Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:0721 - Security Advisory
Issued:
2012-06-12
Updated:
2012-06-12

RHSA-2012:0721 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • It was found that the Xen hypervisor implementation as shipped with Red

Hat Enterprise Linux 5 did not properly restrict the syscall return
addresses in the sysret return path to canonical addresses. An unprivileged
user in a 64-bit para-virtualized guest, that is running on a 64-bit host
that has an Intel CPU, could use this flaw to crash the host or,
potentially, escalate their privileges, allowing them to execute arbitrary
code at the hypervisor level. (CVE-2012-0217, Important)

  • It was found that guests could trigger a bug in earlier AMD CPUs, leading

to a CPU hard lockup, when running on the Xen hypervisor implementation. An
unprivileged user in a 64-bit para-virtualized guest could use this flaw to
crash the host. Warning: After installing this update, hosts that are using
an affected AMD CPU (refer to Red Hat Bugzilla bug #824966 for a list) will
fail to boot. In order to boot such hosts, the new kernel parameter,
allow_unsafe, can be used ("allow_unsafe=on"). This option should only be
used with hosts that are running trusted guests, as setting it to "on"
reintroduces the flaw (allowing guests to crash the host). (CVE-2012-2934,
Moderate)

Note: For Red Hat Enterprise Linux guests, only privileged guest users can
exploit the CVE-2012-0217 and CVE-2012-2934 issues.

Red Hat would like to thank the Xen project for reporting these issues.
Upstream acknowledges Rafal Wojtczuk as the original reporter of
CVE-2012-0217.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 813428 - CVE-2012-0217 kernel: x86-64: avoid sysret to non-canonical address
  • BZ - 824966 - CVE-2012-2934 kernel: denial of service due to AMD Erratum #121

CVEs

  • CVE-2012-2934
  • CVE-2012-0217

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://bugzilla.redhat.com/show_bug.cgi?id=824966
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-308.8.2.el5.src.rpm SHA-256: 21d14efaef51fd14681c3eeda9713bec2f6bd523a33328d2ed804405e87a1be5
x86_64
kernel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: ac9b9ef922abc95f64a55d447b6a01617757e89c7536c48c4b2d72e51762648c
kernel-debug-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 5e0d5e2ede09ade763765e2a7bb71bdd9436df1fb9a3782cabdac3127fdab468
kernel-debug-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: fba8c25cda5da8fc4d849c8b82c882ad146a09cda20a4d1da194d37e19e59c3a
kernel-debug-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 0fb1672e4f0e791b03f757077b183b60d452596de4f238a412ea590852faee1a
kernel-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: d49607ce3894322c4364d2bbd9aa1053724e1c1c565fdcd82a99443043521164
kernel-debuginfo-common-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: f12abf795366dbb18c51a0a84809aa3305af04d7813ff615973c58dcb2fde7c1
kernel-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 2b9c0313a0c6285ec8b74b3c5f555d8febb27354561cbcc6df39efccfc5e36e2
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 52cdb662da0a0b2831b983bc0c5640d4c1b9af654024e60aa7b69443461b4f80
kernel-xen-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 49ec4bd238582aeaef6dadc3811b196efbc4947e85ea5b835f9034e2eade19e4
kernel-xen-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: d900e2208e8df73d625b933d382f00d8d26eb36b7c05aed2338957f0a0edc310
kernel-xen-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 8c08f903c9ec6c0c3cba80f1f2f9c05932f5f68b6de5871f6226914b24f89c0f
ia64
kernel-2.6.18-308.8.2.el5.ia64.rpm SHA-256: 3e1e5458a7930c0d57a854ec0db25a8988452273c9853443f68a94fb3e304b53
kernel-debug-2.6.18-308.8.2.el5.ia64.rpm SHA-256: b94bcd3d6aed790351842cf4fae0cf52cb8ab3b33546e98ab7aa795098f05269
kernel-debug-debuginfo-2.6.18-308.8.2.el5.ia64.rpm SHA-256: 15a645e988a78e280a4472d5a529f0cb352117dd7c7ea12e6308b2fd49d5816d
kernel-debug-devel-2.6.18-308.8.2.el5.ia64.rpm SHA-256: 934d4430aa84bdedd3485f3bd147553b4b313b350165107d48336b5f7c0944d2
kernel-debuginfo-2.6.18-308.8.2.el5.ia64.rpm SHA-256: cf8241effdb9a2bbe0f79edc8de1fe9a9c15774c02385145ecc4cd41318b480c
kernel-debuginfo-common-2.6.18-308.8.2.el5.ia64.rpm SHA-256: 0dc425d100235b6839e65c80c91aca6e2099d6a3c732baa0e1822ceaa7612fc7
kernel-devel-2.6.18-308.8.2.el5.ia64.rpm SHA-256: 9ffe2f2b5e697642a4284511877373bf690156428b11edf2bf8b9c9fbadb85ef
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.ia64.rpm SHA-256: f458e3011101a890fc653c2ddbdfcaa1aa1c698b5bda2d4ce325be1cf1d23921
kernel-xen-2.6.18-308.8.2.el5.ia64.rpm SHA-256: 468958476a5f5f834729df5aed5a2f05a3160d90f188ac519e005755741798a1
kernel-xen-debuginfo-2.6.18-308.8.2.el5.ia64.rpm SHA-256: 8962eda5b4a9a238a5897dd8575f7e5c09daa1f700238dafc09e47c1b4755c69
kernel-xen-devel-2.6.18-308.8.2.el5.ia64.rpm SHA-256: 574eb2cb5eb59ba6b9a379cfb3c6f287c019b87b3ddc36a9a7130ece49fa1105
i386
kernel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 897762bcd031135aa0669edb8346ffcc3751d7365271f30af353e4847e915444
kernel-PAE-2.6.18-308.8.2.el5.i686.rpm SHA-256: f17e3e0360ca406b051d098d072b78d85983c3ac2c78b7312f262b11873a8dcf
kernel-PAE-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: b52b0e9e869bfa27e52eea2c9ae4ef7546fcb90db066a9ba56102245a07c9027
kernel-PAE-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 5ef65e0b934ec7437772d6a2fd7b3e672c5eb652caab14b00809d6dafe3f617c
kernel-debug-2.6.18-308.8.2.el5.i686.rpm SHA-256: 10434df7d2b3b8cb16200c71f7a922cc9d2a2d54d341158d1e30bc3c4d389da1
kernel-debug-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: f7dce680fa16ad773b717153e90deef5b2ee8ea3ae71095112dc48b4f301ee1f
kernel-debug-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: ca04a3956a88cc931253737f3fec5166f191efa9532eb1f9e13712c220ad88e8
kernel-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: 00861d72106abf37ff0d0c5ee590554120b935d0597ca255fac6609da6dc0261
kernel-debuginfo-common-2.6.18-308.8.2.el5.i686.rpm SHA-256: f15d2c911c5ce1098f70d377d844db3a120905a7d8493b6d8a31205ceb4440ea
kernel-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 71554ceae50874026d5edbd8edd44fe4eae184950dd98c53162d0c6fe1f961ad
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.i386.rpm SHA-256: e7a44875bff0f15d0cd8a48a4af3fd65bebed5fb72d0ee9ea462d94206ce1e9d
kernel-xen-2.6.18-308.8.2.el5.i686.rpm SHA-256: f9e8bc102ec75836048bc6ee49131aa217e737d4c66671b1b924a83b403f69f8
kernel-xen-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: 56e3122643c2ad71b0fb96e7341abf78be8428c7be506b06c0bb0c9e7bea68a2
kernel-xen-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: e83edb26cd8ee98e37cdd14a7344fde5b2d479e7f0d38ac060f9cdc560914e14

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-308.8.2.el5.src.rpm SHA-256: 21d14efaef51fd14681c3eeda9713bec2f6bd523a33328d2ed804405e87a1be5
x86_64
kernel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: ac9b9ef922abc95f64a55d447b6a01617757e89c7536c48c4b2d72e51762648c
kernel-debug-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 5e0d5e2ede09ade763765e2a7bb71bdd9436df1fb9a3782cabdac3127fdab468
kernel-debug-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: fba8c25cda5da8fc4d849c8b82c882ad146a09cda20a4d1da194d37e19e59c3a
kernel-debug-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 0fb1672e4f0e791b03f757077b183b60d452596de4f238a412ea590852faee1a
kernel-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: d49607ce3894322c4364d2bbd9aa1053724e1c1c565fdcd82a99443043521164
kernel-debuginfo-common-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: f12abf795366dbb18c51a0a84809aa3305af04d7813ff615973c58dcb2fde7c1
kernel-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 2b9c0313a0c6285ec8b74b3c5f555d8febb27354561cbcc6df39efccfc5e36e2
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 52cdb662da0a0b2831b983bc0c5640d4c1b9af654024e60aa7b69443461b4f80
kernel-xen-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 49ec4bd238582aeaef6dadc3811b196efbc4947e85ea5b835f9034e2eade19e4
kernel-xen-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: d900e2208e8df73d625b933d382f00d8d26eb36b7c05aed2338957f0a0edc310
kernel-xen-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 8c08f903c9ec6c0c3cba80f1f2f9c05932f5f68b6de5871f6226914b24f89c0f
i386
kernel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 897762bcd031135aa0669edb8346ffcc3751d7365271f30af353e4847e915444
kernel-PAE-2.6.18-308.8.2.el5.i686.rpm SHA-256: f17e3e0360ca406b051d098d072b78d85983c3ac2c78b7312f262b11873a8dcf
kernel-PAE-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: b52b0e9e869bfa27e52eea2c9ae4ef7546fcb90db066a9ba56102245a07c9027
kernel-PAE-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 5ef65e0b934ec7437772d6a2fd7b3e672c5eb652caab14b00809d6dafe3f617c
kernel-debug-2.6.18-308.8.2.el5.i686.rpm SHA-256: 10434df7d2b3b8cb16200c71f7a922cc9d2a2d54d341158d1e30bc3c4d389da1
kernel-debug-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: f7dce680fa16ad773b717153e90deef5b2ee8ea3ae71095112dc48b4f301ee1f
kernel-debug-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: ca04a3956a88cc931253737f3fec5166f191efa9532eb1f9e13712c220ad88e8
kernel-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: 00861d72106abf37ff0d0c5ee590554120b935d0597ca255fac6609da6dc0261
kernel-debuginfo-common-2.6.18-308.8.2.el5.i686.rpm SHA-256: f15d2c911c5ce1098f70d377d844db3a120905a7d8493b6d8a31205ceb4440ea
kernel-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 71554ceae50874026d5edbd8edd44fe4eae184950dd98c53162d0c6fe1f961ad
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.i386.rpm SHA-256: e7a44875bff0f15d0cd8a48a4af3fd65bebed5fb72d0ee9ea462d94206ce1e9d
kernel-xen-2.6.18-308.8.2.el5.i686.rpm SHA-256: f9e8bc102ec75836048bc6ee49131aa217e737d4c66671b1b924a83b403f69f8
kernel-xen-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: 56e3122643c2ad71b0fb96e7341abf78be8428c7be506b06c0bb0c9e7bea68a2
kernel-xen-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: e83edb26cd8ee98e37cdd14a7344fde5b2d479e7f0d38ac060f9cdc560914e14

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-308.8.2.el5.src.rpm SHA-256: 21d14efaef51fd14681c3eeda9713bec2f6bd523a33328d2ed804405e87a1be5
x86_64
kernel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: ac9b9ef922abc95f64a55d447b6a01617757e89c7536c48c4b2d72e51762648c
kernel-debug-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 5e0d5e2ede09ade763765e2a7bb71bdd9436df1fb9a3782cabdac3127fdab468
kernel-debug-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: fba8c25cda5da8fc4d849c8b82c882ad146a09cda20a4d1da194d37e19e59c3a
kernel-debug-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 0fb1672e4f0e791b03f757077b183b60d452596de4f238a412ea590852faee1a
kernel-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: d49607ce3894322c4364d2bbd9aa1053724e1c1c565fdcd82a99443043521164
kernel-debuginfo-common-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: f12abf795366dbb18c51a0a84809aa3305af04d7813ff615973c58dcb2fde7c1
kernel-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 2b9c0313a0c6285ec8b74b3c5f555d8febb27354561cbcc6df39efccfc5e36e2
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 52cdb662da0a0b2831b983bc0c5640d4c1b9af654024e60aa7b69443461b4f80
kernel-xen-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 49ec4bd238582aeaef6dadc3811b196efbc4947e85ea5b835f9034e2eade19e4
kernel-xen-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: d900e2208e8df73d625b933d382f00d8d26eb36b7c05aed2338957f0a0edc310
kernel-xen-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 8c08f903c9ec6c0c3cba80f1f2f9c05932f5f68b6de5871f6226914b24f89c0f
i386
kernel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 897762bcd031135aa0669edb8346ffcc3751d7365271f30af353e4847e915444
kernel-PAE-2.6.18-308.8.2.el5.i686.rpm SHA-256: f17e3e0360ca406b051d098d072b78d85983c3ac2c78b7312f262b11873a8dcf
kernel-PAE-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: b52b0e9e869bfa27e52eea2c9ae4ef7546fcb90db066a9ba56102245a07c9027
kernel-PAE-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 5ef65e0b934ec7437772d6a2fd7b3e672c5eb652caab14b00809d6dafe3f617c
kernel-debug-2.6.18-308.8.2.el5.i686.rpm SHA-256: 10434df7d2b3b8cb16200c71f7a922cc9d2a2d54d341158d1e30bc3c4d389da1
kernel-debug-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: f7dce680fa16ad773b717153e90deef5b2ee8ea3ae71095112dc48b4f301ee1f
kernel-debug-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: ca04a3956a88cc931253737f3fec5166f191efa9532eb1f9e13712c220ad88e8
kernel-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: 00861d72106abf37ff0d0c5ee590554120b935d0597ca255fac6609da6dc0261
kernel-debuginfo-common-2.6.18-308.8.2.el5.i686.rpm SHA-256: f15d2c911c5ce1098f70d377d844db3a120905a7d8493b6d8a31205ceb4440ea
kernel-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 71554ceae50874026d5edbd8edd44fe4eae184950dd98c53162d0c6fe1f961ad
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.i386.rpm SHA-256: e7a44875bff0f15d0cd8a48a4af3fd65bebed5fb72d0ee9ea462d94206ce1e9d
kernel-xen-2.6.18-308.8.2.el5.i686.rpm SHA-256: f9e8bc102ec75836048bc6ee49131aa217e737d4c66671b1b924a83b403f69f8
kernel-xen-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: 56e3122643c2ad71b0fb96e7341abf78be8428c7be506b06c0bb0c9e7bea68a2
kernel-xen-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: e83edb26cd8ee98e37cdd14a7344fde5b2d479e7f0d38ac060f9cdc560914e14

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-308.8.2.el5.src.rpm SHA-256: 21d14efaef51fd14681c3eeda9713bec2f6bd523a33328d2ed804405e87a1be5
s390x
kernel-2.6.18-308.8.2.el5.s390x.rpm SHA-256: 4d94e772f10669d5cf13e3f0bb6d7bb80529a4dc9f0ebdfd8bda40277b598c19
kernel-debug-2.6.18-308.8.2.el5.s390x.rpm SHA-256: e398bab36df1ad3a9ae1f0ab2e75ad2e8c4dc208c2a6e27c49e6a0e981a290da
kernel-debug-debuginfo-2.6.18-308.8.2.el5.s390x.rpm SHA-256: b57b515a68c4c186800ff09535a83bc4ee6af253dd4233d56d10c7667beb7120
kernel-debug-devel-2.6.18-308.8.2.el5.s390x.rpm SHA-256: fb9d1dbb512c037854ac2dd06cb24aeb70390c96dd966f739aa62d62b3da941f
kernel-debuginfo-2.6.18-308.8.2.el5.s390x.rpm SHA-256: 9cfbb3ac3f3f1960fac21b65db8392a9c493c8b54070c69ba4aa585219633f64
kernel-debuginfo-common-2.6.18-308.8.2.el5.s390x.rpm SHA-256: 75a2cf3f0dbc1479be385eade534d231512ace1c9f78d988fe021935f16072dd
kernel-devel-2.6.18-308.8.2.el5.s390x.rpm SHA-256: 897e483813ba4955c3b1cca6b088d252ecb1b4124b19b8ebccff5609ce583c50
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.s390x.rpm SHA-256: 385bcfce350d8b439dff566629d1996a16b4f42ed310d80655ddaa7d5ba7a599
kernel-kdump-2.6.18-308.8.2.el5.s390x.rpm SHA-256: 3abfed86f4d8c6ae7b52e0f2f722041cc850bd30e0bc1cdea434fa1e1e597f8c
kernel-kdump-debuginfo-2.6.18-308.8.2.el5.s390x.rpm SHA-256: ec06487c7708586114c1d9e9322fad6a2279679f6b7754379741301cbdea5fe7
kernel-kdump-devel-2.6.18-308.8.2.el5.s390x.rpm SHA-256: de6994839fa34b43516ea008516f1157f573a3a80b8343cbeeda48ff5f992096

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-308.8.2.el5.src.rpm SHA-256: 21d14efaef51fd14681c3eeda9713bec2f6bd523a33328d2ed804405e87a1be5
ppc
kernel-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: dd0d4cb6dae33151668e73885c11a8571bc3ae0343115be39121eeefc8dfda5e
kernel-debug-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: d2e652b4187bb1e6ce78add37eda4dcf5dd2d33e5a308c5621587fbbb49425b9
kernel-debug-debuginfo-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: ec9132a1516c015e4717852c0b4ffe5e4cb8c3dbb7d5c98ae7a9108984912218
kernel-debug-devel-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: b78a944c234bf06a2444e5628266182cbfd29b18787ec3bce01b6f504b9ced52
kernel-debuginfo-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: 25258a5defffff0e6aa383536d2882e77e7e98f3d9bfa57263ac65d6556ec817
kernel-debuginfo-common-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: c18d2336bc876210ec1996c370b31f2a5fa3827a9861f95c20d3e47a742324e4
kernel-devel-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: 1d3faf560d680b734754db0c183009cc91c514e56195f4bd4275ee7d73f80f25
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.ppc.rpm SHA-256: a14f9587aee92ecb55662a8a3a0b2c3e73e91e411896343a726f715a4d2798c1
kernel-headers-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: ba613789a458087a8a28914fffa1073f8f66d82afe89f48a291e5948bce4d825
kernel-kdump-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: 69e4b18ad538613fa933d9ffff526447d3c5da73975aa048b6fffc0874b68167
kernel-kdump-debuginfo-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: 15443fc917469a1ab2f29e923af9b984a98c2b730b94c1d812731a16a900daf9
kernel-kdump-devel-2.6.18-308.8.2.el5.ppc64.rpm SHA-256: de3407d9e89fac81c82fb0e0ee1e3292f8b2996190862c40957f2d847cae5361

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-308.8.2.el5.src.rpm SHA-256: 21d14efaef51fd14681c3eeda9713bec2f6bd523a33328d2ed804405e87a1be5
x86_64
kernel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: ac9b9ef922abc95f64a55d447b6a01617757e89c7536c48c4b2d72e51762648c
kernel-debug-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 5e0d5e2ede09ade763765e2a7bb71bdd9436df1fb9a3782cabdac3127fdab468
kernel-debug-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: fba8c25cda5da8fc4d849c8b82c882ad146a09cda20a4d1da194d37e19e59c3a
kernel-debug-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 0fb1672e4f0e791b03f757077b183b60d452596de4f238a412ea590852faee1a
kernel-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: d49607ce3894322c4364d2bbd9aa1053724e1c1c565fdcd82a99443043521164
kernel-debuginfo-common-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: f12abf795366dbb18c51a0a84809aa3305af04d7813ff615973c58dcb2fde7c1
kernel-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 2b9c0313a0c6285ec8b74b3c5f555d8febb27354561cbcc6df39efccfc5e36e2
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 52cdb662da0a0b2831b983bc0c5640d4c1b9af654024e60aa7b69443461b4f80
kernel-xen-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 49ec4bd238582aeaef6dadc3811b196efbc4947e85ea5b835f9034e2eade19e4
kernel-xen-debuginfo-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: d900e2208e8df73d625b933d382f00d8d26eb36b7c05aed2338957f0a0edc310
kernel-xen-devel-2.6.18-308.8.2.el5.x86_64.rpm SHA-256: 8c08f903c9ec6c0c3cba80f1f2f9c05932f5f68b6de5871f6226914b24f89c0f
i386
kernel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 897762bcd031135aa0669edb8346ffcc3751d7365271f30af353e4847e915444
kernel-PAE-2.6.18-308.8.2.el5.i686.rpm SHA-256: f17e3e0360ca406b051d098d072b78d85983c3ac2c78b7312f262b11873a8dcf
kernel-PAE-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: b52b0e9e869bfa27e52eea2c9ae4ef7546fcb90db066a9ba56102245a07c9027
kernel-PAE-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 5ef65e0b934ec7437772d6a2fd7b3e672c5eb652caab14b00809d6dafe3f617c
kernel-debug-2.6.18-308.8.2.el5.i686.rpm SHA-256: 10434df7d2b3b8cb16200c71f7a922cc9d2a2d54d341158d1e30bc3c4d389da1
kernel-debug-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: f7dce680fa16ad773b717153e90deef5b2ee8ea3ae71095112dc48b4f301ee1f
kernel-debug-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: ca04a3956a88cc931253737f3fec5166f191efa9532eb1f9e13712c220ad88e8
kernel-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: 00861d72106abf37ff0d0c5ee590554120b935d0597ca255fac6609da6dc0261
kernel-debuginfo-common-2.6.18-308.8.2.el5.i686.rpm SHA-256: f15d2c911c5ce1098f70d377d844db3a120905a7d8493b6d8a31205ceb4440ea
kernel-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: 71554ceae50874026d5edbd8edd44fe4eae184950dd98c53162d0c6fe1f961ad
kernel-doc-2.6.18-308.8.2.el5.noarch.rpm SHA-256: 26e35a26ba4f0f421099f2b5d9348ff4fb07f68289af9bf6054c743d71e6b37a
kernel-headers-2.6.18-308.8.2.el5.i386.rpm SHA-256: e7a44875bff0f15d0cd8a48a4af3fd65bebed5fb72d0ee9ea462d94206ce1e9d
kernel-xen-2.6.18-308.8.2.el5.i686.rpm SHA-256: f9e8bc102ec75836048bc6ee49131aa217e737d4c66671b1b924a83b403f69f8
kernel-xen-debuginfo-2.6.18-308.8.2.el5.i686.rpm SHA-256: 56e3122643c2ad71b0fb96e7341abf78be8428c7be506b06c0bb0c9e7bea68a2
kernel-xen-devel-2.6.18-308.8.2.el5.i686.rpm SHA-256: e83edb26cd8ee98e37cdd14a7344fde5b2d479e7f0d38ac060f9cdc560914e14

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter