOC-67874
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
x86_64
kernel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 65b3127e57686dba6376e68e0ceadc5dc1c1e4a6a1197e8bbda7168e51714422
kernel-debug-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: d633c3ec58cd9a6242d664a9e8e1d17a9b6ac1bd5bf6f644b871d5188c563f3b
kernel-debug-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: dda347bf4e9019ccec27190ba4528fa5b7722d33d581f42d29006e8ef4f1c335
kernel-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9be9b859c73021da04330f5181d29282667c7550836f6ca5ee63f1624c37266
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9c1ead3a127b1efad6beeef5b09f10f035b9a9c76e60958ded63384e14d3805
kernel-xen-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 09b52f136beee96bb976ea9de16d84bde4dd5b8ac1625b1b7004fa08919d0ca2
kernel-xen-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 0ce849f526f9271ec134fbab2feafe2fa2d51c047be9558aa9972e3ab2c9045c
ia64
kernel-2.6.18-274.18.1.el5.ia64.rpm SHA-256: bda88f7c73686276ca05415a8e8b8f404461c0282e843722a31159abcdfb438a
kernel-debug-2.6.18-274.18.1.el5.ia64.rpm SHA-256: a64b26183c8a8e73935122bef52343e21bdba40d82ea077112d4cef505bf5947
kernel-debug-devel-2.6.18-274.18.1.el5.ia64.rpm SHA-256: b23d44dc20bb5bf5691d528b10fa308fdf61b06555f546a99a7f39fd1bb7d9e7
kernel-devel-2.6.18-274.18.1.el5.ia64.rpm SHA-256: fe2b623f3124510f89d80364a40c405326be18acdbbaa37ddee72908e7476852
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.ia64.rpm SHA-256: 832b7f41eca2cc5546b59912941ef5c4f5b5dc81ad74d7e47ed50b7e0110ef5d
kernel-xen-2.6.18-274.18.1.el5.ia64.rpm SHA-256: 34b5c877bf4614d88d6152f68673292095e25d2bbfa0ae0437111ee28e192b7a
kernel-xen-devel-2.6.18-274.18.1.el5.ia64.rpm SHA-256: 75c1dc4996fa271c6c37d57bad4ebf367309609a022dc94a3d46ea7a7bcbd5ff
i386
kernel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e327eac2488e5a76336a101b7fb8c2b2b194a3ce342c9827a21bffae98ded510
kernel-PAE-2.6.18-274.18.1.el5.i686.rpm SHA-256: a6c7c07bf722e4d8609ce790c5e59a5259bd5bd98df9c4f7e0b51cf7d38b81fb
kernel-PAE-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 96dd9f5265c3a461f315b40064d6b3810c63785cc6276b767ff4ea158a40f02b
kernel-debug-2.6.18-274.18.1.el5.i686.rpm SHA-256: 31aedc1b66b0a9ce36f96d5876eedbca642e329a282417da4b768985794b5a54
kernel-debug-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 0a6294343280103f552d6387a5f7c755bf7dde57698f13225b6a1fb86d9fa58d
kernel-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e262f844e17b4bfcc24114aa4d8831e70dc85352e295ebdb35bd46a698f6fc70
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.i386.rpm SHA-256: 61a7135fcbc8028c599b1dffb9a3cdc1c93ea93ff493b2a17064a7aaab7902b8
kernel-xen-2.6.18-274.18.1.el5.i686.rpm SHA-256: 9e8647060d4b039b5ea1f9823735a7b0af636295e1fa18550a0871360110c7bb
kernel-xen-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 81a262d02340ab7d65c880d924828ea476fe811ebde122eca0d139ece39a4096

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
x86_64
kernel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 65b3127e57686dba6376e68e0ceadc5dc1c1e4a6a1197e8bbda7168e51714422
kernel-debug-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: d633c3ec58cd9a6242d664a9e8e1d17a9b6ac1bd5bf6f644b871d5188c563f3b
kernel-debug-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: dda347bf4e9019ccec27190ba4528fa5b7722d33d581f42d29006e8ef4f1c335
kernel-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9be9b859c73021da04330f5181d29282667c7550836f6ca5ee63f1624c37266
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9c1ead3a127b1efad6beeef5b09f10f035b9a9c76e60958ded63384e14d3805
kernel-xen-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 09b52f136beee96bb976ea9de16d84bde4dd5b8ac1625b1b7004fa08919d0ca2
kernel-xen-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 0ce849f526f9271ec134fbab2feafe2fa2d51c047be9558aa9972e3ab2c9045c
i386
kernel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e327eac2488e5a76336a101b7fb8c2b2b194a3ce342c9827a21bffae98ded510
kernel-PAE-2.6.18-274.18.1.el5.i686.rpm SHA-256: a6c7c07bf722e4d8609ce790c5e59a5259bd5bd98df9c4f7e0b51cf7d38b81fb
kernel-PAE-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 96dd9f5265c3a461f315b40064d6b3810c63785cc6276b767ff4ea158a40f02b
kernel-debug-2.6.18-274.18.1.el5.i686.rpm SHA-256: 31aedc1b66b0a9ce36f96d5876eedbca642e329a282417da4b768985794b5a54
kernel-debug-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 0a6294343280103f552d6387a5f7c755bf7dde57698f13225b6a1fb86d9fa58d
kernel-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e262f844e17b4bfcc24114aa4d8831e70dc85352e295ebdb35bd46a698f6fc70
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.i386.rpm SHA-256: 61a7135fcbc8028c599b1dffb9a3cdc1c93ea93ff493b2a17064a7aaab7902b8
kernel-xen-2.6.18-274.18.1.el5.i686.rpm SHA-256: 9e8647060d4b039b5ea1f9823735a7b0af636295e1fa18550a0871360110c7bb
kernel-xen-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 81a262d02340ab7d65c880d924828ea476fe811ebde122eca0d139ece39a4096

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
x86_64
kernel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 65b3127e57686dba6376e68e0ceadc5dc1c1e4a6a1197e8bbda7168e51714422
kernel-debug-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: d633c3ec58cd9a6242d664a9e8e1d17a9b6ac1bd5bf6f644b871d5188c563f3b
kernel-debug-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: dda347bf4e9019ccec27190ba4528fa5b7722d33d581f42d29006e8ef4f1c335
kernel-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9be9b859c73021da04330f5181d29282667c7550836f6ca5ee63f1624c37266
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9c1ead3a127b1efad6beeef5b09f10f035b9a9c76e60958ded63384e14d3805
kernel-xen-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 09b52f136beee96bb976ea9de16d84bde4dd5b8ac1625b1b7004fa08919d0ca2
kernel-xen-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 0ce849f526f9271ec134fbab2feafe2fa2d51c047be9558aa9972e3ab2c9045c
i386
kernel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e327eac2488e5a76336a101b7fb8c2b2b194a3ce342c9827a21bffae98ded510
kernel-PAE-2.6.18-274.18.1.el5.i686.rpm SHA-256: a6c7c07bf722e4d8609ce790c5e59a5259bd5bd98df9c4f7e0b51cf7d38b81fb
kernel-PAE-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 96dd9f5265c3a461f315b40064d6b3810c63785cc6276b767ff4ea158a40f02b
kernel-debug-2.6.18-274.18.1.el5.i686.rpm SHA-256: 31aedc1b66b0a9ce36f96d5876eedbca642e329a282417da4b768985794b5a54
kernel-debug-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 0a6294343280103f552d6387a5f7c755bf7dde57698f13225b6a1fb86d9fa58d
kernel-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e262f844e17b4bfcc24114aa4d8831e70dc85352e295ebdb35bd46a698f6fc70
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.i386.rpm SHA-256: 61a7135fcbc8028c599b1dffb9a3cdc1c93ea93ff493b2a17064a7aaab7902b8
kernel-xen-2.6.18-274.18.1.el5.i686.rpm SHA-256: 9e8647060d4b039b5ea1f9823735a7b0af636295e1fa18550a0871360110c7bb
kernel-xen-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 81a262d02340ab7d65c880d924828ea476fe811ebde122eca0d139ece39a4096

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
s390x
kernel-2.6.18-274.18.1.el5.s390x.rpm SHA-256: a5c13e726974a2a8e7419dc542823cfa77087e52ae70e44bc7ff86d86ffa80b4
kernel-debug-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 817b20eaefcd69604162b896f8be2fd9e972aaa87b2d9570cbae225a759d2224
kernel-debug-devel-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 7cad84e3e92827cb77803c66320cb6dc6a77812336e978ade543cfeb3f0c186d
kernel-devel-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 8609bbfc4f5d49423dd5ac52a15d6026f7d73f9b3eb904377d7b32b7f44fe953
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 6e6ac247794b276ad36c5e632f722c2fcc6a0b6145f4a3d549cfdf89b4868ae5
kernel-kdump-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 6cb1175a4711630d8060067d2252f378be363cab5c6c9b61c8206197832fd4d9
kernel-kdump-devel-2.6.18-274.18.1.el5.s390x.rpm SHA-256: e030d4b99d10cde19082327a13d08af91ad51cab7703ae3749899207fdea42f5

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
ppc
kernel-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: 0257b9049f9683690af28ddce463efae215c34ef06141a217dee2887e968fbe2
kernel-debug-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: b7bc97fa86a3bd63bcc42d59f86a4892bac6011944e1aeb23a32f4cdec39560b
kernel-debug-devel-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: 1ee303f82311d019ab7918fc3a183098703df134a6ee49a9daad9e98f79c19f7
kernel-devel-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: 03b2319bec59e12aad61b0a2d165e2db5dab6b181f9b71a09daf0eea209fb590
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.ppc.rpm SHA-256: 295e4aa3bb8830fb431868c58521cceeab49d2b36c7860d0bf398025a20c73d7
kernel-headers-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: a3b873d616acf90ea2128c4b65ee968e6ead5d177d642225f959566045f4479d
kernel-kdump-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: b2004db5a29bb9c39ce11bf762ce6c10a02d9692a74ffa106995117d9c80bcf8
kernel-kdump-devel-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: f964c10b72ffc2a6c8aeef0c78e7462702ea823e09a4b8a7692baddee01f54f9

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
x86_64
kernel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 65b3127e57686dba6376e68e0ceadc5dc1c1e4a6a1197e8bbda7168e51714422
kernel-debug-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: d633c3ec58cd9a6242d664a9e8e1d17a9b6ac1bd5bf6f644b871d5188c563f3b
kernel-debug-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: dda347bf4e9019ccec27190ba4528fa5b7722d33d581f42d29006e8ef4f1c335
kernel-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9be9b859c73021da04330f5181d29282667c7550836f6ca5ee63f1624c37266
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9c1ead3a127b1efad6beeef5b09f10f035b9a9c76e60958ded63384e14d3805
kernel-xen-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 09b52f136beee96bb976ea9de16d84bde4dd5b8ac1625b1b7004fa08919d0ca2
kernel-xen-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 0ce849f526f9271ec134fbab2feafe2fa2d51c047be9558aa9972e3ab2c9045c
i386
kernel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e327eac2488e5a76336a101b7fb8c2b2b194a3ce342c9827a21bffae98ded510
kernel-PAE-2.6.18-274.18.1.el5.i686.rpm SHA-256: a6c7c07bf722e4d8609ce790c5e59a5259bd5bd98df9c4f7e0b51cf7d38b81fb
kernel-PAE-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 96dd9f5265c3a461f315b40064d6b3810c63785cc6276b767ff4ea158a40f02b
kernel-debug-2.6.18-274.18.1.el5.i686.rpm SHA-256: 31aedc1b66b0a9ce36f96d5876eedbca642e329a282417da4b768985794b5a54
kernel-debug-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 0a6294343280103f552d6387a5f7c755bf7dde57698f13225b6a1fb86d9fa58d
kernel-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e262f844e17b4bfcc24114aa4d8831e70dc85352e295ebdb35bd46a698f6fc70
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.i386.rpm SHA-256: 61a7135fcbc8028c599b1dffb9a3cdc1c93ea93ff493b2a17064a7aaab7902b8
kernel-xen-2.6.18-274.18.1.el5.i686.rpm SHA-256: 9e8647060d4b039b5ea1f9823735a7b0af636295e1fa18550a0871360110c7bb
kernel-xen-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 81a262d02340ab7d65c880d924828ea476fe811ebde122eca0d139ece39a4096

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility