Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2007:0959 - Bug Fix Advisory
Issued:
2007-10-30
Updated:
2007-11-07

RHBA-2007:0959 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Updated kernel packages for Red Hat Enterprise Linux 5 Update 1

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 5. This is the first
regular update.

Description

The Linux kernel handles the basic functions of the operating system. This
is the first regular kernel update to Red Hat Enterprise Linux 5.

Feature updates:

  • Applied several enhancements to GFS2 (technology preview feature), which

require a change to the on-disk file system format.

  • Added the firewire-sbp2 module as a technology preview to enable

connectivity with FireWire devices.

  • Added the devicescape stack (mac80211) to enable the iwlwifi 4965GN

wireless driver. This stack allows certain wireless devices to connect to
any WiFi network. At present, this stack is presented as a technology preview.

  • iSCSI installation and boot is now fully supported.
  • The EXT3 file system now has a maximum capacity of 16TB.
  • Fixed ext2 overflows on file systems greater than 8TB.

Virtualization-related changes:

  • The virtualized kernel can now use the kdump function.
  • Virtualization is now fully supported on ia64 architectures.
  • Added support for AMD-V domain live migration.
  • Enabled Xen booting on machines with over 64G of RAM.
  • Xen upgraded to version 3.1.

Generic kernel updates:

  • Added support for LSPP certification.
  • Added replication and migration support for NFSv4 referrals.
  • Updated CIFS to version 1.48aRH.
  • Added support for shared page table for hugetlb pages.
  • Added MODULE_FIRMWARE support.
  • Expanded the in-kernel socket API.

For a comprehensive list of kernel-related updates, refer to the latest
version of the Red Hat Enterprise Linux 5.1 release notes on:

http://www.redhat.com/docs/manuals/enterprise/

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which apply these kernel updates.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 192082 - System won't suspend with GFS2 file system mounted
  • BZ - 205897 - [Areca RHEL 5.1] Add kernel support for Areca RAID controllers (include arcmsr driver from 2.6.19)
  • BZ - 206366 - [RHEL5 Beta1]: sysrq-t incurs a bogus softlockup warning
  • BZ - 206520 - mount hangs when nodir=1 not always used.
  • BZ - 209964 - NFS Client R/O in anaconda preinstall environment
  • BZ - 211197 - xenoprofile uses incorrect mode and eip/rip for AMD-V
  • BZ - 211516 - kernel dm: memory issues cause "failures" when creating many snapshots
  • BZ - 211525 - kernel dm: mempool_resize BUG() during multiple snapshot removals
  • BZ - 212968 - kernel-xen-devel packages all of /xen/
  • BZ - 215536 - Xen0 can not startX in tiger4
  • BZ - 216293 - blktap does not build on ia64
  • BZ - 216750 - fcntl(F_SETLEASE, F_WRLCK) for a file on NFS always returns EAGAIN
  • BZ - 217356 - GFS2 hangs waiting for semaphore?
  • BZ - 219216 - [EMC/QLogic 5.1 bug] qla2xxx driver running IO on DM-MPIO devices cause "kernel: PCI-DMA: Out of SW-IOMMU space "
  • BZ - 219563 - network-attaching and detaching too fast from xenbus will crash domU
  • BZ - 219837 - selinux on RHEL5 and nfs does not cope with nohide exported fs
  • BZ - 219897 - Unmatched decrementing of net device reference count
  • BZ - 220526 - [RHEL5 Xen/IA64]: xennet triggers "Kernel panic - not syncing: Unable to reduce memory reservation"
  • BZ - 220592 - kernel boot panic with >=64GB memory
  • BZ - 221330 - kernel dm-multipath: stall on resume if noflush is used
  • BZ - 221387 - HVM bug: MOVS/OUTS/INS crossing pages
  • BZ - 222455 - Kernel oops when starting pcscd on a Dell Lattitude D620.
  • BZ - 223087 - qla4xxx: mutex_lock needs to be released before sleep() in qla4xxx_mailbox_command
  • BZ - 223530 - Make audit config immutable in kernel
  • BZ - 223918 - LSPP: audit logs bogus obj label in some PATH records
  • BZ - 223919 - LSPP: audit does not log obj label when opening an existing POSIX message queue
  • BZ - 224131 - No zero holes for PTRACE_PEEKUSR/PTRACE_POKEUSR?
  • BZ - 224359 - CIFS: bad session setup packet alignment leads to kernel crash
  • BZ - 224620 - AVC_PATH audit records
  • BZ - 224671 - x86_64 - Fix FS/GS registers for VT execution
  • BZ - 225328 - LSPP: ipsec drops first packet when using IKE daemon
  • BZ - 225515 - [patch]Kernel panic (handle kernel NULLpointer) occurred in NFSv4
  • BZ - 225531 - ia64 PTRACE_GETREGS touches pt_all_user_regs words that should be left alone
  • BZ - 228108 - mptscsi adds DID_BUS_BUSY host status when scsi status of BUSY is returned
  • BZ - 228366 - LSPP: audit does not log obj label for signal recipient
  • BZ - 228397 - PTRACE_PEEKUSR regression for i386/x86_64 unused words of struct user
  • BZ - 228409 - LSPP: regular ipsec in upstream kernel crashes
  • BZ - 228422 - LSPP: cleanup xfrm_audit_log interface
  • BZ - 228540 - Need to add gfs2_tool lockdump support to gfs2
  • BZ - 228557 - LSPP: In labeled ipsec, permissions are checked after deleting the policy
  • BZ - 228854 - nfs protocol V3 :write procedure patch
  • BZ - 229094 - LSPP: audit records for some f*xattr syscalls don't include object info
  • BZ - 229345 - [GFS2] NFS fix - gfs2_decode_fh
  • BZ - 229349 - [GFS2] NFS fix - gfs2_drevalidate panic
  • BZ - 229395 - [GFS2] NFS fix - gfs2 filldir issue
  • BZ - 229527 - LSPP: flow cache entries remain valid even after selinux policy reload
  • BZ - 229528 - LSPP: memory leak in flow cache code
  • BZ - 229720 - LSPP: pfkey_spdget does not audit xrfm policy changes
  • BZ - 229732 - LSPP: pfkey_delete and xfrm_del_sa audit hook is misplaced.
  • BZ - 229831 - [GFS2] gfs2 panic's occasionally in gfs2_unlink while running bonnie++
  • BZ - 229873 - [GFS2] alternate test: assertion "!ip->i_inode.i_mapping->nrpages" failed
  • BZ - 230143 - [GFS2] getting fatal: assertion "!atomic_read(&gl->gl_ail_count)" failed when using gfs2
  • BZ - 230255 - LSPP: cipso mapping settings prevents login into system
  • BZ - 230339 - The fatal error "Segmentation fault" happens when lots of continuous processes of mount.nfs4 are executed.
  • BZ - 230620 - LSPP: xfrm_add_sa_expire bug
  • BZ - 231312 - reproducible stack overflow with trivial test program
  • BZ - 231371 - LSPP: audit=0 appears not to disable syscall auditing
  • BZ - 231380 - GFS2 will hang if you run iozone on one node and do a du -h on another node
  • BZ - 231392 - LSPP: Misc soft-lockups in x86_64 lspp.67 kernel
  • BZ - 231518 - Fix error handling in check_partition(), again
  • BZ - 231553 - jbd I/O errors after ext3 orphan processing on readonly device
  • BZ - 231639 - [Symantec 5.1 bug] kernel thread current->mm dereference in grab_swap_token causes oops
  • BZ - 231910 - GFS2 withdraws if you are trying to remove a file while doing a du
  • BZ - 232074 - forward port of SCSI blacklist from RHEL4
  • BZ - 232107 - GFS2 panics if you try to rm -rf the lost+found directory
  • BZ - 232369 - Exit notifications missing when tracing multi-threaded processes
  • BZ - 232524 - LSPP: the audit record for ipsec when printing ipv6 addresses needs a correction.
  • BZ - 232715 - fix double AIO completion due to invalidate_inode_pages2 failure
  • BZ - 232967 - LSPP: Add audit rule bit operators patch
  • BZ - 233387 - LSPP: security check needed when flushing SAD and SPD
  • BZ - 233540 - utrace: wait does not report immediately after PTRACE_ATTACH of process already in job control stop
  • BZ - 233934 - The patch "xen: Add PACKET_AUXDATA cmsg" cause /usr/include/linux/if_packet.h broken
  • BZ - 233971 - HVM guest hangs on vcpu migration (ptc.ga emulation bug)
  • BZ - 234086 - dlm locking error from gfs dio/aio during virt machine migration
  • BZ - 234338 - use printk for error message before returning LM_OUT_ERROR
  • BZ - 234352 - iser bug fixes for 5.1
  • BZ - 234375 - PV guests can crash at boot w/ >4GB memory
  • BZ - 234447 - BUG_ON(!entry) in shmem_writepage() is triggered in rare circumstances
  • BZ - 234485 - LSPP: when searching for larval SAs check the protocol too
  • BZ - 235039 - conditionalized flush causes clear region requests to remain unflushed
  • BZ - 235184 - [rhts] ltp test vmsplice fails on ppc64 as a 32-bit app
  • BZ - 235299 - GFS2 gfs_quota do_list operation hangs when you have a large sparse quota file
  • BZ - 235475 - LSPP: Panic when running IPSEC labeled loopback on LSPP kernel
  • BZ - 235545 - utrace: ptrace operations should work on child in job control stop
  • BZ - 235640 - iscsi-initiator to solaris express n59, n60,n61 target leads to kernel panic
  • BZ - 235675 - LSPP: INFO: possible recursive locking detected
  • BZ - 235737 - Forcedeth module causes bmc access to fail while machine is off
  • BZ - 236069 - GFS2: deadlock running d_rwdirectlarge
  • BZ - 236087 - GFS2: mmap problems with distributed test cases
  • BZ - 236195 - vga= values result in black screen
  • BZ - 236205 - k8temp kernel modules for AMD K8 sensors
  • BZ - 236271 - dm-mirror: Writes to mirror after log failure return EIO
  • BZ - 236528 - TKIP errors when using WPA
  • BZ - 236624 - dm-mirror: Call to rh_in_sync should be allowed to block in do_reads
  • BZ - 236759 - Off-by-one error in arch/x86_64/k8.c::cache_k8_northbridges()
  • BZ - 236875 - autofs problem with symbolic links
  • BZ - 236880 - [PATCH] Fix NULL bio crash in loop worker thread
  • BZ - 236922 - DMA: Out of SW-IOMMU space
  • BZ - 237124 - zero new user lvbs
  • BZ - 237125 - orphan locks and purging incomplete
  • BZ - 237126 - invalid ids for user locks
  • BZ - 237188 - ext2 failures above 8T
  • BZ - 237374 - Oops in svcauth_gss_release when running connectathon04 test on NFSv3 with krb5i
  • BZ - 237558 - GFS2: problem with drop_inode logic in memory pressure situations
  • BZ - 238570 - HP5750: CDROM generates errors on tray open & close
  • BZ - 238571 - HP5750: cpu_chain & cache_chain_mutex deadlock
  • BZ - 238597 - update CIFS client to 1.48aRH
  • BZ - 238687 - nfsv3 on krb5i printk's many RPC request reserved XXX but used YYY
  • BZ - 238709 - GATT pages must be uncacheable
  • BZ - 238898 - add lock timeouts and time warnings
  • BZ - 238901 - lockup in shrink_zone when node out of memory
  • BZ - 239040 - allow debugging to be enabled
  • BZ - 239520 - kdump 2nd kernel failed to load cciss driver
  • BZ - 239643 - device mapper multipath: round-robin path order is inverted
  • BZ - 239645 - device mapper: incorrect suspend error path
  • BZ - 239655 - kernel dm: allow offline devices
  • BZ - 239887 - LSPP: watches using -p omit some syscalls
  • BZ - 240307 - WARNING: "autofs_kill_sb" [fs/autofs/autofs.ko] undefined in
  • BZ - 240354 - Broadcom Corporation BCM4306 gets ASSERTION FAILED error
  • BZ - 240735 - Kernel Oops in aacraid loading SteelEye Lifekeeper
  • BZ - 240751 - kernel dm io: panic on large request
  • BZ - 240868 - ipw2xxx driver update for 5.1
  • BZ - 241006 - device-mapper mirror: bad call to dm_io in read_async_bio causes I/O failure
  • BZ - 241272 - kernel dm crypt: possible data corruptions
  • BZ - 241817 - misc device removed when lockspace removal fails
  • BZ - 241819 - kobject freeing error when new_lockspace fails
  • BZ - 241821 - dumping master locks
  • BZ - 241902 - Unprivileged users can't create default lockspace
  • BZ - 241928 - IPMI driver updates for RHEL 5.1
  • BZ - 242069 - device-mapper mirror: Blockable function [clear_region] called inside spinlock
  • BZ - 242070 - queue_work oops
  • BZ - 242116 - race in aio io_submit write/read
  • BZ - 242122 - [RHEL5.1][XEN][IA64] blktap: Various cleanups necessary for ia64 support
  • BZ - 242124 - [RHEL5.1][XEN][IA64] Fix HVM interrupts on IPF
  • BZ - 242125 - [RHEL5.1][XEN][IA64] Change to new interrupt deliver mechanism
  • BZ - 242126 - [RHEL5.1][XEN][IA64] evtchn_callback fix and clean
  • BZ - 242136 - [RHEL5.1][XEN][IA64] Set IRQ_PER_CPU status on percpu IRQs
  • BZ - 242137 - [RHEL5.1][XEN][IA64] Fix for irq_desc() missing in new upstream
  • BZ - 242138 - [RHEL5.1][XEN][IA64] dma-mapping.h user our own swiotlb.h header
  • BZ - 242140 - [RHEL5.1][XEN] Support new xm command: xm trigger <Domain> <nmi|reset|init> [<VCPU>]
  • BZ - 242143 - [RHEL5.1][XEN][IA64] Skip MCA setup on domU
  • BZ - 242144 - [RHEL5.1][XEN][IA64] Fix PV-on-HVM driver
  • BZ - 242584 - GFS2 - cleanup inode number handling
  • BZ - 242648 - kdump broken on x86_64
  • BZ - 242779 - [RHEL5.1][XEN][IA64] changed foreign domain page mapping semantic
  • BZ - 242807 - missing dlm_hold_rsb() causes assertion failure
  • BZ - 242828 - [QLogic 5.1 bug] qla4xxx: Fix overrun/underrun handling and HBA online cond.
  • BZ - 242975 - A number of NFS oops, memory leaks found in upstream.
  • BZ - 242989 - [RHEL5.1][XEN][IA64] change interface version for 3.1
  • BZ - 243136 - GFS2 - NFS SPECsfs test runs panic and/or stalled in lookup code
  • BZ - 243555 - utrace: Failing PTRACE_DETACH after ATTACH+CONT(SIGSTOP)
  • BZ - 243913 - NFS Client R/O in anaconda preinstall environment
  • BZ - 243979 - PV-on-HVM interrupts not delivered promptly in APIC mode
  • BZ - 244133 - B44 ethernet driver update
  • BZ - 244150 - Cannot find IDE device with ATI/AMD SB700
  • BZ - 244154 - SMBus does not work on ATI/AMD SB700 chipset
  • BZ - 244215 - kernel dm snapshot: activating of snapshot marked invalid causes incorrect mapping
  • BZ - 244923 - RHEL5.1: vfs support for FUSE
  • BZ - 244949 - [NetApp-N 5.1 bug] umount utility
  • BZ - 245062 - [patch]Kernel panic (handle kernel NULLpointer) occurred in NFSv4
  • BZ - 245135 - Broadcom NetLink BCM5906M Fast Ethernet PCI Express does not work with RHEL5
  • BZ - 245164 - kernel oops when watched file is unlinked and audit is disabled
  • BZ - 245169 - Xen: Windows HVM guest image installed under VT cause blue screen if booted on AMD-V
  • BZ - 245550 - bug in gdth.c crashing machine
  • BZ - 245585 - kexec/xen machines may oops in case highmem is present
  • BZ - 245637 - [RHEL5.1][BUG][XEN] Guest OS hangs on IPF montecito
  • BZ - 246114 - GFS2: soft lockup in rgblk_search
  • BZ - 247120 - NFSd oops when exporting krb5p mounts
  • BZ - 247265 - race between loading xenblk.ko and scanning for LVM partitions etc.
  • BZ - 247427 - utrace: i386 debugger + x86_64 kernel + threaded (i386) inferior = error
  • BZ - 247581 - [LSI-M 5.1 Beta bug] megaraid_sas driver version incorrect (shows 3.05, should be 3.10)
  • BZ - 248102 - Missing critical phys_to_virt in lib/swiotlb.c
  • BZ - 248186 - gp dl535g2 / AMD 8132 MMCONFIG blacklist
  • BZ - 248327 - RHEL5: MegaRAID SATA RAID 150-4/6 are not supported 64-bit DMA
  • BZ - 248382 - Regression in support for third party drivers in RHEL5 kernels post -23.
  • BZ - 249394 - CIFS deadlocks in cifs_get_inode_info_unix
  • BZ - 249409 - Mapping guest pages can crash Dom0
  • BZ - 250203 - ia64 Xen NVRAM support (Hypervisor parts)
  • BZ - 250420 - [RHEL5.1]: Off-line (non-live) migrate of a RHEL5.1 PV guest panics the guest
  • BZ - 250496 - eHCA infiniband adapter works only for IPoIB
  • BZ - 250772 - GFS2: assertion failure gfs2_block_map, file = fs/gfs2/bmap.c, line = 475
  • BZ - 251053 - GFS2 panic at function = do_strip, file = fs/gfs2/bmap.c, line = 764
  • BZ - 251160 - [RHEL 5.1] Memory leak in audit tree watch code
  • BZ - 251179 - clvmd startup times out and fails, but continues running
  • BZ - 251731 - Fix broken AltSysrq-F (Force OOM kill functionality)
  • BZ - 251854 - hda_codec panic at boot
  • BZ - 251905 - use after free of skb in netfront.c:network_start_xmit
  • BZ - 252033 - separate mapped file and mapped anonymous pages in show_mem()
  • BZ - 252034 - forcedeth: missed 2 chunks from 0.60 backport
  • BZ - 252191 - GFS2: More problems unstuffing journaled files
  • BZ - 252243 - RHEL5.1: Updates to cxgb3 driver
  • BZ - 252358 - Duplicate CONFIG_CHANGE audit records when starting auditd
  • BZ - 253590 - GFS2: meta data corruption under heavy IOs
  • BZ - 253921 - GFS2: NULL superblock pointer causes panic after bad mount option
  • BZ - 253988 - Suspend/Resume tg3 does not work correctly
  • BZ - 255841 - kmalloc args are reversed in iscsi_tcp
  • BZ - 272021 - GFS2 - flocks from same process trip kernel BUG at fs/gfs2/glock.c:1118!
  • BZ - 279571 - Can't boot 2.6.18-26.el5 with Vmware ESX
  • BZ - 286501 - ext3 fs corruption noted after fresh install of RHEL5.1-Server-20070906.0
  • BZ - 286821 - GFS2 lock_dlm1 deadlock itself
  • BZ - 323771 - no sound when playing media with realplayer

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-53.el5.src.rpm SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123
x86_64
kernel-2.6.18-53.el5.x86_64.rpm SHA-256: 4dd0a3a133006ee5efff70c2e0cf68400ed537283bc831877dc27b6df3864875
kernel-debug-2.6.18-53.el5.x86_64.rpm SHA-256: 104f6e3a5421d6ebfb59498e18e168fcd53c0a8349ecc9d94eb445ecf88a6e0b
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm SHA-256: e8beb72177092fa7b01750136b36e6bba751dc920d03c7bd12d39a630c4c7004
kernel-devel-2.6.18-53.el5.x86_64.rpm SHA-256: 5e6ff272539efc5d5b95bb088eb995e259895fcd0a2eb187b5f3ce7bd362ccdc
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.x86_64.rpm SHA-256: 94618eb47ef3b841d12aff8c0e2dd1357461b8c385bc9a0ec9bec91bff8d9eb7
kernel-xen-2.6.18-53.el5.x86_64.rpm SHA-256: 13c28b61ec9665d48dd6bebd24f4b459b8f517d95de12fe14e5f9c0f5bd3248c
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm SHA-256: d683def244079158d79b4741c579c7e9a9ab0a100c40e3fdc8f49b0bef262524
ia64
kernel-2.6.18-53.el5.ia64.rpm SHA-256: 609ce142d6ddba812e011e63be45ff94b962418f33f09e31842674d5940937bf
kernel-debug-2.6.18-53.el5.ia64.rpm SHA-256: eaf30e7fd82a8e685ae77ee2548faaed557bea41b294747e9b5cb01e6c4ea3e8
kernel-debug-devel-2.6.18-53.el5.ia64.rpm SHA-256: 7bf8f9cd718bab6f34d500ac577320b5e9b7791972c3b5d500fb80d1791d0c29
kernel-devel-2.6.18-53.el5.ia64.rpm SHA-256: c28a96977d010c8f915f492ceeba4adf27c03caf685df3a9f8fc199c1dc644e3
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.ia64.rpm SHA-256: 6d70b120982deffb76a672ee9984bb0f584f186b12f270521b606ff5243c5885
kernel-xen-2.6.18-53.el5.ia64.rpm SHA-256: 7b5babb95cfb2a2115cb872c6f6b1e8325684bf08ce6635715caa793446dc287
kernel-xen-devel-2.6.18-53.el5.ia64.rpm SHA-256: 6a6c6f1ee259afcf5fbeec62d926fccde61a5ab7f2880de3cc6833f221aee9db
i386
kernel-2.6.18-53.el5.i686.rpm SHA-256: eb3e79e0b46dfcf429d3001b24221f2c14b9069c8e66e8f095d8215ea3cd9726
kernel-PAE-2.6.18-53.el5.i686.rpm SHA-256: 15a99023e1161cffcdbe3b7caf6280c7301d60fd21f30239b1b6e8ebff5c5559
kernel-PAE-devel-2.6.18-53.el5.i686.rpm SHA-256: d9276f8d801d417ca5777b0b9a48f318945a705458c0311e0f3c11c4af2d7630
kernel-debug-2.6.18-53.el5.i686.rpm SHA-256: b67761f59a2064ef17fd1f924ac49f01997f923debe3612842cd6a194005499c
kernel-debug-devel-2.6.18-53.el5.i686.rpm SHA-256: c56fcb3f16479d55b4f7a11fe43a99f3607d85feea0a0da34a6951670528dbd6
kernel-devel-2.6.18-53.el5.i686.rpm SHA-256: ade3089b8bb6ea953b3268cfcc53dd2f3ccc4dceee19d7f0e306d783e573c50d
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.i386.rpm SHA-256: 469313e1de1cf5d3fb574824a1b2b727f1e61c7f506f32414299a29402ff0b57
kernel-xen-2.6.18-53.el5.i686.rpm SHA-256: 2e1596b053d7fe7efd2d9baaa7dc8c6684011040d7ea8984440423564579386e
kernel-xen-devel-2.6.18-53.el5.i686.rpm SHA-256: 30a0f6c5c165d1a3a6a7e4da70e05e4c4a7740ab2b4622a76157e3e2d7cfe24d

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-53.el5.src.rpm SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123
x86_64
kernel-2.6.18-53.el5.x86_64.rpm SHA-256: 4dd0a3a133006ee5efff70c2e0cf68400ed537283bc831877dc27b6df3864875
kernel-debug-2.6.18-53.el5.x86_64.rpm SHA-256: 104f6e3a5421d6ebfb59498e18e168fcd53c0a8349ecc9d94eb445ecf88a6e0b
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm SHA-256: e8beb72177092fa7b01750136b36e6bba751dc920d03c7bd12d39a630c4c7004
kernel-devel-2.6.18-53.el5.x86_64.rpm SHA-256: 5e6ff272539efc5d5b95bb088eb995e259895fcd0a2eb187b5f3ce7bd362ccdc
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.x86_64.rpm SHA-256: 94618eb47ef3b841d12aff8c0e2dd1357461b8c385bc9a0ec9bec91bff8d9eb7
kernel-xen-2.6.18-53.el5.x86_64.rpm SHA-256: 13c28b61ec9665d48dd6bebd24f4b459b8f517d95de12fe14e5f9c0f5bd3248c
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm SHA-256: d683def244079158d79b4741c579c7e9a9ab0a100c40e3fdc8f49b0bef262524
i386
kernel-2.6.18-53.el5.i686.rpm SHA-256: eb3e79e0b46dfcf429d3001b24221f2c14b9069c8e66e8f095d8215ea3cd9726
kernel-PAE-2.6.18-53.el5.i686.rpm SHA-256: 15a99023e1161cffcdbe3b7caf6280c7301d60fd21f30239b1b6e8ebff5c5559
kernel-PAE-devel-2.6.18-53.el5.i686.rpm SHA-256: d9276f8d801d417ca5777b0b9a48f318945a705458c0311e0f3c11c4af2d7630
kernel-debug-2.6.18-53.el5.i686.rpm SHA-256: b67761f59a2064ef17fd1f924ac49f01997f923debe3612842cd6a194005499c
kernel-debug-devel-2.6.18-53.el5.i686.rpm SHA-256: c56fcb3f16479d55b4f7a11fe43a99f3607d85feea0a0da34a6951670528dbd6
kernel-devel-2.6.18-53.el5.i686.rpm SHA-256: ade3089b8bb6ea953b3268cfcc53dd2f3ccc4dceee19d7f0e306d783e573c50d
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.i386.rpm SHA-256: 469313e1de1cf5d3fb574824a1b2b727f1e61c7f506f32414299a29402ff0b57
kernel-xen-2.6.18-53.el5.i686.rpm SHA-256: 2e1596b053d7fe7efd2d9baaa7dc8c6684011040d7ea8984440423564579386e
kernel-xen-devel-2.6.18-53.el5.i686.rpm SHA-256: 30a0f6c5c165d1a3a6a7e4da70e05e4c4a7740ab2b4622a76157e3e2d7cfe24d

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-53.el5.src.rpm SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123
x86_64
kernel-2.6.18-53.el5.x86_64.rpm SHA-256: 4dd0a3a133006ee5efff70c2e0cf68400ed537283bc831877dc27b6df3864875
kernel-debug-2.6.18-53.el5.x86_64.rpm SHA-256: 104f6e3a5421d6ebfb59498e18e168fcd53c0a8349ecc9d94eb445ecf88a6e0b
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm SHA-256: e8beb72177092fa7b01750136b36e6bba751dc920d03c7bd12d39a630c4c7004
kernel-devel-2.6.18-53.el5.x86_64.rpm SHA-256: 5e6ff272539efc5d5b95bb088eb995e259895fcd0a2eb187b5f3ce7bd362ccdc
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.x86_64.rpm SHA-256: 94618eb47ef3b841d12aff8c0e2dd1357461b8c385bc9a0ec9bec91bff8d9eb7
kernel-xen-2.6.18-53.el5.x86_64.rpm SHA-256: 13c28b61ec9665d48dd6bebd24f4b459b8f517d95de12fe14e5f9c0f5bd3248c
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm SHA-256: d683def244079158d79b4741c579c7e9a9ab0a100c40e3fdc8f49b0bef262524
i386
kernel-2.6.18-53.el5.i686.rpm SHA-256: eb3e79e0b46dfcf429d3001b24221f2c14b9069c8e66e8f095d8215ea3cd9726
kernel-PAE-2.6.18-53.el5.i686.rpm SHA-256: 15a99023e1161cffcdbe3b7caf6280c7301d60fd21f30239b1b6e8ebff5c5559
kernel-PAE-devel-2.6.18-53.el5.i686.rpm SHA-256: d9276f8d801d417ca5777b0b9a48f318945a705458c0311e0f3c11c4af2d7630
kernel-debug-2.6.18-53.el5.i686.rpm SHA-256: b67761f59a2064ef17fd1f924ac49f01997f923debe3612842cd6a194005499c
kernel-debug-devel-2.6.18-53.el5.i686.rpm SHA-256: c56fcb3f16479d55b4f7a11fe43a99f3607d85feea0a0da34a6951670528dbd6
kernel-devel-2.6.18-53.el5.i686.rpm SHA-256: ade3089b8bb6ea953b3268cfcc53dd2f3ccc4dceee19d7f0e306d783e573c50d
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.i386.rpm SHA-256: 469313e1de1cf5d3fb574824a1b2b727f1e61c7f506f32414299a29402ff0b57
kernel-xen-2.6.18-53.el5.i686.rpm SHA-256: 2e1596b053d7fe7efd2d9baaa7dc8c6684011040d7ea8984440423564579386e
kernel-xen-devel-2.6.18-53.el5.i686.rpm SHA-256: 30a0f6c5c165d1a3a6a7e4da70e05e4c4a7740ab2b4622a76157e3e2d7cfe24d

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-53.el5.src.rpm SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123
s390x
kernel-2.6.18-53.el5.s390x.rpm SHA-256: a575adcf6544779db30bcd9c9369fbe535fc63872d0321561c0bf08f10a8f886
kernel-debug-2.6.18-53.el5.s390x.rpm SHA-256: 5b09686097edaa2a3125b65b71b8a79ed9ddd0cfa6a49f5f69ff304dc8097924
kernel-debug-devel-2.6.18-53.el5.s390x.rpm SHA-256: 9e566535841bf5a68e6c81929e851bcf608d237a0bf779251500921b2d3885d2
kernel-devel-2.6.18-53.el5.s390x.rpm SHA-256: 22c98f02b50ab7238574900816fbe5a58e2f63e698ddba39326d9dbe5f4173ac
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.s390x.rpm SHA-256: 39aa2ac5660faa17cbdbad58824078b82f3e8e581732c5ce21e66745ea5de378

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-53.el5.src.rpm SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123
ppc
kernel-2.6.18-53.el5.ppc64.rpm SHA-256: 36627f79c6c20c3c4d9b2c9f19b900257b1f67b3de18c51d6ed59a08cc613baf
kernel-debug-2.6.18-53.el5.ppc64.rpm SHA-256: 439a3462c456feccb7e113a161ca05cf473201fb38f120086c8c76885dd83a7f
kernel-debug-devel-2.6.18-53.el5.ppc64.rpm SHA-256: 778f16fb05d31a57e2e1b62e71dbb11ceea8e3f9679dadba2d1471648755c1be
kernel-devel-2.6.18-53.el5.ppc64.rpm SHA-256: a165a2d8035155733119af7919d80a0916f89035ea972a82f17161f10e895577
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.ppc.rpm SHA-256: 55c89ae0cd58aa9265250950edd1fce01a44a31dd01a1746e4d29107f7841c29
kernel-headers-2.6.18-53.el5.ppc64.rpm SHA-256: 71a89edb768a4ed3f5df26831b153729808e8e32b9d95753f0a30fa569b8cc9b
kernel-kdump-2.6.18-53.el5.ppc64.rpm SHA-256: f2168895d368adbcafd03ded9471d7670236983c5475aed7d66022c8103ecd1b
kernel-kdump-devel-2.6.18-53.el5.ppc64.rpm SHA-256: fdc0b95a47fe6490c699d124e80c7ce4eee56a97f32e1aa2a2f8b5b953b4ee51

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-53.el5.src.rpm SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123
x86_64
kernel-2.6.18-53.el5.x86_64.rpm SHA-256: 4dd0a3a133006ee5efff70c2e0cf68400ed537283bc831877dc27b6df3864875
kernel-debug-2.6.18-53.el5.x86_64.rpm SHA-256: 104f6e3a5421d6ebfb59498e18e168fcd53c0a8349ecc9d94eb445ecf88a6e0b
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm SHA-256: e8beb72177092fa7b01750136b36e6bba751dc920d03c7bd12d39a630c4c7004
kernel-devel-2.6.18-53.el5.x86_64.rpm SHA-256: 5e6ff272539efc5d5b95bb088eb995e259895fcd0a2eb187b5f3ce7bd362ccdc
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.x86_64.rpm SHA-256: 94618eb47ef3b841d12aff8c0e2dd1357461b8c385bc9a0ec9bec91bff8d9eb7
kernel-xen-2.6.18-53.el5.x86_64.rpm SHA-256: 13c28b61ec9665d48dd6bebd24f4b459b8f517d95de12fe14e5f9c0f5bd3248c
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm SHA-256: d683def244079158d79b4741c579c7e9a9ab0a100c40e3fdc8f49b0bef262524
i386
kernel-2.6.18-53.el5.i686.rpm SHA-256: eb3e79e0b46dfcf429d3001b24221f2c14b9069c8e66e8f095d8215ea3cd9726
kernel-PAE-2.6.18-53.el5.i686.rpm SHA-256: 15a99023e1161cffcdbe3b7caf6280c7301d60fd21f30239b1b6e8ebff5c5559
kernel-PAE-devel-2.6.18-53.el5.i686.rpm SHA-256: d9276f8d801d417ca5777b0b9a48f318945a705458c0311e0f3c11c4af2d7630
kernel-debug-2.6.18-53.el5.i686.rpm SHA-256: b67761f59a2064ef17fd1f924ac49f01997f923debe3612842cd6a194005499c
kernel-debug-devel-2.6.18-53.el5.i686.rpm SHA-256: c56fcb3f16479d55b4f7a11fe43a99f3607d85feea0a0da34a6951670528dbd6
kernel-devel-2.6.18-53.el5.i686.rpm SHA-256: ade3089b8bb6ea953b3268cfcc53dd2f3ccc4dceee19d7f0e306d783e573c50d
kernel-doc-2.6.18-53.el5.noarch.rpm SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce
kernel-headers-2.6.18-53.el5.i386.rpm SHA-256: 469313e1de1cf5d3fb574824a1b2b727f1e61c7f506f32414299a29402ff0b57
kernel-xen-2.6.18-53.el5.i686.rpm SHA-256: 2e1596b053d7fe7efd2d9baaa7dc8c6684011040d7ea8984440423564579386e
kernel-xen-devel-2.6.18-53.el5.i686.rpm SHA-256: 30a0f6c5c165d1a3a6a7e4da70e05e4c4a7740ab2b4622a76157e3e2d7cfe24d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility