Updated kernel packages that fix one security issue and several bugs arenow available for Red Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* It was found that the Linux kernel’s implementation of vectored pipe readand write functionality did not take into account the I/O vectors that werealready processed when retrying after a failed atomic access operation,potentially resulting in memory corruption due to an I/O vector arrayoverrun. A local, unprivileged user could use this flaw to crash the systemor, potentially, escalate their privileges on the system. (CVE-2015-1805,Important)The security impact of this issue was discovered by Red Hat.This update fixes the following bugs:* Due to a bug in the lpfc_device_reset_handler() function, a scsi commandtimeout could lead to a system crash. With this update,lpfc_device_reset_handler recovers storage without crashing. (BZ#1070964)* Due to the code decrementing the reclaim_in_progress counter withouthaving incremented it first, severe spinlock contention occurred in theshrink_zone() function even though the vm.max_reclaims_in_progress featurewas set to 1. This update provides a patch fixing the underlying sourcecode, and spinlock contention no longer occurs in this scenario.(BZ#1164105)* A TCP socket using SACK that had a retransmission but recovered from it,failed to reset the retransmission timestamp. As a consequence, on certainconnections, if a packet had to be re-transmitted, the retrans_stampvariable was only cleared when the next acked packet was received.This could lead to an early abortion of the TCP connection if this nextpacket also got lost. With this update, the socket clears retrans_stampwhen the recovery is completed, thus fixing the bug. (BZ#1205521)* Previously, the signal delivery paths did not clear the TS_USEDFPU flag,which could cause problems in the switch_to() function and lead tofloating-point unit (FPU) corruption. With this update, TS_USEDFPU iscleared as expected, and FPU is no longer under threat of corruption.(BZ#1193505)* A race condition in the exit_sem() function previously caused thesemaphore undo list corruption. As a consequence, a kernel crash couldoccur. The corruption in the semaphore undo list has been fixed, and thekernel no longer crashes in this situation. (BZ#1124574)* Previously, when running the “virsh blockresize [Device] [Newsize]”command to resize the disk, the new size was not reflected in a Red HatEnterprise Linux 5 Virtual Machine (VM). With this update, the new size isnow reflected online immediately in a Red Hat Enterprise Linux 5 VM so itis no longer necessary to reboot the VM to see the new disk size.(BZ#1200855)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-406.el5.src.rpm
    MD5: d619fefd5c81d13bae92c6357b846a43SHA-256: 9862e7361a6993ad3893f2dcdd60b174cfdcdc25d1117fe4c8baf9b8f381a10c
 
IA-32:
kernel-2.6.18-406.el5.i686.rpm
    MD5: 01826a21b0e18b61991d43aff4054748SHA-256: b16ad1ad88e8c7de74773363397f35ac393fef716d38a3315bfd804b1d9d11ba
kernel-PAE-2.6.18-406.el5.i686.rpm
    MD5: c5d1d7af1b701701bad0ae6f56ab036bSHA-256: f693b40182c238b0d093408c1cdb7e658513da05042004c5a4752120a645b911
kernel-PAE-debuginfo-2.6.18-406.el5.i686.rpm
    MD5: 225bf889f0ede6ffff2139f81ef77ccbSHA-256: 9a4640f5e2b221767e507704e2a94e0b01b58c674724bcbc4a7ed2d40ba907b0
kernel-PAE-devel-2.6.18-406.el5.i686.rpm
    MD5: c2ca6b3da19c4787b3aca43b68a326c0SHA-256: 8893003d5a7f4f5b9033e6842e0253d332ce1478f53e2050191c81ff05762163
kernel-debug-2.6.18-406.el5.i686.rpm
    MD5: b2df546c1519487ac437df72c6f79affSHA-256: 6b65e2317fbabd5ab86038b1762ba6df30d7759c56cee31e66b793fe13e63dfa
kernel-debug-debuginfo-2.6.18-406.el5.i686.rpm
    MD5: 9e35189328ac3f74cbbc5e140b13cd89SHA-256: 827367f6c517658534b19d8bf16aed5b2d3ae381d83d14bb6af088d4da455239
kernel-debug-devel-2.6.18-406.el5.i686.rpm
    MD5: 0433fad5904fc6fcc7d0fba52a193defSHA-256: c6321292db954befe72815deb7b0bc9977d5cc4812b12c10a002a0f71850e6d7
kernel-debuginfo-2.6.18-406.el5.i686.rpm
    MD5: c351a371eabe46812e463128abe1a50fSHA-256: e7e85c047602fb461c708ddace9f87b8c8e27461760b4d3726dbaedccf45de10
kernel-debuginfo-common-2.6.18-406.el5.i686.rpm
    MD5: c1cd61e0fc08e4965a23ea8f37359b63SHA-256: 6cd138c6748489932ac46826ecbc5775a2df1daa3566f99aae59c01e88bd4f12
kernel-devel-2.6.18-406.el5.i686.rpm
    MD5: c9c6573bf2771ed90d913a5ce2768aadSHA-256: f13277a2ac0a5652283d8b3d9b6b9b6a313f9af1fb02dc69d5b3de7e49af3cf2
kernel-doc-2.6.18-406.el5.noarch.rpm
    MD5: 6a0e5d73cf7e13c1623de933c44c0c72SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.i386.rpm
    MD5: 8fe73f6d4a3ad160e16f1deaed451013SHA-256: af80f7066147c42f622992ca205348cd296e915750e2dbe1ed59aed78805feaa
kernel-xen-2.6.18-406.el5.i686.rpm
    MD5: 80fae745cc2e245f037212ba56e94965SHA-256: b66b25a44b66173958441a81697d33f245f70de53b11edcb4ff7ffb10f659666
kernel-xen-debuginfo-2.6.18-406.el5.i686.rpm
    MD5: 57d3c788e469fd6ffceb5e6ffa27f516SHA-256: 9bb45de21940c4daa02fbd8f9c2f4b538617df421e363797db457b39e129bea5
kernel-xen-devel-2.6.18-406.el5.i686.rpm
    MD5: 36cf9fea1975fa02581cddfd4908d2ecSHA-256: b7283e84d684475775d670414f1d6d669d733d72e38ad7e3ec69c5d649bb81c9
 
IA-64:
kernel-2.6.18-406.el5.ia64.rpm
    MD5: 69a17096a876724189a45a256b2fba2cSHA-256: df594f566ef07775d84419942cd23f844e9e27e5e3c0f73fcd1b63ac518612b0
kernel-debug-2.6.18-406.el5.ia64.rpm
    MD5: 099997f29cf2409311e2e0f6e0f015d7SHA-256: b091cec5538b55eb356093821a0698b63a8d58f007acb33a96ce30cd3baceb51
kernel-debug-debuginfo-2.6.18-406.el5.ia64.rpm
    MD5: 10501d10bf730af2b0ae25f9d912a6c2SHA-256: 2b748b4dbf8259132e762359b1b8df0bbc712c7df8acdc6dcbfa88214603a8d7
kernel-debug-devel-2.6.18-406.el5.ia64.rpm
    MD5: a9813682c8e62c1ef6ba15eecee16fc1SHA-256: be7b680dfd4ff345df3a2852119cc1ff849b605c36fa215776a8e4582cb2e1ff
kernel-debuginfo-2.6.18-406.el5.ia64.rpm
    MD5: 93aa947ea5e682419917b68b3a672397SHA-256: df39d861b3f662c78d1d2b685b7375652d12f92ccedff539a06be6bd6283e256
kernel-debuginfo-common-2.6.18-406.el5.ia64.rpm
    MD5: 5a0ef96146e37343713fc4f601cde33fSHA-256: b800412ca8d26a293b9ae6a7e5dac1de4ffdc26c2380fc19e1db8f7141006722
kernel-devel-2.6.18-406.el5.ia64.rpm
    MD5: e3dc6cfae9ed822964c0a554e5bfd13dSHA-256: 5483938d13132fae334182c82596a6ac62fad29d05e0923f26fee8d6ef56de4a
kernel-doc-2.6.18-406.el5.noarch.rpm
    MD5: 6a0e5d73cf7e13c1623de933c44c0c72SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.ia64.rpm
    MD5: ea9b745976fc8723ffe4289dcf761bb3SHA-256: 0a516306c312c5b6755a9b46c8e20b57bed5a4751ff9c2736a6b531e7dc77568
kernel-xen-2.6.18-406.el5.ia64.rpm
    MD5: c01ce733e9795eb93366d08b8ebdd11dSHA-256: 54c494e93f34a7b2ff99bd8ac56c5b397ce460a1603702bac75bc690c430f774
kernel-xen-debuginfo-2.6.18-406.el5.ia64.rpm
    MD5: dc46f29524ec599ba02e08bd346d71e3SHA-256: b14c611ebf869dfcbb4227fcdd785941b66d4879f3436db1eff6789c58ff17d6
kernel-xen-devel-2.6.18-406.el5.ia64.rpm
    MD5: 4bf790817efd7305ab36ffd37063377eSHA-256: 983fd7c81a4b04a9292a0d5af82dbba535d6a5e3c0d797e833209b1f6cdb074d
 
PPC:
kernel-2.6.18-406.el5.ppc64.rpm
    MD5: dc36771578cc9c282a2aec058373c22eSHA-256: e50a2530ceaa21b153eff844882dd3680db04fee75254d9ac7282b93e742bfc4
kernel-debug-2.6.18-406.el5.ppc64.rpm
    MD5: 0b57b88a81a13a41903459d611dbcee6SHA-256: 4aa6b69c566dc1b9223f621acdc0a680f0a7b7241e2ac5a6413c5f995a562036
kernel-debug-debuginfo-2.6.18-406.el5.ppc64.rpm
    MD5: 73f33a78b4d94e61877b8d7f9e15148dSHA-256: 63a19d0e7d96029b830367b53366a7dccc3b5d72f77c72daeb4ca0bf1e1e15b5
kernel-debug-devel-2.6.18-406.el5.ppc64.rpm
    MD5: d9908ad4bf16cf60cc19b60c6f90de2aSHA-256: faf734ea64782b405dc27bb3de6e742d078f42644a514dd9156ab7acf094369b
kernel-debuginfo-2.6.18-406.el5.ppc64.rpm
    MD5: b59ab00d7e18d9d0d58a3894fd7d7f55SHA-256: 921c618d03433647d1cfa8624345df4c8c8c10b20e42444a97cbf3a0806caee2
kernel-debuginfo-common-2.6.18-406.el5.ppc64.rpm
    MD5: 40af196ad78eff281adda67c71cb51c3SHA-256: d5218715c2004f68a17d6c71ebff6cb002c18595c5a7beecc2f45b0bfb3fd7ef
kernel-devel-2.6.18-406.el5.ppc64.rpm
    MD5: b9cf379ff979f5fc96ff0064c90efa5fSHA-256: e5cca6b42754fdb24644085812c342cfaaef181332537174a88517ff5aa26ada
kernel-doc-2.6.18-406.el5.noarch.rpm
    MD5: 6a0e5d73cf7e13c1623de933c44c0c72SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.ppc.rpm
    MD5: 33971b56eb7501aadfe761556f817d97SHA-256: 568b1ccdbb67131949c06b347fed7efb10b13095a6975bd1d8d7d0d156266062
kernel-headers-2.6.18-406.el5.ppc64.rpm
    MD5: 249e43e5199363b0bfdb229522e66560SHA-256: 3bc60f8dc5391c32a8d754adbe0a8119b85e8462ceb776ff02670acef616ce1a
kernel-kdump-2.6.18-406.el5.ppc64.rpm
    MD5: ed7ae0a1db8f833e7007a80f3b2d369dSHA-256: 3251ec3224f5ae6680714cb0c9535396fa438ab44e114064da27e314795152b2
kernel-kdump-debuginfo-2.6.18-406.el5.ppc64.rpm
    MD5: bb2b4518630a7f4db1f7f7992ce04207SHA-256: e9d26cf42d64cbc18b58d1856637aba98c706170908a5134ce090fd0bd7fdba4
kernel-kdump-devel-2.6.18-406.el5.ppc64.rpm
    MD5: bd853eef9842b00398dbce4d47fb03ddSHA-256: 94e4b0cb0b3b776ed9ffd576e6b9bfb0a53e4b9b09c8bc700ccd289e126f0d14
 
s390x:
kernel-2.6.18-406.el5.s390x.rpm
    MD5: 96c68aa8aa3377d92b0a1dc7e26b79acSHA-256: 6efac73d90f8a55806197dd56a39f85221f8eb8c5acfacea1a24734175163de7
kernel-debug-2.6.18-406.el5.s390x.rpm
    MD5: 6e01f5ea915966111dbb10c28527ac2bSHA-256: aeacd90e55a35db27153b84f9376760f7a5d9e55560a104cf8ed835eb2e57608
kernel-debug-debuginfo-2.6.18-406.el5.s390x.rpm
    MD5: c729d264d99fd2ca0da68a934f12b932SHA-256: 9343d870181ce289e8f79cc56f6849be907bec439274bf5ebecfc8df78d576c3
kernel-debug-devel-2.6.18-406.el5.s390x.rpm
    MD5: 3056dee42aa7c31c3f15e9690e0e048fSHA-256: 48fb08f0c1ae63c71af049650e0329213df756bc73f78777d0598c4ba8a1e33d
kernel-debuginfo-2.6.18-406.el5.s390x.rpm
    MD5: da80fcb42f61f28ac77ace357f2e003bSHA-256: 9675c669ad60600d037298d775bab72021aead20d2afb4845256a6b51a960c53
kernel-debuginfo-common-2.6.18-406.el5.s390x.rpm
    MD5: dc999f0eb6ebfa03f59e8bc15d21c363SHA-256: cff5a714b01feb2473f814bb4f5490f7d1d803b161d0a243c7085d8d12295fe5
kernel-devel-2.6.18-406.el5.s390x.rpm
    MD5: 06b9fd5489b3d0532b495462d41e8f5fSHA-256: 0c04a8135485b2315f185f767d9980eec15649d301c33d217a4ca06fbd297579
kernel-doc-2.6.18-406.el5.noarch.rpm
    MD5: 6a0e5d73cf7e13c1623de933c44c0c72SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.s390x.rpm
    MD5: c15b70e1e1138d85986a6deaa2c2dcd6SHA-256: f32f73b84722cc748b71e060e5174ec3c9583901986747b7408a82674de11f09
kernel-kdump-2.6.18-406.el5.s390x.rpm
    MD5: 41d7d1f2146a2f88e3cdce0c6ba16852SHA-256: a313503754c840d67b083adafcbd1765465083e41f4d0af756124675fae94332
kernel-kdump-debuginfo-2.6.18-406.el5.s390x.rpm
    MD5: 4f8b500c41ed2cd1999ea971b3a49673SHA-256: 7b330084991c31814110ae50192bb2edafc27d48f98b0345e50d500628dc54b1
kernel-kdump-devel-2.6.18-406.el5.s390x.rpm
    MD5: c713b9158f4c0e31f8d25753acf2493cSHA-256: 47ffd34dcadadc6f241c9952cbe68f8fc6151cd5109de0e68176ca0741c6c7cd
 
x86_64:
kernel-2.6.18-406.el5.x86_64.rpm
    MD5: f0ef21d8d42442d2e54315853d5fdc2eSHA-256: cb8b0f16bb2e620d0cc71276fcc6757f36c66fd6ad82567f0799a23813ae1fa9
kernel-debug-2.6.18-406.el5.x86_64.rpm
    MD5: f614b43a7082838ad0a75974cebed5abSHA-256: 327bbbbc4c7a4dedc644a8b4f563d50e4e8be35a9994971862e1b5d9280f3ab7
kernel-debug-debuginfo-2.6.18-406.el5.x86_64.rpm
    MD5: be8a9c8a3bf56cede91ea59f6599aa31SHA-256: deeb908a6e6f1ae0faec4e91bc3b6a2979185324d2aaf49000093998c9468d69
kernel-debug-devel-2.6.18-406.el5.x86_64.rpm
    MD5: eda65a0cc8a1348ec2ddfce6c64bda1dSHA-256: ff95c8ebf4392b5777a2c09d8f3cee29446d7e4509469e6d92bac4be6121fa9b
kernel-debuginfo-2.6.18-406.el5.x86_64.rpm
    MD5: d70517d3fcc4d8b8c858ff543afa1d64SHA-256: 2a1324ee23d0cdd779d3a876cd689495f14a7cd906767ffe9aa2866c11d1614d
kernel-debuginfo-common-2.6.18-406.el5.x86_64.rpm
    MD5: 02bfd93d134453518a50f48502267822SHA-256: 38a17fa9e55a41b04b69f8f7442b386c1ff67cfe1e64f8e7893a78cd16b69f66
kernel-devel-2.6.18-406.el5.x86_64.rpm
    MD5: 88578cb714273f289ac61a7aacee3402SHA-256: 033907d9b6b471bbbd111c9a5d538bfdfcf564849df5ac34e550cbe6a4c6b1a8
kernel-doc-2.6.18-406.el5.noarch.rpm
    MD5: 6a0e5d73cf7e13c1623de933c44c0c72SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.x86_64.rpm
    MD5: d07fc50e2aed6b43bd4f286e042e105aSHA-256: 112cd68d3e2756789b93c14cc22c1c86919d208a32cb0bcb8b3d1a4843608f3f
kernel-xen-2.6.18-406.el5.x86_64.rpm
    MD5: 43adda57b7c00e396370b623d0b6b21fSHA-256: c4df00a0fa902c3b65f5e2539876c7706f1a741bcb15485b56c4ae57112c90fc
kernel-xen-debuginfo-2.6.18-406.el5.x86_64.rpm
    MD5: 12c5686f4902f99243ee04175e9e387dSHA-256: 33f00b978f00889230b7f98d8db9386180f7fa5f404d86360dad2ced34971a73
kernel-xen-devel-2.6.18-406.el5.x86_64.rpm
    MD5: ad36268d2fc577b48c9a815292e29239SHA-256: d59ea8eabb9df32f45c25ee6e78f2ffe651073fcaf2222fe5a19ab43360c495e
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-406.el5.src.rpm
    MD5: d619fefd5c81d13bae92c6357b846a43SHA-256: 9862e7361a6993ad3893f2dcdd60b174cfdcdc25d1117fe4c8baf9b8f381a10c
 
IA-32:
kernel-2.6.18-406.el5.i686.rpm
    MD5: 01826a21b0e18b61991d43aff4054748SHA-256: b16ad1ad88e8c7de74773363397f35ac393fef716d38a3315bfd804b1d9d11ba
kernel-PAE-2.6.18-406.el5.i686.rpm
    MD5: c5d1d7af1b701701bad0ae6f56ab036bSHA-256: f693b40182c238b0d093408c1cdb7e658513da05042004c5a4752120a645b911
kernel-PAE-debuginfo-2.6.18-406.el5.i686.rpm
    MD5: 225bf889f0ede6ffff2139f81ef77ccbSHA-256: 9a4640f5e2b221767e507704e2a94e0b01b58c674724bcbc4a7ed2d40ba907b0
kernel-PAE-devel-2.6.18-406.el5.i686.rpm
    MD5: c2ca6b3da19c4787b3aca43b68a326c0SHA-256: 8893003d5a7f4f5b9033e6842e0253d332ce1478f53e2050191c81ff05762163
kernel-debug-2.6.18-406.el5.i686.rpm
    MD5: b2df546c1519487ac437df72c6f79affSHA-256: 6b65e2317fbabd5ab86038b1762ba6df30d7759c56cee31e66b793fe13e63dfa
kernel-debug-debuginfo-2.6.18-406.el5.i686.rpm
    MD5: 9e35189328ac3f74cbbc5e140b13cd89SHA-256: 827367f6c517658534b19d8bf16aed5b2d3ae381d83d14bb6af088d4da455239
kernel-debug-devel-2.6.18-406.el5.i686.rpm
    MD5: 0433fad5904fc6fcc7d0fba52a193defSHA-256: c6321292db954befe72815deb7b0bc9977d5cc4812b12c10a002a0f71850e6d7
kernel-debuginfo-2.6.18-406.el5.i686.rpm
    MD5: c351a371eabe46812e463128abe1a50fSHA-256: e7e85c047602fb461c708ddace9f87b8c8e27461760b4d3726dbaedccf45de10
kernel-debuginfo-common-2.6.18-406.el5.i686.rpm
    MD5: c1cd61e0fc08e4965a23ea8f37359b63SHA-256: 6cd138c6748489932ac46826ecbc5775a2df1daa3566f99aae59c01e88bd4f12
kernel-devel-2.6.18-406.el5.i686.rpm
    MD5: c9c6573bf2771ed90d913a5ce2768aadSHA-256: f13277a2ac0a5652283d8b3d9b6b9b6a313f9af1fb02dc69d5b3de7e49af3cf2
kernel-doc-2.6.18-406.el5.noarch.rpm
    MD5: 6a0e5d73cf7e13c1623de933c44c0c72SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.i386.rpm
    MD5: 8fe73f6d4a3ad160e16f1deaed451013SHA-256: af80f7066147c42f622992ca205348cd296e915750e2dbe1ed59aed78805feaa
kernel-xen-2.6.18-406.el5.i686.rpm
    MD5: 80fae745cc2e245f037212ba56e94965SHA-256: b66b25a44b66173958441a81697d33f245f70de53b11edcb4ff7ffb10f659666
kernel-xen-debuginfo-2.6.18-406.el5.i686.rpm
    MD5: 57d3c788e469fd6ffceb5e6ffa27f516SHA-256: 9bb45de21940c4daa02fbd8f9c2f4b538617df421e363797db457b39e129bea5
kernel-xen-devel-2.6.18-406.el5.i686.rpm
    MD5: 36cf9fea1975fa02581cddfd4908d2ecSHA-256: b7283e84d684475775d670414f1d6d669d733d72e38ad7e3ec69c5d649bb81c9
 
x86_64:
kernel-2.6.18-406.el5.x86_64.rpm
    MD5: f0ef21d8d42442d2e54315853d5fdc2eSHA-256: cb8b0f16bb2e620d0cc71276fcc6757f36c66fd6ad82567f0799a23813ae1fa9
kernel-debug-2.6.18-406.el5.x86_64.rpm
    MD5: f614b43a7082838ad0a75974cebed5abSHA-256: 327bbbbc4c7a4dedc644a8b4f563d50e4e8be35a9994971862e1b5d9280f3ab7
kernel-debug-debuginfo-2.6.18-406.el5.x86_64.rpm
    MD5: be8a9c8a3bf56cede91ea59f6599aa31SHA-256: deeb908a6e6f1ae0faec4e91bc3b6a2979185324d2aaf49000093998c9468d69
kernel-debug-devel-2.6.18-406.el5.x86_64.rpm
    MD5: eda65a0cc8a1348ec2ddfce6c64bda1dSHA-256: ff95c8ebf4392b5777a2c09d8f3cee29446d7e4509469e6d92bac4be6121fa9b
kernel-debuginfo-2.6.18-406.el5.x86_64.rpm
    MD5: d70517d3fcc4d8b8c858ff543afa1d64SHA-256: 2a1324ee23d0cdd779d3a876cd689495f14a7cd906767ffe9aa2866c11d1614d
kernel-debuginfo-common-2.6.18-406.el5.x86_64.rpm
    MD5: 02bfd93d134453518a50f48502267822SHA-256: 38a17fa9e55a41b04b69f8f7442b386c1ff67cfe1e64f8e7893a78cd16b69f66
kernel-devel-2.6.18-406.el5.x86_64.rpm
    MD5: 88578cb714273f289ac61a7aacee3402SHA-256: 033907d9b6b471bbbd111c9a5d538bfdfcf564849df5ac34e550cbe6a4c6b1a8
kernel-doc-2.6.18-406.el5.noarch.rpm
    MD5: 6a0e5d73cf7e13c1623de933c44c0c72SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.x86_64.rpm
    MD5: d07fc50e2aed6b43bd4f286e042e105aSHA-256: 112cd68d3e2756789b93c14cc22c1c86919d208a32cb0bcb8b3d1a4843608f3f
kernel-xen-2.6.18-406.el5.x86_64.rpm
    MD5: 43adda57b7c00e396370b623d0b6b21fSHA-256: c4df00a0fa902c3b65f5e2539876c7706f1a741bcb15485b56c4ae57112c90fc
kernel-xen-debuginfo-2.6.18-406.el5.x86_64.rpm
    MD5: 12c5686f4902f99243ee04175e9e387dSHA-256: 33f00b978f00889230b7f98d8db9386180f7fa5f404d86360dad2ced34971a73
kernel-xen-devel-2.6.18-406.el5.x86_64.rpm
    MD5: ad36268d2fc577b48c9a815292e29239SHA-256: d59ea8eabb9df32f45c25ee6e78f2ffe651073fcaf2222fe5a19ab43360c495e
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply