Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:0690 - Security Advisory
Issued:
2012-05-29
Updated:
2012-05-29

RHSA-2012:0690 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and various bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • It was found that the data_len parameter of the sock_alloc_send_pskb()

function in the Linux kernel's networking implementation was not validated
before use. A local user with access to a TUN/TAP virtual interface could
use this flaw to crash the system or, potentially, escalate their
privileges. Note that unprivileged users cannot access TUN/TAP devices
until the root user grants them access. (CVE-2012-2136, Important)

This update also fixes various bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct this issue, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 816289 - CVE-2012-2136 kernel: net: insufficient data_len validation in sock_alloc_send_pskb()

CVEs

  • CVE-2012-2136

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.8_Technical_Notes/kernel.html#RHSA-2012-0690
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-308.8.1.el5.src.rpm SHA-256: 737ba9517223f7855e5cd974fb01caee3c81e363115421a29f81c29402050c6e
x86_64
kernel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 66268d5e26c23870d5d15bd0b712af7da6444815387441f2f14ba9e194003bb6
kernel-debug-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: c99f887d2be421bdecb0284d93e7d3ed9e771de235ef1858d412b97a6cae2531
kernel-debug-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 89f9ba4ce2b91c73e8fd48b5c43c6ec8873e8dbf17e9cb87d473c6b8effb9b48
kernel-debug-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 7d41971da945d5d07607e4542590847a84a1065c8083e07bc7658085242378ba
kernel-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 6833d0054ee9a22d3a5246762b71d44dd834beb6eb5cea83925d49e3fbc9abb0
kernel-debuginfo-common-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 77ad3e794e620ba5ee92f58c52c8fa710340d29de4f213af81238e204f289b0e
kernel-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: ae018e70665531d8714e4ba60852d06b82cbd4ca2b4399a1c0d512f081cc9b3b
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: da6c4d6c6069225fcbbb287239bd418f5826bae401960af510ff53220c100eb7
kernel-xen-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 88cbfe37583f12f51fe64fcd17efe2d4089f02b840680413a8482e7f99784f15
kernel-xen-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 40ee7beb00810d8bd1ead598506d557404316452278450807111472305754171
kernel-xen-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: babd6c57b6840008b2adfe4204c6bc12b2d7d5934ae0e176c0e5edd3a2df12e8
ia64
kernel-2.6.18-308.8.1.el5.ia64.rpm SHA-256: 9ecf6ee247d97e5bf3ba752fe448f03da3b2518044cd04030001f05d7ada5791
kernel-debug-2.6.18-308.8.1.el5.ia64.rpm SHA-256: d11c2815ac1ded4a3813aaa335ae80e50242b12b4fa6820a63f164a46a2eefa0
kernel-debug-debuginfo-2.6.18-308.8.1.el5.ia64.rpm SHA-256: c532c8b86068542559f32ff594a8bb34a7a619d4b32a056db868d5145c9f2ad0
kernel-debug-devel-2.6.18-308.8.1.el5.ia64.rpm SHA-256: e3fc59122a71e1df08703fc3b5b3f5c4d83d0daffd4bbe600561a381d041269a
kernel-debuginfo-2.6.18-308.8.1.el5.ia64.rpm SHA-256: a411d7f804bf3ab88458fdf0b0d726e3b2a74caad19f7f3a9c80cdf4dedba1ec
kernel-debuginfo-common-2.6.18-308.8.1.el5.ia64.rpm SHA-256: 217968bc8555a38bf5faa7781db5fd4f23dde7fd87ace99ac0c397f0a383a93d
kernel-devel-2.6.18-308.8.1.el5.ia64.rpm SHA-256: 7d7c77a4f7ff62ee2dea1b28ea1fe8da37cd3c6de56d99360820c297e9f4f9ba
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.ia64.rpm SHA-256: b33230df9b703ef3932d5503d52f2888b50c12dc882fc73b1fbd507c2e6b6a66
kernel-xen-2.6.18-308.8.1.el5.ia64.rpm SHA-256: 78605aaedf5cca8dffa912c60e470967b9066d3b0670d7f5991b456b8add5d35
kernel-xen-debuginfo-2.6.18-308.8.1.el5.ia64.rpm SHA-256: f9c72e64a1ee90bf6922979e9a9106d6566994495e90d79ab121e8e9ad6f02d8
kernel-xen-devel-2.6.18-308.8.1.el5.ia64.rpm SHA-256: 705634c8ef3a9292fe1ac4a619ff1b77e44c1838d7177761ef441aea50af1d1c
i386
kernel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 32ffaf21b3b564c274b3d88366fd66c7d08e166c82277e1ac4ab9bac1b46a486
kernel-PAE-2.6.18-308.8.1.el5.i686.rpm SHA-256: 484ed5bf8014fc4cf5891bd2a1e5b5dc822bc395ef681c84f2e744a5304a897e
kernel-PAE-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: 1c37bce95d0c37746a24ecf4ca86ff4473055625084127cbb3ba328fc80ba229
kernel-PAE-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: fe03056f45365da870364fd5c71697d253a847bad3c612a7e09860416ab07ef5
kernel-debug-2.6.18-308.8.1.el5.i686.rpm SHA-256: e03634044e67bee50c3f2680e27616008494752e3bc1a0f96655466e327ecdb1
kernel-debug-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: 548a8cad529e4a6fa9c3e3a99e1796e96a594ac06613c23b80efcf1fbf06af24
kernel-debug-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 2ef4dadf3282533f361787dfe6fdb1d3da8e2506d95e0c42126a312dda8c41f7
kernel-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: b6ee4005e9ef4d8553ae195c8a3a66484a1f95434e11943592e3d52fc2a31052
kernel-debuginfo-common-2.6.18-308.8.1.el5.i686.rpm SHA-256: df9efe32a7429d5f58b4bbe99cd99ba0ea9ec449104e48bdf7e440a738e9c41b
kernel-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 0ec4627c77f2bb6043cbee640976fc57e7e8a543061912375141b96923758c4d
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.i386.rpm SHA-256: 6c03345664e0f05c15534a58d7b04bdd88a24b24e3f9a190717de4b681b12828
kernel-xen-2.6.18-308.8.1.el5.i686.rpm SHA-256: 0f4bb9e3e5d97a8eddf789edcf3173e8e0369ab8890b35062d4015a18a9e269d
kernel-xen-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: bffe244f0d249f524da09737df178c45a80e656bf8724c83d9173ddc74db5d8f
kernel-xen-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 2fa5205560ee482ec274ff137a943889f36a2ca2c7fde2529424de98a4315351

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-308.8.1.el5.src.rpm SHA-256: 737ba9517223f7855e5cd974fb01caee3c81e363115421a29f81c29402050c6e
x86_64
kernel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 66268d5e26c23870d5d15bd0b712af7da6444815387441f2f14ba9e194003bb6
kernel-debug-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: c99f887d2be421bdecb0284d93e7d3ed9e771de235ef1858d412b97a6cae2531
kernel-debug-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 89f9ba4ce2b91c73e8fd48b5c43c6ec8873e8dbf17e9cb87d473c6b8effb9b48
kernel-debug-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 7d41971da945d5d07607e4542590847a84a1065c8083e07bc7658085242378ba
kernel-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 6833d0054ee9a22d3a5246762b71d44dd834beb6eb5cea83925d49e3fbc9abb0
kernel-debuginfo-common-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 77ad3e794e620ba5ee92f58c52c8fa710340d29de4f213af81238e204f289b0e
kernel-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: ae018e70665531d8714e4ba60852d06b82cbd4ca2b4399a1c0d512f081cc9b3b
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: da6c4d6c6069225fcbbb287239bd418f5826bae401960af510ff53220c100eb7
kernel-xen-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 88cbfe37583f12f51fe64fcd17efe2d4089f02b840680413a8482e7f99784f15
kernel-xen-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 40ee7beb00810d8bd1ead598506d557404316452278450807111472305754171
kernel-xen-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: babd6c57b6840008b2adfe4204c6bc12b2d7d5934ae0e176c0e5edd3a2df12e8
i386
kernel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 32ffaf21b3b564c274b3d88366fd66c7d08e166c82277e1ac4ab9bac1b46a486
kernel-PAE-2.6.18-308.8.1.el5.i686.rpm SHA-256: 484ed5bf8014fc4cf5891bd2a1e5b5dc822bc395ef681c84f2e744a5304a897e
kernel-PAE-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: 1c37bce95d0c37746a24ecf4ca86ff4473055625084127cbb3ba328fc80ba229
kernel-PAE-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: fe03056f45365da870364fd5c71697d253a847bad3c612a7e09860416ab07ef5
kernel-debug-2.6.18-308.8.1.el5.i686.rpm SHA-256: e03634044e67bee50c3f2680e27616008494752e3bc1a0f96655466e327ecdb1
kernel-debug-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: 548a8cad529e4a6fa9c3e3a99e1796e96a594ac06613c23b80efcf1fbf06af24
kernel-debug-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 2ef4dadf3282533f361787dfe6fdb1d3da8e2506d95e0c42126a312dda8c41f7
kernel-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: b6ee4005e9ef4d8553ae195c8a3a66484a1f95434e11943592e3d52fc2a31052
kernel-debuginfo-common-2.6.18-308.8.1.el5.i686.rpm SHA-256: df9efe32a7429d5f58b4bbe99cd99ba0ea9ec449104e48bdf7e440a738e9c41b
kernel-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 0ec4627c77f2bb6043cbee640976fc57e7e8a543061912375141b96923758c4d
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.i386.rpm SHA-256: 6c03345664e0f05c15534a58d7b04bdd88a24b24e3f9a190717de4b681b12828
kernel-xen-2.6.18-308.8.1.el5.i686.rpm SHA-256: 0f4bb9e3e5d97a8eddf789edcf3173e8e0369ab8890b35062d4015a18a9e269d
kernel-xen-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: bffe244f0d249f524da09737df178c45a80e656bf8724c83d9173ddc74db5d8f
kernel-xen-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 2fa5205560ee482ec274ff137a943889f36a2ca2c7fde2529424de98a4315351

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-308.8.1.el5.src.rpm SHA-256: 737ba9517223f7855e5cd974fb01caee3c81e363115421a29f81c29402050c6e
x86_64
kernel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 66268d5e26c23870d5d15bd0b712af7da6444815387441f2f14ba9e194003bb6
kernel-debug-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: c99f887d2be421bdecb0284d93e7d3ed9e771de235ef1858d412b97a6cae2531
kernel-debug-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 89f9ba4ce2b91c73e8fd48b5c43c6ec8873e8dbf17e9cb87d473c6b8effb9b48
kernel-debug-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 7d41971da945d5d07607e4542590847a84a1065c8083e07bc7658085242378ba
kernel-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 6833d0054ee9a22d3a5246762b71d44dd834beb6eb5cea83925d49e3fbc9abb0
kernel-debuginfo-common-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 77ad3e794e620ba5ee92f58c52c8fa710340d29de4f213af81238e204f289b0e
kernel-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: ae018e70665531d8714e4ba60852d06b82cbd4ca2b4399a1c0d512f081cc9b3b
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: da6c4d6c6069225fcbbb287239bd418f5826bae401960af510ff53220c100eb7
kernel-xen-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 88cbfe37583f12f51fe64fcd17efe2d4089f02b840680413a8482e7f99784f15
kernel-xen-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 40ee7beb00810d8bd1ead598506d557404316452278450807111472305754171
kernel-xen-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: babd6c57b6840008b2adfe4204c6bc12b2d7d5934ae0e176c0e5edd3a2df12e8
i386
kernel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 32ffaf21b3b564c274b3d88366fd66c7d08e166c82277e1ac4ab9bac1b46a486
kernel-PAE-2.6.18-308.8.1.el5.i686.rpm SHA-256: 484ed5bf8014fc4cf5891bd2a1e5b5dc822bc395ef681c84f2e744a5304a897e
kernel-PAE-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: 1c37bce95d0c37746a24ecf4ca86ff4473055625084127cbb3ba328fc80ba229
kernel-PAE-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: fe03056f45365da870364fd5c71697d253a847bad3c612a7e09860416ab07ef5
kernel-debug-2.6.18-308.8.1.el5.i686.rpm SHA-256: e03634044e67bee50c3f2680e27616008494752e3bc1a0f96655466e327ecdb1
kernel-debug-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: 548a8cad529e4a6fa9c3e3a99e1796e96a594ac06613c23b80efcf1fbf06af24
kernel-debug-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 2ef4dadf3282533f361787dfe6fdb1d3da8e2506d95e0c42126a312dda8c41f7
kernel-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: b6ee4005e9ef4d8553ae195c8a3a66484a1f95434e11943592e3d52fc2a31052
kernel-debuginfo-common-2.6.18-308.8.1.el5.i686.rpm SHA-256: df9efe32a7429d5f58b4bbe99cd99ba0ea9ec449104e48bdf7e440a738e9c41b
kernel-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 0ec4627c77f2bb6043cbee640976fc57e7e8a543061912375141b96923758c4d
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.i386.rpm SHA-256: 6c03345664e0f05c15534a58d7b04bdd88a24b24e3f9a190717de4b681b12828
kernel-xen-2.6.18-308.8.1.el5.i686.rpm SHA-256: 0f4bb9e3e5d97a8eddf789edcf3173e8e0369ab8890b35062d4015a18a9e269d
kernel-xen-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: bffe244f0d249f524da09737df178c45a80e656bf8724c83d9173ddc74db5d8f
kernel-xen-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 2fa5205560ee482ec274ff137a943889f36a2ca2c7fde2529424de98a4315351

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-308.8.1.el5.src.rpm SHA-256: 737ba9517223f7855e5cd974fb01caee3c81e363115421a29f81c29402050c6e
s390x
kernel-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 9383a6f87c88fb5387d53509d72c1e2ba518fe5c395def6df0dde1d848fa616e
kernel-debug-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 86951df5e8f33e1db7c24cbf722c7a76b9acc14d385e69a6ed813cb1388eebb3
kernel-debug-debuginfo-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 43a8e0914f852289e7fb607e69208468584c92bf14f1aba42ee029622b8c53c0
kernel-debug-devel-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 4149c84beb7ed409a8f2218c913eca710c358e5582606179108524d7ec39b4f1
kernel-debuginfo-2.6.18-308.8.1.el5.s390x.rpm SHA-256: dc84c92f3ae84c4d6f696abffca39cc2ba7e06f634fa5cd10c6f77c456dbf7c7
kernel-debuginfo-common-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 305db40285374f3b7f24bfef2c2da586873b6dc70a42f9f4d96da2e487c38c18
kernel-devel-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 7f4dc4eacb3371aebf39430605fce7d0094f9154e788580ca4ff4db500b7b447
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 2bf3b0704f90aea82c54a77f2a302f7986be5dd4e1d10a5093ce1ad518b03b8b
kernel-kdump-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 1ef0de9399a7efcc40e2a0318215bd28776e7db8a6012ae6a8624fba269a4e8b
kernel-kdump-debuginfo-2.6.18-308.8.1.el5.s390x.rpm SHA-256: 47f36588345f3077f657310c50a4c42a649e9154073f0c8136a6cefe55d90faa
kernel-kdump-devel-2.6.18-308.8.1.el5.s390x.rpm SHA-256: e1a4ca4c64f8fc1ff021116b8eda893f4c1e355551a681a353109bd1e91d5937

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-308.8.1.el5.src.rpm SHA-256: 737ba9517223f7855e5cd974fb01caee3c81e363115421a29f81c29402050c6e
ppc
kernel-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: f352f5da28312af7542c861420ea1bf8b217ef23de1662482a57bc90a5b4e578
kernel-debug-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: 65ecc01b9d39c451c8a97cd657a1032c1206f1c20e1402d0abb7f79192e06bab
kernel-debug-debuginfo-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: 301ce6dccbdb1ec914362671d4579311d68f340ebe9bc6a6ad6abd2b70f9d08f
kernel-debug-devel-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: 80e2bbfbee9817df58cffb78179aad497de2f9607715af3feba35a0a607652ca
kernel-debuginfo-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: 5f4c0fee024e19f325d919ae5902124197e38c90dfe2a3696a20b6b5185075fd
kernel-debuginfo-common-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: c68509a0833a9ce30464bf55bfeaa3da5598955bf632dae8de9dd996af914773
kernel-devel-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: fa1c036e8c9a966e8a98fd960c5af7c1ff3d7e3f31a8d0690a1dbd7e83c7304e
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.ppc.rpm SHA-256: ac1f554568296889c0f393dcec276658dee57f2a11cdd2b715adac04d1fb367e
kernel-headers-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: e695cc8ca7e8a930b5ab1d1b6a2a91d8b0e1bf517f3fd303dad3b9d9da776cf3
kernel-kdump-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: fee714959b47634f33cbe072c8eea698e3c63a5fb118ba35346c11425cc2d7ef
kernel-kdump-debuginfo-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: 9d61509ad3b45e9e5511555220c0d12a048efa80d9d1b3d61b957c803862ad51
kernel-kdump-devel-2.6.18-308.8.1.el5.ppc64.rpm SHA-256: 9ac3a0b48f25f0687f8f2aa8c7116b2bbac9b40a92f8b09d231fa8405f7b76d4

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-308.8.1.el5.src.rpm SHA-256: 737ba9517223f7855e5cd974fb01caee3c81e363115421a29f81c29402050c6e
x86_64
kernel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 66268d5e26c23870d5d15bd0b712af7da6444815387441f2f14ba9e194003bb6
kernel-debug-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: c99f887d2be421bdecb0284d93e7d3ed9e771de235ef1858d412b97a6cae2531
kernel-debug-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 89f9ba4ce2b91c73e8fd48b5c43c6ec8873e8dbf17e9cb87d473c6b8effb9b48
kernel-debug-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 7d41971da945d5d07607e4542590847a84a1065c8083e07bc7658085242378ba
kernel-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 6833d0054ee9a22d3a5246762b71d44dd834beb6eb5cea83925d49e3fbc9abb0
kernel-debuginfo-common-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 77ad3e794e620ba5ee92f58c52c8fa710340d29de4f213af81238e204f289b0e
kernel-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: ae018e70665531d8714e4ba60852d06b82cbd4ca2b4399a1c0d512f081cc9b3b
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: da6c4d6c6069225fcbbb287239bd418f5826bae401960af510ff53220c100eb7
kernel-xen-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 88cbfe37583f12f51fe64fcd17efe2d4089f02b840680413a8482e7f99784f15
kernel-xen-debuginfo-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: 40ee7beb00810d8bd1ead598506d557404316452278450807111472305754171
kernel-xen-devel-2.6.18-308.8.1.el5.x86_64.rpm SHA-256: babd6c57b6840008b2adfe4204c6bc12b2d7d5934ae0e176c0e5edd3a2df12e8
i386
kernel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 32ffaf21b3b564c274b3d88366fd66c7d08e166c82277e1ac4ab9bac1b46a486
kernel-PAE-2.6.18-308.8.1.el5.i686.rpm SHA-256: 484ed5bf8014fc4cf5891bd2a1e5b5dc822bc395ef681c84f2e744a5304a897e
kernel-PAE-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: 1c37bce95d0c37746a24ecf4ca86ff4473055625084127cbb3ba328fc80ba229
kernel-PAE-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: fe03056f45365da870364fd5c71697d253a847bad3c612a7e09860416ab07ef5
kernel-debug-2.6.18-308.8.1.el5.i686.rpm SHA-256: e03634044e67bee50c3f2680e27616008494752e3bc1a0f96655466e327ecdb1
kernel-debug-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: 548a8cad529e4a6fa9c3e3a99e1796e96a594ac06613c23b80efcf1fbf06af24
kernel-debug-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 2ef4dadf3282533f361787dfe6fdb1d3da8e2506d95e0c42126a312dda8c41f7
kernel-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: b6ee4005e9ef4d8553ae195c8a3a66484a1f95434e11943592e3d52fc2a31052
kernel-debuginfo-common-2.6.18-308.8.1.el5.i686.rpm SHA-256: df9efe32a7429d5f58b4bbe99cd99ba0ea9ec449104e48bdf7e440a738e9c41b
kernel-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 0ec4627c77f2bb6043cbee640976fc57e7e8a543061912375141b96923758c4d
kernel-doc-2.6.18-308.8.1.el5.noarch.rpm SHA-256: 5dc9070674f286690fecf0262fe1dfefe8cdd95a6f2a49dfcde7f9240528dc8f
kernel-headers-2.6.18-308.8.1.el5.i386.rpm SHA-256: 6c03345664e0f05c15534a58d7b04bdd88a24b24e3f9a190717de4b681b12828
kernel-xen-2.6.18-308.8.1.el5.i686.rpm SHA-256: 0f4bb9e3e5d97a8eddf789edcf3173e8e0369ab8890b35062d4015a18a9e269d
kernel-xen-debuginfo-2.6.18-308.8.1.el5.i686.rpm SHA-256: bffe244f0d249f524da09737df178c45a80e656bf8724c83d9173ddc74db5d8f
kernel-xen-devel-2.6.18-308.8.1.el5.i686.rpm SHA-256: 2fa5205560ee482ec274ff137a943889f36a2ca2c7fde2529424de98a4315351

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter