Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:1347 - Security Advisory
Issued:
2012-10-09
Updated:
2012-10-09

RHSA-2012:1347 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the way socket buffers (skb) requiring TSO (TCP

segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

  • A buffer overflow flaw was found in the hfs_bnode_read() function in the

HFS Plus (HFS+) file system implementation in the Linux kernel. A local
user able to mount a specially-crafted HFS+ file system image could use
this flaw to cause a denial of service or escalate their privileges.
(CVE-2012-2319, Low)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
CVE-2012-3412.

This update also fixes the following bug:

  • Some subsystems clear the TIF_SIGPENDING flag during error handling in

fork() paths. Previously, if the flag was cleared, the ERESTARTNOINTR error
code could be returned. The underlying source code has been modified so
that the error code is no longer returned. (BZ#855754)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc

Fixes

  • BZ - 819471 - CVE-2012-2319 kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020)
  • BZ - 844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option

CVEs

  • CVE-2012-3412
  • CVE-2012-2319

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
x86_64
kernel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: c343662b5f3f84bd52a19621dcdc6b1d1b498d1f5dc9ffa92564422851f30ffa
kernel-debug-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 4e0b4a586176a05f1997134cd43d0dfd8902f57d077722c4995f31b3f4b6dc65
kernel-debug-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 0113300e6ac57192c1c1ebc120ac08075d824034f852a51b3648df79a40c5a6e
kernel-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 68f421c39f98b16424a639b3172d5a39d0b00c8c865c360de0c37531de70fcfe
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: d64fe64c1ad7298eb8a9b5f27fd98a82e431cbdfcb9a36443b6196192e5e4d47
kernel-xen-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 2ec006d44736e30cad3ddfefb83974d7eafe050185f8863b7ff4a5fbdf7fe208
kernel-xen-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: e1f55d293ca8fc8b8d2bf3d8842689025f078f64dbdcd5785d2c61b3b2dcda4b
ia64
kernel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 156e1450d75dc1b1d9b44ab2268ec6c9a8350d006b14cb361eb403b82a226069
kernel-debug-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5a6645a272b5c9a5b6c587bf4517309c0f00da5232295018a300887792bf5265
kernel-debug-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 933e2fda758034b58527d6efa5c775d1d877b26783d5478667bdc5c79d2d669a
kernel-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 0a2d55d239fda0a21d7c3bb4fafcdc4107cf58c0d15bb937044ddece695fbf81
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 6fd076a608e527284783879295aae9a4e71ca4eb2a6375f6312d757d884cb348
kernel-xen-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5b45bc6c77a32e8ff842f18022ca3b835eeeaed2412bbf41bffaa579d198183e
kernel-xen-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 414b7c825f1e2d034192188953988ae496847b98854d30bcb7d3966fefed08f1
i386
kernel-2.6.18-238.45.1.el5.i686.rpm SHA-256: f292f844660af2d7cdf6f547da17632484d85e24f183f9c9acde92f95230387f
kernel-PAE-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9ac5893e8ed3112dfd14b30ffaccf293c96d2a2fd7854d28cdc4824fee2d35a6
kernel-PAE-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: ce7b9ff2c7f793edeeff9927c70502e7f93f387c19c5d326cc0099d36bf880d9
kernel-debug-2.6.18-238.45.1.el5.i686.rpm SHA-256: 245b4eb0c385a53ac58727164bfb9ffca0e502d785d4ec0c00b6ee43e27513d8
kernel-debug-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9db2b94b64fc29a0cc91bbfd3c664172c869a360e9899235e704e50ee0fafa8a
kernel-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e86c29d78f5c61e93ad410120e754af64bf40d24d3929cb33a10cc158ddfe24f
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.i386.rpm SHA-256: 4288ae9e0a5423c4ce69ed3fd99e6c35f575d00ad752591f766c50d396d6b79a
kernel-xen-2.6.18-238.45.1.el5.i686.rpm SHA-256: 7a6f92251dca092982288ec343b6ac752a107e8744b775d799a210237a3778d1
kernel-xen-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e687ab61e692080457cb16d34ad1d41998f193d55318824fdef47f47473b4108

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
x86_64
kernel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: c343662b5f3f84bd52a19621dcdc6b1d1b498d1f5dc9ffa92564422851f30ffa
kernel-debug-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 4e0b4a586176a05f1997134cd43d0dfd8902f57d077722c4995f31b3f4b6dc65
kernel-debug-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 0113300e6ac57192c1c1ebc120ac08075d824034f852a51b3648df79a40c5a6e
kernel-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 68f421c39f98b16424a639b3172d5a39d0b00c8c865c360de0c37531de70fcfe
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: d64fe64c1ad7298eb8a9b5f27fd98a82e431cbdfcb9a36443b6196192e5e4d47
kernel-xen-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 2ec006d44736e30cad3ddfefb83974d7eafe050185f8863b7ff4a5fbdf7fe208
kernel-xen-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: e1f55d293ca8fc8b8d2bf3d8842689025f078f64dbdcd5785d2c61b3b2dcda4b
i386
kernel-2.6.18-238.45.1.el5.i686.rpm SHA-256: f292f844660af2d7cdf6f547da17632484d85e24f183f9c9acde92f95230387f
kernel-PAE-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9ac5893e8ed3112dfd14b30ffaccf293c96d2a2fd7854d28cdc4824fee2d35a6
kernel-PAE-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: ce7b9ff2c7f793edeeff9927c70502e7f93f387c19c5d326cc0099d36bf880d9
kernel-debug-2.6.18-238.45.1.el5.i686.rpm SHA-256: 245b4eb0c385a53ac58727164bfb9ffca0e502d785d4ec0c00b6ee43e27513d8
kernel-debug-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9db2b94b64fc29a0cc91bbfd3c664172c869a360e9899235e704e50ee0fafa8a
kernel-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e86c29d78f5c61e93ad410120e754af64bf40d24d3929cb33a10cc158ddfe24f
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.i386.rpm SHA-256: 4288ae9e0a5423c4ce69ed3fd99e6c35f575d00ad752591f766c50d396d6b79a
kernel-xen-2.6.18-238.45.1.el5.i686.rpm SHA-256: 7a6f92251dca092982288ec343b6ac752a107e8744b775d799a210237a3778d1
kernel-xen-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e687ab61e692080457cb16d34ad1d41998f193d55318824fdef47f47473b4108

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
x86_64
kernel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: c343662b5f3f84bd52a19621dcdc6b1d1b498d1f5dc9ffa92564422851f30ffa
kernel-debug-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 4e0b4a586176a05f1997134cd43d0dfd8902f57d077722c4995f31b3f4b6dc65
kernel-debug-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 3fd820c4ebdce7f04b7a428a1a21e2cdd742386c77b732757caf936715566f09
kernel-debug-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 0113300e6ac57192c1c1ebc120ac08075d824034f852a51b3648df79a40c5a6e
kernel-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 9f73b475707d42fd8000c1bcd120409131d1d033c37c39983792355b5dedb2ee
kernel-debuginfo-common-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: b00a9a6e6b5b8e8df540303804d2dfb93881273685f17db157fa1a8354b56c1c
kernel-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 68f421c39f98b16424a639b3172d5a39d0b00c8c865c360de0c37531de70fcfe
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: d64fe64c1ad7298eb8a9b5f27fd98a82e431cbdfcb9a36443b6196192e5e4d47
kernel-xen-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: 2ec006d44736e30cad3ddfefb83974d7eafe050185f8863b7ff4a5fbdf7fe208
kernel-xen-debuginfo-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: aec6a93500d3b9e1e95b47c70408ad07f7782a101cfd5f1717674b9f8f8dae38
kernel-xen-devel-2.6.18-238.45.1.el5.x86_64.rpm SHA-256: e1f55d293ca8fc8b8d2bf3d8842689025f078f64dbdcd5785d2c61b3b2dcda4b
ia64
kernel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 156e1450d75dc1b1d9b44ab2268ec6c9a8350d006b14cb361eb403b82a226069
kernel-debug-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5a6645a272b5c9a5b6c587bf4517309c0f00da5232295018a300887792bf5265
kernel-debug-debuginfo-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5de458b9476fa0c328c3e2c72cbab4f84db0d48efafec15c82dc061e29753718
kernel-debug-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 933e2fda758034b58527d6efa5c775d1d877b26783d5478667bdc5c79d2d669a
kernel-debuginfo-2.6.18-238.45.1.el5.ia64.rpm SHA-256: f118172e4a1f426bf2b598c1c5212c3f8871407f9d9ca11c0108f57e312c4096
kernel-debuginfo-common-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 8ffa515ff9d50f0d08775923415c892d76615dd3de7d084765ce227a48b16f8c
kernel-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 0a2d55d239fda0a21d7c3bb4fafcdc4107cf58c0d15bb937044ddece695fbf81
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 6fd076a608e527284783879295aae9a4e71ca4eb2a6375f6312d757d884cb348
kernel-xen-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 5b45bc6c77a32e8ff842f18022ca3b835eeeaed2412bbf41bffaa579d198183e
kernel-xen-debuginfo-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 95edd707376c99d1df7635ff1b9f4dc1c1e6bab292e1d8648e012423568384cb
kernel-xen-devel-2.6.18-238.45.1.el5.ia64.rpm SHA-256: 414b7c825f1e2d034192188953988ae496847b98854d30bcb7d3966fefed08f1
i386
kernel-2.6.18-238.45.1.el5.i686.rpm SHA-256: f292f844660af2d7cdf6f547da17632484d85e24f183f9c9acde92f95230387f
kernel-PAE-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9ac5893e8ed3112dfd14b30ffaccf293c96d2a2fd7854d28cdc4824fee2d35a6
kernel-PAE-debuginfo-2.6.18-238.45.1.el5.i686.rpm SHA-256: b67219df27061c5edda0736b678ab5d0f39b6ee556a1f1e60eda6b7844fe4c77
kernel-PAE-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: ce7b9ff2c7f793edeeff9927c70502e7f93f387c19c5d326cc0099d36bf880d9
kernel-debug-2.6.18-238.45.1.el5.i686.rpm SHA-256: 245b4eb0c385a53ac58727164bfb9ffca0e502d785d4ec0c00b6ee43e27513d8
kernel-debug-debuginfo-2.6.18-238.45.1.el5.i686.rpm SHA-256: 966b22c1646e095f1c9cf205be2554d9505efe6826cb0052ad2682d684a13c0b
kernel-debug-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: 9db2b94b64fc29a0cc91bbfd3c664172c869a360e9899235e704e50ee0fafa8a
kernel-debuginfo-2.6.18-238.45.1.el5.i686.rpm SHA-256: 17cf6bfa6c0b6081fbbd7d1b89fa6358a6d1435e10f6d6374e8898a791aa7ce4
kernel-debuginfo-common-2.6.18-238.45.1.el5.i686.rpm SHA-256: 225155709092288230b223170012a3a72b21532bc1a58ab8a61ef5209dbeb1c3
kernel-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e86c29d78f5c61e93ad410120e754af64bf40d24d3929cb33a10cc158ddfe24f
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.i386.rpm SHA-256: 4288ae9e0a5423c4ce69ed3fd99e6c35f575d00ad752591f766c50d396d6b79a
kernel-xen-2.6.18-238.45.1.el5.i686.rpm SHA-256: 7a6f92251dca092982288ec343b6ac752a107e8744b775d799a210237a3778d1
kernel-xen-debuginfo-2.6.18-238.45.1.el5.i686.rpm SHA-256: e4c8ded0bc7d78bab343c967ffcb9fe9308edaa112f6ba743f083c839c5f903b
kernel-xen-devel-2.6.18-238.45.1.el5.i686.rpm SHA-256: e687ab61e692080457cb16d34ad1d41998f193d55318824fdef47f47473b4108

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
s390x
kernel-2.6.18-238.45.1.el5.s390x.rpm SHA-256: de824bb3b1d9b88e2d702617038e7a809fb6ce5acc86e328dc0820b78843d67f
kernel-debug-2.6.18-238.45.1.el5.s390x.rpm SHA-256: 71006248c80dc2fd8394710096d615640be17272bffb8bece45434d5429e9bf8
kernel-debug-devel-2.6.18-238.45.1.el5.s390x.rpm SHA-256: 57bed4966485cbd2e7bd2527d57e81dd53b5ef5a75419912ea382c7ba92f787d
kernel-devel-2.6.18-238.45.1.el5.s390x.rpm SHA-256: cb8f408e60043fff9547ecdfa07e24a5b5735d900545c19c0c340de907d0b8fc
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.s390x.rpm SHA-256: 13491cac02211877c61bb819abca062ae7e95793f859cc9d52fb335099e2897b
kernel-kdump-2.6.18-238.45.1.el5.s390x.rpm SHA-256: bac7cfdec918a5b15435f8bb655176a3d09e6f14f5701b24c7a026818803dad3
kernel-kdump-devel-2.6.18-238.45.1.el5.s390x.rpm SHA-256: 9f0b33b07713be1eb8965335f1e114779b4a4145f2374aead7bb0fbcdace8555

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.45.1.el5.src.rpm SHA-256: d6dbd4d185cd845bd71947d68f26d897ea8f0ce131b4d7e8771d8d9e4b84a14c
ppc
kernel-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: f2dfb205602915449073c9f8a99dd89c86a4a0c96413e7c4f4255b3e92f337a7
kernel-debug-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: 749d260789d3877afeff8d22d9faa4dca6206074508cd5a4d93c25111230903c
kernel-debug-devel-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: 39115f53a56c5cade67efeefcd5918b8a141c94329b3c0d5d0eb6d2ae3177bc2
kernel-devel-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: b9aeb44538ef0298ade45df7f281fd27c294ed5bdefd87d1765cc16bccce2695
kernel-doc-2.6.18-238.45.1.el5.noarch.rpm SHA-256: 23cda34af4ac02a31354f1833cbda20eacff9a9bd778cfc0a4348359cdce22d7
kernel-headers-2.6.18-238.45.1.el5.ppc.rpm SHA-256: d77ca82b8d1525b030c8200a628a7b9f738b96987197cdc1131be3569b593e03
kernel-headers-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: 3dab41748a7045eca390d8a82f5b7493125a7cd8b43377882f7f6061fd7e8096
kernel-kdump-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: e1fef435b24f9d108fb2b940501b9e647d6986f626a3e879ad18b646eb1eb75a
kernel-kdump-devel-2.6.18-238.45.1.el5.ppc64.rpm SHA-256: e1bb8c687cbde3219621461eeb1fc8dcd544921a165ba7c84fdbfb55e91ad26e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter