- Issued:
- 2007-10-30
- Updated:
- 2007-11-07
RHBA-2007:0959 - Bug Fix Advisory
Synopsis
Updated kernel packages for Red Hat Enterprise Linux 5 Update 1
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 5. This is the first
regular update.
Description
The Linux kernel handles the basic functions of the operating system. This
is the first regular kernel update to Red Hat Enterprise Linux 5.
Feature updates:
- Applied several enhancements to GFS2 (technology preview feature), which
require a change to the on-disk file system format.
- Added the firewire-sbp2 module as a technology preview to enable
connectivity with FireWire devices.
- Added the devicescape stack (mac80211) to enable the iwlwifi 4965GN
wireless driver. This stack allows certain wireless devices to connect to
any WiFi network. At present, this stack is presented as a technology preview.
- iSCSI installation and boot is now fully supported.
- The EXT3 file system now has a maximum capacity of 16TB.
- Fixed ext2 overflows on file systems greater than 8TB.
Virtualization-related changes:
- The virtualized kernel can now use the kdump function.
- Virtualization is now fully supported on ia64 architectures.
- Added support for AMD-V domain live migration.
- Enabled Xen booting on machines with over 64G of RAM.
- Xen upgraded to version 3.1.
Generic kernel updates:
- Added support for LSPP certification.
- Added replication and migration support for NFSv4 referrals.
- Updated CIFS to version 1.48aRH.
- Added support for shared page table for hugetlb pages.
- Added MODULE_FIRMWARE support.
- Expanded the in-kernel socket API.
For a comprehensive list of kernel-related updates, refer to the latest
version of the Red Hat Enterprise Linux 5.1 release notes on:
http://www.redhat.com/docs/manuals/enterprise/
Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which apply these kernel updates.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 192082 - System won't suspend with GFS2 file system mounted
- BZ - 205897 - [Areca RHEL 5.1] Add kernel support for Areca RAID controllers (include arcmsr driver from 2.6.19)
- BZ - 206366 - [RHEL5 Beta1]: sysrq-t incurs a bogus softlockup warning
- BZ - 206520 - mount hangs when nodir=1 not always used.
- BZ - 209964 - NFS Client R/O in anaconda preinstall environment
- BZ - 211197 - xenoprofile uses incorrect mode and eip/rip for AMD-V
- BZ - 211516 - kernel dm: memory issues cause "failures" when creating many snapshots
- BZ - 211525 - kernel dm: mempool_resize BUG() during multiple snapshot removals
- BZ - 212968 - kernel-xen-devel packages all of /xen/
- BZ - 215536 - Xen0 can not startX in tiger4
- BZ - 216293 - blktap does not build on ia64
- BZ - 216750 - fcntl(F_SETLEASE, F_WRLCK) for a file on NFS always returns EAGAIN
- BZ - 217356 - GFS2 hangs waiting for semaphore?
- BZ - 219216 - [EMC/QLogic 5.1 bug] qla2xxx driver running IO on DM-MPIO devices cause "kernel: PCI-DMA: Out of SW-IOMMU space "
- BZ - 219563 - network-attaching and detaching too fast from xenbus will crash domU
- BZ - 219837 - selinux on RHEL5 and nfs does not cope with nohide exported fs
- BZ - 219897 - Unmatched decrementing of net device reference count
- BZ - 220526 - [RHEL5 Xen/IA64]: xennet triggers "Kernel panic - not syncing: Unable to reduce memory reservation"
- BZ - 220592 - kernel boot panic with >=64GB memory
- BZ - 221330 - kernel dm-multipath: stall on resume if noflush is used
- BZ - 221387 - HVM bug: MOVS/OUTS/INS crossing pages
- BZ - 222455 - Kernel oops when starting pcscd on a Dell Lattitude D620.
- BZ - 223087 - qla4xxx: mutex_lock needs to be released before sleep() in qla4xxx_mailbox_command
- BZ - 223530 - Make audit config immutable in kernel
- BZ - 223918 - LSPP: audit logs bogus obj label in some PATH records
- BZ - 223919 - LSPP: audit does not log obj label when opening an existing POSIX message queue
- BZ - 224131 - No zero holes for PTRACE_PEEKUSR/PTRACE_POKEUSR?
- BZ - 224359 - CIFS: bad session setup packet alignment leads to kernel crash
- BZ - 224620 - AVC_PATH audit records
- BZ - 224671 - x86_64 - Fix FS/GS registers for VT execution
- BZ - 225328 - LSPP: ipsec drops first packet when using IKE daemon
- BZ - 225515 - [patch]Kernel panic (handle kernel NULLpointer) occurred in NFSv4
- BZ - 225531 - ia64 PTRACE_GETREGS touches pt_all_user_regs words that should be left alone
- BZ - 228108 - mptscsi adds DID_BUS_BUSY host status when scsi status of BUSY is returned
- BZ - 228366 - LSPP: audit does not log obj label for signal recipient
- BZ - 228397 - PTRACE_PEEKUSR regression for i386/x86_64 unused words of struct user
- BZ - 228409 - LSPP: regular ipsec in upstream kernel crashes
- BZ - 228422 - LSPP: cleanup xfrm_audit_log interface
- BZ - 228540 - Need to add gfs2_tool lockdump support to gfs2
- BZ - 228557 - LSPP: In labeled ipsec, permissions are checked after deleting the policy
- BZ - 228854 - nfs protocol V3 :write procedure patch
- BZ - 229094 - LSPP: audit records for some f*xattr syscalls don't include object info
- BZ - 229345 - [GFS2] NFS fix - gfs2_decode_fh
- BZ - 229349 - [GFS2] NFS fix - gfs2_drevalidate panic
- BZ - 229395 - [GFS2] NFS fix - gfs2 filldir issue
- BZ - 229527 - LSPP: flow cache entries remain valid even after selinux policy reload
- BZ - 229528 - LSPP: memory leak in flow cache code
- BZ - 229720 - LSPP: pfkey_spdget does not audit xrfm policy changes
- BZ - 229732 - LSPP: pfkey_delete and xfrm_del_sa audit hook is misplaced.
- BZ - 229831 - [GFS2] gfs2 panic's occasionally in gfs2_unlink while running bonnie++
- BZ - 229873 - [GFS2] alternate test: assertion "!ip->i_inode.i_mapping->nrpages" failed
- BZ - 230143 - [GFS2] getting fatal: assertion "!atomic_read(&gl->gl_ail_count)" failed when using gfs2
- BZ - 230255 - LSPP: cipso mapping settings prevents login into system
- BZ - 230339 - The fatal error "Segmentation fault" happens when lots of continuous processes of mount.nfs4 are executed.
- BZ - 230620 - LSPP: xfrm_add_sa_expire bug
- BZ - 231312 - reproducible stack overflow with trivial test program
- BZ - 231371 - LSPP: audit=0 appears not to disable syscall auditing
- BZ - 231380 - GFS2 will hang if you run iozone on one node and do a du -h on another node
- BZ - 231392 - LSPP: Misc soft-lockups in x86_64 lspp.67 kernel
- BZ - 231518 - Fix error handling in check_partition(), again
- BZ - 231553 - jbd I/O errors after ext3 orphan processing on readonly device
- BZ - 231639 - [Symantec 5.1 bug] kernel thread current->mm dereference in grab_swap_token causes oops
- BZ - 231910 - GFS2 withdraws if you are trying to remove a file while doing a du
- BZ - 232074 - forward port of SCSI blacklist from RHEL4
- BZ - 232107 - GFS2 panics if you try to rm -rf the lost+found directory
- BZ - 232369 - Exit notifications missing when tracing multi-threaded processes
- BZ - 232524 - LSPP: the audit record for ipsec when printing ipv6 addresses needs a correction.
- BZ - 232715 - fix double AIO completion due to invalidate_inode_pages2 failure
- BZ - 232967 - LSPP: Add audit rule bit operators patch
- BZ - 233387 - LSPP: security check needed when flushing SAD and SPD
- BZ - 233540 - utrace: wait does not report immediately after PTRACE_ATTACH of process already in job control stop
- BZ - 233934 - The patch "xen: Add PACKET_AUXDATA cmsg" cause /usr/include/linux/if_packet.h broken
- BZ - 233971 - HVM guest hangs on vcpu migration (ptc.ga emulation bug)
- BZ - 234086 - dlm locking error from gfs dio/aio during virt machine migration
- BZ - 234338 - use printk for error message before returning LM_OUT_ERROR
- BZ - 234352 - iser bug fixes for 5.1
- BZ - 234375 - PV guests can crash at boot w/ >4GB memory
- BZ - 234447 - BUG_ON(!entry) in shmem_writepage() is triggered in rare circumstances
- BZ - 234485 - LSPP: when searching for larval SAs check the protocol too
- BZ - 235039 - conditionalized flush causes clear region requests to remain unflushed
- BZ - 235184 - [rhts] ltp test vmsplice fails on ppc64 as a 32-bit app
- BZ - 235299 - GFS2 gfs_quota do_list operation hangs when you have a large sparse quota file
- BZ - 235475 - LSPP: Panic when running IPSEC labeled loopback on LSPP kernel
- BZ - 235545 - utrace: ptrace operations should work on child in job control stop
- BZ - 235640 - iscsi-initiator to solaris express n59, n60,n61 target leads to kernel panic
- BZ - 235675 - LSPP: INFO: possible recursive locking detected
- BZ - 235737 - Forcedeth module causes bmc access to fail while machine is off
- BZ - 236069 - GFS2: deadlock running d_rwdirectlarge
- BZ - 236087 - GFS2: mmap problems with distributed test cases
- BZ - 236195 - vga= values result in black screen
- BZ - 236205 - k8temp kernel modules for AMD K8 sensors
- BZ - 236271 - dm-mirror: Writes to mirror after log failure return EIO
- BZ - 236528 - TKIP errors when using WPA
- BZ - 236624 - dm-mirror: Call to rh_in_sync should be allowed to block in do_reads
- BZ - 236759 - Off-by-one error in arch/x86_64/k8.c::cache_k8_northbridges()
- BZ - 236875 - autofs problem with symbolic links
- BZ - 236880 - [PATCH] Fix NULL bio crash in loop worker thread
- BZ - 236922 - DMA: Out of SW-IOMMU space
- BZ - 237124 - zero new user lvbs
- BZ - 237125 - orphan locks and purging incomplete
- BZ - 237126 - invalid ids for user locks
- BZ - 237188 - ext2 failures above 8T
- BZ - 237374 - Oops in svcauth_gss_release when running connectathon04 test on NFSv3 with krb5i
- BZ - 237558 - GFS2: problem with drop_inode logic in memory pressure situations
- BZ - 238570 - HP5750: CDROM generates errors on tray open & close
- BZ - 238571 - HP5750: cpu_chain & cache_chain_mutex deadlock
- BZ - 238597 - update CIFS client to 1.48aRH
- BZ - 238687 - nfsv3 on krb5i printk's many RPC request reserved XXX but used YYY
- BZ - 238709 - GATT pages must be uncacheable
- BZ - 238898 - add lock timeouts and time warnings
- BZ - 238901 - lockup in shrink_zone when node out of memory
- BZ - 239040 - allow debugging to be enabled
- BZ - 239520 - kdump 2nd kernel failed to load cciss driver
- BZ - 239643 - device mapper multipath: round-robin path order is inverted
- BZ - 239645 - device mapper: incorrect suspend error path
- BZ - 239655 - kernel dm: allow offline devices
- BZ - 239887 - LSPP: watches using -p omit some syscalls
- BZ - 240307 - WARNING: "autofs_kill_sb" [fs/autofs/autofs.ko] undefined in
- BZ - 240354 - Broadcom Corporation BCM4306 gets ASSERTION FAILED error
- BZ - 240735 - Kernel Oops in aacraid loading SteelEye Lifekeeper
- BZ - 240751 - kernel dm io: panic on large request
- BZ - 240868 - ipw2xxx driver update for 5.1
- BZ - 241006 - device-mapper mirror: bad call to dm_io in read_async_bio causes I/O failure
- BZ - 241272 - kernel dm crypt: possible data corruptions
- BZ - 241817 - misc device removed when lockspace removal fails
- BZ - 241819 - kobject freeing error when new_lockspace fails
- BZ - 241821 - dumping master locks
- BZ - 241902 - Unprivileged users can't create default lockspace
- BZ - 241928 - IPMI driver updates for RHEL 5.1
- BZ - 242069 - device-mapper mirror: Blockable function [clear_region] called inside spinlock
- BZ - 242070 - queue_work oops
- BZ - 242116 - race in aio io_submit write/read
- BZ - 242122 - [RHEL5.1][XEN][IA64] blktap: Various cleanups necessary for ia64 support
- BZ - 242124 - [RHEL5.1][XEN][IA64] Fix HVM interrupts on IPF
- BZ - 242125 - [RHEL5.1][XEN][IA64] Change to new interrupt deliver mechanism
- BZ - 242126 - [RHEL5.1][XEN][IA64] evtchn_callback fix and clean
- BZ - 242136 - [RHEL5.1][XEN][IA64] Set IRQ_PER_CPU status on percpu IRQs
- BZ - 242137 - [RHEL5.1][XEN][IA64] Fix for irq_desc() missing in new upstream
- BZ - 242138 - [RHEL5.1][XEN][IA64] dma-mapping.h user our own swiotlb.h header
- BZ - 242140 - [RHEL5.1][XEN] Support new xm command: xm trigger <Domain> <nmi|reset|init> [<VCPU>]
- BZ - 242143 - [RHEL5.1][XEN][IA64] Skip MCA setup on domU
- BZ - 242144 - [RHEL5.1][XEN][IA64] Fix PV-on-HVM driver
- BZ - 242584 - GFS2 - cleanup inode number handling
- BZ - 242648 - kdump broken on x86_64
- BZ - 242779 - [RHEL5.1][XEN][IA64] changed foreign domain page mapping semantic
- BZ - 242807 - missing dlm_hold_rsb() causes assertion failure
- BZ - 242828 - [QLogic 5.1 bug] qla4xxx: Fix overrun/underrun handling and HBA online cond.
- BZ - 242975 - A number of NFS oops, memory leaks found in upstream.
- BZ - 242989 - [RHEL5.1][XEN][IA64] change interface version for 3.1
- BZ - 243136 - GFS2 - NFS SPECsfs test runs panic and/or stalled in lookup code
- BZ - 243555 - utrace: Failing PTRACE_DETACH after ATTACH+CONT(SIGSTOP)
- BZ - 243913 - NFS Client R/O in anaconda preinstall environment
- BZ - 243979 - PV-on-HVM interrupts not delivered promptly in APIC mode
- BZ - 244133 - B44 ethernet driver update
- BZ - 244150 - Cannot find IDE device with ATI/AMD SB700
- BZ - 244154 - SMBus does not work on ATI/AMD SB700 chipset
- BZ - 244215 - kernel dm snapshot: activating of snapshot marked invalid causes incorrect mapping
- BZ - 244923 - RHEL5.1: vfs support for FUSE
- BZ - 244949 - [NetApp-N 5.1 bug] umount utility
- BZ - 245062 - [patch]Kernel panic (handle kernel NULLpointer) occurred in NFSv4
- BZ - 245135 - Broadcom NetLink BCM5906M Fast Ethernet PCI Express does not work with RHEL5
- BZ - 245164 - kernel oops when watched file is unlinked and audit is disabled
- BZ - 245169 - Xen: Windows HVM guest image installed under VT cause blue screen if booted on AMD-V
- BZ - 245550 - bug in gdth.c crashing machine
- BZ - 245585 - kexec/xen machines may oops in case highmem is present
- BZ - 245637 - [RHEL5.1][BUG][XEN] Guest OS hangs on IPF montecito
- BZ - 246114 - GFS2: soft lockup in rgblk_search
- BZ - 247120 - NFSd oops when exporting krb5p mounts
- BZ - 247265 - race between loading xenblk.ko and scanning for LVM partitions etc.
- BZ - 247427 - utrace: i386 debugger + x86_64 kernel + threaded (i386) inferior = error
- BZ - 247581 - [LSI-M 5.1 Beta bug] megaraid_sas driver version incorrect (shows 3.05, should be 3.10)
- BZ - 248102 - Missing critical phys_to_virt in lib/swiotlb.c
- BZ - 248186 - gp dl535g2 / AMD 8132 MMCONFIG blacklist
- BZ - 248327 - RHEL5: MegaRAID SATA RAID 150-4/6 are not supported 64-bit DMA
- BZ - 248382 - Regression in support for third party drivers in RHEL5 kernels post -23.
- BZ - 249394 - CIFS deadlocks in cifs_get_inode_info_unix
- BZ - 249409 - Mapping guest pages can crash Dom0
- BZ - 250203 - ia64 Xen NVRAM support (Hypervisor parts)
- BZ - 250420 - [RHEL5.1]: Off-line (non-live) migrate of a RHEL5.1 PV guest panics the guest
- BZ - 250496 - eHCA infiniband adapter works only for IPoIB
- BZ - 250772 - GFS2: assertion failure gfs2_block_map, file = fs/gfs2/bmap.c, line = 475
- BZ - 251053 - GFS2 panic at function = do_strip, file = fs/gfs2/bmap.c, line = 764
- BZ - 251160 - [RHEL 5.1] Memory leak in audit tree watch code
- BZ - 251179 - clvmd startup times out and fails, but continues running
- BZ - 251731 - Fix broken AltSysrq-F (Force OOM kill functionality)
- BZ - 251854 - hda_codec panic at boot
- BZ - 251905 - use after free of skb in netfront.c:network_start_xmit
- BZ - 252033 - separate mapped file and mapped anonymous pages in show_mem()
- BZ - 252034 - forcedeth: missed 2 chunks from 0.60 backport
- BZ - 252191 - GFS2: More problems unstuffing journaled files
- BZ - 252243 - RHEL5.1: Updates to cxgb3 driver
- BZ - 252358 - Duplicate CONFIG_CHANGE audit records when starting auditd
- BZ - 253590 - GFS2: meta data corruption under heavy IOs
- BZ - 253921 - GFS2: NULL superblock pointer causes panic after bad mount option
- BZ - 253988 - Suspend/Resume tg3 does not work correctly
- BZ - 255841 - kmalloc args are reversed in iscsi_tcp
- BZ - 272021 - GFS2 - flocks from same process trip kernel BUG at fs/gfs2/glock.c:1118!
- BZ - 279571 - Can't boot 2.6.18-26.el5 with Vmware ESX
- BZ - 286501 - ext3 fs corruption noted after fresh install of RHEL5.1-Server-20070906.0
- BZ - 286821 - GFS2 lock_dlm1 deadlock itself
- BZ - 323771 - no sound when playing media with realplayer
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kernel-2.6.18-53.el5.src.rpm | SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123 |
x86_64 | |
kernel-2.6.18-53.el5.x86_64.rpm | SHA-256: 4dd0a3a133006ee5efff70c2e0cf68400ed537283bc831877dc27b6df3864875 |
kernel-debug-2.6.18-53.el5.x86_64.rpm | SHA-256: 104f6e3a5421d6ebfb59498e18e168fcd53c0a8349ecc9d94eb445ecf88a6e0b |
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: e8beb72177092fa7b01750136b36e6bba751dc920d03c7bd12d39a630c4c7004 |
kernel-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: 5e6ff272539efc5d5b95bb088eb995e259895fcd0a2eb187b5f3ce7bd362ccdc |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.x86_64.rpm | SHA-256: 94618eb47ef3b841d12aff8c0e2dd1357461b8c385bc9a0ec9bec91bff8d9eb7 |
kernel-xen-2.6.18-53.el5.x86_64.rpm | SHA-256: 13c28b61ec9665d48dd6bebd24f4b459b8f517d95de12fe14e5f9c0f5bd3248c |
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: d683def244079158d79b4741c579c7e9a9ab0a100c40e3fdc8f49b0bef262524 |
ia64 | |
kernel-2.6.18-53.el5.ia64.rpm | SHA-256: 609ce142d6ddba812e011e63be45ff94b962418f33f09e31842674d5940937bf |
kernel-debug-2.6.18-53.el5.ia64.rpm | SHA-256: eaf30e7fd82a8e685ae77ee2548faaed557bea41b294747e9b5cb01e6c4ea3e8 |
kernel-debug-devel-2.6.18-53.el5.ia64.rpm | SHA-256: 7bf8f9cd718bab6f34d500ac577320b5e9b7791972c3b5d500fb80d1791d0c29 |
kernel-devel-2.6.18-53.el5.ia64.rpm | SHA-256: c28a96977d010c8f915f492ceeba4adf27c03caf685df3a9f8fc199c1dc644e3 |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.ia64.rpm | SHA-256: 6d70b120982deffb76a672ee9984bb0f584f186b12f270521b606ff5243c5885 |
kernel-xen-2.6.18-53.el5.ia64.rpm | SHA-256: 7b5babb95cfb2a2115cb872c6f6b1e8325684bf08ce6635715caa793446dc287 |
kernel-xen-devel-2.6.18-53.el5.ia64.rpm | SHA-256: 6a6c6f1ee259afcf5fbeec62d926fccde61a5ab7f2880de3cc6833f221aee9db |
i386 | |
kernel-2.6.18-53.el5.i686.rpm | SHA-256: eb3e79e0b46dfcf429d3001b24221f2c14b9069c8e66e8f095d8215ea3cd9726 |
kernel-PAE-2.6.18-53.el5.i686.rpm | SHA-256: 15a99023e1161cffcdbe3b7caf6280c7301d60fd21f30239b1b6e8ebff5c5559 |
kernel-PAE-devel-2.6.18-53.el5.i686.rpm | SHA-256: d9276f8d801d417ca5777b0b9a48f318945a705458c0311e0f3c11c4af2d7630 |
kernel-debug-2.6.18-53.el5.i686.rpm | SHA-256: b67761f59a2064ef17fd1f924ac49f01997f923debe3612842cd6a194005499c |
kernel-debug-devel-2.6.18-53.el5.i686.rpm | SHA-256: c56fcb3f16479d55b4f7a11fe43a99f3607d85feea0a0da34a6951670528dbd6 |
kernel-devel-2.6.18-53.el5.i686.rpm | SHA-256: ade3089b8bb6ea953b3268cfcc53dd2f3ccc4dceee19d7f0e306d783e573c50d |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.i386.rpm | SHA-256: 469313e1de1cf5d3fb574824a1b2b727f1e61c7f506f32414299a29402ff0b57 |
kernel-xen-2.6.18-53.el5.i686.rpm | SHA-256: 2e1596b053d7fe7efd2d9baaa7dc8c6684011040d7ea8984440423564579386e |
kernel-xen-devel-2.6.18-53.el5.i686.rpm | SHA-256: 30a0f6c5c165d1a3a6a7e4da70e05e4c4a7740ab2b4622a76157e3e2d7cfe24d |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kernel-2.6.18-53.el5.src.rpm | SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123 |
x86_64 | |
kernel-2.6.18-53.el5.x86_64.rpm | SHA-256: 4dd0a3a133006ee5efff70c2e0cf68400ed537283bc831877dc27b6df3864875 |
kernel-debug-2.6.18-53.el5.x86_64.rpm | SHA-256: 104f6e3a5421d6ebfb59498e18e168fcd53c0a8349ecc9d94eb445ecf88a6e0b |
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: e8beb72177092fa7b01750136b36e6bba751dc920d03c7bd12d39a630c4c7004 |
kernel-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: 5e6ff272539efc5d5b95bb088eb995e259895fcd0a2eb187b5f3ce7bd362ccdc |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.x86_64.rpm | SHA-256: 94618eb47ef3b841d12aff8c0e2dd1357461b8c385bc9a0ec9bec91bff8d9eb7 |
kernel-xen-2.6.18-53.el5.x86_64.rpm | SHA-256: 13c28b61ec9665d48dd6bebd24f4b459b8f517d95de12fe14e5f9c0f5bd3248c |
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: d683def244079158d79b4741c579c7e9a9ab0a100c40e3fdc8f49b0bef262524 |
i386 | |
kernel-2.6.18-53.el5.i686.rpm | SHA-256: eb3e79e0b46dfcf429d3001b24221f2c14b9069c8e66e8f095d8215ea3cd9726 |
kernel-PAE-2.6.18-53.el5.i686.rpm | SHA-256: 15a99023e1161cffcdbe3b7caf6280c7301d60fd21f30239b1b6e8ebff5c5559 |
kernel-PAE-devel-2.6.18-53.el5.i686.rpm | SHA-256: d9276f8d801d417ca5777b0b9a48f318945a705458c0311e0f3c11c4af2d7630 |
kernel-debug-2.6.18-53.el5.i686.rpm | SHA-256: b67761f59a2064ef17fd1f924ac49f01997f923debe3612842cd6a194005499c |
kernel-debug-devel-2.6.18-53.el5.i686.rpm | SHA-256: c56fcb3f16479d55b4f7a11fe43a99f3607d85feea0a0da34a6951670528dbd6 |
kernel-devel-2.6.18-53.el5.i686.rpm | SHA-256: ade3089b8bb6ea953b3268cfcc53dd2f3ccc4dceee19d7f0e306d783e573c50d |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.i386.rpm | SHA-256: 469313e1de1cf5d3fb574824a1b2b727f1e61c7f506f32414299a29402ff0b57 |
kernel-xen-2.6.18-53.el5.i686.rpm | SHA-256: 2e1596b053d7fe7efd2d9baaa7dc8c6684011040d7ea8984440423564579386e |
kernel-xen-devel-2.6.18-53.el5.i686.rpm | SHA-256: 30a0f6c5c165d1a3a6a7e4da70e05e4c4a7740ab2b4622a76157e3e2d7cfe24d |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
kernel-2.6.18-53.el5.src.rpm | SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123 |
x86_64 | |
kernel-2.6.18-53.el5.x86_64.rpm | SHA-256: 4dd0a3a133006ee5efff70c2e0cf68400ed537283bc831877dc27b6df3864875 |
kernel-debug-2.6.18-53.el5.x86_64.rpm | SHA-256: 104f6e3a5421d6ebfb59498e18e168fcd53c0a8349ecc9d94eb445ecf88a6e0b |
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: e8beb72177092fa7b01750136b36e6bba751dc920d03c7bd12d39a630c4c7004 |
kernel-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: 5e6ff272539efc5d5b95bb088eb995e259895fcd0a2eb187b5f3ce7bd362ccdc |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.x86_64.rpm | SHA-256: 94618eb47ef3b841d12aff8c0e2dd1357461b8c385bc9a0ec9bec91bff8d9eb7 |
kernel-xen-2.6.18-53.el5.x86_64.rpm | SHA-256: 13c28b61ec9665d48dd6bebd24f4b459b8f517d95de12fe14e5f9c0f5bd3248c |
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: d683def244079158d79b4741c579c7e9a9ab0a100c40e3fdc8f49b0bef262524 |
i386 | |
kernel-2.6.18-53.el5.i686.rpm | SHA-256: eb3e79e0b46dfcf429d3001b24221f2c14b9069c8e66e8f095d8215ea3cd9726 |
kernel-PAE-2.6.18-53.el5.i686.rpm | SHA-256: 15a99023e1161cffcdbe3b7caf6280c7301d60fd21f30239b1b6e8ebff5c5559 |
kernel-PAE-devel-2.6.18-53.el5.i686.rpm | SHA-256: d9276f8d801d417ca5777b0b9a48f318945a705458c0311e0f3c11c4af2d7630 |
kernel-debug-2.6.18-53.el5.i686.rpm | SHA-256: b67761f59a2064ef17fd1f924ac49f01997f923debe3612842cd6a194005499c |
kernel-debug-devel-2.6.18-53.el5.i686.rpm | SHA-256: c56fcb3f16479d55b4f7a11fe43a99f3607d85feea0a0da34a6951670528dbd6 |
kernel-devel-2.6.18-53.el5.i686.rpm | SHA-256: ade3089b8bb6ea953b3268cfcc53dd2f3ccc4dceee19d7f0e306d783e573c50d |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.i386.rpm | SHA-256: 469313e1de1cf5d3fb574824a1b2b727f1e61c7f506f32414299a29402ff0b57 |
kernel-xen-2.6.18-53.el5.i686.rpm | SHA-256: 2e1596b053d7fe7efd2d9baaa7dc8c6684011040d7ea8984440423564579386e |
kernel-xen-devel-2.6.18-53.el5.i686.rpm | SHA-256: 30a0f6c5c165d1a3a6a7e4da70e05e4c4a7740ab2b4622a76157e3e2d7cfe24d |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
kernel-2.6.18-53.el5.src.rpm | SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123 |
s390x | |
kernel-2.6.18-53.el5.s390x.rpm | SHA-256: a575adcf6544779db30bcd9c9369fbe535fc63872d0321561c0bf08f10a8f886 |
kernel-debug-2.6.18-53.el5.s390x.rpm | SHA-256: 5b09686097edaa2a3125b65b71b8a79ed9ddd0cfa6a49f5f69ff304dc8097924 |
kernel-debug-devel-2.6.18-53.el5.s390x.rpm | SHA-256: 9e566535841bf5a68e6c81929e851bcf608d237a0bf779251500921b2d3885d2 |
kernel-devel-2.6.18-53.el5.s390x.rpm | SHA-256: 22c98f02b50ab7238574900816fbe5a58e2f63e698ddba39326d9dbe5f4173ac |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.s390x.rpm | SHA-256: 39aa2ac5660faa17cbdbad58824078b82f3e8e581732c5ce21e66745ea5de378 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
kernel-2.6.18-53.el5.src.rpm | SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123 |
ppc | |
kernel-2.6.18-53.el5.ppc64.rpm | SHA-256: 36627f79c6c20c3c4d9b2c9f19b900257b1f67b3de18c51d6ed59a08cc613baf |
kernel-debug-2.6.18-53.el5.ppc64.rpm | SHA-256: 439a3462c456feccb7e113a161ca05cf473201fb38f120086c8c76885dd83a7f |
kernel-debug-devel-2.6.18-53.el5.ppc64.rpm | SHA-256: 778f16fb05d31a57e2e1b62e71dbb11ceea8e3f9679dadba2d1471648755c1be |
kernel-devel-2.6.18-53.el5.ppc64.rpm | SHA-256: a165a2d8035155733119af7919d80a0916f89035ea972a82f17161f10e895577 |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.ppc.rpm | SHA-256: 55c89ae0cd58aa9265250950edd1fce01a44a31dd01a1746e4d29107f7841c29 |
kernel-headers-2.6.18-53.el5.ppc64.rpm | SHA-256: 71a89edb768a4ed3f5df26831b153729808e8e32b9d95753f0a30fa569b8cc9b |
kernel-kdump-2.6.18-53.el5.ppc64.rpm | SHA-256: f2168895d368adbcafd03ded9471d7670236983c5475aed7d66022c8103ecd1b |
kernel-kdump-devel-2.6.18-53.el5.ppc64.rpm | SHA-256: fdc0b95a47fe6490c699d124e80c7ce4eee56a97f32e1aa2a2f8b5b953b4ee51 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
kernel-2.6.18-53.el5.src.rpm | SHA-256: e202133e0ea9307c6814abdc68217048dfd0689cab877d4c33412dae73ca9123 |
x86_64 | |
kernel-2.6.18-53.el5.x86_64.rpm | SHA-256: 4dd0a3a133006ee5efff70c2e0cf68400ed537283bc831877dc27b6df3864875 |
kernel-debug-2.6.18-53.el5.x86_64.rpm | SHA-256: 104f6e3a5421d6ebfb59498e18e168fcd53c0a8349ecc9d94eb445ecf88a6e0b |
kernel-debug-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: e8beb72177092fa7b01750136b36e6bba751dc920d03c7bd12d39a630c4c7004 |
kernel-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: 5e6ff272539efc5d5b95bb088eb995e259895fcd0a2eb187b5f3ce7bd362ccdc |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.x86_64.rpm | SHA-256: 94618eb47ef3b841d12aff8c0e2dd1357461b8c385bc9a0ec9bec91bff8d9eb7 |
kernel-xen-2.6.18-53.el5.x86_64.rpm | SHA-256: 13c28b61ec9665d48dd6bebd24f4b459b8f517d95de12fe14e5f9c0f5bd3248c |
kernel-xen-devel-2.6.18-53.el5.x86_64.rpm | SHA-256: d683def244079158d79b4741c579c7e9a9ab0a100c40e3fdc8f49b0bef262524 |
i386 | |
kernel-2.6.18-53.el5.i686.rpm | SHA-256: eb3e79e0b46dfcf429d3001b24221f2c14b9069c8e66e8f095d8215ea3cd9726 |
kernel-PAE-2.6.18-53.el5.i686.rpm | SHA-256: 15a99023e1161cffcdbe3b7caf6280c7301d60fd21f30239b1b6e8ebff5c5559 |
kernel-PAE-devel-2.6.18-53.el5.i686.rpm | SHA-256: d9276f8d801d417ca5777b0b9a48f318945a705458c0311e0f3c11c4af2d7630 |
kernel-debug-2.6.18-53.el5.i686.rpm | SHA-256: b67761f59a2064ef17fd1f924ac49f01997f923debe3612842cd6a194005499c |
kernel-debug-devel-2.6.18-53.el5.i686.rpm | SHA-256: c56fcb3f16479d55b4f7a11fe43a99f3607d85feea0a0da34a6951670528dbd6 |
kernel-devel-2.6.18-53.el5.i686.rpm | SHA-256: ade3089b8bb6ea953b3268cfcc53dd2f3ccc4dceee19d7f0e306d783e573c50d |
kernel-doc-2.6.18-53.el5.noarch.rpm | SHA-256: 58b43dbe57df76ca1d5157b8c850fbdb44e32b3761c5e86f687a9182df46c8ce |
kernel-headers-2.6.18-53.el5.i386.rpm | SHA-256: 469313e1de1cf5d3fb574824a1b2b727f1e61c7f506f32414299a29402ff0b57 |
kernel-xen-2.6.18-53.el5.i686.rpm | SHA-256: 2e1596b053d7fe7efd2d9baaa7dc8c6684011040d7ea8984440423564579386e |
kernel-xen-devel-2.6.18-53.el5.i686.rpm | SHA-256: 30a0f6c5c165d1a3a6a7e4da70e05e4c4a7740ab2b4622a76157e3e2d7cfe24d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.