Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2013:0695 - Security Advisory
Issued:
2013-04-02
Updated:
2013-04-02

RHSA-2013:0695 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.6 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A race condition was found in the way the Linux kernel's ptrace

implementation handled PTRACE_SETREGS requests when the debuggee was woken
due to a SIGKILL signal instead of being stopped. A local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2013-0871,
Important)

Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc

Fixes

  • BZ - 911937 - CVE-2013-0871 kernel: race condition with PTRACE_SETREGS

CVEs

  • CVE-2013-0871

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.49.1.el5.src.rpm SHA-256: 806fb3c2650d2893db1b1d8818e243301015c5cf8f9d4ca46ce768225c9cc48d
x86_64
kernel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 0d87c9b0106deb91f93b9f511514fa7276508db8fa5b0e5c1dc6268fc61042f3
kernel-debug-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 6d383c1f530418fc21430e163a1393e62bfba622259ce91c9d23c67a950ae9fa
kernel-debug-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: d1857969df9c03e53b378f6eb350674c1091b1e34b5340d3f5f2d44ea120645e
kernel-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 6f9fa428ffb5f6aca5a171df7498480e2d0acdd7d6f7bd6a3114008ead3fa753
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 4a31800e2fd1464404117c0e06eac3fb5ca90f5a0872a16c7481a250cdaf8533
kernel-xen-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 87e9098fe4947e219f4ce397b022c518da0ea480b9292fae6404d97169dd94a1
kernel-xen-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: f12143afd09b4cbb25e0534b9357fff5b3faba3afcb51fbf904364ec9297213e
ia64
kernel-2.6.18-238.49.1.el5.ia64.rpm SHA-256: ac05a722749b76201fc8401ac7b030ab785678508a66990aff6e5a9f02370e48
kernel-debug-2.6.18-238.49.1.el5.ia64.rpm SHA-256: ce34afd8fab3452da65da960af684bcbc054d060d29d8eabfd1f82bdc178de3f
kernel-debug-devel-2.6.18-238.49.1.el5.ia64.rpm SHA-256: 60aff11e80c1b5e184661626eda532eef4cf15571518065ea7edc5683b9ec5b5
kernel-devel-2.6.18-238.49.1.el5.ia64.rpm SHA-256: f1d6c6535937c28476dbbf90a097249d45222948eed0e4b66cc8539f2a0c857a
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.ia64.rpm SHA-256: f389182eaba9b77d04ab3458bae4f4982d88516099f9cfc993d212d6a2de784f
kernel-xen-2.6.18-238.49.1.el5.ia64.rpm SHA-256: 9f54f6b267067522b1306ac34c05225076ff64f6468df550c286714e6424caea
kernel-xen-devel-2.6.18-238.49.1.el5.ia64.rpm SHA-256: aef0d797775bfbe2fa1facc9fd529150b458a08b12e703132437438ff45d9a92
i386
kernel-2.6.18-238.49.1.el5.i686.rpm SHA-256: da065a2b5f9da6d7a9536c8ba2608831adb2ee348dc7a96bfee86cbc21831f5d
kernel-PAE-2.6.18-238.49.1.el5.i686.rpm SHA-256: 760a1bb5c11899bbc966b98fd176892256a5e8950becd21c2df0038a15b231fc
kernel-PAE-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: 85e8043d18f3dd31f917478fc3db43be79c538eea7f48c49e32aba703ec35ee5
kernel-debug-2.6.18-238.49.1.el5.i686.rpm SHA-256: e56bb16d5d1543035b0a245a54c97ae9309d309970b440b87fe3fbc8dcfe3a0c
kernel-debug-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: e09c5a32c89541524d3f3e2ff5f3beada805bbf435a28899ff1f212ab243b70b
kernel-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: 674677acf26eb96564b924671a6e2e131ac8cb7c1bb3831daa8f4021422c4a4e
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.i386.rpm SHA-256: 6d4d992ed6590f839e274cb9ff41b107e073d03f1b48d603c1d2e3696eee47b6
kernel-xen-2.6.18-238.49.1.el5.i686.rpm SHA-256: 20cb2c3dc37c24ba56d3e42515806023649483a6762ee0add0072d24664b753f
kernel-xen-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: b5f248045e34d820345106ca8f2e1f8feff97a893df56bc726b7160a639e4eac

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6

SRPM
kernel-2.6.18-238.49.1.el5.src.rpm SHA-256: 806fb3c2650d2893db1b1d8818e243301015c5cf8f9d4ca46ce768225c9cc48d
x86_64
kernel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 0d87c9b0106deb91f93b9f511514fa7276508db8fa5b0e5c1dc6268fc61042f3
kernel-debug-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 6d383c1f530418fc21430e163a1393e62bfba622259ce91c9d23c67a950ae9fa
kernel-debug-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: d1857969df9c03e53b378f6eb350674c1091b1e34b5340d3f5f2d44ea120645e
kernel-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 6f9fa428ffb5f6aca5a171df7498480e2d0acdd7d6f7bd6a3114008ead3fa753
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 4a31800e2fd1464404117c0e06eac3fb5ca90f5a0872a16c7481a250cdaf8533
kernel-xen-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 87e9098fe4947e219f4ce397b022c518da0ea480b9292fae6404d97169dd94a1
kernel-xen-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: f12143afd09b4cbb25e0534b9357fff5b3faba3afcb51fbf904364ec9297213e
i386
kernel-2.6.18-238.49.1.el5.i686.rpm SHA-256: da065a2b5f9da6d7a9536c8ba2608831adb2ee348dc7a96bfee86cbc21831f5d
kernel-PAE-2.6.18-238.49.1.el5.i686.rpm SHA-256: 760a1bb5c11899bbc966b98fd176892256a5e8950becd21c2df0038a15b231fc
kernel-PAE-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: 85e8043d18f3dd31f917478fc3db43be79c538eea7f48c49e32aba703ec35ee5
kernel-debug-2.6.18-238.49.1.el5.i686.rpm SHA-256: e56bb16d5d1543035b0a245a54c97ae9309d309970b440b87fe3fbc8dcfe3a0c
kernel-debug-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: e09c5a32c89541524d3f3e2ff5f3beada805bbf435a28899ff1f212ab243b70b
kernel-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: 674677acf26eb96564b924671a6e2e131ac8cb7c1bb3831daa8f4021422c4a4e
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.i386.rpm SHA-256: 6d4d992ed6590f839e274cb9ff41b107e073d03f1b48d603c1d2e3696eee47b6
kernel-xen-2.6.18-238.49.1.el5.i686.rpm SHA-256: 20cb2c3dc37c24ba56d3e42515806023649483a6762ee0add0072d24664b753f
kernel-xen-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: b5f248045e34d820345106ca8f2e1f8feff97a893df56bc726b7160a639e4eac

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.49.1.el5.src.rpm SHA-256: 806fb3c2650d2893db1b1d8818e243301015c5cf8f9d4ca46ce768225c9cc48d
x86_64
kernel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 0d87c9b0106deb91f93b9f511514fa7276508db8fa5b0e5c1dc6268fc61042f3
kernel-debug-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 6d383c1f530418fc21430e163a1393e62bfba622259ce91c9d23c67a950ae9fa
kernel-debug-debuginfo-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 599f254a828c4a40c3d5b1e2e7d6309f6500d4b97a8298acadf07f0232389f38
kernel-debug-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: d1857969df9c03e53b378f6eb350674c1091b1e34b5340d3f5f2d44ea120645e
kernel-debuginfo-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 48b486c7b0e325f04e7fcea9c7252f5ec275fbb2de71788aae5bf88e79723534
kernel-debuginfo-common-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 0178458295579a3b90cb880ff275b642d643d512106166cddbb20bc6f979937d
kernel-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 6f9fa428ffb5f6aca5a171df7498480e2d0acdd7d6f7bd6a3114008ead3fa753
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 4a31800e2fd1464404117c0e06eac3fb5ca90f5a0872a16c7481a250cdaf8533
kernel-xen-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 87e9098fe4947e219f4ce397b022c518da0ea480b9292fae6404d97169dd94a1
kernel-xen-debuginfo-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: 6fe99e799934ac8ec94fc0f964826458c5c2d630e47601113ccd9968fc7e949c
kernel-xen-devel-2.6.18-238.49.1.el5.x86_64.rpm SHA-256: f12143afd09b4cbb25e0534b9357fff5b3faba3afcb51fbf904364ec9297213e
ia64
kernel-2.6.18-238.49.1.el5.ia64.rpm SHA-256: ac05a722749b76201fc8401ac7b030ab785678508a66990aff6e5a9f02370e48
kernel-debug-2.6.18-238.49.1.el5.ia64.rpm SHA-256: ce34afd8fab3452da65da960af684bcbc054d060d29d8eabfd1f82bdc178de3f
kernel-debug-debuginfo-2.6.18-238.49.1.el5.ia64.rpm SHA-256: 6c3fd6e32c4ed3cefb22136992babcd2bcb70f6548fcaee8d0f117bd585467cd
kernel-debug-devel-2.6.18-238.49.1.el5.ia64.rpm SHA-256: 60aff11e80c1b5e184661626eda532eef4cf15571518065ea7edc5683b9ec5b5
kernel-debuginfo-2.6.18-238.49.1.el5.ia64.rpm SHA-256: edf5d806777f56370ca9919ced4ba20bdb02ee98b1dde56577a2bfdb6bd520bf
kernel-debuginfo-common-2.6.18-238.49.1.el5.ia64.rpm SHA-256: feb5a003ade14a3cdc9a1a1fc24181f26977475197162f80579c43e9056c1d52
kernel-devel-2.6.18-238.49.1.el5.ia64.rpm SHA-256: f1d6c6535937c28476dbbf90a097249d45222948eed0e4b66cc8539f2a0c857a
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.ia64.rpm SHA-256: f389182eaba9b77d04ab3458bae4f4982d88516099f9cfc993d212d6a2de784f
kernel-xen-2.6.18-238.49.1.el5.ia64.rpm SHA-256: 9f54f6b267067522b1306ac34c05225076ff64f6468df550c286714e6424caea
kernel-xen-debuginfo-2.6.18-238.49.1.el5.ia64.rpm SHA-256: d099b66b2a05790dbbee43508f7e238d74a4b1438d3ae7907006d97141772a69
kernel-xen-devel-2.6.18-238.49.1.el5.ia64.rpm SHA-256: aef0d797775bfbe2fa1facc9fd529150b458a08b12e703132437438ff45d9a92
i386
kernel-2.6.18-238.49.1.el5.i686.rpm SHA-256: da065a2b5f9da6d7a9536c8ba2608831adb2ee348dc7a96bfee86cbc21831f5d
kernel-PAE-2.6.18-238.49.1.el5.i686.rpm SHA-256: 760a1bb5c11899bbc966b98fd176892256a5e8950becd21c2df0038a15b231fc
kernel-PAE-debuginfo-2.6.18-238.49.1.el5.i686.rpm SHA-256: 3966658c5a294aab349048b55b9e0e15b3fef0f1290f97c6e311d47f28af107f
kernel-PAE-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: 85e8043d18f3dd31f917478fc3db43be79c538eea7f48c49e32aba703ec35ee5
kernel-debug-2.6.18-238.49.1.el5.i686.rpm SHA-256: e56bb16d5d1543035b0a245a54c97ae9309d309970b440b87fe3fbc8dcfe3a0c
kernel-debug-debuginfo-2.6.18-238.49.1.el5.i686.rpm SHA-256: f56b192cdff405fd029ef9f926e03335d5ab01143a74f9ec236d7e3ad1de5c07
kernel-debug-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: e09c5a32c89541524d3f3e2ff5f3beada805bbf435a28899ff1f212ab243b70b
kernel-debuginfo-2.6.18-238.49.1.el5.i686.rpm SHA-256: a96a04a5009a0267f8dfafb3e43b1c4bc54b98047ce62242d11a53296b3c1d64
kernel-debuginfo-common-2.6.18-238.49.1.el5.i686.rpm SHA-256: af800ae04eb3b5f2f69f07584f7c4b53e7037b692d9866a2769e4802cc426a2a
kernel-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: 674677acf26eb96564b924671a6e2e131ac8cb7c1bb3831daa8f4021422c4a4e
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.i386.rpm SHA-256: 6d4d992ed6590f839e274cb9ff41b107e073d03f1b48d603c1d2e3696eee47b6
kernel-xen-2.6.18-238.49.1.el5.i686.rpm SHA-256: 20cb2c3dc37c24ba56d3e42515806023649483a6762ee0add0072d24664b753f
kernel-xen-debuginfo-2.6.18-238.49.1.el5.i686.rpm SHA-256: fd27630e5fda58d47d28de34e6e2bde712ffed72dee090033148a16833c2eab7
kernel-xen-devel-2.6.18-238.49.1.el5.i686.rpm SHA-256: b5f248045e34d820345106ca8f2e1f8feff97a893df56bc726b7160a639e4eac

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.49.1.el5.src.rpm SHA-256: 806fb3c2650d2893db1b1d8818e243301015c5cf8f9d4ca46ce768225c9cc48d
s390x
kernel-2.6.18-238.49.1.el5.s390x.rpm SHA-256: a4b2309375089fbc33e22b2aadd0c00f7980e58aca5c93dcaa6719c10fe840bf
kernel-debug-2.6.18-238.49.1.el5.s390x.rpm SHA-256: 41a4b4a28741beecfe3b61666fb640a220402ed08ea38def4a3e4135f4ea62ca
kernel-debug-devel-2.6.18-238.49.1.el5.s390x.rpm SHA-256: 60a16e5d45be4660921bdcfa73005b448a4c4fd48ee6880aa407bbcc96e82205
kernel-devel-2.6.18-238.49.1.el5.s390x.rpm SHA-256: 51dbad5adc5df642082eb4f929d4e4e8ed2268bfe10f02f18bfa84aa322cdf67
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.s390x.rpm SHA-256: 0142d91410202645772c375a1abbeac4633df3fd3e1d7f28940b449b3c13b12d
kernel-kdump-2.6.18-238.49.1.el5.s390x.rpm SHA-256: 08c7fd9b43150395ed7d1caf44f1b770062b969e83d138783e70851884ba6692
kernel-kdump-devel-2.6.18-238.49.1.el5.s390x.rpm SHA-256: ed747fa87f70a02b502c53a66f5dc893235771a11a3c2e08cf09f22b56ba0fd3

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6

SRPM
kernel-2.6.18-238.49.1.el5.src.rpm SHA-256: 806fb3c2650d2893db1b1d8818e243301015c5cf8f9d4ca46ce768225c9cc48d
ppc
kernel-2.6.18-238.49.1.el5.ppc64.rpm SHA-256: fab3d95ad3b11e8a79e1ea49a72aa74352735d2d83b03586ec4180bf50f98e40
kernel-debug-2.6.18-238.49.1.el5.ppc64.rpm SHA-256: 4a56b1a2fbab5329ea46d62c0d17343f815eb21132ff6190ddfdbfbddc193ab3
kernel-debug-devel-2.6.18-238.49.1.el5.ppc64.rpm SHA-256: 33acc65ed92f0805d0eec74ccf3d746ec829cb3acf07e4172e2b64ede250bb82
kernel-devel-2.6.18-238.49.1.el5.ppc64.rpm SHA-256: 8835ae5c763b46f837faa4e8fc9262f7fb770356f3003e11ce34ee3774fc2c88
kernel-doc-2.6.18-238.49.1.el5.noarch.rpm SHA-256: 54ef7110f8bde39dda1f096f5cc8d8ea7b3c88b46112a34dd599c6c153cca8ae
kernel-headers-2.6.18-238.49.1.el5.ppc.rpm SHA-256: e35a37b263a90bdcd82b7fce1cdf2f3f7a4ac03d52c7e92793afce46949f1b3d
kernel-headers-2.6.18-238.49.1.el5.ppc64.rpm SHA-256: 0c7fc644fd9a57674b4a18d59d92331c6b6a6c1ce67a9539c45c397ab483161f
kernel-kdump-2.6.18-238.49.1.el5.ppc64.rpm SHA-256: 147143dedaef2c4cff2afa051d02340920f2d38c960d8d7335dfc3e9e2ca4dea
kernel-kdump-devel-2.6.18-238.49.1.el5.ppc64.rpm SHA-256: e108567be27826786f7d2865ca1665c0c4bece8fdd9efe07009c88884915582a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter