Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:1087 - Security Advisory
Issued:
2012-07-17
Updated:
2012-07-17

RHSA-2012:1087 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and multiple bugs are
now available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • It was found that the data_len parameter of the sock_alloc_send_pskb()

function in the Linux kernel's networking implementation was not validated
before use. A local user with access to a TUN/TAP virtual interface could
use this flaw to crash the system or, potentially, escalate their
privileges. Note that unprivileged users cannot access TUN/TAP devices
until the root user grants them access. (CVE-2012-2136, Important)

This update also fixes the following bugs:

  • An insufficiently designed calculation in the CPU accelerator in the

previous kernel caused an arithmetic overflow in the sched_clock() function
when system uptime exceeded 208.5 days. This overflow led to a kernel panic
on the systems using the Time Stamp Counter (TSC) or Virtual Machine
Interface (VMI) clock source. This update corrects the described
calculation so that this arithmetic overflow and kernel panic can no longer
occur under these circumstances. (BZ#825981, BZ#835449)

  • Previously, a race condition between the journal_write_metadata_buffer()

and jbd_unlock_bh_state() functions could occur. Consequently, another
thread could call the get_write_access() function on the buffer head and
cause the wrong data to be written into the journal. If the system
terminated unexpectedly or was shut down incorrectly, subsequent file
system journal replay could result in file system corruption. This update
fixes the race condition and the file system corruption no longer occurs in
the described scenario. (BZ#833764)

  • When the kvmclock initialization was used in a guest, it could write to

the Time Stamp Counter (TSC) and, under certain circumstances, could cause
the kernel to become unresponsive on boot. With this update, TSC
synchronization, which is unnecessary due to kvmclock, has been disabled,
thus fixing this bug. (BZ#834557)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386

Fixes

  • BZ - 816289 - CVE-2012-2136 kernel: net: insufficient data_len validation in sock_alloc_send_pskb()

CVEs

  • CVE-2012-2136

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
x86_64
kernel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 2e62f690614165b1d6d0b9b54f001fa6a1f46329d049c02e7fa450b9882b0cbd
kernel-debug-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 14204ac3228222eff3a62acbf48f2eb1bfa533c6c33f5d1dd82352efc1292541
kernel-debug-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 47f4b8c7121afbc7cccccffc6a3003f237d490f318fb2f7dbfddb9c61ea7bc31
kernel-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 4c3332dbc0ab02ad372a7e837140894cf38cd508b1aebfb7ca329aeae4e1f3cc
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: d89e11cc0ec34f5676f34579ecae2e92aa539df9029ec1a3a58936b1983ca51e
kernel-xen-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 906a4f2ec66fd8289b5d1806e0889360c1671982d6bbe49b7a77714208233483
kernel-xen-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: af18e0970cfd142cfb18ebabeeab1f9c2381e8b1161a1f00926c813e9724e52b
ia64
kernel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 94cbdb0b541ac0a965edc3f25c8d9057e6dc7497fb6af89b2d582e4f2b677b73
kernel-debug-2.6.18-238.40.1.el5.ia64.rpm SHA-256: d05c9b13b5d20fcdaf0b7a9b455953a70d4331a7a6fe287031f9be693fd0bee8
kernel-debug-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 38cd44f10f8e92c248dd6401560340dd8e5da709bb60f31ce374fcd9c1549973
kernel-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 172a138a7baba306d09fd610886a97545491ed1b6fba73ee800840094d1767c6
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 3082adbaaaecf1d855564a17e5039050644eee5c6d6519079ba5b7addba63b1e
kernel-xen-2.6.18-238.40.1.el5.ia64.rpm SHA-256: f9e6a095c1dfe2379a9a4b575433dd3e52f5023c91fc8dc8bbf1cc846fdcbac6
kernel-xen-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: a138562b944eb6b552b1e7b498242588083eca612bd51aa9da67757727864a21
i386
kernel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 357df74055c7ed08af930bba0f12bf8c10db07bc7dcea9802a084a456d1acccf
kernel-PAE-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8130583a0ac16c79771a7c6e1d2f2b6fccdeb52522676613324324662ade784f
kernel-PAE-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: c39a1b8ac9246926755b0f73d09ef074f7192a8eb3d2389f4fb252157dd8107e
kernel-debug-2.6.18-238.40.1.el5.i686.rpm SHA-256: 03dc2f5a11faaada8a7cb74844808dce4efbd0a32feed6895f1353d5fd297b91
kernel-debug-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: a4c16c2f7a9b19c901e74cd634c33fc3f5cf202c030cd0a6361418f54d9c5541
kernel-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 2e1b343d184351731828e34b065f566b853e85c5069152d9d93ed6318022e219
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.i386.rpm SHA-256: aa453e53d5490b76bb9144cf6e528d54b860f788c5d574d5d3de413b94e61c7c
kernel-xen-2.6.18-238.40.1.el5.i686.rpm SHA-256: c3edd6c8dfca7092b03915eadf0a05dbef294886de581143288f2a6b7ae6a53d
kernel-xen-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: e512a6b309ed98a6515dded21f7d9880cd6a877c0519439e187ef6459a7fbaef

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
x86_64
kernel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 2e62f690614165b1d6d0b9b54f001fa6a1f46329d049c02e7fa450b9882b0cbd
kernel-debug-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 14204ac3228222eff3a62acbf48f2eb1bfa533c6c33f5d1dd82352efc1292541
kernel-debug-debuginfo-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: e138cfef6fd670e6549b109004d7b878cf82fcbf0bfc8ddb928a30aec6055a4c
kernel-debug-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 47f4b8c7121afbc7cccccffc6a3003f237d490f318fb2f7dbfddb9c61ea7bc31
kernel-debuginfo-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 00daac9c775b1a03b5462b51faa0adce47768e77529d34252b4ac67225635c76
kernel-debuginfo-common-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 74d303a28eb1ad48e16382d9d366a1940a4bc53d0107e96476907d3f48a79bf0
kernel-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 4c3332dbc0ab02ad372a7e837140894cf38cd508b1aebfb7ca329aeae4e1f3cc
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: d89e11cc0ec34f5676f34579ecae2e92aa539df9029ec1a3a58936b1983ca51e
kernel-xen-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 906a4f2ec66fd8289b5d1806e0889360c1671982d6bbe49b7a77714208233483
kernel-xen-debuginfo-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 59a7cf395299bbf226638bf4a284dab3819a03b6d6a6b7bfc5a6d5fc39ff7b53
kernel-xen-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: af18e0970cfd142cfb18ebabeeab1f9c2381e8b1161a1f00926c813e9724e52b
ia64
kernel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 94cbdb0b541ac0a965edc3f25c8d9057e6dc7497fb6af89b2d582e4f2b677b73
kernel-debug-2.6.18-238.40.1.el5.ia64.rpm SHA-256: d05c9b13b5d20fcdaf0b7a9b455953a70d4331a7a6fe287031f9be693fd0bee8
kernel-debug-debuginfo-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 2c34ba04e8b44abf20ab90df43108c40efc3dbbc06a0556c54c5598faef0732f
kernel-debug-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 38cd44f10f8e92c248dd6401560340dd8e5da709bb60f31ce374fcd9c1549973
kernel-debuginfo-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 674b25ed265c989f327f2df16f1c03bcbd4b292e00d171d030ed7361205bcf1a
kernel-debuginfo-common-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 709f7baff7a554d1e86ce4137fb783b7632f897c5084d30a35a1a9a6adb6232b
kernel-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 172a138a7baba306d09fd610886a97545491ed1b6fba73ee800840094d1767c6
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 3082adbaaaecf1d855564a17e5039050644eee5c6d6519079ba5b7addba63b1e
kernel-xen-2.6.18-238.40.1.el5.ia64.rpm SHA-256: f9e6a095c1dfe2379a9a4b575433dd3e52f5023c91fc8dc8bbf1cc846fdcbac6
kernel-xen-debuginfo-2.6.18-238.40.1.el5.ia64.rpm SHA-256: 3e26421b5af20f3c9a688665edb6f9e0d1b1d14f001713f68d0d982ddebc08b8
kernel-xen-devel-2.6.18-238.40.1.el5.ia64.rpm SHA-256: a138562b944eb6b552b1e7b498242588083eca612bd51aa9da67757727864a21
i386
kernel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 357df74055c7ed08af930bba0f12bf8c10db07bc7dcea9802a084a456d1acccf
kernel-PAE-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8130583a0ac16c79771a7c6e1d2f2b6fccdeb52522676613324324662ade784f
kernel-PAE-debuginfo-2.6.18-238.40.1.el5.i686.rpm SHA-256: 91d592bd4f5b4f61bb982c918053b3a674770a797c5f73f58b7c5e211ee74643
kernel-PAE-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: c39a1b8ac9246926755b0f73d09ef074f7192a8eb3d2389f4fb252157dd8107e
kernel-debug-2.6.18-238.40.1.el5.i686.rpm SHA-256: 03dc2f5a11faaada8a7cb74844808dce4efbd0a32feed6895f1353d5fd297b91
kernel-debug-debuginfo-2.6.18-238.40.1.el5.i686.rpm SHA-256: 75e6cc21956b6889a73a7173f1b37661ff485da96e1f98bd1fc7f4c6d58c4275
kernel-debug-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: a4c16c2f7a9b19c901e74cd634c33fc3f5cf202c030cd0a6361418f54d9c5541
kernel-debuginfo-2.6.18-238.40.1.el5.i686.rpm SHA-256: 188e55a10231536d9139d7c541785a9c97a6cd9898c6fcc94c669a69d51babc9
kernel-debuginfo-common-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8275fb0171da951855fe98a7e817441ea8273cc73710660be245e0323a714d02
kernel-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 2e1b343d184351731828e34b065f566b853e85c5069152d9d93ed6318022e219
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.i386.rpm SHA-256: aa453e53d5490b76bb9144cf6e528d54b860f788c5d574d5d3de413b94e61c7c
kernel-xen-2.6.18-238.40.1.el5.i686.rpm SHA-256: c3edd6c8dfca7092b03915eadf0a05dbef294886de581143288f2a6b7ae6a53d
kernel-xen-debuginfo-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8f132e95bb6aa791aa1e8696524dd518db38eaa6c68191ecb8b64dee7f6789e3
kernel-xen-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: e512a6b309ed98a6515dded21f7d9880cd6a877c0519439e187ef6459a7fbaef

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
s390x
kernel-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 08d2534aa7163df4a4697a526fae50663fa205c6a88b45418deaf892bd4e7b69
kernel-debug-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 778ff8b63f68804f68695e8fec4764a0c5ca9afe339143eb44d4edffc515ed0a
kernel-debug-devel-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 54e076a132558b220c3d5b4dc2fc089bfa1941e68e02dabe08ba2d9217367c6c
kernel-devel-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 3325e8d4c8c20b5046b66c9b8e4a155da24f2a96868c97b50fbda2738c3050d5
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 455ab6d09f6f32aed433a1bf06280baa77738340c620a592897876adf795d93e
kernel-kdump-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 2978af33aa122c13c099779fed10ce52cbb14af492aded2d07e5da4b24531113
kernel-kdump-devel-2.6.18-238.40.1.el5.s390x.rpm SHA-256: 69b37eba063fddbc57e5c8e4b884775a6854b905cda38b43ced822a2f58f2d93

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
ppc
kernel-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: dfc1041d0b826c32ecbd8c1eca103d8d29d1612a5392dd5e48f408f95ba82c65
kernel-debug-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: 76354e1ee35c32b9198b7e3b4ee314a944c7920ecd525ec37b6b0d63584aa864
kernel-debug-devel-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: d3d685e6cff92484b246761178961cedf911f738d6f2a6b818b6151a0b365034
kernel-devel-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: c6416e2a9635b55deb03ab08d0597b81a5c7b0641bda616b7fa0893dbb8fa750
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.ppc.rpm SHA-256: 78cabcb191f3cf160e4d49681bf066a35dc074c9e48124da56100958c9b03d98
kernel-headers-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: 9d75a62d12e0aeb907a8562693bbbcb5e06453f7a2b7a14eeb373a53400892c3
kernel-kdump-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: 43c56e6338ed8bd821abcaf3d415f59896f51bbfee933d566e9e765146c7e259
kernel-kdump-devel-2.6.18-238.40.1.el5.ppc64.rpm SHA-256: b4958496f9bb6c8136e6579f9c9a87d908f4c860a41024fef32c43be3d298f95

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.40.1.el5.src.rpm SHA-256: 71125e801ec5562abe7f51cfedfb752e87058af680534444fecb8095ca21d591
x86_64
kernel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 2e62f690614165b1d6d0b9b54f001fa6a1f46329d049c02e7fa450b9882b0cbd
kernel-debug-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 14204ac3228222eff3a62acbf48f2eb1bfa533c6c33f5d1dd82352efc1292541
kernel-debug-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 47f4b8c7121afbc7cccccffc6a3003f237d490f318fb2f7dbfddb9c61ea7bc31
kernel-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 4c3332dbc0ab02ad372a7e837140894cf38cd508b1aebfb7ca329aeae4e1f3cc
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: d89e11cc0ec34f5676f34579ecae2e92aa539df9029ec1a3a58936b1983ca51e
kernel-xen-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: 906a4f2ec66fd8289b5d1806e0889360c1671982d6bbe49b7a77714208233483
kernel-xen-devel-2.6.18-238.40.1.el5.x86_64.rpm SHA-256: af18e0970cfd142cfb18ebabeeab1f9c2381e8b1161a1f00926c813e9724e52b
i386
kernel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 357df74055c7ed08af930bba0f12bf8c10db07bc7dcea9802a084a456d1acccf
kernel-PAE-2.6.18-238.40.1.el5.i686.rpm SHA-256: 8130583a0ac16c79771a7c6e1d2f2b6fccdeb52522676613324324662ade784f
kernel-PAE-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: c39a1b8ac9246926755b0f73d09ef074f7192a8eb3d2389f4fb252157dd8107e
kernel-debug-2.6.18-238.40.1.el5.i686.rpm SHA-256: 03dc2f5a11faaada8a7cb74844808dce4efbd0a32feed6895f1353d5fd297b91
kernel-debug-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: a4c16c2f7a9b19c901e74cd634c33fc3f5cf202c030cd0a6361418f54d9c5541
kernel-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: 2e1b343d184351731828e34b065f566b853e85c5069152d9d93ed6318022e219
kernel-doc-2.6.18-238.40.1.el5.noarch.rpm SHA-256: e70ece0d91e09e87e087146be8369da6633cf25ffb7bbc4d8bde2117ffb10dad
kernel-headers-2.6.18-238.40.1.el5.i386.rpm SHA-256: aa453e53d5490b76bb9144cf6e528d54b860f788c5d574d5d3de413b94e61c7c
kernel-xen-2.6.18-238.40.1.el5.i686.rpm SHA-256: c3edd6c8dfca7092b03915eadf0a05dbef294886de581143288f2a6b7ae6a53d
kernel-xen-devel-2.6.18-238.40.1.el5.i686.rpm SHA-256: e512a6b309ed98a6515dded21f7d9880cd6a877c0519439e187ef6459a7fbaef

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility