Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0275 - Security Advisory
Issued:
2008-05-20
Updated:
2008-05-20

RHSA-2008:0275 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

  • on AMD64 architectures, the possibility of a kernel crash was discovered

by testing the Linux kernel process-trace ability. This could allow a local
unprivileged user to cause a denial of service (kernel crash).
(CVE-2008-1615, Important)

  • on 64-bit architectures, the possibility of a timer-expiration value

overflow was found in the Linux kernel high-resolution timers
functionality, hrtimer. This could allow a local unprivileged user to setup
a large interval value, forcing the timer expiry value to become negative,
causing a denial of service (kernel hang). (CVE-2007-6712, Important)

  • the possibility of a kernel crash was found in the Linux kernel IPsec

protocol implementation, due to improper handling of fragmented ESP
packets. When an attacker controlling an intermediate router fragmented
these packets into very small pieces, it would cause a kernel crash on the
receiving node during packet reassembly. (CVE-2007-6282, Important)

  • a potential denial of service attack was discovered in the Linux kernel

PWC USB video driver. A local unprivileged user could use this flaw to
bring the kernel USB subsystem into the busy-waiting state, causing a
denial of service. (CVE-2007-5093, Low)

As well, these updated packages fix the following bugs:

  • in certain situations, a kernel hang and a possible panic occurred when

disabling the cpufreq daemon. This may have prevented system reboots from
completing successfully.

  • continual "softlockup" messages, which occurred on the guest's console

after a successful save and restore of a Red Hat Enterprise Linux 5
para-virtualized guest, have been resolved.

  • in the previous kernel packages, the kernel may not have reclaimed NFS

locks after a system reboot.

Red Hat Enterprise Linux 5 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 306591 - CVE-2007-5093 kernel PWC driver DoS
  • BZ - 400821 - rhel5.1s2 hang at 'Disabling ondemand cpu frequency scaling' [rhel-5.1.z]
  • BZ - 404291 - CVE-2007-6282 IPSec ESP kernel panics
  • BZ - 429516 - booting with maxcpus=1 panics when starting cpufreq service [rhel-5.1.z]
  • BZ - 431430 - CVE-2008-1615 kernel: ptrace: Unprivileged crash on x86_64 %cs corruption
  • BZ - 439999 - CVE-2007-6712 kernel: infinite loop in highres timers (kernel hang)
  • BZ - 444402 - [RHEL5]: Softlockup after save/restore in PV guest
  • BZ - 445360 - RHEL5.1 kernel not reclaiming NFS locks when server reboots

CVEs

  • CVE-2007-6282
  • CVE-2008-1615
  • CVE-2007-6712
  • CVE-2007-5093

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-53.1.21.el5.src.rpm SHA-256: b1749f5a65f9e3c1b00f0e24eadc5164450ec7cf16fc455ba4195644a9b6e3e7
x86_64
kernel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 32f0ddd49f0bcf9e2e724196c3e29b615f63c93a4ebf8482d640f81f4d8c4e5e
kernel-debug-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 3aaa9662908d77589da81c039015918272a0a6c28534758cd36bfc6bf3aae66f
kernel-debug-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 1021983694b4a1340f0dfa0c8a8b93b66d56493e70a20af0a9cc2a64b15e6577
kernel-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 90a3033dbe035e49eeeef4795f2fbceaeb276ad6ca52234a46f6376803209017
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 66ab198e5c6bb734a488b5a558a8223e363c60908a69309d593f3a9a0c4838ed
kernel-xen-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: fa3f148f5092002cf6e7e5fa393ec0122e0c32d649ef967df3401086fed63eea
kernel-xen-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: ef7ffb75f7ee3d0b09cf689e94c9456c15f543fd7ff9cf42ee26618228f3a31e
ia64
kernel-2.6.18-53.1.21.el5.ia64.rpm SHA-256: 6a23b798f196736398485dfb4bd038dced07578823951eb989dd4cddb22795c5
kernel-debug-2.6.18-53.1.21.el5.ia64.rpm SHA-256: 7854144d5ef1938cca921b9d3c0e0f1a5147bf1392f993edec415c03fed4b75a
kernel-debug-devel-2.6.18-53.1.21.el5.ia64.rpm SHA-256: eb16cf58edc074226f1b581904a85331f5a89fc57b36472fd611aa74e322bd9a
kernel-devel-2.6.18-53.1.21.el5.ia64.rpm SHA-256: 31071836f06853da045c60b7093c65fa1a371e0fe67911c51cda97c1d290e4c4
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.ia64.rpm SHA-256: 99929b0a81c8674af61aeaab667745eda1e6efe475c8e6f0972aa41025fa201f
kernel-xen-2.6.18-53.1.21.el5.ia64.rpm SHA-256: cf500739d612c7a784c7ae411f6e7eabc7385c86198dcc3049851f4137ab9ca1
kernel-xen-devel-2.6.18-53.1.21.el5.ia64.rpm SHA-256: f84bbabe2f612da5f31afbd9fe4a602700734d65d2ea9cd3502631d0c006387f
i386
kernel-2.6.18-53.1.21.el5.i686.rpm SHA-256: b11463e5c310439558c70884486a8eb0f6000a1c51374375f7f5b34d3391421e
kernel-PAE-2.6.18-53.1.21.el5.i686.rpm SHA-256: 135a42d7299c9462bc52f3fc27c30cb7cf9f5712c1e5140e51d35fe29d277c08
kernel-PAE-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 5d2baa21409eb3223fd82fa04dc01d9b6a13123e9f7a797255285e724e4b655f
kernel-debug-2.6.18-53.1.21.el5.i686.rpm SHA-256: a52247aa9409b9a6b3914d9fffdb1caee4af96dacaaa4f504a98c04dab5a5487
kernel-debug-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 4e20749bc6584446fe5799dd218e7c8a350f98cfa57f517dd18ddb2fc43aa488
kernel-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 3578343f3d3e5b1fb55fd52a3d260c1125eb3800e6d945d1d8db1e5d010fd77f
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.i386.rpm SHA-256: 064b9d68c14b8dc386966f857c3568a20cb90b441c32a564b9ec37b2283f23d2
kernel-xen-2.6.18-53.1.21.el5.i686.rpm SHA-256: bb174a574d56d17363d316d0dca1704cd7f4e4963bb042e6a98ffcf7bf31120f
kernel-xen-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 4738252e37c0bbcb34c870e3e6c9286405d94f12c1721c39b2d432f7015fdf1a

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-53.1.21.el5.src.rpm SHA-256: b1749f5a65f9e3c1b00f0e24eadc5164450ec7cf16fc455ba4195644a9b6e3e7
x86_64
kernel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 32f0ddd49f0bcf9e2e724196c3e29b615f63c93a4ebf8482d640f81f4d8c4e5e
kernel-debug-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 3aaa9662908d77589da81c039015918272a0a6c28534758cd36bfc6bf3aae66f
kernel-debug-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 1021983694b4a1340f0dfa0c8a8b93b66d56493e70a20af0a9cc2a64b15e6577
kernel-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 90a3033dbe035e49eeeef4795f2fbceaeb276ad6ca52234a46f6376803209017
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 66ab198e5c6bb734a488b5a558a8223e363c60908a69309d593f3a9a0c4838ed
kernel-xen-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: fa3f148f5092002cf6e7e5fa393ec0122e0c32d649ef967df3401086fed63eea
kernel-xen-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: ef7ffb75f7ee3d0b09cf689e94c9456c15f543fd7ff9cf42ee26618228f3a31e
i386
kernel-2.6.18-53.1.21.el5.i686.rpm SHA-256: b11463e5c310439558c70884486a8eb0f6000a1c51374375f7f5b34d3391421e
kernel-PAE-2.6.18-53.1.21.el5.i686.rpm SHA-256: 135a42d7299c9462bc52f3fc27c30cb7cf9f5712c1e5140e51d35fe29d277c08
kernel-PAE-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 5d2baa21409eb3223fd82fa04dc01d9b6a13123e9f7a797255285e724e4b655f
kernel-debug-2.6.18-53.1.21.el5.i686.rpm SHA-256: a52247aa9409b9a6b3914d9fffdb1caee4af96dacaaa4f504a98c04dab5a5487
kernel-debug-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 4e20749bc6584446fe5799dd218e7c8a350f98cfa57f517dd18ddb2fc43aa488
kernel-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 3578343f3d3e5b1fb55fd52a3d260c1125eb3800e6d945d1d8db1e5d010fd77f
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.i386.rpm SHA-256: 064b9d68c14b8dc386966f857c3568a20cb90b441c32a564b9ec37b2283f23d2
kernel-xen-2.6.18-53.1.21.el5.i686.rpm SHA-256: bb174a574d56d17363d316d0dca1704cd7f4e4963bb042e6a98ffcf7bf31120f
kernel-xen-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 4738252e37c0bbcb34c870e3e6c9286405d94f12c1721c39b2d432f7015fdf1a

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-53.1.21.el5.src.rpm SHA-256: b1749f5a65f9e3c1b00f0e24eadc5164450ec7cf16fc455ba4195644a9b6e3e7
x86_64
kernel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 32f0ddd49f0bcf9e2e724196c3e29b615f63c93a4ebf8482d640f81f4d8c4e5e
kernel-debug-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 3aaa9662908d77589da81c039015918272a0a6c28534758cd36bfc6bf3aae66f
kernel-debug-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 1021983694b4a1340f0dfa0c8a8b93b66d56493e70a20af0a9cc2a64b15e6577
kernel-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 90a3033dbe035e49eeeef4795f2fbceaeb276ad6ca52234a46f6376803209017
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 66ab198e5c6bb734a488b5a558a8223e363c60908a69309d593f3a9a0c4838ed
kernel-xen-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: fa3f148f5092002cf6e7e5fa393ec0122e0c32d649ef967df3401086fed63eea
kernel-xen-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: ef7ffb75f7ee3d0b09cf689e94c9456c15f543fd7ff9cf42ee26618228f3a31e
i386
kernel-2.6.18-53.1.21.el5.i686.rpm SHA-256: b11463e5c310439558c70884486a8eb0f6000a1c51374375f7f5b34d3391421e
kernel-PAE-2.6.18-53.1.21.el5.i686.rpm SHA-256: 135a42d7299c9462bc52f3fc27c30cb7cf9f5712c1e5140e51d35fe29d277c08
kernel-PAE-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 5d2baa21409eb3223fd82fa04dc01d9b6a13123e9f7a797255285e724e4b655f
kernel-debug-2.6.18-53.1.21.el5.i686.rpm SHA-256: a52247aa9409b9a6b3914d9fffdb1caee4af96dacaaa4f504a98c04dab5a5487
kernel-debug-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 4e20749bc6584446fe5799dd218e7c8a350f98cfa57f517dd18ddb2fc43aa488
kernel-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 3578343f3d3e5b1fb55fd52a3d260c1125eb3800e6d945d1d8db1e5d010fd77f
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.i386.rpm SHA-256: 064b9d68c14b8dc386966f857c3568a20cb90b441c32a564b9ec37b2283f23d2
kernel-xen-2.6.18-53.1.21.el5.i686.rpm SHA-256: bb174a574d56d17363d316d0dca1704cd7f4e4963bb042e6a98ffcf7bf31120f
kernel-xen-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 4738252e37c0bbcb34c870e3e6c9286405d94f12c1721c39b2d432f7015fdf1a

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-53.1.21.el5.src.rpm SHA-256: b1749f5a65f9e3c1b00f0e24eadc5164450ec7cf16fc455ba4195644a9b6e3e7
s390x
kernel-2.6.18-53.1.21.el5.s390x.rpm SHA-256: 808b09312ecb3068eaacd4fcf6ce5de79bf5bb227fb26ff2d17fbe5ddbf132b1
kernel-debug-2.6.18-53.1.21.el5.s390x.rpm SHA-256: 4d8d0bf3165f78cdee613136fdc130209733f5e01de21eeb7dbb74453769aad3
kernel-debug-devel-2.6.18-53.1.21.el5.s390x.rpm SHA-256: ebf85f6b9ff63c1cb81f71b4339dbe502ea1fee7058988febb7c7876a0fc4828
kernel-devel-2.6.18-53.1.21.el5.s390x.rpm SHA-256: b512330e0d04253b8a6926f50c5125b796714e4fd5043bf941bc2e560e82d2fb
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.s390x.rpm SHA-256: 68b89897c22a3750262589ccf078a0e5337ef74109ef5102282b1094d4cb3e99

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-53.1.21.el5.src.rpm SHA-256: b1749f5a65f9e3c1b00f0e24eadc5164450ec7cf16fc455ba4195644a9b6e3e7
ppc
kernel-2.6.18-53.1.21.el5.ppc64.rpm SHA-256: 821ef5d675da2de85bb3e94bbf89a09536bc1f2bff9c379da7e336673e18b368
kernel-debug-2.6.18-53.1.21.el5.ppc64.rpm SHA-256: 48acf026b2f719391ecd3ee80ff11d3158d28fead2d8818f8a89678c15dbe4be
kernel-debug-devel-2.6.18-53.1.21.el5.ppc64.rpm SHA-256: ad6e72bb4a6f43823a15334bfa48bdd7116aea5637c2b4102824b6c4496af619
kernel-devel-2.6.18-53.1.21.el5.ppc64.rpm SHA-256: 3ad5cb664ed2904a674075f737505b3b36a78657f4b4cfab399c4303bbb95d53
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.ppc.rpm SHA-256: b7319c7d90bca7ecc72a6eb9863026fa11642792c977a4318358fe99626811f0
kernel-headers-2.6.18-53.1.21.el5.ppc64.rpm SHA-256: 57fb80995de35c9cfa1812fc1d7c6453b4cbcf8c0b33bb24b0caf0a55ab0bee4
kernel-kdump-2.6.18-53.1.21.el5.ppc64.rpm SHA-256: f752453e42a4517acc8e26fa579319fb2070a351c4e3f9dedd30e07014893654
kernel-kdump-devel-2.6.18-53.1.21.el5.ppc64.rpm SHA-256: 0c4cf79d612f8a744663eb81745b48b2d32c33a54768907103c8d0bd49ea3e98

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-53.1.21.el5.src.rpm SHA-256: b1749f5a65f9e3c1b00f0e24eadc5164450ec7cf16fc455ba4195644a9b6e3e7
x86_64
kernel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 32f0ddd49f0bcf9e2e724196c3e29b615f63c93a4ebf8482d640f81f4d8c4e5e
kernel-debug-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 3aaa9662908d77589da81c039015918272a0a6c28534758cd36bfc6bf3aae66f
kernel-debug-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 1021983694b4a1340f0dfa0c8a8b93b66d56493e70a20af0a9cc2a64b15e6577
kernel-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 90a3033dbe035e49eeeef4795f2fbceaeb276ad6ca52234a46f6376803209017
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: 66ab198e5c6bb734a488b5a558a8223e363c60908a69309d593f3a9a0c4838ed
kernel-xen-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: fa3f148f5092002cf6e7e5fa393ec0122e0c32d649ef967df3401086fed63eea
kernel-xen-devel-2.6.18-53.1.21.el5.x86_64.rpm SHA-256: ef7ffb75f7ee3d0b09cf689e94c9456c15f543fd7ff9cf42ee26618228f3a31e
i386
kernel-2.6.18-53.1.21.el5.i686.rpm SHA-256: b11463e5c310439558c70884486a8eb0f6000a1c51374375f7f5b34d3391421e
kernel-PAE-2.6.18-53.1.21.el5.i686.rpm SHA-256: 135a42d7299c9462bc52f3fc27c30cb7cf9f5712c1e5140e51d35fe29d277c08
kernel-PAE-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 5d2baa21409eb3223fd82fa04dc01d9b6a13123e9f7a797255285e724e4b655f
kernel-debug-2.6.18-53.1.21.el5.i686.rpm SHA-256: a52247aa9409b9a6b3914d9fffdb1caee4af96dacaaa4f504a98c04dab5a5487
kernel-debug-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 4e20749bc6584446fe5799dd218e7c8a350f98cfa57f517dd18ddb2fc43aa488
kernel-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 3578343f3d3e5b1fb55fd52a3d260c1125eb3800e6d945d1d8db1e5d010fd77f
kernel-doc-2.6.18-53.1.21.el5.noarch.rpm SHA-256: c96f98831331f0abaea8426baabfbe42070e3c8bed5b3bbeffbb8c58beb39dac
kernel-headers-2.6.18-53.1.21.el5.i386.rpm SHA-256: 064b9d68c14b8dc386966f857c3568a20cb90b441c32a564b9ec37b2283f23d2
kernel-xen-2.6.18-53.1.21.el5.i686.rpm SHA-256: bb174a574d56d17363d316d0dca1704cd7f4e4963bb042e6a98ffcf7bf31120f
kernel-xen-devel-2.6.18-53.1.21.el5.i686.rpm SHA-256: 4738252e37c0bbcb34c870e3e6c9286405d94f12c1721c39b2d432f7015fdf1a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility