Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2016:2962 - Security Advisory
Issued:
2016-12-20
Updated:
2016-12-20

RHSA-2016:2962 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

  • A use-after-free vulnerability was found in the kernels socket recvmmsg

subsystem. This may allows remote attackers to corrupt memory and may allow
execution of arbitrary code. This corruption takes place during the error
handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)

Bug Fix(es):

  • Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in

some cases rebooted during the graceful node failover test, because the host
kept sending heartbeat packets independently of guests responding to them. This
update fixes the bug by properly responding to all the heartbeat messages in the
queue, even if they are pending. As a result, guest VMs no longer get rebooted
under the described circumstances. (BZ#1391167)

Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc

Fixes

  • BZ - 1382268 - CVE-2016-7117 kernel: Use-after-free in the recvmmsg exit path

CVEs

  • CVE-2016-7117

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-417.el5.src.rpm SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae
x86_64
kernel-2.6.18-417.el5.x86_64.rpm SHA-256: 6118209329e9b366ab97200a87737e9feda7c47a1c2261bc66ed7000966aab38
kernel-debug-2.6.18-417.el5.x86_64.rpm SHA-256: 8207bc083e33680b984425b269cfddf6a337a8a73006f91848108f193e0a740b
kernel-debug-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: daf217c7140707964bfd895d92e0749fc75647f0b14ab9120a221856f1303daa
kernel-debug-devel-2.6.18-417.el5.x86_64.rpm SHA-256: c3cc69fc738092a39ae1605aa98a0766af604f11142f3306b22e01391519a531
kernel-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: 06d44532c4167b796d1cb8337c29ff7be6559bac7c65b945b65bbbc39ad0660c
kernel-debuginfo-common-2.6.18-417.el5.x86_64.rpm SHA-256: d15227aec97941660253d23d6b49811032228f17457a703eea9c40f372a4dc4c
kernel-devel-2.6.18-417.el5.x86_64.rpm SHA-256: ac2cfe3276190d33b65c5f0cab52cd46ab04dd1d9fea8bec4d46f4002f15a029
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.x86_64.rpm SHA-256: 2759ae78d3133f8831e8a35d6737886bd6b51a99df6fa6d3867910168cc856c7
kernel-xen-2.6.18-417.el5.x86_64.rpm SHA-256: 18273f99b61e5e55db90f3eb331446a929399930931ead2f86d28246d2905965
kernel-xen-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: 9d95a5d7eebd160cc9b881da56ed392dd21806a6dfbca0c17559395006740ab2
kernel-xen-devel-2.6.18-417.el5.x86_64.rpm SHA-256: 56c116f4d3ac12fee5da396c0f4682b25b3fd8814cac8f52b50008d4dbc5c983
ia64
kernel-2.6.18-417.el5.ia64.rpm SHA-256: 3014a80b82b27dfa97cbf55ef55d1e2f3248b030ca7271d13d2442c0bfca9639
kernel-debug-2.6.18-417.el5.ia64.rpm SHA-256: 1fa665f0c9b0355bcb0f0fa753fe75774e030cee4e9763412ac338f9a888c635
kernel-debug-debuginfo-2.6.18-417.el5.ia64.rpm SHA-256: 5f96e8557fe252c0648a431275124aa799ca5ea93fe0492eed50e6dfccf7ff4f
kernel-debug-devel-2.6.18-417.el5.ia64.rpm SHA-256: 4bf8020f398eab3e4a38f31638806a176c77dfe45bdeed7e9c42d8f7b73db409
kernel-debuginfo-2.6.18-417.el5.ia64.rpm SHA-256: c3812826acaa2d0c555feb066fbef8427b960f804caf5445bcb9533480949c2c
kernel-debuginfo-common-2.6.18-417.el5.ia64.rpm SHA-256: 51a1210e6a5d890f22a7849eadf76639150ffe4ce37914deca2169e1d537072c
kernel-devel-2.6.18-417.el5.ia64.rpm SHA-256: b20b36fb75d2d616800165ea6372e3176add8d0dc609828880711cb523f2c5d6
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.ia64.rpm SHA-256: f44c2e763d2e801f77b22d490260832fd4e0a356fc6331e53daa6676b7f56d5d
kernel-xen-2.6.18-417.el5.ia64.rpm SHA-256: bf86b4ad9c3007cf6dd65240821e9eab231fead49787b194338a716ae595e5eb
kernel-xen-debuginfo-2.6.18-417.el5.ia64.rpm SHA-256: 555bd486c735662d6963a9838a53cd4616a28e01b3f81a689ede438bd0d5abcd
kernel-xen-devel-2.6.18-417.el5.ia64.rpm SHA-256: 420601aa5da611f105fbcdd03ce2a847282f931bc126d37b92ec9a675e85c6e5
i386
kernel-2.6.18-417.el5.i686.rpm SHA-256: 6ea22df7be6594c2281dc6318d2144ebc04f8317e820117a961ded8ef66445eb
kernel-PAE-2.6.18-417.el5.i686.rpm SHA-256: 52fd33be241fde923cc7ba4d31bcd94cea34edb739187869556b62d010d8756f
kernel-PAE-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: a835e2e578a1dad090229dce5a8071b7932d207fafd66422983180797a1f1adc
kernel-PAE-devel-2.6.18-417.el5.i686.rpm SHA-256: 596189af5e5f641600cf3a49e53820bc79e4dc32f0ecba9713ca9afc047dd400
kernel-debug-2.6.18-417.el5.i686.rpm SHA-256: 4f25680fde7320643b269a203de9df022484cd1824ef0cc69978edf1cbc46878
kernel-debug-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 0a050e15525cff972664564a4d950fa397bfe95bc5da23cca292ffebb3775774
kernel-debug-devel-2.6.18-417.el5.i686.rpm SHA-256: ccdae634a1c27144ddfd3d9d62ccb23241f8660f03862cda7834902d3fff7c47
kernel-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 5c726ec72edc577d847d0cb1f2765a615378170c5a005b537e6458ca0617955c
kernel-debuginfo-common-2.6.18-417.el5.i686.rpm SHA-256: 07d75ba791986d54262bdf7af086474a4dd4a4d221f6b9b4be2aa45e1ed3e4ef
kernel-devel-2.6.18-417.el5.i686.rpm SHA-256: e682ff313dce46f095420eb9f4f0249248785cede1387315d16909c2874e71b8
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.i386.rpm SHA-256: 4df342da49b769e60e6c6c6a9812fdb738f4c6e231bcbce10c03c267bdb71692
kernel-xen-2.6.18-417.el5.i686.rpm SHA-256: 7236cefb71ca1ed729ee423bee1ec549d065c0117c58e9d23f3985a42eba2c0f
kernel-xen-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 1a03025737f3a2cb4179a5a45f01945b45cc79b8796a61bf9a63c3b7ab2dc4f5
kernel-xen-devel-2.6.18-417.el5.i686.rpm SHA-256: fc618b2169dfce782e0153a76146688ae9842bd41d34367bb41405b3d3c4231b

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-417.el5.src.rpm SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae
x86_64
kernel-2.6.18-417.el5.x86_64.rpm SHA-256: 6118209329e9b366ab97200a87737e9feda7c47a1c2261bc66ed7000966aab38
kernel-debug-2.6.18-417.el5.x86_64.rpm SHA-256: 8207bc083e33680b984425b269cfddf6a337a8a73006f91848108f193e0a740b
kernel-debug-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: daf217c7140707964bfd895d92e0749fc75647f0b14ab9120a221856f1303daa
kernel-debug-devel-2.6.18-417.el5.x86_64.rpm SHA-256: c3cc69fc738092a39ae1605aa98a0766af604f11142f3306b22e01391519a531
kernel-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: 06d44532c4167b796d1cb8337c29ff7be6559bac7c65b945b65bbbc39ad0660c
kernel-debuginfo-common-2.6.18-417.el5.x86_64.rpm SHA-256: d15227aec97941660253d23d6b49811032228f17457a703eea9c40f372a4dc4c
kernel-devel-2.6.18-417.el5.x86_64.rpm SHA-256: ac2cfe3276190d33b65c5f0cab52cd46ab04dd1d9fea8bec4d46f4002f15a029
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.x86_64.rpm SHA-256: 2759ae78d3133f8831e8a35d6737886bd6b51a99df6fa6d3867910168cc856c7
kernel-xen-2.6.18-417.el5.x86_64.rpm SHA-256: 18273f99b61e5e55db90f3eb331446a929399930931ead2f86d28246d2905965
kernel-xen-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: 9d95a5d7eebd160cc9b881da56ed392dd21806a6dfbca0c17559395006740ab2
kernel-xen-devel-2.6.18-417.el5.x86_64.rpm SHA-256: 56c116f4d3ac12fee5da396c0f4682b25b3fd8814cac8f52b50008d4dbc5c983
i386
kernel-2.6.18-417.el5.i686.rpm SHA-256: 6ea22df7be6594c2281dc6318d2144ebc04f8317e820117a961ded8ef66445eb
kernel-PAE-2.6.18-417.el5.i686.rpm SHA-256: 52fd33be241fde923cc7ba4d31bcd94cea34edb739187869556b62d010d8756f
kernel-PAE-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: a835e2e578a1dad090229dce5a8071b7932d207fafd66422983180797a1f1adc
kernel-PAE-devel-2.6.18-417.el5.i686.rpm SHA-256: 596189af5e5f641600cf3a49e53820bc79e4dc32f0ecba9713ca9afc047dd400
kernel-debug-2.6.18-417.el5.i686.rpm SHA-256: 4f25680fde7320643b269a203de9df022484cd1824ef0cc69978edf1cbc46878
kernel-debug-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 0a050e15525cff972664564a4d950fa397bfe95bc5da23cca292ffebb3775774
kernel-debug-devel-2.6.18-417.el5.i686.rpm SHA-256: ccdae634a1c27144ddfd3d9d62ccb23241f8660f03862cda7834902d3fff7c47
kernel-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 5c726ec72edc577d847d0cb1f2765a615378170c5a005b537e6458ca0617955c
kernel-debuginfo-common-2.6.18-417.el5.i686.rpm SHA-256: 07d75ba791986d54262bdf7af086474a4dd4a4d221f6b9b4be2aa45e1ed3e4ef
kernel-devel-2.6.18-417.el5.i686.rpm SHA-256: e682ff313dce46f095420eb9f4f0249248785cede1387315d16909c2874e71b8
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.i386.rpm SHA-256: 4df342da49b769e60e6c6c6a9812fdb738f4c6e231bcbce10c03c267bdb71692
kernel-xen-2.6.18-417.el5.i686.rpm SHA-256: 7236cefb71ca1ed729ee423bee1ec549d065c0117c58e9d23f3985a42eba2c0f
kernel-xen-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 1a03025737f3a2cb4179a5a45f01945b45cc79b8796a61bf9a63c3b7ab2dc4f5
kernel-xen-devel-2.6.18-417.el5.i686.rpm SHA-256: fc618b2169dfce782e0153a76146688ae9842bd41d34367bb41405b3d3c4231b

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-417.el5.src.rpm SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae
x86_64
kernel-2.6.18-417.el5.x86_64.rpm SHA-256: 6118209329e9b366ab97200a87737e9feda7c47a1c2261bc66ed7000966aab38
kernel-debug-2.6.18-417.el5.x86_64.rpm SHA-256: 8207bc083e33680b984425b269cfddf6a337a8a73006f91848108f193e0a740b
kernel-debug-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: daf217c7140707964bfd895d92e0749fc75647f0b14ab9120a221856f1303daa
kernel-debug-devel-2.6.18-417.el5.x86_64.rpm SHA-256: c3cc69fc738092a39ae1605aa98a0766af604f11142f3306b22e01391519a531
kernel-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: 06d44532c4167b796d1cb8337c29ff7be6559bac7c65b945b65bbbc39ad0660c
kernel-debuginfo-common-2.6.18-417.el5.x86_64.rpm SHA-256: d15227aec97941660253d23d6b49811032228f17457a703eea9c40f372a4dc4c
kernel-devel-2.6.18-417.el5.x86_64.rpm SHA-256: ac2cfe3276190d33b65c5f0cab52cd46ab04dd1d9fea8bec4d46f4002f15a029
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.x86_64.rpm SHA-256: 2759ae78d3133f8831e8a35d6737886bd6b51a99df6fa6d3867910168cc856c7
kernel-xen-2.6.18-417.el5.x86_64.rpm SHA-256: 18273f99b61e5e55db90f3eb331446a929399930931ead2f86d28246d2905965
kernel-xen-debuginfo-2.6.18-417.el5.x86_64.rpm SHA-256: 9d95a5d7eebd160cc9b881da56ed392dd21806a6dfbca0c17559395006740ab2
kernel-xen-devel-2.6.18-417.el5.x86_64.rpm SHA-256: 56c116f4d3ac12fee5da396c0f4682b25b3fd8814cac8f52b50008d4dbc5c983
i386
kernel-2.6.18-417.el5.i686.rpm SHA-256: 6ea22df7be6594c2281dc6318d2144ebc04f8317e820117a961ded8ef66445eb
kernel-PAE-2.6.18-417.el5.i686.rpm SHA-256: 52fd33be241fde923cc7ba4d31bcd94cea34edb739187869556b62d010d8756f
kernel-PAE-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: a835e2e578a1dad090229dce5a8071b7932d207fafd66422983180797a1f1adc
kernel-PAE-devel-2.6.18-417.el5.i686.rpm SHA-256: 596189af5e5f641600cf3a49e53820bc79e4dc32f0ecba9713ca9afc047dd400
kernel-debug-2.6.18-417.el5.i686.rpm SHA-256: 4f25680fde7320643b269a203de9df022484cd1824ef0cc69978edf1cbc46878
kernel-debug-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 0a050e15525cff972664564a4d950fa397bfe95bc5da23cca292ffebb3775774
kernel-debug-devel-2.6.18-417.el5.i686.rpm SHA-256: ccdae634a1c27144ddfd3d9d62ccb23241f8660f03862cda7834902d3fff7c47
kernel-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 5c726ec72edc577d847d0cb1f2765a615378170c5a005b537e6458ca0617955c
kernel-debuginfo-common-2.6.18-417.el5.i686.rpm SHA-256: 07d75ba791986d54262bdf7af086474a4dd4a4d221f6b9b4be2aa45e1ed3e4ef
kernel-devel-2.6.18-417.el5.i686.rpm SHA-256: e682ff313dce46f095420eb9f4f0249248785cede1387315d16909c2874e71b8
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.i386.rpm SHA-256: 4df342da49b769e60e6c6c6a9812fdb738f4c6e231bcbce10c03c267bdb71692
kernel-xen-2.6.18-417.el5.i686.rpm SHA-256: 7236cefb71ca1ed729ee423bee1ec549d065c0117c58e9d23f3985a42eba2c0f
kernel-xen-debuginfo-2.6.18-417.el5.i686.rpm SHA-256: 1a03025737f3a2cb4179a5a45f01945b45cc79b8796a61bf9a63c3b7ab2dc4f5
kernel-xen-devel-2.6.18-417.el5.i686.rpm SHA-256: fc618b2169dfce782e0153a76146688ae9842bd41d34367bb41405b3d3c4231b

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-417.el5.src.rpm SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae
s390x
kernel-2.6.18-417.el5.s390x.rpm SHA-256: c4077989884d658a1e36ddb8d14d3b58a229162b4aea47540d9d81c5fb0d882b
kernel-debug-2.6.18-417.el5.s390x.rpm SHA-256: fd4b9fc46c6dba6ed3d79c220492b9cb8ebe6a72f764a8778e72e814329b95a0
kernel-debug-debuginfo-2.6.18-417.el5.s390x.rpm SHA-256: 2a15116d66a7b4bca57503aab44141e03d92c7812d1b40288287d3f0f7b45a8c
kernel-debug-devel-2.6.18-417.el5.s390x.rpm SHA-256: 3559b4e8f238d975b3fe6b015be0d366d942dff0fcab125ee299cf87c66dcbea
kernel-debuginfo-2.6.18-417.el5.s390x.rpm SHA-256: eeefa8904b06a4f25a8a277fe7464b55ada2bf21922db7f6dbe7b8220fe68292
kernel-debuginfo-common-2.6.18-417.el5.s390x.rpm SHA-256: cc1499f45de64772383e6d24dc39d17e3e864010217c36b8c7f8311346785b7d
kernel-devel-2.6.18-417.el5.s390x.rpm SHA-256: 59a659fbb1a1570b2d452217962f795e5184f9aeddc659f14a26b5d86a33863b
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.s390x.rpm SHA-256: 3aab5af416a7b21f3a157992e5a0d83cc3106579a5ef46f9f9d63f8220d7ee20
kernel-kdump-2.6.18-417.el5.s390x.rpm SHA-256: 9153696399fea10b9300f40577e498937919ac95cd821f320b9588842af3c6f9
kernel-kdump-debuginfo-2.6.18-417.el5.s390x.rpm SHA-256: 2480ea5a5f66da7354cb1c36ae7f269912696ed6d1013a84971d4e8042b4e695
kernel-kdump-devel-2.6.18-417.el5.s390x.rpm SHA-256: d4618cb122854ff60aca29b866778f90d4b1362c9ebe5f114dd42266226ad0f2

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-417.el5.src.rpm SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae
ppc
kernel-2.6.18-417.el5.ppc64.rpm SHA-256: b11eb0b05b660c6899265977a88293065c4373eb4a2ab2d296abb679401a0cb6
kernel-debug-2.6.18-417.el5.ppc64.rpm SHA-256: eafb8e04795a6a89f3d6aba404144344efeccec35bd3dba1775db5301425b1e9
kernel-debug-debuginfo-2.6.18-417.el5.ppc64.rpm SHA-256: 7243086506781eb3e2957a1f99e7fcb08971002d82f2783fd386d90d03e9df70
kernel-debug-devel-2.6.18-417.el5.ppc64.rpm SHA-256: 7a61cc02ca3c7ca72985b8a251ed7d2e50771bb8aa3ecef424a41020d1cac80e
kernel-debuginfo-2.6.18-417.el5.ppc64.rpm SHA-256: d40f2e1234d3543e43e4745bd26f041680f6f88b92ea10a0f2643696099b4c7a
kernel-debuginfo-common-2.6.18-417.el5.ppc64.rpm SHA-256: ac12bf953bed6868a63123321098735b4c6400a414eca87f4c6e9655d3a9540d
kernel-devel-2.6.18-417.el5.ppc64.rpm SHA-256: c270974da1cd73d99bbad4044d90ec5d9f45bc19d97c584aad2d23ff5b1cc395
kernel-doc-2.6.18-417.el5.noarch.rpm SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe
kernel-headers-2.6.18-417.el5.ppc.rpm SHA-256: e7202e0b1cd8034a012110bd583a4d7ff7b8928055a228a344648ef35efce76e
kernel-headers-2.6.18-417.el5.ppc64.rpm SHA-256: a6fa3c2ad51c1335c470ec1b798c4f7751f043f04a1b0108347205b2a67e2cd5
kernel-kdump-2.6.18-417.el5.ppc64.rpm SHA-256: f3e4be9dc783d3ae2448f06dcde90ba34078deb375665bb651ae898d9f5a8c57
kernel-kdump-debuginfo-2.6.18-417.el5.ppc64.rpm SHA-256: dbae6a913737083c15accd4183e413b0cc2f4a5a4df1a0d9f09d94e15ddcbc17
kernel-kdump-devel-2.6.18-417.el5.ppc64.rpm SHA-256: 514d3aba1839f5e5cd0803aae7a21dcfc55c7c636d5836e2c17183131e52e2b5

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter