Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:1061 - Security Advisory
Issued:
2012-07-10
Updated:
2012-07-10

RHSA-2012:1061 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and multiple bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fix:

  • The fix for CVE-2011-1083 (RHSA-2012:0150) introduced a flaw in the way

the Linux kernel's Event Poll (epoll) subsystem handled resource clean up
when an ELOOP error code was returned. A local, unprivileged user could use
this flaw to cause a denial of service. (CVE-2012-3375, Moderate)

Bug fixes:

  • The qla2xxx driver handled interrupts for QLogic Fibre Channel adapters

incorrectly due to a bug in a test condition for MSI-X support. This update
corrects the bug and qla2xxx now handles interrupts as expected.
(BZ#816373)

  • A process scheduler did not handle RPC priority wait queues correctly.

Consequently, the process scheduler failed to wake up all scheduled tasks
as expected after RPC timeout, which caused the system to become
unresponsive and could significantly decrease system performance. This
update modifies the process scheduler to handle RPC priority wait queues as
expected. All scheduled tasks are now properly woken up after RPC timeout
and the system behaves as expected. (BZ#817571)

  • The kernel version 2.6.18-308.4.1.el5 contained several bugs which led to

an overrun of the NFS server page array. Consequently, any attempt to
connect an NFS client running on Red Hat Enterprise Linux 5.8 to the NFS
server running on the system with this kernel caused the NFS server to
terminate unexpectedly and the kernel to panic. This update corrects the
bugs causing NFS page array overruns and the kernel no longer crashes in
this scenario. (BZ#820358)

  • An insufficiently designed calculation in the CPU accelerator in the

previous kernel caused an arithmetic overflow in the sched_clock() function
when system uptime exceeded 208.5 days. This overflow led to a kernel panic
on the systems using the Time Stamp Counter (TSC) or Virtual Machine
Interface (VMI) clock source. This update corrects the calculation so that
this arithmetic overflow and kernel panic can no longer occur under these
circumstances.

Note: This advisory does not include a fix for this bug for the 32-bit
architecture. (BZ#824654)

  • Under memory pressure, memory pages that are still a part of a

checkpointing transaction can be invalidated. However, when the pages were
invalidated, the journal head was re-filed onto the transactions' "forget"
list, which caused the current running transaction's block to be modified.
As a result, block accounting was not properly performed on that modified
block because it appeared to have already been modified due to the journal
head being re-filed. This could trigger an assertion failure in the
"journal_commit_transaction()" function on the system. The "b_modified"
flag is now cleared before the journal head is filed onto any transaction;
assertion failures no longer occur. (BZ#827205)

  • When running more than 30 instances of the cclengine utility concurrently

on IBM System z with IBM Communications Controller for Linux, the system
could become unresponsive. This was caused by a missing wake_up() function
call in the qeth_release_buffer() function in the QETH network device
driver. This update adds the missing wake_up() function call and the system
now responds as expected in this scenario. (BZ#829059)

  • Recent changes removing support for the Flow Director from the ixgbe

driver introduced bugs that caused the RSS (Receive Side Scaling)
functionality to stop working correctly on Intel 82599EB 10 Gigabit
Ethernet network devices. This update corrects the return code in the
ixgbe_cache_ring_fdir function and setting of the registers that control
the RSS redirection table. Also, obsolete code related to Flow Director
support has been removed. The RSS functionality now works as expected on
these devices. (BZ#832169)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 837502 - CVE-2012-3375 kernel: epoll: can leak file descriptors when returning -ELOOP

CVEs

  • CVE-2012-3375

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://rhn.redhat.com/errata/RHSA-2012-0150.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-308.11.1.el5.src.rpm SHA-256: e4211bdbf9c07ec6638b524399e22bc76d514257838403fd3478f7df7127424c
x86_64
kernel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 1d96e79d9208009cc248c380e5935054001cd0d77ac3673c6401e445f3863180
kernel-debug-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 227fc5965be6e35669ea69a90a5089a9766afdeb3c415acc90bc3381102c908e
kernel-debug-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: e3ab868539e57bac0a15f31e3b53f7b177535085c94540779638611eed529ece
kernel-debug-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 96d8644d68bb3729608cc5ee8421ac19627e358b37278ffdd232c9568aeaff3d
kernel-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 725d1e339021b1205934db28ae2d86a1b743738a6cb896b5b736ff62530669d3
kernel-debuginfo-common-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 578e8a32f6948ed5e0fab94e1722e3da26362a54ef959eaa14befcf0ef65ed07
kernel-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 4b7e55d41a70ce82d9312310f43e8acf5726235a458e22581d797ae4b4863114
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 29c18fac69d400c55311952fd5690231fb1a7eb5bf2d4fd158217303863bdbe6
kernel-xen-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 4ace1e45f66e05b449a99fc4176e36c355926c70a5bfe54ca6e212ade1f8d341
kernel-xen-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: c1e1a187512d49f791ec84f5f4bdeee76483f954bdc95a8a0e408a1d5cd2ed30
kernel-xen-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 6b7249210a0da1b952f6c3b53ac553d92e6c9c787ca798bf53169009e1be941b
ia64
kernel-2.6.18-308.11.1.el5.ia64.rpm SHA-256: 1055655fe58e01a3212f79f5f2fdb10af5096e396bd2b3d74ec6e1a2e648724e
kernel-debug-2.6.18-308.11.1.el5.ia64.rpm SHA-256: 3ffe837ac321d7b6928a972d164fcafeb9137930a2818377d0a34ed0c23fec84
kernel-debug-debuginfo-2.6.18-308.11.1.el5.ia64.rpm SHA-256: 1b915f5f333abd4050822e47a2037f667692364d53bf0a46352be3ec85219241
kernel-debug-devel-2.6.18-308.11.1.el5.ia64.rpm SHA-256: ad5ad2be0854e06b104428a7cc7be72dd0f1822581062c9337f9f54ae0658492
kernel-debuginfo-2.6.18-308.11.1.el5.ia64.rpm SHA-256: 6282212648b3904099c60237783e27b6a7451918b02536f880e7b7d39a3e0854
kernel-debuginfo-common-2.6.18-308.11.1.el5.ia64.rpm SHA-256: 4bf919e7f27cb1dff7aea9587a716bdd52e86f0406675b38847174941acf8502
kernel-devel-2.6.18-308.11.1.el5.ia64.rpm SHA-256: afae807970bab87fe55b5662f258d14b27ba17b2a83b876ddb9d285d24c237f3
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.ia64.rpm SHA-256: f3b2056aaaa27a9c42f775e7f3356a31baf6b9a458aa1f5fee6e3690f11b32ab
kernel-xen-2.6.18-308.11.1.el5.ia64.rpm SHA-256: 86ba8e99ecebc80a99fdf6d01b127b041b3a816c52b693685c4d138d4da68b2f
kernel-xen-debuginfo-2.6.18-308.11.1.el5.ia64.rpm SHA-256: c133f29e74a6f29d4a22dfac4bfe313a7bfbe15869e4e52379a396485f3754e3
kernel-xen-devel-2.6.18-308.11.1.el5.ia64.rpm SHA-256: ac8d34d6fb39dc779b7b34f079b383669c19d1f25e4b99a77b6eb1db6c8f3ac5
i386
kernel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 9aefcbe32c13de9e8d4f7f22db856c720a4ba60253f86691d76a46017c1f3cfc
kernel-PAE-2.6.18-308.11.1.el5.i686.rpm SHA-256: ba120a2ecb09964bf90d009949f1d918f3beacf36410c73b9a5f5c2320edf3cc
kernel-PAE-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 562b62ff161e8316db82ab951f5efa61e9fbab34f0df237db55dc4fa7decb178
kernel-PAE-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 3fe249279c23237bc8964465be8eeb24cd3985ad5d4a5ab502e2a53d28d27300
kernel-debug-2.6.18-308.11.1.el5.i686.rpm SHA-256: 933ae94e2bf53728cf80dd8976f8ffc69504570cd99338edc9ab728630dee2cb
kernel-debug-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 0420831982cbbcee33a5e319eb8dbe057c17c977161e3934f65bd9af18731a5f
kernel-debug-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 326328e454eabd8f97ab5305b737838787b9463181ba77efccfbec45d783d089
kernel-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 1189e9f4b024de10ec516fa8f79e67cb85d4cb321622cd58a0000943eaf9e519
kernel-debuginfo-common-2.6.18-308.11.1.el5.i686.rpm SHA-256: 2223be99e813d570897f82737423b98dc3b3be952a83c61250f16023472a9450
kernel-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 692e40db9f5a685d9e0ce245f9eefadb7634fe6b9f763d6269fde49cdc7aaad0
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.i386.rpm SHA-256: 005b9209df18491953bacc9997b8ad198743361f3447f294dc687f6f3c42b498
kernel-xen-2.6.18-308.11.1.el5.i686.rpm SHA-256: 3ef1253e4edc7f220b62feb85a1966978c5459202ac45c93957cfed81c3c05b1
kernel-xen-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 54c3ea815ad146ddfbbea89291db8b2b54cdd23384c44d42d58b1579652c8e24
kernel-xen-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 46f7512fb4f388e6553dbabfc9d51c5bfc6589269d995ea854e20ecdfc23b3b2

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-308.11.1.el5.src.rpm SHA-256: e4211bdbf9c07ec6638b524399e22bc76d514257838403fd3478f7df7127424c
x86_64
kernel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 1d96e79d9208009cc248c380e5935054001cd0d77ac3673c6401e445f3863180
kernel-debug-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 227fc5965be6e35669ea69a90a5089a9766afdeb3c415acc90bc3381102c908e
kernel-debug-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: e3ab868539e57bac0a15f31e3b53f7b177535085c94540779638611eed529ece
kernel-debug-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 96d8644d68bb3729608cc5ee8421ac19627e358b37278ffdd232c9568aeaff3d
kernel-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 725d1e339021b1205934db28ae2d86a1b743738a6cb896b5b736ff62530669d3
kernel-debuginfo-common-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 578e8a32f6948ed5e0fab94e1722e3da26362a54ef959eaa14befcf0ef65ed07
kernel-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 4b7e55d41a70ce82d9312310f43e8acf5726235a458e22581d797ae4b4863114
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 29c18fac69d400c55311952fd5690231fb1a7eb5bf2d4fd158217303863bdbe6
kernel-xen-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 4ace1e45f66e05b449a99fc4176e36c355926c70a5bfe54ca6e212ade1f8d341
kernel-xen-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: c1e1a187512d49f791ec84f5f4bdeee76483f954bdc95a8a0e408a1d5cd2ed30
kernel-xen-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 6b7249210a0da1b952f6c3b53ac553d92e6c9c787ca798bf53169009e1be941b
i386
kernel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 9aefcbe32c13de9e8d4f7f22db856c720a4ba60253f86691d76a46017c1f3cfc
kernel-PAE-2.6.18-308.11.1.el5.i686.rpm SHA-256: ba120a2ecb09964bf90d009949f1d918f3beacf36410c73b9a5f5c2320edf3cc
kernel-PAE-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 562b62ff161e8316db82ab951f5efa61e9fbab34f0df237db55dc4fa7decb178
kernel-PAE-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 3fe249279c23237bc8964465be8eeb24cd3985ad5d4a5ab502e2a53d28d27300
kernel-debug-2.6.18-308.11.1.el5.i686.rpm SHA-256: 933ae94e2bf53728cf80dd8976f8ffc69504570cd99338edc9ab728630dee2cb
kernel-debug-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 0420831982cbbcee33a5e319eb8dbe057c17c977161e3934f65bd9af18731a5f
kernel-debug-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 326328e454eabd8f97ab5305b737838787b9463181ba77efccfbec45d783d089
kernel-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 1189e9f4b024de10ec516fa8f79e67cb85d4cb321622cd58a0000943eaf9e519
kernel-debuginfo-common-2.6.18-308.11.1.el5.i686.rpm SHA-256: 2223be99e813d570897f82737423b98dc3b3be952a83c61250f16023472a9450
kernel-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 692e40db9f5a685d9e0ce245f9eefadb7634fe6b9f763d6269fde49cdc7aaad0
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.i386.rpm SHA-256: 005b9209df18491953bacc9997b8ad198743361f3447f294dc687f6f3c42b498
kernel-xen-2.6.18-308.11.1.el5.i686.rpm SHA-256: 3ef1253e4edc7f220b62feb85a1966978c5459202ac45c93957cfed81c3c05b1
kernel-xen-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 54c3ea815ad146ddfbbea89291db8b2b54cdd23384c44d42d58b1579652c8e24
kernel-xen-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 46f7512fb4f388e6553dbabfc9d51c5bfc6589269d995ea854e20ecdfc23b3b2

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-308.11.1.el5.src.rpm SHA-256: e4211bdbf9c07ec6638b524399e22bc76d514257838403fd3478f7df7127424c
x86_64
kernel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 1d96e79d9208009cc248c380e5935054001cd0d77ac3673c6401e445f3863180
kernel-debug-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 227fc5965be6e35669ea69a90a5089a9766afdeb3c415acc90bc3381102c908e
kernel-debug-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: e3ab868539e57bac0a15f31e3b53f7b177535085c94540779638611eed529ece
kernel-debug-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 96d8644d68bb3729608cc5ee8421ac19627e358b37278ffdd232c9568aeaff3d
kernel-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 725d1e339021b1205934db28ae2d86a1b743738a6cb896b5b736ff62530669d3
kernel-debuginfo-common-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 578e8a32f6948ed5e0fab94e1722e3da26362a54ef959eaa14befcf0ef65ed07
kernel-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 4b7e55d41a70ce82d9312310f43e8acf5726235a458e22581d797ae4b4863114
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 29c18fac69d400c55311952fd5690231fb1a7eb5bf2d4fd158217303863bdbe6
kernel-xen-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 4ace1e45f66e05b449a99fc4176e36c355926c70a5bfe54ca6e212ade1f8d341
kernel-xen-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: c1e1a187512d49f791ec84f5f4bdeee76483f954bdc95a8a0e408a1d5cd2ed30
kernel-xen-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 6b7249210a0da1b952f6c3b53ac553d92e6c9c787ca798bf53169009e1be941b
i386
kernel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 9aefcbe32c13de9e8d4f7f22db856c720a4ba60253f86691d76a46017c1f3cfc
kernel-PAE-2.6.18-308.11.1.el5.i686.rpm SHA-256: ba120a2ecb09964bf90d009949f1d918f3beacf36410c73b9a5f5c2320edf3cc
kernel-PAE-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 562b62ff161e8316db82ab951f5efa61e9fbab34f0df237db55dc4fa7decb178
kernel-PAE-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 3fe249279c23237bc8964465be8eeb24cd3985ad5d4a5ab502e2a53d28d27300
kernel-debug-2.6.18-308.11.1.el5.i686.rpm SHA-256: 933ae94e2bf53728cf80dd8976f8ffc69504570cd99338edc9ab728630dee2cb
kernel-debug-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 0420831982cbbcee33a5e319eb8dbe057c17c977161e3934f65bd9af18731a5f
kernel-debug-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 326328e454eabd8f97ab5305b737838787b9463181ba77efccfbec45d783d089
kernel-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 1189e9f4b024de10ec516fa8f79e67cb85d4cb321622cd58a0000943eaf9e519
kernel-debuginfo-common-2.6.18-308.11.1.el5.i686.rpm SHA-256: 2223be99e813d570897f82737423b98dc3b3be952a83c61250f16023472a9450
kernel-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 692e40db9f5a685d9e0ce245f9eefadb7634fe6b9f763d6269fde49cdc7aaad0
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.i386.rpm SHA-256: 005b9209df18491953bacc9997b8ad198743361f3447f294dc687f6f3c42b498
kernel-xen-2.6.18-308.11.1.el5.i686.rpm SHA-256: 3ef1253e4edc7f220b62feb85a1966978c5459202ac45c93957cfed81c3c05b1
kernel-xen-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 54c3ea815ad146ddfbbea89291db8b2b54cdd23384c44d42d58b1579652c8e24
kernel-xen-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 46f7512fb4f388e6553dbabfc9d51c5bfc6589269d995ea854e20ecdfc23b3b2

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-308.11.1.el5.src.rpm SHA-256: e4211bdbf9c07ec6638b524399e22bc76d514257838403fd3478f7df7127424c
s390x
kernel-2.6.18-308.11.1.el5.s390x.rpm SHA-256: fdc6d9af7670fec99df2e6fe179fa3183942d6e08f4f429eb244cf87e25a4481
kernel-debug-2.6.18-308.11.1.el5.s390x.rpm SHA-256: 9ae5dcc2e707cbdfb5e9f6291c0daf98d44808f0c8722af5e972caa4fa2f7127
kernel-debug-debuginfo-2.6.18-308.11.1.el5.s390x.rpm SHA-256: fc1189757b156049a47f26f44ca7770d3f72c5bf7469a81a51661a8a3dc663c8
kernel-debug-devel-2.6.18-308.11.1.el5.s390x.rpm SHA-256: ae645e1e4391844f639b8704c2cb60a4d2b8d40c1485b37af68f265fae83b2c1
kernel-debuginfo-2.6.18-308.11.1.el5.s390x.rpm SHA-256: 187b1b130cbb5a85d8d2d56ddecea5a3602b09b5fcae655ea727e35389693a09
kernel-debuginfo-common-2.6.18-308.11.1.el5.s390x.rpm SHA-256: 9148a38c6c287f0f26365ce2cc6211396661e0b70b565261f9315514c5c371b1
kernel-devel-2.6.18-308.11.1.el5.s390x.rpm SHA-256: 935d22527fcfbbadf980da8522e328c3139b72892e1d6b69214ffe2caaab40d0
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.s390x.rpm SHA-256: 42704b4afdd471e8be2522a365308d8a3d3d468b8cc75a737147816fa84262bb
kernel-kdump-2.6.18-308.11.1.el5.s390x.rpm SHA-256: f8772f961491ea1c8c8449020133107491d22d74066d4f1fd9655480d89f4c49
kernel-kdump-debuginfo-2.6.18-308.11.1.el5.s390x.rpm SHA-256: a4c4cff11579bcd4c5654958b1eab37cf976be68a0f20ec6d21f52bab8fb7713
kernel-kdump-devel-2.6.18-308.11.1.el5.s390x.rpm SHA-256: 011465e979795faf833d0cba8f7fef506b317b4661e2d081f0b0b020bb1d3a07

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-308.11.1.el5.src.rpm SHA-256: e4211bdbf9c07ec6638b524399e22bc76d514257838403fd3478f7df7127424c
ppc
kernel-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: 9bd4499e90ee5f399d1e8265d42777743761d3185921706a0ee88b171e5a586a
kernel-debug-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: 3952d76a8b7934853e565466b96b0be1d45dc4396a6d451934ba2647e71642d4
kernel-debug-debuginfo-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: 9c6f31fe6e98fc7995af90315f4638932ea523eacc7cbd7687197d8e534fb94c
kernel-debug-devel-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: f6e351d812b0d5419e0bd2b29f5630851eac31884532d4f0fbd751df8cbf72a1
kernel-debuginfo-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: 8c6d94a4aa2ac8635c3e57283a438bdac0d9867f8fdf2a5ee316b61356401caf
kernel-debuginfo-common-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: e35cd96d189033acc8ddcffd7affbe44acd4c5753852aaea99433e04e6ceba55
kernel-devel-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: 5c490b3e15e403d745c1fbc2d01f07e1e229b29518fc34ee51f705aa45623163
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.ppc.rpm SHA-256: a7eafa91e0fa3270609b812dbde60d9cb09b2f49d53038c05cdf0cb65c58ed1c
kernel-headers-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: f9fd2f464db7a6df027aaacae8c5c28e8bec68a35eb37f63d8348cd2c414e096
kernel-kdump-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: f807e2fc00dbae0e844ca2af5de95a478a56713a1b956cef283cd4dbc261cd7c
kernel-kdump-debuginfo-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: 0deb2d9474dec224c7e4d428a6cf0fb8a1231ed99e1bec64e8ed518dc48f57be
kernel-kdump-devel-2.6.18-308.11.1.el5.ppc64.rpm SHA-256: 3398e81ce14fedc43e37a24a956946cf1014dadbc817cc1c6789e72685161dfd

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-308.11.1.el5.src.rpm SHA-256: e4211bdbf9c07ec6638b524399e22bc76d514257838403fd3478f7df7127424c
x86_64
kernel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 1d96e79d9208009cc248c380e5935054001cd0d77ac3673c6401e445f3863180
kernel-debug-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 227fc5965be6e35669ea69a90a5089a9766afdeb3c415acc90bc3381102c908e
kernel-debug-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: e3ab868539e57bac0a15f31e3b53f7b177535085c94540779638611eed529ece
kernel-debug-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 96d8644d68bb3729608cc5ee8421ac19627e358b37278ffdd232c9568aeaff3d
kernel-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 725d1e339021b1205934db28ae2d86a1b743738a6cb896b5b736ff62530669d3
kernel-debuginfo-common-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 578e8a32f6948ed5e0fab94e1722e3da26362a54ef959eaa14befcf0ef65ed07
kernel-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 4b7e55d41a70ce82d9312310f43e8acf5726235a458e22581d797ae4b4863114
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 29c18fac69d400c55311952fd5690231fb1a7eb5bf2d4fd158217303863bdbe6
kernel-xen-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 4ace1e45f66e05b449a99fc4176e36c355926c70a5bfe54ca6e212ade1f8d341
kernel-xen-debuginfo-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: c1e1a187512d49f791ec84f5f4bdeee76483f954bdc95a8a0e408a1d5cd2ed30
kernel-xen-devel-2.6.18-308.11.1.el5.x86_64.rpm SHA-256: 6b7249210a0da1b952f6c3b53ac553d92e6c9c787ca798bf53169009e1be941b
i386
kernel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 9aefcbe32c13de9e8d4f7f22db856c720a4ba60253f86691d76a46017c1f3cfc
kernel-PAE-2.6.18-308.11.1.el5.i686.rpm SHA-256: ba120a2ecb09964bf90d009949f1d918f3beacf36410c73b9a5f5c2320edf3cc
kernel-PAE-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 562b62ff161e8316db82ab951f5efa61e9fbab34f0df237db55dc4fa7decb178
kernel-PAE-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 3fe249279c23237bc8964465be8eeb24cd3985ad5d4a5ab502e2a53d28d27300
kernel-debug-2.6.18-308.11.1.el5.i686.rpm SHA-256: 933ae94e2bf53728cf80dd8976f8ffc69504570cd99338edc9ab728630dee2cb
kernel-debug-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 0420831982cbbcee33a5e319eb8dbe057c17c977161e3934f65bd9af18731a5f
kernel-debug-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 326328e454eabd8f97ab5305b737838787b9463181ba77efccfbec45d783d089
kernel-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 1189e9f4b024de10ec516fa8f79e67cb85d4cb321622cd58a0000943eaf9e519
kernel-debuginfo-common-2.6.18-308.11.1.el5.i686.rpm SHA-256: 2223be99e813d570897f82737423b98dc3b3be952a83c61250f16023472a9450
kernel-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 692e40db9f5a685d9e0ce245f9eefadb7634fe6b9f763d6269fde49cdc7aaad0
kernel-doc-2.6.18-308.11.1.el5.noarch.rpm SHA-256: 3543266ea1c561cee69a3d385c0f71073b40d7de71be3a3124f938c65c763b18
kernel-headers-2.6.18-308.11.1.el5.i386.rpm SHA-256: 005b9209df18491953bacc9997b8ad198743361f3447f294dc687f6f3c42b498
kernel-xen-2.6.18-308.11.1.el5.i686.rpm SHA-256: 3ef1253e4edc7f220b62feb85a1966978c5459202ac45c93957cfed81c3c05b1
kernel-xen-debuginfo-2.6.18-308.11.1.el5.i686.rpm SHA-256: 54c3ea815ad146ddfbbea89291db8b2b54cdd23384c44d42d58b1579652c8e24
kernel-xen-devel-2.6.18-308.11.1.el5.i686.rpm SHA-256: 46f7512fb4f388e6553dbabfc9d51c5bfc6589269d995ea854e20ecdfc23b3b2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility