Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:0150 - Security Advisory
Issued:
2012-02-21
Updated:
2012-02-21

RHSA-2012:0150 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat Enterprise Linux 5.8 kernel update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 5.
This is the eighth regular update.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A flaw was found in the way the Linux kernel's Event Poll (epoll)

subsystem handled large, nested epoll structures. A local, unprivileged
user could use this flaw to cause a denial of service. (CVE-2011-1083,
Moderate)

Red Hat would like to thank Nelson Elhage for reporting this issue.

These updated kernel packages include a number of bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Enterprise Linux 5.8 Technical
Notes, linked to in the References, for information on the most significant
of these changes.

All Red Hat Enterprise Linux 5 users are advised to install these updated
packages, which correct these issues and add these enhancements. The system
must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 485173 - kernel/module-verify-sig.c with memory uncleaned bug
  • BZ - 516170 - kernel multipath driver behaves badly on medium errors
  • BZ - 526862 - [RHEL5 Xen]: Mask out CPU features by default
  • BZ - 543064 - No NUMA node hash function found on a EX machine
  • BZ - 571737 - Cannot use Quickcam Pro 9000 with Ekiga, fails with "uvcvideo: Failed to query ..."
  • BZ - 585935 - Bug in RHEL-5.4/5.5 nfs_access_cache_shrinker
  • BZ - 608156 - kernel panic if bonding initialization fails
  • BZ - 618317 - RFE: RHEL5 Xen: support online dynamic resize of guest virtual disks
  • BZ - 664653 - [5.4] OS cannot recognize DVD disk replace in rescue mode.
  • BZ - 668027 - unexpected error message when sending a unsolicited NA from user code
  • BZ - 668529 - Spare disk added to a raid1 array by mdadm command is dropped upon next boot.
  • BZ - 674663 - vlapic: Fix possible guest tick losing after save/restore
  • BZ - 681578 - CVE-2011-1083 kernel: excessive in kernel CPU consumption when creating large nested epoll structures
  • BZ - 681902 - GFS2: Add readahead to sequential directory traversal
  • BZ - 683372 - NFS4: Incorrect server behavior when using OPEN call with O_CREATE on a directory on which the process has no WRITE permissions.
  • BZ - 688673 - PCI Virtual Function Passthrough - SR-IOV, Paravirt Guest fails to obtain IRQ after reboot
  • BZ - 688791 - dropwatch>stop: Waiting for deactivation ack (forever)
  • BZ - 691087 - Incorrect values in /proc/sys/vm/dirty_writeback_centises and dirty_expire_centisecs
  • BZ - 694625 - Non-responsive scsi target leads to excessive scsi recovery and dm-mp failover time
  • BZ - 697021 - Patch needed to allow MTU >1500 on vif prior to connecting to bridge
  • BZ - 698842 - kvmclock: MP-BIOS bug: 8254 timer not connected to IO-APIC
  • BZ - 698928 - VLAN interface with changed MAC address fails to communicate
  • BZ - 700565 - RHEL6.1 32bit xen hvm guest crash randomly
  • BZ - 700752 - 32-bit PV guest crash on restore on x64_86 host
  • BZ - 700886 - RHEL5.6 TSC used as default clock source on multi-chassis system
  • BZ - 703150 - multiple resource leaks on error paths in blkfront and netfront
  • BZ - 703505 - 300 seconds time shift in vdso version of clock_gettime()
  • BZ - 704921 - panic in cifsd code after unexpected lookup error -88.
  • BZ - 706339 - open/closed files in cifs mount points
  • BZ - 707966 - 2.6.18-238.1.1.el5 or newer won't boot under Xen HVM due to linux-2.6-virt-nmi-don-t-print-nmi-stuck-messages-on-guests.patch
  • BZ - 709271 - net.ipv6.conf.default.dad_transmits has no effect on tentative IPv6 addresses
  • BZ - 709515 - Kernel panic at nfs4_callback_compound+0x2dd
  • BZ - 711070 - mask the SMEP bit for PV, do the same or backport SMEP emulation for HVM
  • BZ - 712439 - Backport "x86: extend debug key 't' to collect useful clock skew info"
  • BZ - 712440 - Backport "vmx: Print advanced features during boot"
  • BZ - 712441 - Backport "x86/hvm: fix off-by-one errors in vcpuid range checks"
  • BZ - 713702 - pull missing fixes from upstream x86_emulate()
  • BZ - 714053 - couple nice-to-have xen hypervisor patches
  • BZ - 714670 - TCP_CRR and concurrent TCP stream tests over IPv6 sometime fails on rhel5.7
  • BZ - 715501 - ext4: Don't error out the fs if the user tries to make a file too big
  • BZ - 716834 - 'dmesg' command is swamped with the message: pci_set_power_state(): 0000:05:05.0: state=3, current state=5
  • BZ - 717434 - Unable to attach a cdrom device to guest domain
  • BZ - 717850 - miss xmit_hash_policy=layer2+3 in modinfo bonding output
  • BZ - 718232 - [xfs] mis-sized O_DIRECT I/O results in hung task timeouts
  • BZ - 718641 - Can't change lacp_rate in bonding mode=802.3ad
  • BZ - 718988 - [EL5.7] igb: failed to activate WOL on 2nd LAN port on i350
  • BZ - 720347 - RHEL 6.1 Xen paravirt guest is getting network outage during live migration (host side)
  • BZ - 720551 - xfs_error_report() oops when passed-in mp is NULL
  • BZ - 720936 - Windows guests may hang/BSOD on some AMD processors.
  • BZ - 720986 - vlapic: backport EOI fast path
  • BZ - 723755 - win2003 i386 guest BSOD when created with e1000 nic
  • BZ - 728508 - Huge performance regression in NFS client
  • BZ - 729261 - ext3/ext4 mbcache causes high CPU load
  • BZ - 732752 - exclude VMX_PROCBASED_CTL2 from the MSRs a VMX guest is allowed to access
  • BZ - 733416 - netfront MTU drops to 1500 after domain migration
  • BZ - 734708 - xen modules - unable to handle kernel NULL pointer dereference
  • BZ - 734900 - Panic, NMI Watchdog detected LOCKUP on CPU 6
  • BZ - 735477 - nfs4_getfacl decoding causes kernel oops
  • BZ - 740203 - Host crash when pass-through fails
  • BZ - 740299 - [RTC] - The ioctl RTC_IRPQ_READ doesn't return the correct value
  • BZ - 742880 - [RFE] backport Xen watchdog (hypervisor side only)
  • BZ - 752626 - BNX2I: Fixed the endian on TTT for NOP out transmission
  • BZ - 753729 - system cannot suspend with "stopping tasks timed out - bnx2i_thread/0 remaining"
  • BZ - 771592 - Install RHEV-H to virtual machine cause VM kernel panic when boot
  • BZ - 772578 - [ALL LANG] [anaconda] The installation halted when clicking 'Skip' button (select 'Skip entering Installation Number')

CVEs

  • CVE-2011-1083

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.8_Technical_Notes/kernel.html#RHSA-2012-0150
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-308.el5.src.rpm SHA-256: 96dcc6e82aa32fbe5da7e34fdc0f2e62f326d8a2b860d3817636af8dfa5a289a
x86_64
kernel-2.6.18-308.el5.x86_64.rpm SHA-256: 6b06b63d946abdb90d338d1fc671d1d7e7e64e4033ad213812b45dae310fd985
kernel-debug-2.6.18-308.el5.x86_64.rpm SHA-256: 7deafc36b45058643d960ef48d25ad30ef924aa7cc348f18ad1367dc2f7d4811
kernel-debug-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: 4f3e86f33bf6a72ad30e89d12370547a34a0ed4d93c862621cc9a4aba4c0bbba
kernel-debug-devel-2.6.18-308.el5.x86_64.rpm SHA-256: d5e273234dc8cfe65d2ffa27f7fdf0d2a7e8e7537058f235657cce0016a5ade7
kernel-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: 1530f25f5fb1e5f8b98d06fb442f5faecf769d50796e4c8de5c7575d2d63575f
kernel-debuginfo-common-2.6.18-308.el5.x86_64.rpm SHA-256: ec340d1ce42e5a182b821c28d8574ff7e8b3c39f526c921b19c9f5683899c571
kernel-devel-2.6.18-308.el5.x86_64.rpm SHA-256: 9751501de3b4bbd05850c8b429955a40a0128a4b7bb3100e12206c74827d42c0
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.x86_64.rpm SHA-256: 1f288fe2e3b93c706910ec20df8c463f6400d7fd80d9e3d157957fb1d8c3f651
kernel-xen-2.6.18-308.el5.x86_64.rpm SHA-256: 9d16e1c07349899a07169348cff872acecb4e408b3a34c25837615c380c405aa
kernel-xen-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: e815260b66aea51ed637153754efa577585bf4ba8cd23f65a02fb1b90ffe59f5
kernel-xen-devel-2.6.18-308.el5.x86_64.rpm SHA-256: 9ceca607dcb0507998fd606980fd7bb041c4acb7e257298731a929945a8b7ef6
ia64
kernel-2.6.18-308.el5.ia64.rpm SHA-256: 9455719f787e2b7731dae3dd22d50137e49ee9d757125b673ccfe12717eda7e0
kernel-debug-2.6.18-308.el5.ia64.rpm SHA-256: a0e6e146ab1e9bc07e35a8090f3dbca9ecf42270fa3c5d0fd2f4e1116b73d0c0
kernel-debug-debuginfo-2.6.18-308.el5.ia64.rpm SHA-256: 823741485f477bd3d7ce2e718ab1330eafb54853391393bc585cf04e8f303e9d
kernel-debug-devel-2.6.18-308.el5.ia64.rpm SHA-256: c5330d994f30bd6916677fc0ef9c80aaaaab417e55175632e972aa4293e06661
kernel-debuginfo-2.6.18-308.el5.ia64.rpm SHA-256: 78a257522588820b24bcc2d2a2103aac11d0ab875c7ef68a308ae421d0d7a653
kernel-debuginfo-common-2.6.18-308.el5.ia64.rpm SHA-256: 6bee219a603bbf1456eeca2e4fb612456046c937876d9f93a2144c082f4753c9
kernel-devel-2.6.18-308.el5.ia64.rpm SHA-256: 76b63a779aaf6081b7ec7041363ccb75e4055a0b090170772bcfeefe5245daef
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.ia64.rpm SHA-256: 9d95848096797c7a059a014f1de288a62d0d6d62837ef3ceecbe4d1cfb7d1181
kernel-xen-2.6.18-308.el5.ia64.rpm SHA-256: bb87c7ce02bebf2af0f741f656b18be2b653c4a3833eca1cc8d27dbfdd29e9bc
kernel-xen-debuginfo-2.6.18-308.el5.ia64.rpm SHA-256: cf54865fcc60dd84af80ff4f77a545ca9bcfdccce89b8f1659159dee5dc9058f
kernel-xen-devel-2.6.18-308.el5.ia64.rpm SHA-256: f794a8a1671d3b888f9886242a9325e3400e0e868e04108ea80bfd954492f63a
i386
kernel-2.6.18-308.el5.i686.rpm SHA-256: 26420ecaafd3bc79fa7be8b6bae44ce930d834a9710326eae586a9a734b0a61d
kernel-PAE-2.6.18-308.el5.i686.rpm SHA-256: 9fe47da810193b82dc24d498026a75546449e2902e2e898e557777672beae452
kernel-PAE-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 986f36743685f12253641c48202be55071f8afdea17bd8039881033f08e673e5
kernel-PAE-devel-2.6.18-308.el5.i686.rpm SHA-256: 2885c4d3c83b3fe86f6985a53d03d89c0708b86be367769877d77e0dbc17340a
kernel-debug-2.6.18-308.el5.i686.rpm SHA-256: d93285069f1cf92f6309d55154eb479f5a8266f459341b0d5a0bbac3b894f19e
kernel-debug-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 236095b0ced94f7cc296235cd06f67da3826c49e72d0ca2573cd9740739f6749
kernel-debug-devel-2.6.18-308.el5.i686.rpm SHA-256: a2268dee40b40b147b1cf78224875200d40e92032b33e9994cca4bcf78936503
kernel-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 0662ee4e10bc2f957853c746d8b4eaeb0842ba286fee875494647ba53c0fef9e
kernel-debuginfo-common-2.6.18-308.el5.i686.rpm SHA-256: 13e3e8e78fd8317344a3d300cfc9ec8a9a22f163d12eea2353c2d293a3bc2864
kernel-devel-2.6.18-308.el5.i686.rpm SHA-256: 15cefd6c764cd1694c4a958335135869db54fe0faeeedfb9059cdbd6be9a0c03
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.i386.rpm SHA-256: 7b7bc0c8e68354ee9a8b720cf0ca0573aae3e6343d40ea3f7064fbfd2f98a95c
kernel-xen-2.6.18-308.el5.i686.rpm SHA-256: 0a3d4d4a50ac0ecb862cf5d2a496e65f0e4d53b90d1542f621fb3a3f19a7232e
kernel-xen-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: bc2f7d91c759e7b601e1ff12fe3c91e97eacdbb4faf35bfa320d3160a231bb04
kernel-xen-devel-2.6.18-308.el5.i686.rpm SHA-256: 32dc5361133c537938881db91813a4c4e3ad7888ea9ad7b174c902c50c9e2d9e

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-308.el5.src.rpm SHA-256: 96dcc6e82aa32fbe5da7e34fdc0f2e62f326d8a2b860d3817636af8dfa5a289a
x86_64
kernel-2.6.18-308.el5.x86_64.rpm SHA-256: 6b06b63d946abdb90d338d1fc671d1d7e7e64e4033ad213812b45dae310fd985
kernel-debug-2.6.18-308.el5.x86_64.rpm SHA-256: 7deafc36b45058643d960ef48d25ad30ef924aa7cc348f18ad1367dc2f7d4811
kernel-debug-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: 4f3e86f33bf6a72ad30e89d12370547a34a0ed4d93c862621cc9a4aba4c0bbba
kernel-debug-devel-2.6.18-308.el5.x86_64.rpm SHA-256: d5e273234dc8cfe65d2ffa27f7fdf0d2a7e8e7537058f235657cce0016a5ade7
kernel-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: 1530f25f5fb1e5f8b98d06fb442f5faecf769d50796e4c8de5c7575d2d63575f
kernel-debuginfo-common-2.6.18-308.el5.x86_64.rpm SHA-256: ec340d1ce42e5a182b821c28d8574ff7e8b3c39f526c921b19c9f5683899c571
kernel-devel-2.6.18-308.el5.x86_64.rpm SHA-256: 9751501de3b4bbd05850c8b429955a40a0128a4b7bb3100e12206c74827d42c0
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.x86_64.rpm SHA-256: 1f288fe2e3b93c706910ec20df8c463f6400d7fd80d9e3d157957fb1d8c3f651
kernel-xen-2.6.18-308.el5.x86_64.rpm SHA-256: 9d16e1c07349899a07169348cff872acecb4e408b3a34c25837615c380c405aa
kernel-xen-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: e815260b66aea51ed637153754efa577585bf4ba8cd23f65a02fb1b90ffe59f5
kernel-xen-devel-2.6.18-308.el5.x86_64.rpm SHA-256: 9ceca607dcb0507998fd606980fd7bb041c4acb7e257298731a929945a8b7ef6
i386
kernel-2.6.18-308.el5.i686.rpm SHA-256: 26420ecaafd3bc79fa7be8b6bae44ce930d834a9710326eae586a9a734b0a61d
kernel-PAE-2.6.18-308.el5.i686.rpm SHA-256: 9fe47da810193b82dc24d498026a75546449e2902e2e898e557777672beae452
kernel-PAE-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 986f36743685f12253641c48202be55071f8afdea17bd8039881033f08e673e5
kernel-PAE-devel-2.6.18-308.el5.i686.rpm SHA-256: 2885c4d3c83b3fe86f6985a53d03d89c0708b86be367769877d77e0dbc17340a
kernel-debug-2.6.18-308.el5.i686.rpm SHA-256: d93285069f1cf92f6309d55154eb479f5a8266f459341b0d5a0bbac3b894f19e
kernel-debug-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 236095b0ced94f7cc296235cd06f67da3826c49e72d0ca2573cd9740739f6749
kernel-debug-devel-2.6.18-308.el5.i686.rpm SHA-256: a2268dee40b40b147b1cf78224875200d40e92032b33e9994cca4bcf78936503
kernel-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 0662ee4e10bc2f957853c746d8b4eaeb0842ba286fee875494647ba53c0fef9e
kernel-debuginfo-common-2.6.18-308.el5.i686.rpm SHA-256: 13e3e8e78fd8317344a3d300cfc9ec8a9a22f163d12eea2353c2d293a3bc2864
kernel-devel-2.6.18-308.el5.i686.rpm SHA-256: 15cefd6c764cd1694c4a958335135869db54fe0faeeedfb9059cdbd6be9a0c03
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.i386.rpm SHA-256: 7b7bc0c8e68354ee9a8b720cf0ca0573aae3e6343d40ea3f7064fbfd2f98a95c
kernel-xen-2.6.18-308.el5.i686.rpm SHA-256: 0a3d4d4a50ac0ecb862cf5d2a496e65f0e4d53b90d1542f621fb3a3f19a7232e
kernel-xen-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: bc2f7d91c759e7b601e1ff12fe3c91e97eacdbb4faf35bfa320d3160a231bb04
kernel-xen-devel-2.6.18-308.el5.i686.rpm SHA-256: 32dc5361133c537938881db91813a4c4e3ad7888ea9ad7b174c902c50c9e2d9e

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-308.el5.src.rpm SHA-256: 96dcc6e82aa32fbe5da7e34fdc0f2e62f326d8a2b860d3817636af8dfa5a289a
x86_64
kernel-2.6.18-308.el5.x86_64.rpm SHA-256: 6b06b63d946abdb90d338d1fc671d1d7e7e64e4033ad213812b45dae310fd985
kernel-debug-2.6.18-308.el5.x86_64.rpm SHA-256: 7deafc36b45058643d960ef48d25ad30ef924aa7cc348f18ad1367dc2f7d4811
kernel-debug-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: 4f3e86f33bf6a72ad30e89d12370547a34a0ed4d93c862621cc9a4aba4c0bbba
kernel-debug-devel-2.6.18-308.el5.x86_64.rpm SHA-256: d5e273234dc8cfe65d2ffa27f7fdf0d2a7e8e7537058f235657cce0016a5ade7
kernel-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: 1530f25f5fb1e5f8b98d06fb442f5faecf769d50796e4c8de5c7575d2d63575f
kernel-debuginfo-common-2.6.18-308.el5.x86_64.rpm SHA-256: ec340d1ce42e5a182b821c28d8574ff7e8b3c39f526c921b19c9f5683899c571
kernel-devel-2.6.18-308.el5.x86_64.rpm SHA-256: 9751501de3b4bbd05850c8b429955a40a0128a4b7bb3100e12206c74827d42c0
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.x86_64.rpm SHA-256: 1f288fe2e3b93c706910ec20df8c463f6400d7fd80d9e3d157957fb1d8c3f651
kernel-xen-2.6.18-308.el5.x86_64.rpm SHA-256: 9d16e1c07349899a07169348cff872acecb4e408b3a34c25837615c380c405aa
kernel-xen-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: e815260b66aea51ed637153754efa577585bf4ba8cd23f65a02fb1b90ffe59f5
kernel-xen-devel-2.6.18-308.el5.x86_64.rpm SHA-256: 9ceca607dcb0507998fd606980fd7bb041c4acb7e257298731a929945a8b7ef6
i386
kernel-2.6.18-308.el5.i686.rpm SHA-256: 26420ecaafd3bc79fa7be8b6bae44ce930d834a9710326eae586a9a734b0a61d
kernel-PAE-2.6.18-308.el5.i686.rpm SHA-256: 9fe47da810193b82dc24d498026a75546449e2902e2e898e557777672beae452
kernel-PAE-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 986f36743685f12253641c48202be55071f8afdea17bd8039881033f08e673e5
kernel-PAE-devel-2.6.18-308.el5.i686.rpm SHA-256: 2885c4d3c83b3fe86f6985a53d03d89c0708b86be367769877d77e0dbc17340a
kernel-debug-2.6.18-308.el5.i686.rpm SHA-256: d93285069f1cf92f6309d55154eb479f5a8266f459341b0d5a0bbac3b894f19e
kernel-debug-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 236095b0ced94f7cc296235cd06f67da3826c49e72d0ca2573cd9740739f6749
kernel-debug-devel-2.6.18-308.el5.i686.rpm SHA-256: a2268dee40b40b147b1cf78224875200d40e92032b33e9994cca4bcf78936503
kernel-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 0662ee4e10bc2f957853c746d8b4eaeb0842ba286fee875494647ba53c0fef9e
kernel-debuginfo-common-2.6.18-308.el5.i686.rpm SHA-256: 13e3e8e78fd8317344a3d300cfc9ec8a9a22f163d12eea2353c2d293a3bc2864
kernel-devel-2.6.18-308.el5.i686.rpm SHA-256: 15cefd6c764cd1694c4a958335135869db54fe0faeeedfb9059cdbd6be9a0c03
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.i386.rpm SHA-256: 7b7bc0c8e68354ee9a8b720cf0ca0573aae3e6343d40ea3f7064fbfd2f98a95c
kernel-xen-2.6.18-308.el5.i686.rpm SHA-256: 0a3d4d4a50ac0ecb862cf5d2a496e65f0e4d53b90d1542f621fb3a3f19a7232e
kernel-xen-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: bc2f7d91c759e7b601e1ff12fe3c91e97eacdbb4faf35bfa320d3160a231bb04
kernel-xen-devel-2.6.18-308.el5.i686.rpm SHA-256: 32dc5361133c537938881db91813a4c4e3ad7888ea9ad7b174c902c50c9e2d9e

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-308.el5.src.rpm SHA-256: 96dcc6e82aa32fbe5da7e34fdc0f2e62f326d8a2b860d3817636af8dfa5a289a
s390x
kernel-2.6.18-308.el5.s390x.rpm SHA-256: d34818b50c32552411d79fc819ee023a128ec0c6d9df509771844cb140cc7b97
kernel-debug-2.6.18-308.el5.s390x.rpm SHA-256: f09c149e8c8b55f25b85863bb43ce9c048197c030088b657f6414ac593650cb4
kernel-debug-debuginfo-2.6.18-308.el5.s390x.rpm SHA-256: ddeae259db90b76b7352f1440ac182b46fe7954b3814a6c9e5a5dd50bb74c83b
kernel-debug-devel-2.6.18-308.el5.s390x.rpm SHA-256: 0073fe67bec50b29b539759c4b0a07dd4f12bb3bd4467cff946ced8dbd84d373
kernel-debuginfo-2.6.18-308.el5.s390x.rpm SHA-256: 76becd210e4bd229a073f1b19e3890703d32a6b987d1294215ea9778673743d3
kernel-debuginfo-common-2.6.18-308.el5.s390x.rpm SHA-256: 240e96dfb039cfe1921237f9a5a8bcb7bcf01f8596e7d4b0296a2f16d56c06a1
kernel-devel-2.6.18-308.el5.s390x.rpm SHA-256: a190475c9d0dad2458d7e78a5ced44e66c14732cde25b00442d5199f537c1c3c
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.s390x.rpm SHA-256: ad34b60c3d874288b4f9c8e0a91ed1d41c1f0489a40b7394f7b9fbb902962f1a
kernel-kdump-2.6.18-308.el5.s390x.rpm SHA-256: 0058107c399ad5eadeb491be4dcacc5c202165970fe33a9ce6db4c4374834d72
kernel-kdump-debuginfo-2.6.18-308.el5.s390x.rpm SHA-256: 1945cc309e5565eda1085d3a2ca3510af2907de3542912308f3d9d51ebbbe4ed
kernel-kdump-devel-2.6.18-308.el5.s390x.rpm SHA-256: 7af6fc3bc5827789759ecfa3ae4d23c019bd9760cc7c41521a810ff64c571556

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-308.el5.src.rpm SHA-256: 96dcc6e82aa32fbe5da7e34fdc0f2e62f326d8a2b860d3817636af8dfa5a289a
ppc
kernel-2.6.18-308.el5.ppc64.rpm SHA-256: 184135014863ab38d1a2404a8b5107f52574a106d9dbfe82b88a58e31cb1e352
kernel-debug-2.6.18-308.el5.ppc64.rpm SHA-256: eff50abaa13aaf7ade025064798d8be42a2913f69a99fdd5b97678bac3426176
kernel-debug-debuginfo-2.6.18-308.el5.ppc64.rpm SHA-256: 8b3dd0531ceda3c2e8d28d43ea1666d67364d712fbae9704702630bf75e5e65f
kernel-debug-devel-2.6.18-308.el5.ppc64.rpm SHA-256: 2a46dbae4c3c6124e6bee171f6cb84cabd238faea41d7e10baaa9a07e1926764
kernel-debuginfo-2.6.18-308.el5.ppc64.rpm SHA-256: b86896d41bd03947c9bdaa25354b68fd1f689048b78c0ca27b6c1dc64e89191f
kernel-debuginfo-common-2.6.18-308.el5.ppc64.rpm SHA-256: a6e4c6506c83d549a0f3f34c63ae1153913ab17e566689efa377a8d1e3de5e80
kernel-devel-2.6.18-308.el5.ppc64.rpm SHA-256: 4aa758d817bb2e8f83205138ec1d306aa0f8d43c52429e87a7c08e9e7aa55081
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.ppc.rpm SHA-256: 522bb8a26955edc805d23535c23d5c32ca0b35433a4b582aa698c1f0b4af03e4
kernel-headers-2.6.18-308.el5.ppc64.rpm SHA-256: c7eb35c7b821a6dd4a7eedd7da0986225fca8dabb576422ad0d0609ce7779352
kernel-kdump-2.6.18-308.el5.ppc64.rpm SHA-256: c4467b0e95efb25e798ac6ae4f362f7ca128d8f3b433599c8dd381ebbcbfa43e
kernel-kdump-debuginfo-2.6.18-308.el5.ppc64.rpm SHA-256: 4b4610cd643e0250f78b8aeb89c73eb6b426bae190508cc8b4cc085ee12e13f6
kernel-kdump-devel-2.6.18-308.el5.ppc64.rpm SHA-256: af3e6c60296a03c8408c82679c6dd7fb28be43572d9eb509fc2100d91227060f

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-308.el5.src.rpm SHA-256: 96dcc6e82aa32fbe5da7e34fdc0f2e62f326d8a2b860d3817636af8dfa5a289a
x86_64
kernel-2.6.18-308.el5.x86_64.rpm SHA-256: 6b06b63d946abdb90d338d1fc671d1d7e7e64e4033ad213812b45dae310fd985
kernel-debug-2.6.18-308.el5.x86_64.rpm SHA-256: 7deafc36b45058643d960ef48d25ad30ef924aa7cc348f18ad1367dc2f7d4811
kernel-debug-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: 4f3e86f33bf6a72ad30e89d12370547a34a0ed4d93c862621cc9a4aba4c0bbba
kernel-debug-devel-2.6.18-308.el5.x86_64.rpm SHA-256: d5e273234dc8cfe65d2ffa27f7fdf0d2a7e8e7537058f235657cce0016a5ade7
kernel-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: 1530f25f5fb1e5f8b98d06fb442f5faecf769d50796e4c8de5c7575d2d63575f
kernel-debuginfo-common-2.6.18-308.el5.x86_64.rpm SHA-256: ec340d1ce42e5a182b821c28d8574ff7e8b3c39f526c921b19c9f5683899c571
kernel-devel-2.6.18-308.el5.x86_64.rpm SHA-256: 9751501de3b4bbd05850c8b429955a40a0128a4b7bb3100e12206c74827d42c0
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.x86_64.rpm SHA-256: 1f288fe2e3b93c706910ec20df8c463f6400d7fd80d9e3d157957fb1d8c3f651
kernel-xen-2.6.18-308.el5.x86_64.rpm SHA-256: 9d16e1c07349899a07169348cff872acecb4e408b3a34c25837615c380c405aa
kernel-xen-debuginfo-2.6.18-308.el5.x86_64.rpm SHA-256: e815260b66aea51ed637153754efa577585bf4ba8cd23f65a02fb1b90ffe59f5
kernel-xen-devel-2.6.18-308.el5.x86_64.rpm SHA-256: 9ceca607dcb0507998fd606980fd7bb041c4acb7e257298731a929945a8b7ef6
i386
kernel-2.6.18-308.el5.i686.rpm SHA-256: 26420ecaafd3bc79fa7be8b6bae44ce930d834a9710326eae586a9a734b0a61d
kernel-PAE-2.6.18-308.el5.i686.rpm SHA-256: 9fe47da810193b82dc24d498026a75546449e2902e2e898e557777672beae452
kernel-PAE-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 986f36743685f12253641c48202be55071f8afdea17bd8039881033f08e673e5
kernel-PAE-devel-2.6.18-308.el5.i686.rpm SHA-256: 2885c4d3c83b3fe86f6985a53d03d89c0708b86be367769877d77e0dbc17340a
kernel-debug-2.6.18-308.el5.i686.rpm SHA-256: d93285069f1cf92f6309d55154eb479f5a8266f459341b0d5a0bbac3b894f19e
kernel-debug-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 236095b0ced94f7cc296235cd06f67da3826c49e72d0ca2573cd9740739f6749
kernel-debug-devel-2.6.18-308.el5.i686.rpm SHA-256: a2268dee40b40b147b1cf78224875200d40e92032b33e9994cca4bcf78936503
kernel-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: 0662ee4e10bc2f957853c746d8b4eaeb0842ba286fee875494647ba53c0fef9e
kernel-debuginfo-common-2.6.18-308.el5.i686.rpm SHA-256: 13e3e8e78fd8317344a3d300cfc9ec8a9a22f163d12eea2353c2d293a3bc2864
kernel-devel-2.6.18-308.el5.i686.rpm SHA-256: 15cefd6c764cd1694c4a958335135869db54fe0faeeedfb9059cdbd6be9a0c03
kernel-doc-2.6.18-308.el5.noarch.rpm SHA-256: e7a415ecce8740546da2931ecf6cda7f681190fc6d382af234927c5f828e7a22
kernel-headers-2.6.18-308.el5.i386.rpm SHA-256: 7b7bc0c8e68354ee9a8b720cf0ca0573aae3e6343d40ea3f7064fbfd2f98a95c
kernel-xen-2.6.18-308.el5.i686.rpm SHA-256: 0a3d4d4a50ac0ecb862cf5d2a496e65f0e4d53b90d1542f621fb3a3f19a7232e
kernel-xen-debuginfo-2.6.18-308.el5.i686.rpm SHA-256: bc2f7d91c759e7b601e1ff12fe3c91e97eacdbb4faf35bfa320d3160a231bb04
kernel-xen-devel-2.6.18-308.el5.i686.rpm SHA-256: 32dc5361133c537938881db91813a4c4e3ad7888ea9ad7b174c902c50c9e2d9e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter