Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2009:0264 - Security Advisory
Issued:
2009-02-10
Updated:
2009-02-10

RHSA-2009:0264 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that resolve several security issues are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update addresses the following security issues:

  • a memory leak in keyctl handling. A local user could use this flaw to

deplete kernel memory, eventually leading to a denial of service.
(CVE-2009-0031, Important)

  • a buffer overflow in the Linux kernel Partial Reliable Stream Control

Transmission Protocol (PR-SCTP) implementation. This could, potentially,
lead to a denial of service if a Forward-TSN chunk is received with a large
stream ID. (CVE-2009-0065, Important)

  • a flaw when handling heavy network traffic on an SMP system with many

cores. An attacker who could send a large amount of network traffic could
create a denial of service. (CVE-2008-5713, Important)

  • the code for the HFS and HFS Plus (HFS+) file systems failed to properly

handle corrupted data structures. This could, potentially, lead to a local
denial of service. (CVE-2008-4933, CVE-2008-5025, Low)

  • a flaw was found in the HFS Plus (HFS+) file system implementation. This

could, potentially, lead to a local denial of service when write operations
are performed. (CVE-2008-4934, Low)

In addition, these updated packages fix the following bugs:

  • when using the nfsd daemon in a clustered setup, kernel panics appeared

seemingly at random. These panics were caused by a race condition in
the device-mapper mirror target.

  • the clock_gettime(CLOCK_THREAD_CPUTIME_ID, ) syscall returned a smaller

timespec value than the result of previous clock_gettime() function
execution, which resulted in a negative, and nonsensical, elapsed time value.

  • nfs_create_rpc_client was called with a "flavor" parameter which was

usually ignored and ended up unconditionally creating the RPC client with
an AUTH_UNIX flavor. This caused problems on AUTH_GSS mounts when the
credentials needed to be refreshed. The credops did not match the
authorization type, which resulted in the credops dereferencing an
incorrect part of the AUTH_UNIX rpc_auth struct.

  • when copy_user_c terminated prematurely due to reading beyond the end of

the user buffer and the kernel jumped to the exception table entry, the rsi
register was not cleared. This resulted in exiting back to user code with
garbage in the rsi register.

  • the hexdump data in s390dbf traces was incomplete. The length of the data

traced was incorrect and the SAN payload was read from a different place
then it was written to.

  • when using connected mode (CM) in IPoIB on ehca2 hardware, it was not

possible to transmit any data.

  • when an application called fork() and pthread_create() many times and, at

some point, a thread forked a child and then attempted to call the
setpgid() function, then this function failed and returned and ESRCH error
value.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. Note: for this update to take effect, the
system must be rebooted.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 469631 - CVE-2008-4933 kernel: hfsplus: fix Buffer overflow with a corrupted image
  • BZ - 469640 - CVE-2008-4934 kernel: hfsplus: check read_mapping_page() return value
  • BZ - 470769 - CVE-2008-5025 kernel: hfs: fix namelength memory corruption
  • BZ - 477744 - CVE-2008-5713 kernel: soft lockup occurs when network load is very high
  • BZ - 478800 - CVE-2009-0065 kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID
  • BZ - 479812 - IB/ipoib: data transmission fails in connected mode on any HCA
  • BZ - 480576 - RHEL5.2/3 - setpgid() returns ESRCH in some situations
  • BZ - 480592 - CVE-2009-0031 kernel: local denial of service in keyctl_join_session_keyring
  • BZ - 480996 - zfcp: fix hexdump data in s390dbf traces
  • BZ - 481117 - RHSA-2008:0508 linux-2.6.9-x86_64-copy_user-zero-tail.patch broken
  • BZ - 481119 - Kernel panic in auth_rpcgss:__gss_find_upcall
  • BZ - 481120 - oops in mirror_map (dm-raid1.c)
  • BZ - 481122 - [5.3] clock_gettime() syscall returns a smaller timespec value than previous.

CVEs

  • CVE-2008-4933
  • CVE-2008-4934
  • CVE-2008-5025
  • CVE-2009-0065
  • CVE-2009-0031
  • CVE-2008-5713

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-128.1.1.el5.src.rpm SHA-256: afdb6482733ac92a92641d9d614f9585ea8ca9f9ed51556dedd966f4b28c2fa8
x86_64
kernel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 94fb8e80f3ec13f7c0636f27044dc9c475c2054fc9c826fd99c55bc60ead5c2b
kernel-debug-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: c88c23bdbdf3227ba29f1afd603a3fcca6012f21ad6ea85d46b00cf8c4069355
kernel-debug-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 2772976615cd9cbd6d30556b8c0d9d68bcbff151d23d1465e58f849bdfcf12e9
kernel-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: e5118aac170a152b6ca92abe1dee53a0408873c15a3558ae9ba735659a4c7d15
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: f18bec7cfb5a162f9146b5801a20b1cc273c00dd92401455904742d610fff465
kernel-xen-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 7fd44ae2cf5a86a4fb9ebcd2220938c793c498cef3a88380ac071383775f0caa
kernel-xen-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 6b25d5d113aa08c401dc07ccbbf1a42dfc60720cffc19dbb8d05996e8ac93e40
ia64
kernel-2.6.18-128.1.1.el5.ia64.rpm SHA-256: 5a8b9cab505106a406a80781e375f6fdfd0bd38b1e5c9240efd647bed35480e1
kernel-debug-2.6.18-128.1.1.el5.ia64.rpm SHA-256: 983fbce573c64c9709481d8a7afae4ead90a4e06850b430aed765c62270908e5
kernel-debug-devel-2.6.18-128.1.1.el5.ia64.rpm SHA-256: b8813dea5159a2372670a295281763e231499e6db08a323ecfba89ae2c514585
kernel-devel-2.6.18-128.1.1.el5.ia64.rpm SHA-256: da0e5a3e1cf3fb479b457754b56312ddc22d08ddc060a4e0f4fdfa14c04134e1
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.ia64.rpm SHA-256: 690d6b84f48bfdce7935a4a3cc45f3270c566049f6231f91acf2947dc7d7c131
kernel-xen-2.6.18-128.1.1.el5.ia64.rpm SHA-256: a4826b6d4dee2fdf58eb496c131d234d8c1e8869a981dedd14b5b54f01b043d2
kernel-xen-devel-2.6.18-128.1.1.el5.ia64.rpm SHA-256: 8f5bf9f90a94b997a4d6249c7e6554590cfde87dd872d16c7c280a76e50461cb
i386
kernel-2.6.18-128.1.1.el5.i686.rpm SHA-256: aea5c12f4f3407e9fe4cc0d2ff38fe6ba93efe97a734ca2c00222414848f1ac3
kernel-PAE-2.6.18-128.1.1.el5.i686.rpm SHA-256: e89dc0c96870460e354e4f6a65eb43b79793e3fb0199374cb80302bf6ab4b852
kernel-PAE-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 11bc84846265f074bae02cb52b551758e12dd38065f7868ddc3308a739c09c97
kernel-debug-2.6.18-128.1.1.el5.i686.rpm SHA-256: 84484fc461eca1a6806965b4596c4d92e5381ba92eb535fb8794776aec8fec37
kernel-debug-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 1128fd913f001c4107157f72c19bf6d934179e974b763a9b9ce386a5a29ad62b
kernel-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 01e5a8b1936bfc3ba7b9fb408cfa0d44a79595a0a3e6b25a41092d4d089f514a
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.i386.rpm SHA-256: 7d20a3a2c97df68dc3bdbac39ee4cc6b1542e222838226afbd56e2e9605a0a9c
kernel-xen-2.6.18-128.1.1.el5.i686.rpm SHA-256: 734be17d20f3ba8f7a12d0ad4dc6103b2f7c50001eef89308ee6add4bb0bfb85
kernel-xen-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 6d85837cc47944b9f327c0197e37671dce3a3c0d54f41f8c496b299aa1d1f7b7

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-128.1.1.el5.src.rpm SHA-256: afdb6482733ac92a92641d9d614f9585ea8ca9f9ed51556dedd966f4b28c2fa8
x86_64
kernel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 94fb8e80f3ec13f7c0636f27044dc9c475c2054fc9c826fd99c55bc60ead5c2b
kernel-debug-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: c88c23bdbdf3227ba29f1afd603a3fcca6012f21ad6ea85d46b00cf8c4069355
kernel-debug-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 2772976615cd9cbd6d30556b8c0d9d68bcbff151d23d1465e58f849bdfcf12e9
kernel-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: e5118aac170a152b6ca92abe1dee53a0408873c15a3558ae9ba735659a4c7d15
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: f18bec7cfb5a162f9146b5801a20b1cc273c00dd92401455904742d610fff465
kernel-xen-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 7fd44ae2cf5a86a4fb9ebcd2220938c793c498cef3a88380ac071383775f0caa
kernel-xen-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 6b25d5d113aa08c401dc07ccbbf1a42dfc60720cffc19dbb8d05996e8ac93e40
i386
kernel-2.6.18-128.1.1.el5.i686.rpm SHA-256: aea5c12f4f3407e9fe4cc0d2ff38fe6ba93efe97a734ca2c00222414848f1ac3
kernel-PAE-2.6.18-128.1.1.el5.i686.rpm SHA-256: e89dc0c96870460e354e4f6a65eb43b79793e3fb0199374cb80302bf6ab4b852
kernel-PAE-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 11bc84846265f074bae02cb52b551758e12dd38065f7868ddc3308a739c09c97
kernel-debug-2.6.18-128.1.1.el5.i686.rpm SHA-256: 84484fc461eca1a6806965b4596c4d92e5381ba92eb535fb8794776aec8fec37
kernel-debug-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 1128fd913f001c4107157f72c19bf6d934179e974b763a9b9ce386a5a29ad62b
kernel-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 01e5a8b1936bfc3ba7b9fb408cfa0d44a79595a0a3e6b25a41092d4d089f514a
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.i386.rpm SHA-256: 7d20a3a2c97df68dc3bdbac39ee4cc6b1542e222838226afbd56e2e9605a0a9c
kernel-xen-2.6.18-128.1.1.el5.i686.rpm SHA-256: 734be17d20f3ba8f7a12d0ad4dc6103b2f7c50001eef89308ee6add4bb0bfb85
kernel-xen-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 6d85837cc47944b9f327c0197e37671dce3a3c0d54f41f8c496b299aa1d1f7b7

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-128.1.1.el5.src.rpm SHA-256: afdb6482733ac92a92641d9d614f9585ea8ca9f9ed51556dedd966f4b28c2fa8
x86_64
kernel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 94fb8e80f3ec13f7c0636f27044dc9c475c2054fc9c826fd99c55bc60ead5c2b
kernel-debug-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: c88c23bdbdf3227ba29f1afd603a3fcca6012f21ad6ea85d46b00cf8c4069355
kernel-debug-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 2772976615cd9cbd6d30556b8c0d9d68bcbff151d23d1465e58f849bdfcf12e9
kernel-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: e5118aac170a152b6ca92abe1dee53a0408873c15a3558ae9ba735659a4c7d15
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: f18bec7cfb5a162f9146b5801a20b1cc273c00dd92401455904742d610fff465
kernel-xen-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 7fd44ae2cf5a86a4fb9ebcd2220938c793c498cef3a88380ac071383775f0caa
kernel-xen-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 6b25d5d113aa08c401dc07ccbbf1a42dfc60720cffc19dbb8d05996e8ac93e40
i386
kernel-2.6.18-128.1.1.el5.i686.rpm SHA-256: aea5c12f4f3407e9fe4cc0d2ff38fe6ba93efe97a734ca2c00222414848f1ac3
kernel-PAE-2.6.18-128.1.1.el5.i686.rpm SHA-256: e89dc0c96870460e354e4f6a65eb43b79793e3fb0199374cb80302bf6ab4b852
kernel-PAE-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 11bc84846265f074bae02cb52b551758e12dd38065f7868ddc3308a739c09c97
kernel-debug-2.6.18-128.1.1.el5.i686.rpm SHA-256: 84484fc461eca1a6806965b4596c4d92e5381ba92eb535fb8794776aec8fec37
kernel-debug-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 1128fd913f001c4107157f72c19bf6d934179e974b763a9b9ce386a5a29ad62b
kernel-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 01e5a8b1936bfc3ba7b9fb408cfa0d44a79595a0a3e6b25a41092d4d089f514a
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.i386.rpm SHA-256: 7d20a3a2c97df68dc3bdbac39ee4cc6b1542e222838226afbd56e2e9605a0a9c
kernel-xen-2.6.18-128.1.1.el5.i686.rpm SHA-256: 734be17d20f3ba8f7a12d0ad4dc6103b2f7c50001eef89308ee6add4bb0bfb85
kernel-xen-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 6d85837cc47944b9f327c0197e37671dce3a3c0d54f41f8c496b299aa1d1f7b7

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-128.1.1.el5.src.rpm SHA-256: afdb6482733ac92a92641d9d614f9585ea8ca9f9ed51556dedd966f4b28c2fa8
s390x
kernel-2.6.18-128.1.1.el5.s390x.rpm SHA-256: 0685993645827e64642aeafda308e9c3d887dc1569f3c5f5a16323258345f9d5
kernel-debug-2.6.18-128.1.1.el5.s390x.rpm SHA-256: a30c365d40e371a856349796aec16c2c8686076985230add596f53b98f3d5d57
kernel-debug-devel-2.6.18-128.1.1.el5.s390x.rpm SHA-256: 3695679b82a4af7d2fa9a1761f8bf1d642578806c2ea95d8e986ea55055a2669
kernel-devel-2.6.18-128.1.1.el5.s390x.rpm SHA-256: 3e56ef6e9e101d49602876ad88bfd0db8e638db5e7247a647c291f724514c532
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.s390x.rpm SHA-256: e2577927df27d4f017621918d974972db48cbbc1f124fe5b4318104d2266498a
kernel-kdump-2.6.18-128.1.1.el5.s390x.rpm SHA-256: a0ab251d97acc68826decaad84be374296d0fba50071bbf6f17821af373d4e67
kernel-kdump-devel-2.6.18-128.1.1.el5.s390x.rpm SHA-256: 1e59c93655c620134c1c164e6a52d480bbb2229843e5b7b061854bb6874a8a9b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-128.1.1.el5.src.rpm SHA-256: afdb6482733ac92a92641d9d614f9585ea8ca9f9ed51556dedd966f4b28c2fa8
ppc
kernel-2.6.18-128.1.1.el5.ppc64.rpm SHA-256: fe3144371ff22ffce988d1be8eb9e44d7402d18ee9d064136af82df3785b277b
kernel-debug-2.6.18-128.1.1.el5.ppc64.rpm SHA-256: 564aa06fa73b219d04c676eeb29e30969b6be07209f8f24e42b4b77a769af31f
kernel-debug-devel-2.6.18-128.1.1.el5.ppc64.rpm SHA-256: 3dfb04ece691f6babe4ab19ad894f16f11567260aec990b17b17f94a363b2705
kernel-devel-2.6.18-128.1.1.el5.ppc64.rpm SHA-256: cb8285ed9c92d3956a3d2d1fe6092b1373d364e4b9d7ad0f4f885340d0daa78c
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.ppc.rpm SHA-256: 12828dd3bb803f982106a4b572cbd58a0aaf9fe9dbcb00d899e8d5b493069ff1
kernel-headers-2.6.18-128.1.1.el5.ppc64.rpm SHA-256: 188c7eeb6a1ac972b0c6c6b8d7fa7d819d09154fd9c3f1c3cea09d0ccdb6a956
kernel-kdump-2.6.18-128.1.1.el5.ppc64.rpm SHA-256: ed5d7787cae3719ecef4db7bfdf12885f8f3f57a123e662d9fec323d44ff8fdf
kernel-kdump-devel-2.6.18-128.1.1.el5.ppc64.rpm SHA-256: 502237bc537a9b0019c95aab70bf4e74bcd670d686fe01623172e5d03e67f2c7

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-128.1.1.el5.src.rpm SHA-256: afdb6482733ac92a92641d9d614f9585ea8ca9f9ed51556dedd966f4b28c2fa8
x86_64
kernel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 94fb8e80f3ec13f7c0636f27044dc9c475c2054fc9c826fd99c55bc60ead5c2b
kernel-debug-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: c88c23bdbdf3227ba29f1afd603a3fcca6012f21ad6ea85d46b00cf8c4069355
kernel-debug-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 2772976615cd9cbd6d30556b8c0d9d68bcbff151d23d1465e58f849bdfcf12e9
kernel-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: e5118aac170a152b6ca92abe1dee53a0408873c15a3558ae9ba735659a4c7d15
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: f18bec7cfb5a162f9146b5801a20b1cc273c00dd92401455904742d610fff465
kernel-xen-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 7fd44ae2cf5a86a4fb9ebcd2220938c793c498cef3a88380ac071383775f0caa
kernel-xen-devel-2.6.18-128.1.1.el5.x86_64.rpm SHA-256: 6b25d5d113aa08c401dc07ccbbf1a42dfc60720cffc19dbb8d05996e8ac93e40
i386
kernel-2.6.18-128.1.1.el5.i686.rpm SHA-256: aea5c12f4f3407e9fe4cc0d2ff38fe6ba93efe97a734ca2c00222414848f1ac3
kernel-PAE-2.6.18-128.1.1.el5.i686.rpm SHA-256: e89dc0c96870460e354e4f6a65eb43b79793e3fb0199374cb80302bf6ab4b852
kernel-PAE-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 11bc84846265f074bae02cb52b551758e12dd38065f7868ddc3308a739c09c97
kernel-debug-2.6.18-128.1.1.el5.i686.rpm SHA-256: 84484fc461eca1a6806965b4596c4d92e5381ba92eb535fb8794776aec8fec37
kernel-debug-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 1128fd913f001c4107157f72c19bf6d934179e974b763a9b9ce386a5a29ad62b
kernel-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 01e5a8b1936bfc3ba7b9fb408cfa0d44a79595a0a3e6b25a41092d4d089f514a
kernel-doc-2.6.18-128.1.1.el5.noarch.rpm SHA-256: 7a382f98c87a9fe8e750100f1cbd9586748ad3561095f7d9102f10d06e64c015
kernel-headers-2.6.18-128.1.1.el5.i386.rpm SHA-256: 7d20a3a2c97df68dc3bdbac39ee4cc6b1542e222838226afbd56e2e9605a0a9c
kernel-xen-2.6.18-128.1.1.el5.i686.rpm SHA-256: 734be17d20f3ba8f7a12d0ad4dc6103b2f7c50001eef89308ee6add4bb0bfb85
kernel-xen-devel-2.6.18-128.1.1.el5.i686.rpm SHA-256: 6d85837cc47944b9f327c0197e37671dce3a3c0d54f41f8c496b299aa1d1f7b7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter