Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:0107 - Security Advisory
Issued:
2012-02-09
Updated:
2012-02-09

RHSA-2012:0107 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and two bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • Using the SG_IO ioctl to issue SCSI requests to partitions or LVM volumes

resulted in the requests being passed to the underlying block device. If a
privileged user only had access to a single partition or LVM volume, they
could use this flaw to bypass those restrictions and gain read and write
access (and be able to issue other SCSI commands) to the entire block
device. Refer to Red Hat Knowledgebase article DOC-67874, linked to in the
References, for further details about this issue. (CVE-2011-4127,
Important)

  • A flaw was found in the way the Linux kernel handled robust list pointers

of user-space held futexes across exec() calls. A local, unprivileged user
could use this flaw to cause a denial of service or, eventually, escalate
their privileges. (CVE-2012-0028, Important)

  • A flaw was found in the Linux kernel in the way splitting two extents in

ext4_ext_convert_to_initialized() worked. A local, unprivileged user with
the ability to mount and unmount ext4 file systems could use this flaw to
cause a denial of service. (CVE-2011-3638, Moderate)

  • A flaw was found in the way the Linux kernel's journal_unmap_buffer()

function handled buffer head states. On systems that have an ext4 file
system with a journal mounted, a local, unprivileged user could use this
flaw to cause a denial of service. (CVE-2011-4086, Moderate)

  • A divide-by-zero flaw was found in the Linux kernel's igmp_heard_query()

function. An attacker able to send certain IGMP (Internet Group Management
Protocol) packets to a target system could use this flaw to cause a denial
of service. (CVE-2012-0207, Moderate)

Red Hat would like to thank Zheng Liu for reporting CVE-2011-3638, and
Simon McVittie for reporting CVE-2012-0207.

This update also fixes the following bugs:

  • When a host was in recovery mode and a SCSI scan operation was initiated,

the scan operation failed and provided no error output. This bug has been
fixed and the SCSI layer now waits for recovery of the host to complete
scan operations for devices. (BZ#772162)

  • SG_IO ioctls were not implemented correctly in the Red Hat Enterprise

Linux 5 virtio-blk driver. Sending an SG_IO ioctl request to a virtio-blk
disk caused the sending thread to enter an uninterruptible sleep state ("D"
state). With this update, SG_IO ioctls are rejected by the virtio-blk
driver: the ioctl system call will simply return an ENOTTY ("Inappropriate
ioctl for device") error and the thread will continue normally. (BZ#773322)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 747942 - CVE-2011-3638 kernel: ext4: ext4_ext_insert_extent() kernel oops
  • BZ - 749143 - CVE-2011-4086 kernel: jbd2: unmapped buffer with _Unwritten or _Delay flags set can lead to DoS
  • BZ - 752375 - CVE-2011-4127 kernel: possible privilege escalation via SG_IO ioctl
  • BZ - 771764 - CVE-2012-0028 kernel: futex: clear robust_list on execve
  • BZ - 772867 - CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries

CVEs

  • CVE-2011-3638
  • CVE-2011-4127
  • CVE-2012-0028
  • CVE-2012-0207
  • CVE-2011-4086

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/kb/docs/DOC-67874
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
x86_64
kernel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 65b3127e57686dba6376e68e0ceadc5dc1c1e4a6a1197e8bbda7168e51714422
kernel-debug-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: d633c3ec58cd9a6242d664a9e8e1d17a9b6ac1bd5bf6f644b871d5188c563f3b
kernel-debug-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: dda347bf4e9019ccec27190ba4528fa5b7722d33d581f42d29006e8ef4f1c335
kernel-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9be9b859c73021da04330f5181d29282667c7550836f6ca5ee63f1624c37266
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9c1ead3a127b1efad6beeef5b09f10f035b9a9c76e60958ded63384e14d3805
kernel-xen-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 09b52f136beee96bb976ea9de16d84bde4dd5b8ac1625b1b7004fa08919d0ca2
kernel-xen-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 0ce849f526f9271ec134fbab2feafe2fa2d51c047be9558aa9972e3ab2c9045c
ia64
kernel-2.6.18-274.18.1.el5.ia64.rpm SHA-256: bda88f7c73686276ca05415a8e8b8f404461c0282e843722a31159abcdfb438a
kernel-debug-2.6.18-274.18.1.el5.ia64.rpm SHA-256: a64b26183c8a8e73935122bef52343e21bdba40d82ea077112d4cef505bf5947
kernel-debug-devel-2.6.18-274.18.1.el5.ia64.rpm SHA-256: b23d44dc20bb5bf5691d528b10fa308fdf61b06555f546a99a7f39fd1bb7d9e7
kernel-devel-2.6.18-274.18.1.el5.ia64.rpm SHA-256: fe2b623f3124510f89d80364a40c405326be18acdbbaa37ddee72908e7476852
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.ia64.rpm SHA-256: 832b7f41eca2cc5546b59912941ef5c4f5b5dc81ad74d7e47ed50b7e0110ef5d
kernel-xen-2.6.18-274.18.1.el5.ia64.rpm SHA-256: 34b5c877bf4614d88d6152f68673292095e25d2bbfa0ae0437111ee28e192b7a
kernel-xen-devel-2.6.18-274.18.1.el5.ia64.rpm SHA-256: 75c1dc4996fa271c6c37d57bad4ebf367309609a022dc94a3d46ea7a7bcbd5ff
i386
kernel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e327eac2488e5a76336a101b7fb8c2b2b194a3ce342c9827a21bffae98ded510
kernel-PAE-2.6.18-274.18.1.el5.i686.rpm SHA-256: a6c7c07bf722e4d8609ce790c5e59a5259bd5bd98df9c4f7e0b51cf7d38b81fb
kernel-PAE-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 96dd9f5265c3a461f315b40064d6b3810c63785cc6276b767ff4ea158a40f02b
kernel-debug-2.6.18-274.18.1.el5.i686.rpm SHA-256: 31aedc1b66b0a9ce36f96d5876eedbca642e329a282417da4b768985794b5a54
kernel-debug-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 0a6294343280103f552d6387a5f7c755bf7dde57698f13225b6a1fb86d9fa58d
kernel-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e262f844e17b4bfcc24114aa4d8831e70dc85352e295ebdb35bd46a698f6fc70
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.i386.rpm SHA-256: 61a7135fcbc8028c599b1dffb9a3cdc1c93ea93ff493b2a17064a7aaab7902b8
kernel-xen-2.6.18-274.18.1.el5.i686.rpm SHA-256: 9e8647060d4b039b5ea1f9823735a7b0af636295e1fa18550a0871360110c7bb
kernel-xen-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 81a262d02340ab7d65c880d924828ea476fe811ebde122eca0d139ece39a4096

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
x86_64
kernel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 65b3127e57686dba6376e68e0ceadc5dc1c1e4a6a1197e8bbda7168e51714422
kernel-debug-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: d633c3ec58cd9a6242d664a9e8e1d17a9b6ac1bd5bf6f644b871d5188c563f3b
kernel-debug-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: dda347bf4e9019ccec27190ba4528fa5b7722d33d581f42d29006e8ef4f1c335
kernel-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9be9b859c73021da04330f5181d29282667c7550836f6ca5ee63f1624c37266
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9c1ead3a127b1efad6beeef5b09f10f035b9a9c76e60958ded63384e14d3805
kernel-xen-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 09b52f136beee96bb976ea9de16d84bde4dd5b8ac1625b1b7004fa08919d0ca2
kernel-xen-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 0ce849f526f9271ec134fbab2feafe2fa2d51c047be9558aa9972e3ab2c9045c
i386
kernel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e327eac2488e5a76336a101b7fb8c2b2b194a3ce342c9827a21bffae98ded510
kernel-PAE-2.6.18-274.18.1.el5.i686.rpm SHA-256: a6c7c07bf722e4d8609ce790c5e59a5259bd5bd98df9c4f7e0b51cf7d38b81fb
kernel-PAE-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 96dd9f5265c3a461f315b40064d6b3810c63785cc6276b767ff4ea158a40f02b
kernel-debug-2.6.18-274.18.1.el5.i686.rpm SHA-256: 31aedc1b66b0a9ce36f96d5876eedbca642e329a282417da4b768985794b5a54
kernel-debug-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 0a6294343280103f552d6387a5f7c755bf7dde57698f13225b6a1fb86d9fa58d
kernel-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e262f844e17b4bfcc24114aa4d8831e70dc85352e295ebdb35bd46a698f6fc70
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.i386.rpm SHA-256: 61a7135fcbc8028c599b1dffb9a3cdc1c93ea93ff493b2a17064a7aaab7902b8
kernel-xen-2.6.18-274.18.1.el5.i686.rpm SHA-256: 9e8647060d4b039b5ea1f9823735a7b0af636295e1fa18550a0871360110c7bb
kernel-xen-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 81a262d02340ab7d65c880d924828ea476fe811ebde122eca0d139ece39a4096

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
x86_64
kernel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 65b3127e57686dba6376e68e0ceadc5dc1c1e4a6a1197e8bbda7168e51714422
kernel-debug-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: d633c3ec58cd9a6242d664a9e8e1d17a9b6ac1bd5bf6f644b871d5188c563f3b
kernel-debug-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: dda347bf4e9019ccec27190ba4528fa5b7722d33d581f42d29006e8ef4f1c335
kernel-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9be9b859c73021da04330f5181d29282667c7550836f6ca5ee63f1624c37266
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9c1ead3a127b1efad6beeef5b09f10f035b9a9c76e60958ded63384e14d3805
kernel-xen-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 09b52f136beee96bb976ea9de16d84bde4dd5b8ac1625b1b7004fa08919d0ca2
kernel-xen-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 0ce849f526f9271ec134fbab2feafe2fa2d51c047be9558aa9972e3ab2c9045c
i386
kernel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e327eac2488e5a76336a101b7fb8c2b2b194a3ce342c9827a21bffae98ded510
kernel-PAE-2.6.18-274.18.1.el5.i686.rpm SHA-256: a6c7c07bf722e4d8609ce790c5e59a5259bd5bd98df9c4f7e0b51cf7d38b81fb
kernel-PAE-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 96dd9f5265c3a461f315b40064d6b3810c63785cc6276b767ff4ea158a40f02b
kernel-debug-2.6.18-274.18.1.el5.i686.rpm SHA-256: 31aedc1b66b0a9ce36f96d5876eedbca642e329a282417da4b768985794b5a54
kernel-debug-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 0a6294343280103f552d6387a5f7c755bf7dde57698f13225b6a1fb86d9fa58d
kernel-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e262f844e17b4bfcc24114aa4d8831e70dc85352e295ebdb35bd46a698f6fc70
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.i386.rpm SHA-256: 61a7135fcbc8028c599b1dffb9a3cdc1c93ea93ff493b2a17064a7aaab7902b8
kernel-xen-2.6.18-274.18.1.el5.i686.rpm SHA-256: 9e8647060d4b039b5ea1f9823735a7b0af636295e1fa18550a0871360110c7bb
kernel-xen-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 81a262d02340ab7d65c880d924828ea476fe811ebde122eca0d139ece39a4096

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
s390x
kernel-2.6.18-274.18.1.el5.s390x.rpm SHA-256: a5c13e726974a2a8e7419dc542823cfa77087e52ae70e44bc7ff86d86ffa80b4
kernel-debug-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 817b20eaefcd69604162b896f8be2fd9e972aaa87b2d9570cbae225a759d2224
kernel-debug-devel-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 7cad84e3e92827cb77803c66320cb6dc6a77812336e978ade543cfeb3f0c186d
kernel-devel-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 8609bbfc4f5d49423dd5ac52a15d6026f7d73f9b3eb904377d7b32b7f44fe953
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 6e6ac247794b276ad36c5e632f722c2fcc6a0b6145f4a3d549cfdf89b4868ae5
kernel-kdump-2.6.18-274.18.1.el5.s390x.rpm SHA-256: 6cb1175a4711630d8060067d2252f378be363cab5c6c9b61c8206197832fd4d9
kernel-kdump-devel-2.6.18-274.18.1.el5.s390x.rpm SHA-256: e030d4b99d10cde19082327a13d08af91ad51cab7703ae3749899207fdea42f5

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
ppc
kernel-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: 0257b9049f9683690af28ddce463efae215c34ef06141a217dee2887e968fbe2
kernel-debug-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: b7bc97fa86a3bd63bcc42d59f86a4892bac6011944e1aeb23a32f4cdec39560b
kernel-debug-devel-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: 1ee303f82311d019ab7918fc3a183098703df134a6ee49a9daad9e98f79c19f7
kernel-devel-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: 03b2319bec59e12aad61b0a2d165e2db5dab6b181f9b71a09daf0eea209fb590
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.ppc.rpm SHA-256: 295e4aa3bb8830fb431868c58521cceeab49d2b36c7860d0bf398025a20c73d7
kernel-headers-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: a3b873d616acf90ea2128c4b65ee968e6ead5d177d642225f959566045f4479d
kernel-kdump-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: b2004db5a29bb9c39ce11bf762ce6c10a02d9692a74ffa106995117d9c80bcf8
kernel-kdump-devel-2.6.18-274.18.1.el5.ppc64.rpm SHA-256: f964c10b72ffc2a6c8aeef0c78e7462702ea823e09a4b8a7692baddee01f54f9

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-274.18.1.el5.src.rpm SHA-256: d9b0fc3a47216c026e9e3d6f25763e709d8d7201ff449862b08127363c31da8d
x86_64
kernel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 65b3127e57686dba6376e68e0ceadc5dc1c1e4a6a1197e8bbda7168e51714422
kernel-debug-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: d633c3ec58cd9a6242d664a9e8e1d17a9b6ac1bd5bf6f644b871d5188c563f3b
kernel-debug-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: dda347bf4e9019ccec27190ba4528fa5b7722d33d581f42d29006e8ef4f1c335
kernel-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9be9b859c73021da04330f5181d29282667c7550836f6ca5ee63f1624c37266
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: c9c1ead3a127b1efad6beeef5b09f10f035b9a9c76e60958ded63384e14d3805
kernel-xen-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 09b52f136beee96bb976ea9de16d84bde4dd5b8ac1625b1b7004fa08919d0ca2
kernel-xen-devel-2.6.18-274.18.1.el5.x86_64.rpm SHA-256: 0ce849f526f9271ec134fbab2feafe2fa2d51c047be9558aa9972e3ab2c9045c
i386
kernel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e327eac2488e5a76336a101b7fb8c2b2b194a3ce342c9827a21bffae98ded510
kernel-PAE-2.6.18-274.18.1.el5.i686.rpm SHA-256: a6c7c07bf722e4d8609ce790c5e59a5259bd5bd98df9c4f7e0b51cf7d38b81fb
kernel-PAE-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 96dd9f5265c3a461f315b40064d6b3810c63785cc6276b767ff4ea158a40f02b
kernel-debug-2.6.18-274.18.1.el5.i686.rpm SHA-256: 31aedc1b66b0a9ce36f96d5876eedbca642e329a282417da4b768985794b5a54
kernel-debug-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 0a6294343280103f552d6387a5f7c755bf7dde57698f13225b6a1fb86d9fa58d
kernel-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: e262f844e17b4bfcc24114aa4d8831e70dc85352e295ebdb35bd46a698f6fc70
kernel-doc-2.6.18-274.18.1.el5.noarch.rpm SHA-256: d0ed6860b4d79c2228c370516cc8517fc4c2c470925de69181b90701f9d47b4d
kernel-headers-2.6.18-274.18.1.el5.i386.rpm SHA-256: 61a7135fcbc8028c599b1dffb9a3cdc1c93ea93ff493b2a17064a7aaab7902b8
kernel-xen-2.6.18-274.18.1.el5.i686.rpm SHA-256: 9e8647060d4b039b5ea1f9823735a7b0af636295e1fa18550a0871360110c7bb
kernel-xen-devel-2.6.18-274.18.1.el5.i686.rpm SHA-256: 81a262d02340ab7d65c880d924828ea476fe811ebde122eca0d139ece39a4096

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter