Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2009:0326 - Security Advisory
Issued:
2009-04-01
Updated:
2009-04-01

RHSA-2009:0326 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • memory leaks were found on some error paths in the icmp_send()

function in the Linux kernel. This could, potentially, cause the network
connectivity to cease. (CVE-2009-0778, Important)

  • Chris Evans reported a deficiency in the clone() system call when called

with the CLONE_PARENT flag. This flaw permits the caller (the parent
process) to indicate an arbitrary signal it wants to receive when its child
process exits. This could lead to a denial of service of the parent
process. (CVE-2009-0028, Moderate)

  • an off-by-one underflow flaw was found in the eCryptfs subsystem. This

could potentially cause a local denial of service when the readlink()
function returned an error. (CVE-2009-0269, Moderate)

  • a deficiency was found in the Remote BIOS Update (RBU) driver for Dell

systems. This could allow a local, unprivileged user to cause a denial of
service by reading zero bytes from the image_type or packet_size files in
"/sys/devices/platform/dell_rbu/". (CVE-2009-0322, Moderate)

  • an inverted logic flaw was found in the SysKonnect FDDI PCI adapter

driver, allowing driver statistics to be reset only when the CAP_NET_ADMIN
capability was absent (local, unprivileged users could reset driver
statistics). (CVE-2009-0675, Moderate)

  • the sock_getsockopt() function in the Linux kernel did not properly

initialize a data structure that can be directly returned to user-space
when the getsockopt() function is called with SO_BSDCOMPAT optname set.
This flaw could possibly lead to memory disclosure.
(CVE-2009-0676, Moderate)

  • the ext2 and ext3 file system code failed to properly handle corrupted

data structures, leading to a possible local denial of service when read
or write operations were performed on a specially-crafted file system.
(CVE-2008-3528, Low)

  • a deficiency was found in the libATA implementation. This could,

potentially, lead to a local denial of service. Note: by default, the
"/dev/sg*" devices are accessible only to the root user.
(CVE-2008-5700, Low)

Bug fixes:

  • a bug in aic94xx may have caused kernel panics during boot on some

systems with certain SATA disks. (BZ#485909)

  • a word endianness problem in the qla2xx driver on PowerPC-based machines

may have corrupted flash-based devices. (BZ#485908)

  • a memory leak in pipe() may have caused a system deadlock. The workaround

in Section 1.5, Known Issues, of the Red Hat Enterprise Linux 5.3 Release
Notes Updates, which involved manually allocating extra file descriptors to
processes calling do_pipe, is no longer necessary. (BZ#481576)

  • CPU soft-lockups in the network rate estimator. (BZ#481746)
  • bugs in the ixgbe driver caused it to function unreliably on some

systems with 16 or more CPU cores. (BZ#483210)

  • the iwl4965 driver may have caused a kernel panic. (BZ#483206)
  • a bug caused NFS attributes to not update for some long-lived NFS

mounted file systems. (BZ#483201)

  • unmounting a GFS2 file system may have caused a panic. (BZ#485910)
  • a bug in ptrace() may have caused a panic when single stepping a target.

(BZ#487394)

  • on some 64-bit systems, notsc was incorrectly set at boot, causing slow

gettimeofday() calls. (BZ#488239)

  • do_machine_check() cleared all Machine Check Exception (MCE) status

registers, preventing the BIOS from using them to determine the cause of
certain panics and errors. (BZ#490433)

  • scaling problems caused performance problems for LAPI applications.

(BZ#489457)

  • a panic may have occurred on systems using certain Intel WiFi Link 5000

products when booting with the RF Kill switch on. (BZ#489846)

  • the TSC is invariant with C/P/T states, and always runs at constant

frequency from now on. (BZ#489310)

All users should upgrade to these updated packages, which contain
backported patches to correct these issues. The system must be rebooted for
this update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 459577 - CVE-2008-3528 Linux kernel ext[234] directory corruption denial of service
  • BZ - 474495 - CVE-2008-5700 kernel: enforce a minimum SG_IO timeout
  • BZ - 479932 - CVE-2009-0028 Linux kernel minor signal handling vulnerability
  • BZ - 481576 - multipath test causes memory leak and eventual system deadlock
  • BZ - 481604 - CVE-2009-0269 kernel: ecryptfs readlink flaw
  • BZ - 481746 - [RHEL 5] gen_estimator deadlock fix
  • BZ - 482866 - CVE-2009-0322 kernel: dell_rbu local oops
  • BZ - 483201 - NFS problem#3 of IT 106473 - 32-bit jiffy wrap around - NFS inode
  • BZ - 483206 - Kernel panic in iwl4965 driver
  • BZ - 485163 - CVE-2009-0778 kernel: rt_cache leak leads to lack of network connectivity
  • BZ - 485908 - [QLogic 5.4 bug] qla2xx - Word-endian problem programming flash on PPC
  • BZ - 485909 - Panic at boot if SATA disk is present
  • BZ - 485910 - reproducible panic in debugfs_remove when unmounting gfs2 filesystem
  • BZ - 486305 - CVE-2009-0676 kernel: memory disclosure in SO_BSDCOMPAT gsopt
  • BZ - 486534 - CVE-2009-0675 kernel: skfp_ioctl inverted logic flaw
  • BZ - 487394 - kernel BUG at kernel/ptrace.c:1068
  • BZ - 488239 - RHEL5 kernel forces notsc on certain systems [C-state support dependant]
  • BZ - 489310 - [Intel 5.4 FEAT] TSC keeps running in C3+
  • BZ - 489457 - Lapi takes too long to run
  • BZ - 489846 - RHEL 5.3 GA kernel panics when RF Kill is on in 5100/5300 AGN
  • BZ - 490433 - RHEL5.3 (x86_64): MCE handler must not clear status registers on fatal conditions

CVEs

  • CVE-2008-3528
  • CVE-2008-5700
  • CVE-2009-0322
  • CVE-2009-0676
  • CVE-2009-0675
  • CVE-2009-0269
  • CVE-2009-0028
  • CVE-2009-0778

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Release_Notes/index.html#d0e497
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
x86_64
kernel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: eca9165ace422049e75ae517f7fde2e1c03bc3c9ff53716e1339314cb79730aa
kernel-debug-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 582e8d9b6fd93c35e5b05f96ccfc9dfd10ef2aaf1efffc330afb421feec33011
kernel-debug-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e11638ff2593111615406ed8e9cf6b58cc350c488a3e9c72e9557c179d72f021
kernel-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 7fa55258914f677821772f0ab5bc5dfbde84c728507e9ceda54c7a00c0c8a40c
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 0bdbec5b6f5b834bb34c363343920d5f3b9a1020ba59b460ddf21ca7aee97db6
kernel-xen-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e1a46dcd0f05cc30da4929526e79a4c1f556ec9ca26936b5c50e23bbc559e1f5
kernel-xen-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: b9309d16ea5b3a57011ff29206558cf51dbbf92b6d4b69f0f7ee3d856e0a9617
ia64
kernel-2.6.18-128.1.6.el5.ia64.rpm SHA-256: 93c09e7d771dd6f785ac4da601dfdf02185d9071460f4932718c798499df45e8
kernel-debug-2.6.18-128.1.6.el5.ia64.rpm SHA-256: 5650416a35f476dd881394e8220a053256956d3182e5fadd6707ff5df935864f
kernel-debug-devel-2.6.18-128.1.6.el5.ia64.rpm SHA-256: b46f767ea88e490d2359ba1995f83c23ddf754be3b3e68b125f502ac15efe991
kernel-devel-2.6.18-128.1.6.el5.ia64.rpm SHA-256: 7dfd2d50760a9edd7230a23266d927dd8149ec1078cf9fdfa65fb95e2c38d847
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.ia64.rpm SHA-256: e3e560b5330cf23012ae3ed952ae4e6300077a3d3501d3b0a6c32492d83c09b5
kernel-xen-2.6.18-128.1.6.el5.ia64.rpm SHA-256: d7c67679d8421043760690fa8772d8ca5585f47996da12dd61c68576f2618ac5
kernel-xen-devel-2.6.18-128.1.6.el5.ia64.rpm SHA-256: 9b4fcf87ff63c78afc62d4a0998f4b91b5ddfd8a6bd77626f7786be985c6d71a
i386
kernel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 3aebbba3ef1cb7895ab2340ff1735bccf3d48b6f22ac81efabb043a6dc783b5a
kernel-PAE-2.6.18-128.1.6.el5.i686.rpm SHA-256: f405ea0f28121eb155d098212134d4b32725598c93d0a7b08453d31b1789989a
kernel-PAE-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 07310ea062b67bc6342e6ed3472f783af70edea1fa4f490ac3820eb5c1ebddbc
kernel-debug-2.6.18-128.1.6.el5.i686.rpm SHA-256: edeef1abd6d52ace5544307e76010076437da6fd6af176414a3baf423cf8ede8
kernel-debug-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 29e80aeeae49e084241c1354257cba4b9eb382945dbadd9846fcee309870a675
kernel-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 33d723c8eea2f24000946d444cf69a8887e33441a103c72893106de08fae9691
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.i386.rpm SHA-256: 1c16b37143a0ffb72b78684b4a92c1017cf2162dfb83a3439f1c27547875ca6c
kernel-xen-2.6.18-128.1.6.el5.i686.rpm SHA-256: 1b1e98fc9411d5437ac2d99ab1bd6de089fbc043f55e4433e71100ad4f86c5e5
kernel-xen-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: a3ea5eba3c1914937044362829a8a8cda64194b488d11ab221a286037e1c9296

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
x86_64
kernel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: eca9165ace422049e75ae517f7fde2e1c03bc3c9ff53716e1339314cb79730aa
kernel-debug-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 582e8d9b6fd93c35e5b05f96ccfc9dfd10ef2aaf1efffc330afb421feec33011
kernel-debug-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e11638ff2593111615406ed8e9cf6b58cc350c488a3e9c72e9557c179d72f021
kernel-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 7fa55258914f677821772f0ab5bc5dfbde84c728507e9ceda54c7a00c0c8a40c
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 0bdbec5b6f5b834bb34c363343920d5f3b9a1020ba59b460ddf21ca7aee97db6
kernel-xen-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e1a46dcd0f05cc30da4929526e79a4c1f556ec9ca26936b5c50e23bbc559e1f5
kernel-xen-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: b9309d16ea5b3a57011ff29206558cf51dbbf92b6d4b69f0f7ee3d856e0a9617
i386
kernel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 3aebbba3ef1cb7895ab2340ff1735bccf3d48b6f22ac81efabb043a6dc783b5a
kernel-PAE-2.6.18-128.1.6.el5.i686.rpm SHA-256: f405ea0f28121eb155d098212134d4b32725598c93d0a7b08453d31b1789989a
kernel-PAE-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 07310ea062b67bc6342e6ed3472f783af70edea1fa4f490ac3820eb5c1ebddbc
kernel-debug-2.6.18-128.1.6.el5.i686.rpm SHA-256: edeef1abd6d52ace5544307e76010076437da6fd6af176414a3baf423cf8ede8
kernel-debug-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 29e80aeeae49e084241c1354257cba4b9eb382945dbadd9846fcee309870a675
kernel-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 33d723c8eea2f24000946d444cf69a8887e33441a103c72893106de08fae9691
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.i386.rpm SHA-256: 1c16b37143a0ffb72b78684b4a92c1017cf2162dfb83a3439f1c27547875ca6c
kernel-xen-2.6.18-128.1.6.el5.i686.rpm SHA-256: 1b1e98fc9411d5437ac2d99ab1bd6de089fbc043f55e4433e71100ad4f86c5e5
kernel-xen-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: a3ea5eba3c1914937044362829a8a8cda64194b488d11ab221a286037e1c9296

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
x86_64
kernel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: eca9165ace422049e75ae517f7fde2e1c03bc3c9ff53716e1339314cb79730aa
kernel-debug-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 582e8d9b6fd93c35e5b05f96ccfc9dfd10ef2aaf1efffc330afb421feec33011
kernel-debug-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e11638ff2593111615406ed8e9cf6b58cc350c488a3e9c72e9557c179d72f021
kernel-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 7fa55258914f677821772f0ab5bc5dfbde84c728507e9ceda54c7a00c0c8a40c
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 0bdbec5b6f5b834bb34c363343920d5f3b9a1020ba59b460ddf21ca7aee97db6
kernel-xen-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e1a46dcd0f05cc30da4929526e79a4c1f556ec9ca26936b5c50e23bbc559e1f5
kernel-xen-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: b9309d16ea5b3a57011ff29206558cf51dbbf92b6d4b69f0f7ee3d856e0a9617
i386
kernel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 3aebbba3ef1cb7895ab2340ff1735bccf3d48b6f22ac81efabb043a6dc783b5a
kernel-PAE-2.6.18-128.1.6.el5.i686.rpm SHA-256: f405ea0f28121eb155d098212134d4b32725598c93d0a7b08453d31b1789989a
kernel-PAE-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 07310ea062b67bc6342e6ed3472f783af70edea1fa4f490ac3820eb5c1ebddbc
kernel-debug-2.6.18-128.1.6.el5.i686.rpm SHA-256: edeef1abd6d52ace5544307e76010076437da6fd6af176414a3baf423cf8ede8
kernel-debug-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 29e80aeeae49e084241c1354257cba4b9eb382945dbadd9846fcee309870a675
kernel-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 33d723c8eea2f24000946d444cf69a8887e33441a103c72893106de08fae9691
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.i386.rpm SHA-256: 1c16b37143a0ffb72b78684b4a92c1017cf2162dfb83a3439f1c27547875ca6c
kernel-xen-2.6.18-128.1.6.el5.i686.rpm SHA-256: 1b1e98fc9411d5437ac2d99ab1bd6de089fbc043f55e4433e71100ad4f86c5e5
kernel-xen-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: a3ea5eba3c1914937044362829a8a8cda64194b488d11ab221a286037e1c9296

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
s390x
kernel-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 0cefc2523bf8febc58f436519115683d7e22a3cd2bc5816c95e0a67d8b68114b
kernel-debug-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 55e8c2a15184fd25abf0e8d35816b7b252ca806c203004e0d962ffa7ee831708
kernel-debug-devel-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 5437cdbe8326e81789432dfe8586d6f3d271355f0fe30179d5be7cda6b6b7eaa
kernel-devel-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 7e470e90ab54e8d86a2b1e5cd9eab6e99ca2d2efb290bf735aac5b2ba1c125dc
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 6a3f6088d92257580d6b7cbe925d608ea5d42f16802cfe4320e8538384b29958
kernel-kdump-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 26f97c9ab719848d9e7d97c290b982e1f31b9a066c13846f7e8b9068d380d9fc
kernel-kdump-devel-2.6.18-128.1.6.el5.s390x.rpm SHA-256: c3c8db8a8fe01fc1184fca692673ca2c9d5f36b0d9beb9ab4c401baee1d089d4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
ppc
kernel-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 8e39c2dc53ffc45e72edff4a591af1cba9994ff6c4fa149fda29e2080cbb8b36
kernel-debug-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: d5e884655ec546569ba082bb28c0edec2ec12fde683c0db1ebfb818410717eed
kernel-debug-devel-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 04c146be4a55e9301811a32629c8d1b50f71661394bf968acf8d343bf1f4f8c1
kernel-devel-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 0c0c75e3cc8fa307bcd6344eb655e9dea6a6e14c4d35adf5f19aa4b09b7dc824
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.ppc.rpm SHA-256: 0f756ca1b4de5c48d9d5c6466af766a43128a089ca6433eee1fc0db28e199d77
kernel-headers-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 9117f116bd613778f1e22580c6decee8286c7dfd0202b437b9a69a94bc10742b
kernel-kdump-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: d3e6dee2716dfb7dd73f47e0ef316410bbb1d3fe9aed336e8405fe26514a347f
kernel-kdump-devel-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 5cb8e4b7178aa2ab6a40a93fe4287ee6ffc0c134cc2fc4d0efc9b9488cf06637

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
x86_64
kernel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: eca9165ace422049e75ae517f7fde2e1c03bc3c9ff53716e1339314cb79730aa
kernel-debug-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 582e8d9b6fd93c35e5b05f96ccfc9dfd10ef2aaf1efffc330afb421feec33011
kernel-debug-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e11638ff2593111615406ed8e9cf6b58cc350c488a3e9c72e9557c179d72f021
kernel-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 7fa55258914f677821772f0ab5bc5dfbde84c728507e9ceda54c7a00c0c8a40c
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 0bdbec5b6f5b834bb34c363343920d5f3b9a1020ba59b460ddf21ca7aee97db6
kernel-xen-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e1a46dcd0f05cc30da4929526e79a4c1f556ec9ca26936b5c50e23bbc559e1f5
kernel-xen-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: b9309d16ea5b3a57011ff29206558cf51dbbf92b6d4b69f0f7ee3d856e0a9617
i386
kernel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 3aebbba3ef1cb7895ab2340ff1735bccf3d48b6f22ac81efabb043a6dc783b5a
kernel-PAE-2.6.18-128.1.6.el5.i686.rpm SHA-256: f405ea0f28121eb155d098212134d4b32725598c93d0a7b08453d31b1789989a
kernel-PAE-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 07310ea062b67bc6342e6ed3472f783af70edea1fa4f490ac3820eb5c1ebddbc
kernel-debug-2.6.18-128.1.6.el5.i686.rpm SHA-256: edeef1abd6d52ace5544307e76010076437da6fd6af176414a3baf423cf8ede8
kernel-debug-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 29e80aeeae49e084241c1354257cba4b9eb382945dbadd9846fcee309870a675
kernel-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 33d723c8eea2f24000946d444cf69a8887e33441a103c72893106de08fae9691
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.i386.rpm SHA-256: 1c16b37143a0ffb72b78684b4a92c1017cf2162dfb83a3439f1c27547875ca6c
kernel-xen-2.6.18-128.1.6.el5.i686.rpm SHA-256: 1b1e98fc9411d5437ac2d99ab1bd6de089fbc043f55e4433e71100ad4f86c5e5
kernel-xen-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: a3ea5eba3c1914937044362829a8a8cda64194b488d11ab221a286037e1c9296

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter