Skip to navigation Skip to main content

Utilities

  • Abonnements
  • Téléchargements
  • Console Red Hat
  • Assistance
Red Hat Customer Portal
  • Abonnements
  • Téléchargements
  • Console Red Hat
  • Assistance
  • Produits

    Produits Phares

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    Tous les produits

    Téléchargements et Conteneurs

    • Téléchargements
    • Packages
    • Containers

    Ressources principales

    • Documentation produits
    • Cycles de vie des produits
    • Conformité produits
    • Errata
  • Base de Connaisances

    Red Hat Knowledge Center

    • Solutions Knowledgebase
    • Articles Knowledgebase
    • Labs Portail Client
    • Errata

    Docs Produits phares

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    Toutes les Docs Produits

    Formation et Certification

    • À Propos
    • Index Cours
    • Index Certification
    • Skill Assessment
  • Sécurité

    Centre de Sécurité des Produits Red Hat

    • Mises à jour de sécurité
    • Alertes de Sécurité
    • Base de données CVE Red Hat
    • Errata

    References

    • Bulletins de sécurité
    • Indices de gravité
    • Données de sécurité

    Top Ressources

    • Labs de sécurité
    • Règles de rétroportage
    • Blog sécurité
  • Support

    Support Red Hat

    • Dossiers d'assistance
    • Résolution de panne
    • Obtenir de l'assistance
    • Contacter Red Hat Support

    Support Communauté Red Hat

    • Communauté Portail Client
    • Discussions Communauté
    • Red Hat Accelerator Program

    Top Ressources

    • Cycles de vie des produits
    • Labs Portail Client
    • Configurations prises en charge par Red Hat Jboss
    • Red Hat Lightspeed
Ou dépanner un problème.

Sélectionnez la langue

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure et gestion

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Informatique Cloud

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Stockage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Intégration et automatisation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
Tous les produits
Errata des produits Red Hat RHSA-2012:1347 - Security Advisory
Publié :
2012-10-09
Mis à jour :
2012-10-09

RHSA-2012:1347 - Security Advisory

  • Aperçu général
  • Paquets mis à jour

Synopsis

Important: kernel security and bug fix update

Type / Sévérité

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identifiez et remédiez aux systèmes concernés par cette alerte.

Voir les systèmes concernés

Sujet

Updated kernel packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the way socket buffers (skb) requiring TSO (TCP

segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

  • A buffer overflow flaw was found in the hfs_bnode_read() function in the

HFS Plus (HFS+) file system implementation in the Linux kernel. A local
user able to mount a specially-crafted HFS+ file system image could use
this flaw to cause a denial of service or escalate their privileges.
(CVE-2012-2319, Low)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
CVE-2012-3412.

This update also fixes the following bug:

  • Some subsystems clear the TIF_SIGPENDING flag during error handling in

fork() paths. Previously, if the flag was cleared, the ERESTARTNOINTR error
code could be returned. The underlying source code has been modified so
that the error code is no longer returned. (BZ#855754)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Produits concernés

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386

Correctifs

  • BZ - 819471 - CVE-2012-2319 kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020)
  • BZ - 844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option

CVE

  • CVE-2012-3412
  • CVE-2012-2319

Références

  • https://access.redhat.com/security/updates/classification/#important
Remarque: Il existe peut-être des versions plus récentes de ces paquets. Cliquer sur un nom de paquet pour obtenir plus de détails.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
x86_64
kernel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: c343662b5f3f84bd52a19621dcdc6b1d1b498d1f5dc9ffa92564422851f30ffa
kernel-debug-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 4e0b4a586176a05f1997134cd43d0dfd8902f57d077722c4995f31b3f4b6dc65
kernel-debug-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 0113300e6ac57192c1c1ebc120ac08075d824034f852a51b3648df79a40c5a6e
kernel-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 68f421c39f98b16424a639b3172d5a39d0b00c8c865c360de0c37531de70fcfe
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: d64fe64c1ad7298eb8a9b5f27fd98a82e431cbdfcb9a36443b6196192e5e4d47
kernel-xen-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 2ec006d44736e30cad3ddfefb83974d7eafe050185f8863b7ff4a5fbdf7fe208
kernel-xen-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: e1f55d293ca8fc8b8d2bf3d8842689025f078f64dbdcd5785d2c61b3b2dcda4b
ia64
kernel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 156e1450d75dc1b1d9b44ab2268ec6c9a8350d006b14cb361eb403b82a226069
kernel-debug-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5a6645a272b5c9a5b6c587bf4517309c0f00da5232295018a300887792bf5265
kernel-debug-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 933e2fda758034b58527d6efa5c775d1d877b26783d5478667bdc5c79d2d669a
kernel-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 0a2d55d239fda0a21d7c3bb4fafcdc4107cf58c0d15bb937044ddece695fbf81
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 6fd076a608e527284783879295aae9a4e71ca4eb2a6375f6312d757d884cb348
kernel-xen-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5b45bc6c77a32e8ff842f18022ca3b835eeeaed2412bbf41bffaa579d198183e
kernel-xen-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 414b7c825f1e2d034192188953988ae496847b98854d30bcb7d3966fefed08f1
i386
kernel-2.6.18-238.45.1.el5.i686.rpm SHA-256: f292f844660af2d7cdf6f547da17632484d85e24f183f9c9acde92f95230387f
kernel-PAE-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9ac5893e8ed3112dfd14b30ffaccf293c96d2a2fd7854d28cdc4824fee2d35a6
kernel-PAE-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: ce7b9ff2c7f793edeeff9927c70502e7f93f387c19c5d326cc0099d36bf880d9
kernel-debug-2.6.18-238.45.1.el5.i686.rpm SHA-256: 245b4eb0c385a53ac58727164bfb9ffca0e502d785d4ec0c00b6ee43e27513d8
kernel-debug-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9db2b94b64fc29a0cc91bbfd3c664172c869a360e9899235e704e50ee0fafa8a
kernel-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e86c29d78f5c61e93ad410120e754af64bf40d24d3929cb33a10cc158ddfe24f
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.i386.rpm SHA-256: 4288ae9e0a5423c4ce69ed3fd99e6c35f575d00ad752591f766c50d396d6b79a
kernel-xen-2.6.18-238.45.1.el5.i686.rpm SHA-256: 7a6f92251dca092982288ec343b6ac752a107e8744b775d799a210237a3778d1
kernel-xen-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e687ab61e692080457cb16d34ad1d41998f193d55318824fdef47f47473b4108

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
x86_64
kernel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: c343662b5f3f84bd52a19621dcdc6b1d1b498d1f5dc9ffa92564422851f30ffa
kernel-debug-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 4e0b4a586176a05f1997134cd43d0dfd8902f57d077722c4995f31b3f4b6dc65
kernel-debug-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 3fd820c4ebdce7f04b7a428a1a21e2cdd742386c77b732757caf936715566f09
kernel-debug-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 0113300e6ac57192c1c1ebc120ac08075d824034f852a51b3648df79a40c5a6e
kernel-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 9f73b475707d42fd8000c1bcd120409131d1d033c37c39983792355b5dedb2ee
kernel-debuginfo-common-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: b00a9a6e6b5b8e8df540303804d2dfb93881273685f17db157fa1a8354b56c1c
kernel-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 68f421c39f98b16424a639b3172d5a39d0b00c8c865c360de0c37531de70fcfe
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: d64fe64c1ad7298eb8a9b5f27fd98a82e431cbdfcb9a36443b6196192e5e4d47
kernel-xen-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 2ec006d44736e30cad3ddfefb83974d7eafe050185f8863b7ff4a5fbdf7fe208
kernel-xen-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: aec6a93500d3b9e1e95b47c70408ad07f7782a101cfd5f1717674b9f8f8dae38
kernel-xen-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: e1f55d293ca8fc8b8d2bf3d8842689025f078f64dbdcd5785d2c61b3b2dcda4b
ia64
kernel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 156e1450d75dc1b1d9b44ab2268ec6c9a8350d006b14cb361eb403b82a226069
kernel-debug-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5a6645a272b5c9a5b6c587bf4517309c0f00da5232295018a300887792bf5265
kernel-debug-debuginfo-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5de458b9476fa0c328c3e2c72cbab4f84db0d48efafec15c82dc061e29753718
kernel-debug-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 933e2fda758034b58527d6efa5c775d1d877b26783d5478667bdc5c79d2d669a
kernel-debuginfo-2.6.18-238.45.1.el5.ia64.rpm SHA-256: f118172e4a1f426bf2b598c1c5212c3f8871407f9d9ca11c0108f57e312c4096
kernel-debuginfo-common-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 8ffa515ff9d50f0d08775923415c892d76615dd3de7d084765ce227a48b16f8c
kernel-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 0a2d55d239fda0a21d7c3bb4fafcdc4107cf58c0d15bb937044ddece695fbf81
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 6fd076a608e527284783879295aae9a4e71ca4eb2a6375f6312d757d884cb348
kernel-xen-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5b45bc6c77a32e8ff842f18022ca3b835eeeaed2412bbf41bffaa579d198183e
kernel-xen-debuginfo-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 95edd707376c99d1df7635ff1b9f4dc1c1e6bab292e1d8648e012423568384cb
kernel-xen-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 414b7c825f1e2d034192188953988ae496847b98854d30bcb7d3966fefed08f1
i386
kernel-2.6.18-238.45.1.el5.i686.rpm SHA-256: f292f844660af2d7cdf6f547da17632484d85e24f183f9c9acde92f95230387f
kernel-PAE-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9ac5893e8ed3112dfd14b30ffaccf293c96d2a2fd7854d28cdc4824fee2d35a6
kernel-PAE-debuginfo-2.6.18-238.45.1.el5.i686.rpm SHA-256: b67219df27061c5edda0736b678ab5d0f39b6ee556a1f1e60eda6b7844fe4c77
kernel-PAE-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: ce7b9ff2c7f793edeeff9927c70502e7f93f387c19c5d326cc0099d36bf880d9
kernel-debug-2.6.18-238.45.1.el5.i686.rpm SHA-256: 245b4eb0c385a53ac58727164bfb9ffca0e502d785d4ec0c00b6ee43e27513d8
kernel-debug-debuginfo-2.6.18-238.45.1.el5.i686.rpm SHA-256: 966b22c1646e095f1c9cf205be2554d9505efe6826cb0052ad2682d684a13c0b
kernel-debug-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9db2b94b64fc29a0cc91bbfd3c664172c869a360e9899235e704e50ee0fafa8a
kernel-debuginfo-2.6.18-238.45.1.el5.i686.rpm SHA-256: 17cf6bfa6c0b6081fbbd7d1b89fa6358a6d1435e10f6d6374e8898a791aa7ce4
kernel-debuginfo-common-2.6.18-238.45.1.el5.i686.rpm SHA-256: 225155709092288230b223170012a3a72b21532bc1a58ab8a61ef5209dbeb1c3
kernel-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e86c29d78f5c61e93ad410120e754af64bf40d24d3929cb33a10cc158ddfe24f
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.i386.rpm SHA-256: 4288ae9e0a5423c4ce69ed3fd99e6c35f575d00ad752591f766c50d396d6b79a
kernel-xen-2.6.18-238.45.1.el5.i686.rpm SHA-256: 7a6f92251dca092982288ec343b6ac752a107e8744b775d799a210237a3778d1
kernel-xen-debuginfo-2.6.18-238.45.1.el5.i686.rpm SHA-256: e4c8ded0bc7d78bab343c967ffcb9fe9308edaa112f6ba743f083c839c5f903b
kernel-xen-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e687ab61e692080457cb16d34ad1d41998f193d55318824fdef47f47473b4108

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
s390x
kernel-2.6.18-238.45.1.el5.s390x.rpm SHA-256: de824bb3b1d9b88e2d702617038e7a809fb6ce5acc86e328dc0820b78843d67f
kernel-debug-2.6.18-238.45.1.el5.s390x.rpm SHA-256: 71006248c80dc2fd8394710096d615640be17272bffb8bece45434d5429e9bf8
kernel-debug-devel-2.6.18-238.45.1.el5.s390x.rpm SHA-256: 57bed4966485cbd2e7bd2527d57e81dd53b5ef5a75419912ea382c7ba92f787d
kernel-devel-2.6.18-238.45.1.el5.s390x.rpm SHA-256: cb8f408e60043fff9547ecdfa07e24a5b5735d900545c19c0c340de907d0b8fc
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.s390x.rpm SHA-256: 13491cac02211877c61bb819abca062ae7e95793f859cc9d52fb335099e2897b
kernel-kdump-2.6.18-238.45.1.el5.s390x.rpm SHA-256: bac7cfdec918a5b15435f8bb655176a3d09e6f14f5701b24c7a026818803dad3
kernel-kdump-devel-2.6.18-238.45.1.el5.s390x.rpm SHA-256: 9f0b33b07713be1eb8965335f1e114779b4a4145f2374aead7bb0fbcdace8555

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
ppc
kernel-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: f2dfb205602915449073c9f8a99dd89c86a4a0c96413e7c4f4255b3e92f337a7
kernel-debug-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: 749d260789d3877afeff8d22d9faa4dca6206074508cd5a4d93c25111230903c
kernel-debug-devel-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: 39115f53a56c5cade67efeefcd5918b8a141c94329b3c0d5d0eb6d2ae3177bc2
kernel-devel-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: b9aeb44538ef0298ade45df7f281fd27c294ed5bdefd87d1765cc16bccce2695
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.ppc.rpm SHA-256: d77ca82b8d1525b030c8200a628a7b9f738b96987197cdc1131be3569b593e03
kernel-headers-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: 3dab41748a7045eca390d8a82f5b7493125a7cd8b43377882f7f6061fd7e8096
kernel-kdump-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: e1fef435b24f9d108fb2b940501b9e647d6986f626a3e879ad18b646eb1eb75a
kernel-kdump-devel-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: e1bb8c687cbde3219621461eeb1fc8dcd544921a165ba7c84fdbfb55e91ad26e

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
x86_64
kernel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: c343662b5f3f84bd52a19621dcdc6b1d1b498d1f5dc9ffa92564422851f30ffa
kernel-debug-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 4e0b4a586176a05f1997134cd43d0dfd8902f57d077722c4995f31b3f4b6dc65
kernel-debug-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 0113300e6ac57192c1c1ebc120ac08075d824034f852a51b3648df79a40c5a6e
kernel-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 68f421c39f98b16424a639b3172d5a39d0b00c8c865c360de0c37531de70fcfe
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: d64fe64c1ad7298eb8a9b5f27fd98a82e431cbdfcb9a36443b6196192e5e4d47
kernel-xen-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 2ec006d44736e30cad3ddfefb83974d7eafe050185f8863b7ff4a5fbdf7fe208
kernel-xen-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: e1f55d293ca8fc8b8d2bf3d8842689025f078f64dbdcd5785d2c61b3b2dcda4b
i386
kernel-2.6.18-238.45.1.el5.i686.rpm SHA-256: f292f844660af2d7cdf6f547da17632484d85e24f183f9c9acde92f95230387f
kernel-PAE-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9ac5893e8ed3112dfd14b30ffaccf293c96d2a2fd7854d28cdc4824fee2d35a6
kernel-PAE-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: ce7b9ff2c7f793edeeff9927c70502e7f93f387c19c5d326cc0099d36bf880d9
kernel-debug-2.6.18-238.45.1.el5.i686.rpm SHA-256: 245b4eb0c385a53ac58727164bfb9ffca0e502d785d4ec0c00b6ee43e27513d8
kernel-debug-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9db2b94b64fc29a0cc91bbfd3c664172c869a360e9899235e704e50ee0fafa8a
kernel-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e86c29d78f5c61e93ad410120e754af64bf40d24d3929cb33a10cc158ddfe24f
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.i386.rpm SHA-256: 4288ae9e0a5423c4ce69ed3fd99e6c35f575d00ad752591f766c50d396d6b79a
kernel-xen-2.6.18-238.45.1.el5.i686.rpm SHA-256: 7a6f92251dca092982288ec343b6ac752a107e8744b775d799a210237a3778d1
kernel-xen-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e687ab61e692080457cb16d34ad1d41998f193d55318824fdef47f47473b4108

Le contact Red Hat Security est secalert@redhat.com. Plus d'infos contact à https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Liens rapides

  • Téléchargements
  • Abonnements
  • Dossiers d'assistance
  • Service client
  • Documentation produit

Aide

  • Nous contacter
  • FAQ du Portail Client
  • Aide relative à la connexion

Informations sur le site

  • Faire confiance à Red Hat
  • Politique de prise en charge des navigateurs
  • Accessibilité
  • Prix & récompenses
  • Colophon

Sites sur le même sujet

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • À propos de Red Hat
  • Jobs
  • Événements
  • Emplacements
  • Contactez Red Hat
  • Blog Red Hat
  • Inclusion at Red Hat
  • Red Hat Cool Shop
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Déclaration de confidentialité
  • Conditions d'utilisation
  • Toutes les politiques et directives
  • Accessibilité numérique