Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2012:1087 - Security Advisory
Issued:
2012-07-17
Updated:
2012-07-17

RHSA-2012:1087 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix one security issue and multiple bugs are
now available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • It was found that the data_len parameter of the sock_alloc_send_pskb()
    function in the Linux kernel's networking implementation was not validated
    before use. A local user with access to a TUN/TAP virtual interface could
    use this flaw to crash the system or, potentially, escalate their
    privileges. Note that unprivileged users cannot access TUN/TAP devices
    until the root user grants them access. (CVE-2012-2136, Important)

This update also fixes the following bugs:

  • An insufficiently designed calculation in the CPU accelerator in the
    previous kernel caused an arithmetic overflow in the sched_clock() function
    when system uptime exceeded 208.5 days. This overflow led to a kernel panic
    on the systems using the Time Stamp Counter (TSC) or Virtual Machine
    Interface (VMI) clock source. This update corrects the described
    calculation so that this arithmetic overflow and kernel panic can no longer
    occur under these circumstances. (BZ#825981, BZ#835449)
  • Previously, a race condition between the journal_write_metadata_buffer()
    and jbd_unlock_bh_state() functions could occur. Consequently, another
    thread could call the get_write_access() function on the buffer head and
    cause the wrong data to be written into the journal. If the system
    terminated unexpectedly or was shut down incorrectly, subsequent file
    system journal replay could result in file system corruption. This update
    fixes the race condition and the file system corruption no longer occurs in
    the described scenario. (BZ#833764)
  • When the kvmclock initialization was used in a guest, it could write to
    the Time Stamp Counter (TSC) and, under certain circumstances, could cause
    the kernel to become unresponsive on boot. With this update, TSC
    synchronization, which is unnecessary due to kvmclock, has been disabled,
    thus fixing this bug. (BZ#834557)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc

Fixes

  • BZ - 816289 - CVE-2012-2136 kernel: net: insufficient data_len validation in sock_alloc_send_pskb()

CVEs

  • CVE-2012-2136

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
x86_64
kernel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 2e62f690614165b1d6d0b9b54f001fa6a1f46329d049c02e7fa450b9882b0cbd
kernel-debug-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 14204ac3228222eff3a62acbf48f2eb1bfa533c6c33f5d1dd82352efc1292541
kernel-debug-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 47f4b8c7121afbc7cccccffc6a3003f237d490f318fb2f7dbfddb9c61ea7bc31
kernel-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 4c3332dbc0ab02ad372a7e837140894cf38cd508b1aebfb7ca329aeae4e1f3cc
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: d89e11cc0ec34f5676f34579ecae2e92aa539df9029ec1a3a58936b1983ca51e
kernel-xen-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 906a4f2ec66fd8289b5d1806e0889360c1671982d6bbe49b7a77714208233483
kernel-xen-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: af18e0970cfd142cfb18ebabeeab1f9c2381e8b1161a1f00926c813e9724e52b
ia64
kernel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 94cbdb0b541ac0a965edc3f25c8d9057e6dc7497fb6af89b2d582e4f2b677b73
kernel-debug-2.6.18-238.40.1.el5.ia64.rpm SHA-256: d05c9b13b5d20fcdaf0b7a9b455953a70d4331a7a6fe287031f9be693fd0bee8
kernel-debug-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 38cd44f10f8e92c248dd6401560340dd8e5da709bb60f31ce374fcd9c1549973
kernel-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 172a138a7baba306d09fd610886a97545491ed1b6fba73ee800840094d1767c6
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 3082adbaaaecf1d855564a17e5039050644eee5c6d6519079ba5b7addba63b1e
kernel-xen-2.6.18-238.40.1.el5.ia64.rpm SHA-256: f9e6a095c1dfe2379a9a4b575433dd3e52f5023c91fc8dc8bbf1cc846fdcbac6
kernel-xen-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: a138562b944eb6b552b1e7b498242588083eca612bd51aa9da67757727864a21
i386
kernel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 357df74055c7ed08af930bba0f12bf8c10db07bc7dcea9802a084a456d1acccf
kernel-PAE-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8130583a0ac16c79771a7c6e1d2f2b6fccdeb52522676613324324662ade784f
kernel-PAE-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: c39a1b8ac9246926755b0f73d09ef074f7192a8eb3d2389f4fb252157dd8107e
kernel-debug-2.6.18-238.40.1.el5.i686.rpm SHA-256: 03dc2f5a11faaada8a7cb74844808dce4efbd0a32feed6895f1353d5fd297b91
kernel-debug-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: a4c16c2f7a9b19c901e74cd634c33fc3f5cf202c030cd0a6361418f54d9c5541
kernel-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 2e1b343d184351731828e34b065f566b853e85c5069152d9d93ed6318022e219
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.i386.rpm SHA-256: aa453e53d5490b76bb9144cf6e528d54b860f788c5d574d5d3de413b94e61c7c
kernel-xen-2.6.18-238.40.1.el5.i686.rpm SHA-256: c3edd6c8dfca7092b03915eadf0a05dbef294886de581143288f2a6b7ae6a53d
kernel-xen-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: e512a6b309ed98a6515dded21f7d9880cd6a877c0519439e187ef6459a7fbaef

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
s390x
kernel-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 08d2534aa7163df4a4697a526fae50663fa205c6a88b45418deaf892bd4e7b69
kernel-debug-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 778ff8b63f68804f68695e8fec4764a0c5ca9afe339143eb44d4edffc515ed0a
kernel-debug-devel-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 54e076a132558b220c3d5b4dc2fc089bfa1941e68e02dabe08ba2d9217367c6c
kernel-devel-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 3325e8d4c8c20b5046b66c9b8e4a155da24f2a96868c97b50fbda2738c3050d5
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 455ab6d09f6f32aed433a1bf06280baa77738340c620a592897876adf795d93e
kernel-kdump-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 2978af33aa122c13c099779fed10ce52cbb14af492aded2d07e5da4b24531113
kernel-kdump-devel-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 69b37eba063fddbc57e5c8e4b884775a6854b905cda38b43ced822a2f58f2d93

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
ppc
kernel-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: dfc1041d0b826c32ecbd8c1eca103d8d29d1612a5392dd5e48f408f95ba82c65
kernel-debug-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: 76354e1ee35c32b9198b7e3b4ee314a944c7920ecd525ec37b6b0d63584aa864
kernel-debug-devel-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: d3d685e6cff92484b246761178961cedf911f738d6f2a6b818b6151a0b365034
kernel-devel-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: c6416e2a9635b55deb03ab08d0597b81a5c7b0641bda616b7fa0893dbb8fa750
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.ppc.rpm SHA-256: 78cabcb191f3cf160e4d49681bf066a35dc074c9e48124da56100958c9b03d98
kernel-headers-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: 9d75a62d12e0aeb907a8562693bbbcb5e06453f7a2b7a14eeb373a53400892c3
kernel-kdump-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: 43c56e6338ed8bd821abcaf3d415f59896f51bbfee933d566e9e765146c7e259
kernel-kdump-devel-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: b4958496f9bb6c8136e6579f9c9a87d908f4c860a41024fef32c43be3d298f95

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
x86_64
kernel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 2e62f690614165b1d6d0b9b54f001fa6a1f46329d049c02e7fa450b9882b0cbd
kernel-debug-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 14204ac3228222eff3a62acbf48f2eb1bfa533c6c33f5d1dd82352efc1292541
kernel-debug-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 47f4b8c7121afbc7cccccffc6a3003f237d490f318fb2f7dbfddb9c61ea7bc31
kernel-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 4c3332dbc0ab02ad372a7e837140894cf38cd508b1aebfb7ca329aeae4e1f3cc
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: d89e11cc0ec34f5676f34579ecae2e92aa539df9029ec1a3a58936b1983ca51e
kernel-xen-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 906a4f2ec66fd8289b5d1806e0889360c1671982d6bbe49b7a77714208233483
kernel-xen-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: af18e0970cfd142cfb18ebabeeab1f9c2381e8b1161a1f00926c813e9724e52b
i386
kernel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 357df74055c7ed08af930bba0f12bf8c10db07bc7dcea9802a084a456d1acccf
kernel-PAE-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8130583a0ac16c79771a7c6e1d2f2b6fccdeb52522676613324324662ade784f
kernel-PAE-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: c39a1b8ac9246926755b0f73d09ef074f7192a8eb3d2389f4fb252157dd8107e
kernel-debug-2.6.18-238.40.1.el5.i686.rpm SHA-256: 03dc2f5a11faaada8a7cb74844808dce4efbd0a32feed6895f1353d5fd297b91
kernel-debug-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: a4c16c2f7a9b19c901e74cd634c33fc3f5cf202c030cd0a6361418f54d9c5541
kernel-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 2e1b343d184351731828e34b065f566b853e85c5069152d9d93ed6318022e219
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.i386.rpm SHA-256: aa453e53d5490b76bb9144cf6e528d54b860f788c5d574d5d3de413b94e61c7c
kernel-xen-2.6.18-238.40.1.el5.i686.rpm SHA-256: c3edd6c8dfca7092b03915eadf0a05dbef294886de581143288f2a6b7ae6a53d
kernel-xen-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: e512a6b309ed98a6515dded21f7d9880cd6a877c0519439e187ef6459a7fbaef

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
x86_64
kernel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 2e62f690614165b1d6d0b9b54f001fa6a1f46329d049c02e7fa450b9882b0cbd
kernel-debug-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 14204ac3228222eff3a62acbf48f2eb1bfa533c6c33f5d1dd82352efc1292541
kernel-debug-debuginfo-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: e138cfef6fd670e6549b109004d7b878cf82fcbf0bfc8ddb928a30aec6055a4c
kernel-debug-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 47f4b8c7121afbc7cccccffc6a3003f237d490f318fb2f7dbfddb9c61ea7bc31
kernel-debuginfo-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 00daac9c775b1a03b5462b51faa0adce47768e77529d34252b4ac67225635c76
kernel-debuginfo-common-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 74d303a28eb1ad48e16382d9d366a1940a4bc53d0107e96476907d3f48a79bf0
kernel-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 4c3332dbc0ab02ad372a7e837140894cf38cd508b1aebfb7ca329aeae4e1f3cc
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: d89e11cc0ec34f5676f34579ecae2e92aa539df9029ec1a3a58936b1983ca51e
kernel-xen-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 906a4f2ec66fd8289b5d1806e0889360c1671982d6bbe49b7a77714208233483
kernel-xen-debuginfo-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 59a7cf395299bbf226638bf4a284dab3819a03b6d6a6b7bfc5a6d5fc39ff7b53
kernel-xen-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: af18e0970cfd142cfb18ebabeeab1f9c2381e8b1161a1f00926c813e9724e52b
ia64
kernel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 94cbdb0b541ac0a965edc3f25c8d9057e6dc7497fb6af89b2d582e4f2b677b73
kernel-debug-2.6.18-238.40.1.el5.ia64.rpm SHA-256: d05c9b13b5d20fcdaf0b7a9b455953a70d4331a7a6fe287031f9be693fd0bee8
kernel-debug-debuginfo-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 2c34ba04e8b44abf20ab90df43108c40efc3dbbc06a0556c54c5598faef0732f
kernel-debug-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 38cd44f10f8e92c248dd6401560340dd8e5da709bb60f31ce374fcd9c1549973
kernel-debuginfo-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 674b25ed265c989f327f2df16f1c03bcbd4b292e00d171d030ed7361205bcf1a
kernel-debuginfo-common-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 709f7baff7a554d1e86ce4137fb783b7632f897c5084d30a35a1a9a6adb6232b
kernel-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 172a138a7baba306d09fd610886a97545491ed1b6fba73ee800840094d1767c6
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 3082adbaaaecf1d855564a17e5039050644eee5c6d6519079ba5b7addba63b1e
kernel-xen-2.6.18-238.40.1.el5.ia64.rpm SHA-256: f9e6a095c1dfe2379a9a4b575433dd3e52f5023c91fc8dc8bbf1cc846fdcbac6
kernel-xen-debuginfo-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 3e26421b5af20f3c9a688665edb6f9e0d1b1d14f001713f68d0d982ddebc08b8
kernel-xen-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: a138562b944eb6b552b1e7b498242588083eca612bd51aa9da67757727864a21
i386
kernel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 357df74055c7ed08af930bba0f12bf8c10db07bc7dcea9802a084a456d1acccf
kernel-PAE-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8130583a0ac16c79771a7c6e1d2f2b6fccdeb52522676613324324662ade784f
kernel-PAE-debuginfo-2.6.18-238.40.1.el5.i686.rpm SHA-256: 91d592bd4f5b4f61bb982c918053b3a674770a797c5f73f58b7c5e211ee74643
kernel-PAE-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: c39a1b8ac9246926755b0f73d09ef074f7192a8eb3d2389f4fb252157dd8107e
kernel-debug-2.6.18-238.40.1.el5.i686.rpm SHA-256: 03dc2f5a11faaada8a7cb74844808dce4efbd0a32feed6895f1353d5fd297b91
kernel-debug-debuginfo-2.6.18-238.40.1.el5.i686.rpm SHA-256: 75e6cc21956b6889a73a7173f1b37661ff485da96e1f98bd1fc7f4c6d58c4275
kernel-debug-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: a4c16c2f7a9b19c901e74cd634c33fc3f5cf202c030cd0a6361418f54d9c5541
kernel-debuginfo-2.6.18-238.40.1.el5.i686.rpm SHA-256: 188e55a10231536d9139d7c541785a9c97a6cd9898c6fcc94c669a69d51babc9
kernel-debuginfo-common-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8275fb0171da951855fe98a7e817441ea8273cc73710660be245e0323a714d02
kernel-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 2e1b343d184351731828e34b065f566b853e85c5069152d9d93ed6318022e219
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.i386.rpm SHA-256: aa453e53d5490b76bb9144cf6e528d54b860f788c5d574d5d3de413b94e61c7c
kernel-xen-2.6.18-238.40.1.el5.i686.rpm SHA-256: c3edd6c8dfca7092b03915eadf0a05dbef294886de581143288f2a6b7ae6a53d
kernel-xen-debuginfo-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8f132e95bb6aa791aa1e8696524dd518db38eaa6c68191ecb8b64dee7f6789e3
kernel-xen-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: e512a6b309ed98a6515dded21f7d9880cd6a877c0519439e187ef6459a7fbaef

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+