Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2007:0993 - Security Advisory
Issued:
2007-11-29
Updated:
2007-11-29

RHSA-2007:0993 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix various security issues in the Red Hat
Enterprise Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

A memory leak was found in the Red Hat Content Accelerator kernel patch. A
local user could use this flaw to cause a denial of service (memory
exhaustion). (CVE-2007-5494, Important)

A flaw was found in the handling of IEEE 802.11 frames affecting several
wireless LAN modules. In certain circumstances, a remote attacker could
trigger this flaw by sending a malicious packet over a wireless network and
cause a denial of service (kernel crash). (CVE-2007-4997, Important).

A flaw was found in the Advanced Linux Sound Architecture (ALSA). A local
user who had the ability to read the /proc/driver/snd-page-alloc file could
see portions of kernel memory. (CVE-2007-4571, Moderate).

In addition to the security issues described above, several bug fixes
preventing possible memory corruption, system crashes, SCSI I/O fails,
networking drivers performance regression and journaling block device layer
issue were also included.

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which contain backported patches to resolve these issues.

Red Hat would like to credit Vasily Averin, Chris Evans, and Neil Kettle
for reporting the security issues corrected by this update.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 288961 - CVE-2007-4571 ALSA memory disclosure flaw
  • BZ - 305011 - [RHEL 5.1.z]: Tick divider bugs on x86_64
  • BZ - 315051 - CVE-2007-5494 open(O_ATOMICLOOKUP) leaks dentry
  • BZ - 345141 - [PATCH] jbd: wait for already submitted t_sync_datalist buffer to complete (Possibility of in-place data destruction)
  • BZ - 345151 - LSPP: audit rule causes kernel 'out of memory' condition and auditd failure
  • BZ - 345161 - [EL5][BUG] Unexpected SIGILL on NFS/Montecito(ia64)
  • BZ - 345171 - task->mm or slab corruption with CIFS
  • BZ - 346341 - CVE-2007-4997 kernel ieee80211 off-by-two integer underflow
  • BZ - 381001 - LSPP: audit enable not picking up all processes
  • BZ - 381021 - [Broadcom 5.1.z bug] Performance regression on 5705 TG3 NICs
  • BZ - 381101 - LTC35628-kexec/kdump kernel hung on Power5+ and Power6 based systems
  • BZ - 381121 - LTC38135-vSCSI client reports 'Device sdX not ready' after deactive/active device on vSCSI server
  • BZ - 381131 - forcedeth driver mishandles MSI interrupts under high load

CVEs

  • CVE-2007-4571
  • CVE-2007-4997
  • CVE-2007-5494

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-53.1.4.el5.src.rpm SHA-256: f6a5d6cfaf089a61f21ef5f280edb124f524fa7ea1520471b43193e658999140
x86_64
kernel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 07c1e1a26ba566023202067d7040a167094ac4a34380abb6ede932c9e7d79462
kernel-debug-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 2f1ed75227158a918533dd5c9b2ac623edc0d003795e36a906c7dbe2bb57f700
kernel-debug-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 914bddad10df3ce528c5986ce8eb1996efd773b22fa20e02973907519fc15e15
kernel-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: eb57ade99ba67935cda145f0347bbb6d664afeda817b0520e57e86c1e5c776bd
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 178b40aed3eff81d743263420979b98b062e804e46601143af5e97db1a9cbad8
kernel-xen-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 39244fda09f0723037b5fd2b34a45954824887ab4c8ca3cd075955940bbff739
kernel-xen-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 4f351aaaf42d7ad2cf4312bc43495aef797b5b465bfe74f5ccc03030e43b5438
ia64
kernel-2.6.18-53.1.4.el5.ia64.rpm SHA-256: fa7b002ccbe010243dffe48081911bb55da0a506151cd3d060e6c4f4e2a8565e
kernel-debug-2.6.18-53.1.4.el5.ia64.rpm SHA-256: a464be5c0ea64b0ae312c741895ca3c479a4e2e8c8565342886422510e9a31d9
kernel-debug-devel-2.6.18-53.1.4.el5.ia64.rpm SHA-256: 38fb5578d4bf680d97fda50be6e10bd8f126734a32afc53e78f885153b7b47c5
kernel-devel-2.6.18-53.1.4.el5.ia64.rpm SHA-256: c806d361fe0a9467c23fd26f338a0aa283337b813306402f35085961bed07c35
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.ia64.rpm SHA-256: 709c5fb6046a43b50b8b156af084e64e8aaf143bca4c95b4e441e826c8be617a
kernel-xen-2.6.18-53.1.4.el5.ia64.rpm SHA-256: b4431dffa85b5abf0ebd5fa6b61ce1c9624b2d42d04b737c3cf875753472a0c0
kernel-xen-devel-2.6.18-53.1.4.el5.ia64.rpm SHA-256: 7d02c2435f10c255efedf9901755a6df7c74f498a3b438c379807970d8dd61bb
i386
kernel-2.6.18-53.1.4.el5.i686.rpm SHA-256: caffb04d1f14bd3432d40f575967848b80d39242c85734f004f45d7df577baa3
kernel-PAE-2.6.18-53.1.4.el5.i686.rpm SHA-256: 82a1b74b55f08b37359da84576113811dddae04eeb020749b196a8dfba8f3528
kernel-PAE-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: f9a3abfc720343ffc8b0807450861ef6cfbdd2b290cac02f16631c3a45eb428a
kernel-debug-2.6.18-53.1.4.el5.i686.rpm SHA-256: 916660b3841ed0092ef5c15170bb16f2ea58ad331f0697ab52ca428f5ec2a128
kernel-debug-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: 0cd6f05014b8b976ee95e92e82703da8d988beb178971b5eefc873dd5df28464
kernel-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: 225e152160dd59717a0439dd3db93c257f7073ca1d5b230c79af2d955c9377c7
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.i386.rpm SHA-256: 744ed72c7f2acfa07d7b51da02963ceb056466737dc8fe6218bf9959d45d8e34
kernel-xen-2.6.18-53.1.4.el5.i686.rpm SHA-256: 18b8352daf404bd6c08a345141b17bcdb3a196084c8d4406e1eca46ca8b37b65
kernel-xen-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: b3cd55e32b66d2360ac56ce1b514917497f55e08cfc2a46d5136ecde8fee4dee

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-53.1.4.el5.src.rpm SHA-256: f6a5d6cfaf089a61f21ef5f280edb124f524fa7ea1520471b43193e658999140
x86_64
kernel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 07c1e1a26ba566023202067d7040a167094ac4a34380abb6ede932c9e7d79462
kernel-debug-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 2f1ed75227158a918533dd5c9b2ac623edc0d003795e36a906c7dbe2bb57f700
kernel-debug-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 914bddad10df3ce528c5986ce8eb1996efd773b22fa20e02973907519fc15e15
kernel-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: eb57ade99ba67935cda145f0347bbb6d664afeda817b0520e57e86c1e5c776bd
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 178b40aed3eff81d743263420979b98b062e804e46601143af5e97db1a9cbad8
kernel-xen-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 39244fda09f0723037b5fd2b34a45954824887ab4c8ca3cd075955940bbff739
kernel-xen-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 4f351aaaf42d7ad2cf4312bc43495aef797b5b465bfe74f5ccc03030e43b5438
i386
kernel-2.6.18-53.1.4.el5.i686.rpm SHA-256: caffb04d1f14bd3432d40f575967848b80d39242c85734f004f45d7df577baa3
kernel-PAE-2.6.18-53.1.4.el5.i686.rpm SHA-256: 82a1b74b55f08b37359da84576113811dddae04eeb020749b196a8dfba8f3528
kernel-PAE-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: f9a3abfc720343ffc8b0807450861ef6cfbdd2b290cac02f16631c3a45eb428a
kernel-debug-2.6.18-53.1.4.el5.i686.rpm SHA-256: 916660b3841ed0092ef5c15170bb16f2ea58ad331f0697ab52ca428f5ec2a128
kernel-debug-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: 0cd6f05014b8b976ee95e92e82703da8d988beb178971b5eefc873dd5df28464
kernel-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: 225e152160dd59717a0439dd3db93c257f7073ca1d5b230c79af2d955c9377c7
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.i386.rpm SHA-256: 744ed72c7f2acfa07d7b51da02963ceb056466737dc8fe6218bf9959d45d8e34
kernel-xen-2.6.18-53.1.4.el5.i686.rpm SHA-256: 18b8352daf404bd6c08a345141b17bcdb3a196084c8d4406e1eca46ca8b37b65
kernel-xen-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: b3cd55e32b66d2360ac56ce1b514917497f55e08cfc2a46d5136ecde8fee4dee

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-53.1.4.el5.src.rpm SHA-256: f6a5d6cfaf089a61f21ef5f280edb124f524fa7ea1520471b43193e658999140
x86_64
kernel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 07c1e1a26ba566023202067d7040a167094ac4a34380abb6ede932c9e7d79462
kernel-debug-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 2f1ed75227158a918533dd5c9b2ac623edc0d003795e36a906c7dbe2bb57f700
kernel-debug-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 914bddad10df3ce528c5986ce8eb1996efd773b22fa20e02973907519fc15e15
kernel-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: eb57ade99ba67935cda145f0347bbb6d664afeda817b0520e57e86c1e5c776bd
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 178b40aed3eff81d743263420979b98b062e804e46601143af5e97db1a9cbad8
kernel-xen-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 39244fda09f0723037b5fd2b34a45954824887ab4c8ca3cd075955940bbff739
kernel-xen-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 4f351aaaf42d7ad2cf4312bc43495aef797b5b465bfe74f5ccc03030e43b5438
i386
kernel-2.6.18-53.1.4.el5.i686.rpm SHA-256: caffb04d1f14bd3432d40f575967848b80d39242c85734f004f45d7df577baa3
kernel-PAE-2.6.18-53.1.4.el5.i686.rpm SHA-256: 82a1b74b55f08b37359da84576113811dddae04eeb020749b196a8dfba8f3528
kernel-PAE-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: f9a3abfc720343ffc8b0807450861ef6cfbdd2b290cac02f16631c3a45eb428a
kernel-debug-2.6.18-53.1.4.el5.i686.rpm SHA-256: 916660b3841ed0092ef5c15170bb16f2ea58ad331f0697ab52ca428f5ec2a128
kernel-debug-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: 0cd6f05014b8b976ee95e92e82703da8d988beb178971b5eefc873dd5df28464
kernel-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: 225e152160dd59717a0439dd3db93c257f7073ca1d5b230c79af2d955c9377c7
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.i386.rpm SHA-256: 744ed72c7f2acfa07d7b51da02963ceb056466737dc8fe6218bf9959d45d8e34
kernel-xen-2.6.18-53.1.4.el5.i686.rpm SHA-256: 18b8352daf404bd6c08a345141b17bcdb3a196084c8d4406e1eca46ca8b37b65
kernel-xen-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: b3cd55e32b66d2360ac56ce1b514917497f55e08cfc2a46d5136ecde8fee4dee

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-53.1.4.el5.src.rpm SHA-256: f6a5d6cfaf089a61f21ef5f280edb124f524fa7ea1520471b43193e658999140
s390x
kernel-2.6.18-53.1.4.el5.s390x.rpm SHA-256: bb8b932ced600c9e76355857f5557f79dd8baac521869c31a5f6607942399fb9
kernel-debug-2.6.18-53.1.4.el5.s390x.rpm SHA-256: 45af2f285710de91e17751df41f8ceffa0126cc69c35b4e94460f444ff2d4635
kernel-debug-devel-2.6.18-53.1.4.el5.s390x.rpm SHA-256: 791bd167ded3e0c045d6a0137275e6edd63390e8b785a9dece02aa4e3d9a59a8
kernel-devel-2.6.18-53.1.4.el5.s390x.rpm SHA-256: 6a4c0e0f7dac244b3fb255bb4ddc647fa16cad6c77dc2ae48fbdc72ffee89c33
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.s390x.rpm SHA-256: 14608a00e1f0a5bff3cd76e8420bd91365b5a34f7429358f7cba5bfb7ee32a4c

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-53.1.4.el5.src.rpm SHA-256: f6a5d6cfaf089a61f21ef5f280edb124f524fa7ea1520471b43193e658999140
ppc
kernel-2.6.18-53.1.4.el5.ppc64.rpm SHA-256: 6f640e674408275f10216df4b4bdb3e072499bb461897afd35089b88614ece9f
kernel-debug-2.6.18-53.1.4.el5.ppc64.rpm SHA-256: b9b04c0b8a171772feb478e6a8ab5e5546a7cbda531699aa79196c291b84533e
kernel-debug-devel-2.6.18-53.1.4.el5.ppc64.rpm SHA-256: 547dad27961ae20f4e254eb73859be8d1a5e26794438978dfbb47ce880e1e788
kernel-devel-2.6.18-53.1.4.el5.ppc64.rpm SHA-256: 822a31b971efa56d400c7881d43856b824f489d3f012c3e081ff9448ba38a432
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.ppc.rpm SHA-256: d190387f26ed04cb4156bc5deb71187baafa5979850af200ab6b964be8363743
kernel-headers-2.6.18-53.1.4.el5.ppc64.rpm SHA-256: 1a5178009f2e1e449b41c6695ff803d392d921ad3313b8e4dd92d936945b5c51
kernel-kdump-2.6.18-53.1.4.el5.ppc64.rpm SHA-256: cb075ff8e7eac895237172988370e32c441c4e76335f90a0c6373258da95a64c
kernel-kdump-devel-2.6.18-53.1.4.el5.ppc64.rpm SHA-256: 5cadb749a3971dd238b2712bbfc7715099f359ffab44b92e90de59f623995128

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-53.1.4.el5.src.rpm SHA-256: f6a5d6cfaf089a61f21ef5f280edb124f524fa7ea1520471b43193e658999140
x86_64
kernel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 07c1e1a26ba566023202067d7040a167094ac4a34380abb6ede932c9e7d79462
kernel-debug-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 2f1ed75227158a918533dd5c9b2ac623edc0d003795e36a906c7dbe2bb57f700
kernel-debug-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 914bddad10df3ce528c5986ce8eb1996efd773b22fa20e02973907519fc15e15
kernel-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: eb57ade99ba67935cda145f0347bbb6d664afeda817b0520e57e86c1e5c776bd
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 178b40aed3eff81d743263420979b98b062e804e46601143af5e97db1a9cbad8
kernel-xen-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 39244fda09f0723037b5fd2b34a45954824887ab4c8ca3cd075955940bbff739
kernel-xen-devel-2.6.18-53.1.4.el5.x86_64.rpm SHA-256: 4f351aaaf42d7ad2cf4312bc43495aef797b5b465bfe74f5ccc03030e43b5438
i386
kernel-2.6.18-53.1.4.el5.i686.rpm SHA-256: caffb04d1f14bd3432d40f575967848b80d39242c85734f004f45d7df577baa3
kernel-PAE-2.6.18-53.1.4.el5.i686.rpm SHA-256: 82a1b74b55f08b37359da84576113811dddae04eeb020749b196a8dfba8f3528
kernel-PAE-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: f9a3abfc720343ffc8b0807450861ef6cfbdd2b290cac02f16631c3a45eb428a
kernel-debug-2.6.18-53.1.4.el5.i686.rpm SHA-256: 916660b3841ed0092ef5c15170bb16f2ea58ad331f0697ab52ca428f5ec2a128
kernel-debug-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: 0cd6f05014b8b976ee95e92e82703da8d988beb178971b5eefc873dd5df28464
kernel-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: 225e152160dd59717a0439dd3db93c257f7073ca1d5b230c79af2d955c9377c7
kernel-doc-2.6.18-53.1.4.el5.noarch.rpm SHA-256: 7c3943b8bfc915800a421ce584f098707e8efb0bdc9b576e1d62f47d87219861
kernel-headers-2.6.18-53.1.4.el5.i386.rpm SHA-256: 744ed72c7f2acfa07d7b51da02963ceb056466737dc8fe6218bf9959d45d8e34
kernel-xen-2.6.18-53.1.4.el5.i686.rpm SHA-256: 18b8352daf404bd6c08a345141b17bcdb3a196084c8d4406e1eca46ca8b37b65
kernel-xen-devel-2.6.18-53.1.4.el5.i686.rpm SHA-256: b3cd55e32b66d2360ac56ce1b514917497f55e08cfc2a46d5136ecde8fee4dee

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility