Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:1323 - Security Advisory
Issued:
2012-10-02
Updated:
2012-10-02

RHSA-2012:1323 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the way socket buffers (skb) requiring TSO (TCP

segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

  • A use-after-free flaw was found in the xacct_add_tsk() function in the

Linux kernel's taskstats subsystem. A local, unprivileged user could use
this flaw to cause an information leak or a denial of service.
(CVE-2012-3510, Moderate)

  • A buffer overflow flaw was found in the hfs_bnode_read() function in the

HFS Plus (HFS+) file system implementation in the Linux kernel. A local
user able to mount a specially-crafted HFS+ file system image could use
this flaw to cause a denial of service or escalate their privileges.
(CVE-2012-2319, Low)

  • A flaw was found in the way the msg_namelen variable in the rds_recvmsg()

function of the Linux kernel's Reliable Datagram Sockets (RDS) protocol
implementation was initialized. A local, unprivileged user could use this
flaw to leak kernel stack memory to user-space. (CVE-2012-3430, Low)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
CVE-2012-3412, and Alexander Peslyak for reporting CVE-2012-3510. The
CVE-2012-3430 issue was discovered by the Red Hat InfiniBand team.

This update also fixes the following bugs:

  • The cpuid_whitelist() function, masking the Enhanced Intel SpeedStep

(EST) flag from all guests, prevented the "cpuspeed" service from working
in the privileged Xen domain (dom0). CPU scaling was therefore not
possible. With this update, cpuid_whitelist() is aware whether the domain
executing CPUID is privileged or not, and enables the EST flag for dom0.
(BZ#846125)

  • If a delayed-allocation write was performed before quota was enabled,

the kernel displayed the following warning message:

WARNING: at fs/quota/dquot.c:988 dquot_claim_space+0x77/0x112()

This was because information about the delayed allocation was not recorded
in the quota structure. With this update, writes prior to enabling quota
are properly accounted for, and the message is not displayed. (BZ#847326)

  • In Red Hat Enterprise Linux 5.9, the DSCP (Differentiated Services Code

Point) netfilter module now supports mangling of the DSCP field.
(BZ#847327)

  • Some subsystems clear the TIF_SIGPENDING flag during error handling in

fork() paths. Previously, if the flag was cleared, the ERESTARTNOINTR error
code could be returned. The underlying source code has been modified so
that the error code is no longer returned. (BZ#847359)

  • An unnecessary check for the RXCW.CW bit could cause the Intel e1000e NIC

(Network Interface Controller) to not work properly. The check has been
removed so that the Intel e1000e NIC works as expected. (BZ#852448)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 819471 - CVE-2012-2319 kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020)
  • BZ - 820039 - CVE-2012-3430 kernel: recv{from,msg}() on an rds socket can leak kernel memory
  • BZ - 844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option
  • BZ - 847326 - WARNING: at fs/dquot.c:814 dquot_claim_reserved_space() in dmesg [rhel-5.8.z]
  • BZ - 849722 - CVE-2012-3510 kernel: taskstats: use-after-free in xacct_add_tsk()

CVEs

  • CVE-2012-3430
  • CVE-2012-3412
  • CVE-2012-3510
  • CVE-2012-2319

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-308.16.1.el5.src.rpm SHA-256: 2a7b9b9dfa6098f0b6374c05af25a86003a1a26ce510ef94b55aada3c0e8f2ba
x86_64
kernel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 20c18ed1c0be8833d9150af385d4da58e149d606e4db3dcd4d9ba7fe970e911e
kernel-debug-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: b938c36d2ae9869c19834a300fdac765be2f895f5c4930cfc714ea546baad8e4
kernel-debug-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 99d018eed4ccaf86bfc9bab9f1fd4a2f847f460e2de59fe2b48f17753c089157
kernel-debug-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 7e174187e06a3919fe157b71b11e13ac1d6386e7274d1f8e17352531bcebbc4e
kernel-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 061d24daeb37f68bcbb9701f0c7272bd85475eed1a660dd204b298e5aecd3eb1
kernel-debuginfo-common-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: ac61a7dcf2ffaa780cb38573fcb0a96abb9f9f7abef9acdab9ce24a278fac8d7
kernel-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: cf9b32f02e100239b383275c031ca5bb14ddb337e3ddcaf34e6483f7239c994e
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 85a33f5cdf632de89359153ed8e98ab4f4e7d5725fa2e25b2a1510c7c8857b97
kernel-xen-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: cd31965352597b2d7d2901d40a843f0035ebdfc5e8a624363e71f30639fdeb03
kernel-xen-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: c3b76972bcbdc6cc8cf2de4b765fd3a8cff328ae77c49aaf7da0e3a32a9a97af
kernel-xen-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: fbfa008fe971ca5fb0d1856429a79cbd3803451612a35145df21472b0f356288
ia64
kernel-2.6.18-308.16.1.el5.ia64.rpm SHA-256: 4a058cad93d1d53211062bf504993fcfd11c2c4b4f57f70ae7fa3b0af2a71242
kernel-debug-2.6.18-308.16.1.el5.ia64.rpm SHA-256: 3cc9309ad9f6bb7d837835577b7cf9d59767ba8d011634fd29d62b4daac57aa8
kernel-debug-debuginfo-2.6.18-308.16.1.el5.ia64.rpm SHA-256: 3f483cbc3502cc250ab12f635179cbdb471423998d3f2b49823a434acf6972e4
kernel-debug-devel-2.6.18-308.16.1.el5.ia64.rpm SHA-256: 2ba0373044264c7c7b2033d75329e02a02ce33db24d7045f1c593e2fbc0e6123
kernel-debuginfo-2.6.18-308.16.1.el5.ia64.rpm SHA-256: 3abc631ff559a09f879bd1ce69d0e0cefc8756a916a02aa5e20a30b2df41e217
kernel-debuginfo-common-2.6.18-308.16.1.el5.ia64.rpm SHA-256: c3b9eab3d7ccf4c73774df1effeb7e6f4754549362eab04507989b22ef76b0aa
kernel-devel-2.6.18-308.16.1.el5.ia64.rpm SHA-256: afec6260b5d1305fb2c1ce22161552778e5b37c772059ee69e7e8a9856ad5ba3
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.ia64.rpm SHA-256: a41f577fc4e18c41116a24e932abf0a73a5daa78d03f5377ad7f0fa52289e82a
kernel-xen-2.6.18-308.16.1.el5.ia64.rpm SHA-256: 25d2cd6a0f165161cee1cb593df9ebe0204c7364f2aace94293a2a368039d000
kernel-xen-debuginfo-2.6.18-308.16.1.el5.ia64.rpm SHA-256: 4adb9ef5624df31484c36c290b8713e0c6d752917597abe69712b3dd8d70587a
kernel-xen-devel-2.6.18-308.16.1.el5.ia64.rpm SHA-256: 8be125878d41ca1b4d98e2e99582c84587b99838f8629409c57d14752dc14605
i386
kernel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 115257281af52f0da43f8ec43df2a185a22fc9f330e2b473f4a7d3081c617051
kernel-PAE-2.6.18-308.16.1.el5.i686.rpm SHA-256: ed47486bf5266c38582b587f4f3a50bdb6b6a58ceb43392d95a69159369f2f8e
kernel-PAE-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: 6ea8ae87f50ae8cf72df29fc2a85453fec8f510f005ac27bcf80feb7462d53a8
kernel-PAE-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: ec3a8f69f9a7a0d2f0d29a16daa23cbc9ab4e45e9f3093f19e951e080c9bd0a4
kernel-debug-2.6.18-308.16.1.el5.i686.rpm SHA-256: 2184e2a8eb1bee1321052039bba909576cab7e43151ec100d1bf4293664a4ad3
kernel-debug-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: 0570b3ed5639dc52ccb9fba956c3c0bd7cbe5d38277d2cd75bf70137933aaa63
kernel-debug-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 303d9fe0512bf4185393aa179b73af1c57f1bd3ace869ccef5a5a9989b3c9ea8
kernel-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: a2fe836dc34c7986ad9d352145bef064c6e13d6a52282535483dce2583ab3728
kernel-debuginfo-common-2.6.18-308.16.1.el5.i686.rpm SHA-256: bf62935b0c9dcb1be75eabb5a3524c6b94823309a9000f482dda588dca09dc54
kernel-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 38c37774e2bcc2ca82387cc2dc74ec488803d30c2339302dadca4d669d3addc8
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.i386.rpm SHA-256: 2e36b61f375c1d5ccf16b05da197656bef3efba37f7b7a7e74791b56b848f9f0
kernel-xen-2.6.18-308.16.1.el5.i686.rpm SHA-256: 2d06c54faa224a4590f8cb32b2dd1c7d590fa1a11d9c8aae9f91dae38741a789
kernel-xen-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: b793f5b4fef7b49cc4625025b8cd8e0840ea0fb317e193b76e20971d4bcdc929
kernel-xen-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: d4171344e6b2d3b051de62559dc1fdfc35414da8072f473bc1d68ee8f6b1cd2b

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-308.16.1.el5.src.rpm SHA-256: 2a7b9b9dfa6098f0b6374c05af25a86003a1a26ce510ef94b55aada3c0e8f2ba
x86_64
kernel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 20c18ed1c0be8833d9150af385d4da58e149d606e4db3dcd4d9ba7fe970e911e
kernel-debug-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: b938c36d2ae9869c19834a300fdac765be2f895f5c4930cfc714ea546baad8e4
kernel-debug-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 99d018eed4ccaf86bfc9bab9f1fd4a2f847f460e2de59fe2b48f17753c089157
kernel-debug-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 7e174187e06a3919fe157b71b11e13ac1d6386e7274d1f8e17352531bcebbc4e
kernel-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 061d24daeb37f68bcbb9701f0c7272bd85475eed1a660dd204b298e5aecd3eb1
kernel-debuginfo-common-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: ac61a7dcf2ffaa780cb38573fcb0a96abb9f9f7abef9acdab9ce24a278fac8d7
kernel-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: cf9b32f02e100239b383275c031ca5bb14ddb337e3ddcaf34e6483f7239c994e
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 85a33f5cdf632de89359153ed8e98ab4f4e7d5725fa2e25b2a1510c7c8857b97
kernel-xen-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: cd31965352597b2d7d2901d40a843f0035ebdfc5e8a624363e71f30639fdeb03
kernel-xen-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: c3b76972bcbdc6cc8cf2de4b765fd3a8cff328ae77c49aaf7da0e3a32a9a97af
kernel-xen-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: fbfa008fe971ca5fb0d1856429a79cbd3803451612a35145df21472b0f356288
i386
kernel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 115257281af52f0da43f8ec43df2a185a22fc9f330e2b473f4a7d3081c617051
kernel-PAE-2.6.18-308.16.1.el5.i686.rpm SHA-256: ed47486bf5266c38582b587f4f3a50bdb6b6a58ceb43392d95a69159369f2f8e
kernel-PAE-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: 6ea8ae87f50ae8cf72df29fc2a85453fec8f510f005ac27bcf80feb7462d53a8
kernel-PAE-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: ec3a8f69f9a7a0d2f0d29a16daa23cbc9ab4e45e9f3093f19e951e080c9bd0a4
kernel-debug-2.6.18-308.16.1.el5.i686.rpm SHA-256: 2184e2a8eb1bee1321052039bba909576cab7e43151ec100d1bf4293664a4ad3
kernel-debug-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: 0570b3ed5639dc52ccb9fba956c3c0bd7cbe5d38277d2cd75bf70137933aaa63
kernel-debug-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 303d9fe0512bf4185393aa179b73af1c57f1bd3ace869ccef5a5a9989b3c9ea8
kernel-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: a2fe836dc34c7986ad9d352145bef064c6e13d6a52282535483dce2583ab3728
kernel-debuginfo-common-2.6.18-308.16.1.el5.i686.rpm SHA-256: bf62935b0c9dcb1be75eabb5a3524c6b94823309a9000f482dda588dca09dc54
kernel-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 38c37774e2bcc2ca82387cc2dc74ec488803d30c2339302dadca4d669d3addc8
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.i386.rpm SHA-256: 2e36b61f375c1d5ccf16b05da197656bef3efba37f7b7a7e74791b56b848f9f0
kernel-xen-2.6.18-308.16.1.el5.i686.rpm SHA-256: 2d06c54faa224a4590f8cb32b2dd1c7d590fa1a11d9c8aae9f91dae38741a789
kernel-xen-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: b793f5b4fef7b49cc4625025b8cd8e0840ea0fb317e193b76e20971d4bcdc929
kernel-xen-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: d4171344e6b2d3b051de62559dc1fdfc35414da8072f473bc1d68ee8f6b1cd2b

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-308.16.1.el5.src.rpm SHA-256: 2a7b9b9dfa6098f0b6374c05af25a86003a1a26ce510ef94b55aada3c0e8f2ba
x86_64
kernel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 20c18ed1c0be8833d9150af385d4da58e149d606e4db3dcd4d9ba7fe970e911e
kernel-debug-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: b938c36d2ae9869c19834a300fdac765be2f895f5c4930cfc714ea546baad8e4
kernel-debug-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 99d018eed4ccaf86bfc9bab9f1fd4a2f847f460e2de59fe2b48f17753c089157
kernel-debug-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 7e174187e06a3919fe157b71b11e13ac1d6386e7274d1f8e17352531bcebbc4e
kernel-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 061d24daeb37f68bcbb9701f0c7272bd85475eed1a660dd204b298e5aecd3eb1
kernel-debuginfo-common-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: ac61a7dcf2ffaa780cb38573fcb0a96abb9f9f7abef9acdab9ce24a278fac8d7
kernel-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: cf9b32f02e100239b383275c031ca5bb14ddb337e3ddcaf34e6483f7239c994e
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 85a33f5cdf632de89359153ed8e98ab4f4e7d5725fa2e25b2a1510c7c8857b97
kernel-xen-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: cd31965352597b2d7d2901d40a843f0035ebdfc5e8a624363e71f30639fdeb03
kernel-xen-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: c3b76972bcbdc6cc8cf2de4b765fd3a8cff328ae77c49aaf7da0e3a32a9a97af
kernel-xen-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: fbfa008fe971ca5fb0d1856429a79cbd3803451612a35145df21472b0f356288
i386
kernel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 115257281af52f0da43f8ec43df2a185a22fc9f330e2b473f4a7d3081c617051
kernel-PAE-2.6.18-308.16.1.el5.i686.rpm SHA-256: ed47486bf5266c38582b587f4f3a50bdb6b6a58ceb43392d95a69159369f2f8e
kernel-PAE-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: 6ea8ae87f50ae8cf72df29fc2a85453fec8f510f005ac27bcf80feb7462d53a8
kernel-PAE-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: ec3a8f69f9a7a0d2f0d29a16daa23cbc9ab4e45e9f3093f19e951e080c9bd0a4
kernel-debug-2.6.18-308.16.1.el5.i686.rpm SHA-256: 2184e2a8eb1bee1321052039bba909576cab7e43151ec100d1bf4293664a4ad3
kernel-debug-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: 0570b3ed5639dc52ccb9fba956c3c0bd7cbe5d38277d2cd75bf70137933aaa63
kernel-debug-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 303d9fe0512bf4185393aa179b73af1c57f1bd3ace869ccef5a5a9989b3c9ea8
kernel-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: a2fe836dc34c7986ad9d352145bef064c6e13d6a52282535483dce2583ab3728
kernel-debuginfo-common-2.6.18-308.16.1.el5.i686.rpm SHA-256: bf62935b0c9dcb1be75eabb5a3524c6b94823309a9000f482dda588dca09dc54
kernel-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 38c37774e2bcc2ca82387cc2dc74ec488803d30c2339302dadca4d669d3addc8
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.i386.rpm SHA-256: 2e36b61f375c1d5ccf16b05da197656bef3efba37f7b7a7e74791b56b848f9f0
kernel-xen-2.6.18-308.16.1.el5.i686.rpm SHA-256: 2d06c54faa224a4590f8cb32b2dd1c7d590fa1a11d9c8aae9f91dae38741a789
kernel-xen-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: b793f5b4fef7b49cc4625025b8cd8e0840ea0fb317e193b76e20971d4bcdc929
kernel-xen-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: d4171344e6b2d3b051de62559dc1fdfc35414da8072f473bc1d68ee8f6b1cd2b

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-308.16.1.el5.src.rpm SHA-256: 2a7b9b9dfa6098f0b6374c05af25a86003a1a26ce510ef94b55aada3c0e8f2ba
s390x
kernel-2.6.18-308.16.1.el5.s390x.rpm SHA-256: 6e5ea11dcdc772449ffaf1ae501f30336193fb67b8e9f1e3f5cf55aa44837ea0
kernel-debug-2.6.18-308.16.1.el5.s390x.rpm SHA-256: 6f828c6fce8bad1638ec80862d09af0a6a7775a2c9e871d12991d107e5a64a01
kernel-debug-debuginfo-2.6.18-308.16.1.el5.s390x.rpm SHA-256: 8f821d57f23a87958c7fd32a6bff297243fdab2f82306f9d9fc8bb50ba6ed9ec
kernel-debug-devel-2.6.18-308.16.1.el5.s390x.rpm SHA-256: b5cf74eff1cd034d9fcb99a1254ce65323f597d82645f6b45df230b985c745f5
kernel-debuginfo-2.6.18-308.16.1.el5.s390x.rpm SHA-256: fa6583925e6728a8a9d382daf3d507b1a812bd369de0e403c935299690d72f62
kernel-debuginfo-common-2.6.18-308.16.1.el5.s390x.rpm SHA-256: b01a6ab9e9bb33a3ad38e8ee7b4f7dd0c3f25c1258b18ab2fbc9567267107157
kernel-devel-2.6.18-308.16.1.el5.s390x.rpm SHA-256: 259c42d39b505894c1ab8311b6e479b377253ef32edc69d9d1a78b89f46cb889
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.s390x.rpm SHA-256: e57b61c977d29955e9fb65da1f6dc62d13d6d8d0ba29adb405a90cfa008dca81
kernel-kdump-2.6.18-308.16.1.el5.s390x.rpm SHA-256: b9a3920ed69b60089fa4a05f90c8daa87b02db193a8560f5167d3d3711d7e85d
kernel-kdump-debuginfo-2.6.18-308.16.1.el5.s390x.rpm SHA-256: a33f2f7d53580d75fec8954b2bf188d26622b2a3a2973b0549b856ddc85c1663
kernel-kdump-devel-2.6.18-308.16.1.el5.s390x.rpm SHA-256: fa7ddff79756568139e569762d2e13dbdc28488bf994bfdaf1de3bb0e96c7814

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-308.16.1.el5.src.rpm SHA-256: 2a7b9b9dfa6098f0b6374c05af25a86003a1a26ce510ef94b55aada3c0e8f2ba
ppc
kernel-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: 2b1059fa7a2dab59542cf9155b484e7be1337b2c9df7c0a4889993d632693207
kernel-debug-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: 845ea68e33d8d3c88b248013072e7bdf803ae45d7d031db17d41d916984f6cf0
kernel-debug-debuginfo-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: 5c385b67bcd31443565220b668af1ba82de3718e4acc078c292be6c259902209
kernel-debug-devel-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: ede820dd2c58bd8fc0f097ce7d98a9f7a705cfc578442fbd8be556e99dcd3c76
kernel-debuginfo-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: ee4c1fdb844c7431b8512c5be836887183e08df5cda1500f867239b2da606bc4
kernel-debuginfo-common-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: adff47d1fb0dcca706bf98313a90856e259b3f3b881ec6a8de30d8e49bd18e8e
kernel-devel-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: 8da3c8db31b25efc3fee023f491f16986aecad03600143ea46819e4573800c4c
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.ppc.rpm SHA-256: 810b9fe171d46deb123ef9ba94168fbc7f3c465037410a1b93001b26f820e02b
kernel-headers-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: 672015c44fd066c80d0d3ac580063e5dad96b2283cc9d488bd61f948ee10961e
kernel-kdump-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: ab1a243b3ddb630f714894cedb95a943ffcf0ca36ea7dad0b5ab49ff89f20038
kernel-kdump-debuginfo-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: 96c19ab9f2d3ac1c7631fbfd5ed5e64d5c59aa67377fa721ef249612328d4ce3
kernel-kdump-devel-2.6.18-308.16.1.el5.ppc64.rpm SHA-256: 9c68e998700dc38801a3fe0d66e71bf61521fef3e4c12e66f2cb354a61313368

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-308.16.1.el5.src.rpm SHA-256: 2a7b9b9dfa6098f0b6374c05af25a86003a1a26ce510ef94b55aada3c0e8f2ba
x86_64
kernel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 20c18ed1c0be8833d9150af385d4da58e149d606e4db3dcd4d9ba7fe970e911e
kernel-debug-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: b938c36d2ae9869c19834a300fdac765be2f895f5c4930cfc714ea546baad8e4
kernel-debug-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 99d018eed4ccaf86bfc9bab9f1fd4a2f847f460e2de59fe2b48f17753c089157
kernel-debug-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 7e174187e06a3919fe157b71b11e13ac1d6386e7274d1f8e17352531bcebbc4e
kernel-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 061d24daeb37f68bcbb9701f0c7272bd85475eed1a660dd204b298e5aecd3eb1
kernel-debuginfo-common-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: ac61a7dcf2ffaa780cb38573fcb0a96abb9f9f7abef9acdab9ce24a278fac8d7
kernel-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: cf9b32f02e100239b383275c031ca5bb14ddb337e3ddcaf34e6483f7239c994e
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: 85a33f5cdf632de89359153ed8e98ab4f4e7d5725fa2e25b2a1510c7c8857b97
kernel-xen-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: cd31965352597b2d7d2901d40a843f0035ebdfc5e8a624363e71f30639fdeb03
kernel-xen-debuginfo-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: c3b76972bcbdc6cc8cf2de4b765fd3a8cff328ae77c49aaf7da0e3a32a9a97af
kernel-xen-devel-2.6.18-308.16.1.el5.x86_64.rpm SHA-256: fbfa008fe971ca5fb0d1856429a79cbd3803451612a35145df21472b0f356288
i386
kernel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 115257281af52f0da43f8ec43df2a185a22fc9f330e2b473f4a7d3081c617051
kernel-PAE-2.6.18-308.16.1.el5.i686.rpm SHA-256: ed47486bf5266c38582b587f4f3a50bdb6b6a58ceb43392d95a69159369f2f8e
kernel-PAE-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: 6ea8ae87f50ae8cf72df29fc2a85453fec8f510f005ac27bcf80feb7462d53a8
kernel-PAE-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: ec3a8f69f9a7a0d2f0d29a16daa23cbc9ab4e45e9f3093f19e951e080c9bd0a4
kernel-debug-2.6.18-308.16.1.el5.i686.rpm SHA-256: 2184e2a8eb1bee1321052039bba909576cab7e43151ec100d1bf4293664a4ad3
kernel-debug-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: 0570b3ed5639dc52ccb9fba956c3c0bd7cbe5d38277d2cd75bf70137933aaa63
kernel-debug-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 303d9fe0512bf4185393aa179b73af1c57f1bd3ace869ccef5a5a9989b3c9ea8
kernel-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: a2fe836dc34c7986ad9d352145bef064c6e13d6a52282535483dce2583ab3728
kernel-debuginfo-common-2.6.18-308.16.1.el5.i686.rpm SHA-256: bf62935b0c9dcb1be75eabb5a3524c6b94823309a9000f482dda588dca09dc54
kernel-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: 38c37774e2bcc2ca82387cc2dc74ec488803d30c2339302dadca4d669d3addc8
kernel-doc-2.6.18-308.16.1.el5.noarch.rpm SHA-256: 1450d795db835b52190f07e6eecf48afe2ae1f375a2cee60b74051d01bd59f5a
kernel-headers-2.6.18-308.16.1.el5.i386.rpm SHA-256: 2e36b61f375c1d5ccf16b05da197656bef3efba37f7b7a7e74791b56b848f9f0
kernel-xen-2.6.18-308.16.1.el5.i686.rpm SHA-256: 2d06c54faa224a4590f8cb32b2dd1c7d590fa1a11d9c8aae9f91dae38741a789
kernel-xen-debuginfo-2.6.18-308.16.1.el5.i686.rpm SHA-256: b793f5b4fef7b49cc4625025b8cd8e0840ea0fb317e193b76e20971d4bcdc929
kernel-xen-devel-2.6.18-308.16.1.el5.i686.rpm SHA-256: d4171344e6b2d3b051de62559dc1fdfc35414da8072f473bc1d68ee8f6b1cd2b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility