Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:0326 - Security Advisory
Issued:
2009-04-01
Updated:
2009-04-01

RHSA-2009:0326 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • memory leaks were found on some error paths in the icmp_send()

function in the Linux kernel. This could, potentially, cause the network
connectivity to cease. (CVE-2009-0778, Important)

  • Chris Evans reported a deficiency in the clone() system call when called

with the CLONE_PARENT flag. This flaw permits the caller (the parent
process) to indicate an arbitrary signal it wants to receive when its child
process exits. This could lead to a denial of service of the parent
process. (CVE-2009-0028, Moderate)

  • an off-by-one underflow flaw was found in the eCryptfs subsystem. This

could potentially cause a local denial of service when the readlink()
function returned an error. (CVE-2009-0269, Moderate)

  • a deficiency was found in the Remote BIOS Update (RBU) driver for Dell

systems. This could allow a local, unprivileged user to cause a denial of
service by reading zero bytes from the image_type or packet_size files in
"/sys/devices/platform/dell_rbu/". (CVE-2009-0322, Moderate)

  • an inverted logic flaw was found in the SysKonnect FDDI PCI adapter

driver, allowing driver statistics to be reset only when the CAP_NET_ADMIN
capability was absent (local, unprivileged users could reset driver
statistics). (CVE-2009-0675, Moderate)

  • the sock_getsockopt() function in the Linux kernel did not properly

initialize a data structure that can be directly returned to user-space
when the getsockopt() function is called with SO_BSDCOMPAT optname set.
This flaw could possibly lead to memory disclosure.
(CVE-2009-0676, Moderate)

  • the ext2 and ext3 file system code failed to properly handle corrupted

data structures, leading to a possible local denial of service when read
or write operations were performed on a specially-crafted file system.
(CVE-2008-3528, Low)

  • a deficiency was found in the libATA implementation. This could,

potentially, lead to a local denial of service. Note: by default, the
"/dev/sg*" devices are accessible only to the root user.
(CVE-2008-5700, Low)

Bug fixes:

  • a bug in aic94xx may have caused kernel panics during boot on some

systems with certain SATA disks. (BZ#485909)

  • a word endianness problem in the qla2xx driver on PowerPC-based machines

may have corrupted flash-based devices. (BZ#485908)

  • a memory leak in pipe() may have caused a system deadlock. The workaround

in Section 1.5, Known Issues, of the Red Hat Enterprise Linux 5.3 Release
Notes Updates, which involved manually allocating extra file descriptors to
processes calling do_pipe, is no longer necessary. (BZ#481576)

  • CPU soft-lockups in the network rate estimator. (BZ#481746)
  • bugs in the ixgbe driver caused it to function unreliably on some

systems with 16 or more CPU cores. (BZ#483210)

  • the iwl4965 driver may have caused a kernel panic. (BZ#483206)
  • a bug caused NFS attributes to not update for some long-lived NFS

mounted file systems. (BZ#483201)

  • unmounting a GFS2 file system may have caused a panic. (BZ#485910)
  • a bug in ptrace() may have caused a panic when single stepping a target.

(BZ#487394)

  • on some 64-bit systems, notsc was incorrectly set at boot, causing slow

gettimeofday() calls. (BZ#488239)

  • do_machine_check() cleared all Machine Check Exception (MCE) status

registers, preventing the BIOS from using them to determine the cause of
certain panics and errors. (BZ#490433)

  • scaling problems caused performance problems for LAPI applications.

(BZ#489457)

  • a panic may have occurred on systems using certain Intel WiFi Link 5000

products when booting with the RF Kill switch on. (BZ#489846)

  • the TSC is invariant with C/P/T states, and always runs at constant

frequency from now on. (BZ#489310)

All users should upgrade to these updated packages, which contain
backported patches to correct these issues. The system must be rebooted for
this update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 459577 - CVE-2008-3528 Linux kernel ext[234] directory corruption denial of service
  • BZ - 474495 - CVE-2008-5700 kernel: enforce a minimum SG_IO timeout
  • BZ - 479932 - CVE-2009-0028 Linux kernel minor signal handling vulnerability
  • BZ - 481576 - multipath test causes memory leak and eventual system deadlock
  • BZ - 481604 - CVE-2009-0269 kernel: ecryptfs readlink flaw
  • BZ - 481746 - [RHEL 5] gen_estimator deadlock fix
  • BZ - 482866 - CVE-2009-0322 kernel: dell_rbu local oops
  • BZ - 483201 - NFS problem#3 of IT 106473 - 32-bit jiffy wrap around - NFS inode
  • BZ - 483206 - Kernel panic in iwl4965 driver
  • BZ - 485163 - CVE-2009-0778 kernel: rt_cache leak leads to lack of network connectivity
  • BZ - 485908 - [QLogic 5.4 bug] qla2xx - Word-endian problem programming flash on PPC
  • BZ - 485909 - Panic at boot if SATA disk is present
  • BZ - 485910 - reproducible panic in debugfs_remove when unmounting gfs2 filesystem
  • BZ - 486305 - CVE-2009-0676 kernel: memory disclosure in SO_BSDCOMPAT gsopt
  • BZ - 486534 - CVE-2009-0675 kernel: skfp_ioctl inverted logic flaw
  • BZ - 487394 - kernel BUG at kernel/ptrace.c:1068
  • BZ - 488239 - RHEL5 kernel forces notsc on certain systems [C-state support dependant]
  • BZ - 489310 - [Intel 5.4 FEAT] TSC keeps running in C3+
  • BZ - 489457 - Lapi takes too long to run
  • BZ - 489846 - RHEL 5.3 GA kernel panics when RF Kill is on in 5100/5300 AGN
  • BZ - 490433 - RHEL5.3 (x86_64): MCE handler must not clear status registers on fatal conditions

CVEs

  • CVE-2008-3528
  • CVE-2008-5700
  • CVE-2009-0322
  • CVE-2009-0676
  • CVE-2009-0675
  • CVE-2009-0269
  • CVE-2009-0028
  • CVE-2009-0778

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Release_Notes/index.html#d0e497
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
x86_64
kernel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: eca9165ace422049e75ae517f7fde2e1c03bc3c9ff53716e1339314cb79730aa
kernel-debug-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 582e8d9b6fd93c35e5b05f96ccfc9dfd10ef2aaf1efffc330afb421feec33011
kernel-debug-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e11638ff2593111615406ed8e9cf6b58cc350c488a3e9c72e9557c179d72f021
kernel-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 7fa55258914f677821772f0ab5bc5dfbde84c728507e9ceda54c7a00c0c8a40c
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 0bdbec5b6f5b834bb34c363343920d5f3b9a1020ba59b460ddf21ca7aee97db6
kernel-xen-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e1a46dcd0f05cc30da4929526e79a4c1f556ec9ca26936b5c50e23bbc559e1f5
kernel-xen-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: b9309d16ea5b3a57011ff29206558cf51dbbf92b6d4b69f0f7ee3d856e0a9617
ia64
kernel-2.6.18-128.1.6.el5.ia64.rpm SHA-256: 93c09e7d771dd6f785ac4da601dfdf02185d9071460f4932718c798499df45e8
kernel-debug-2.6.18-128.1.6.el5.ia64.rpm SHA-256: 5650416a35f476dd881394e8220a053256956d3182e5fadd6707ff5df935864f
kernel-debug-devel-2.6.18-128.1.6.el5.ia64.rpm SHA-256: b46f767ea88e490d2359ba1995f83c23ddf754be3b3e68b125f502ac15efe991
kernel-devel-2.6.18-128.1.6.el5.ia64.rpm SHA-256: 7dfd2d50760a9edd7230a23266d927dd8149ec1078cf9fdfa65fb95e2c38d847
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.ia64.rpm SHA-256: e3e560b5330cf23012ae3ed952ae4e6300077a3d3501d3b0a6c32492d83c09b5
kernel-xen-2.6.18-128.1.6.el5.ia64.rpm SHA-256: d7c67679d8421043760690fa8772d8ca5585f47996da12dd61c68576f2618ac5
kernel-xen-devel-2.6.18-128.1.6.el5.ia64.rpm SHA-256: 9b4fcf87ff63c78afc62d4a0998f4b91b5ddfd8a6bd77626f7786be985c6d71a
i386
kernel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 3aebbba3ef1cb7895ab2340ff1735bccf3d48b6f22ac81efabb043a6dc783b5a
kernel-PAE-2.6.18-128.1.6.el5.i686.rpm SHA-256: f405ea0f28121eb155d098212134d4b32725598c93d0a7b08453d31b1789989a
kernel-PAE-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 07310ea062b67bc6342e6ed3472f783af70edea1fa4f490ac3820eb5c1ebddbc
kernel-debug-2.6.18-128.1.6.el5.i686.rpm SHA-256: edeef1abd6d52ace5544307e76010076437da6fd6af176414a3baf423cf8ede8
kernel-debug-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 29e80aeeae49e084241c1354257cba4b9eb382945dbadd9846fcee309870a675
kernel-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 33d723c8eea2f24000946d444cf69a8887e33441a103c72893106de08fae9691
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.i386.rpm SHA-256: 1c16b37143a0ffb72b78684b4a92c1017cf2162dfb83a3439f1c27547875ca6c
kernel-xen-2.6.18-128.1.6.el5.i686.rpm SHA-256: 1b1e98fc9411d5437ac2d99ab1bd6de089fbc043f55e4433e71100ad4f86c5e5
kernel-xen-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: a3ea5eba3c1914937044362829a8a8cda64194b488d11ab221a286037e1c9296

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
x86_64
kernel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: eca9165ace422049e75ae517f7fde2e1c03bc3c9ff53716e1339314cb79730aa
kernel-debug-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 582e8d9b6fd93c35e5b05f96ccfc9dfd10ef2aaf1efffc330afb421feec33011
kernel-debug-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e11638ff2593111615406ed8e9cf6b58cc350c488a3e9c72e9557c179d72f021
kernel-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 7fa55258914f677821772f0ab5bc5dfbde84c728507e9ceda54c7a00c0c8a40c
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 0bdbec5b6f5b834bb34c363343920d5f3b9a1020ba59b460ddf21ca7aee97db6
kernel-xen-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e1a46dcd0f05cc30da4929526e79a4c1f556ec9ca26936b5c50e23bbc559e1f5
kernel-xen-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: b9309d16ea5b3a57011ff29206558cf51dbbf92b6d4b69f0f7ee3d856e0a9617
i386
kernel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 3aebbba3ef1cb7895ab2340ff1735bccf3d48b6f22ac81efabb043a6dc783b5a
kernel-PAE-2.6.18-128.1.6.el5.i686.rpm SHA-256: f405ea0f28121eb155d098212134d4b32725598c93d0a7b08453d31b1789989a
kernel-PAE-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 07310ea062b67bc6342e6ed3472f783af70edea1fa4f490ac3820eb5c1ebddbc
kernel-debug-2.6.18-128.1.6.el5.i686.rpm SHA-256: edeef1abd6d52ace5544307e76010076437da6fd6af176414a3baf423cf8ede8
kernel-debug-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 29e80aeeae49e084241c1354257cba4b9eb382945dbadd9846fcee309870a675
kernel-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 33d723c8eea2f24000946d444cf69a8887e33441a103c72893106de08fae9691
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.i386.rpm SHA-256: 1c16b37143a0ffb72b78684b4a92c1017cf2162dfb83a3439f1c27547875ca6c
kernel-xen-2.6.18-128.1.6.el5.i686.rpm SHA-256: 1b1e98fc9411d5437ac2d99ab1bd6de089fbc043f55e4433e71100ad4f86c5e5
kernel-xen-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: a3ea5eba3c1914937044362829a8a8cda64194b488d11ab221a286037e1c9296

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
x86_64
kernel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: eca9165ace422049e75ae517f7fde2e1c03bc3c9ff53716e1339314cb79730aa
kernel-debug-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 582e8d9b6fd93c35e5b05f96ccfc9dfd10ef2aaf1efffc330afb421feec33011
kernel-debug-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e11638ff2593111615406ed8e9cf6b58cc350c488a3e9c72e9557c179d72f021
kernel-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 7fa55258914f677821772f0ab5bc5dfbde84c728507e9ceda54c7a00c0c8a40c
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 0bdbec5b6f5b834bb34c363343920d5f3b9a1020ba59b460ddf21ca7aee97db6
kernel-xen-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e1a46dcd0f05cc30da4929526e79a4c1f556ec9ca26936b5c50e23bbc559e1f5
kernel-xen-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: b9309d16ea5b3a57011ff29206558cf51dbbf92b6d4b69f0f7ee3d856e0a9617
i386
kernel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 3aebbba3ef1cb7895ab2340ff1735bccf3d48b6f22ac81efabb043a6dc783b5a
kernel-PAE-2.6.18-128.1.6.el5.i686.rpm SHA-256: f405ea0f28121eb155d098212134d4b32725598c93d0a7b08453d31b1789989a
kernel-PAE-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 07310ea062b67bc6342e6ed3472f783af70edea1fa4f490ac3820eb5c1ebddbc
kernel-debug-2.6.18-128.1.6.el5.i686.rpm SHA-256: edeef1abd6d52ace5544307e76010076437da6fd6af176414a3baf423cf8ede8
kernel-debug-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 29e80aeeae49e084241c1354257cba4b9eb382945dbadd9846fcee309870a675
kernel-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 33d723c8eea2f24000946d444cf69a8887e33441a103c72893106de08fae9691
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.i386.rpm SHA-256: 1c16b37143a0ffb72b78684b4a92c1017cf2162dfb83a3439f1c27547875ca6c
kernel-xen-2.6.18-128.1.6.el5.i686.rpm SHA-256: 1b1e98fc9411d5437ac2d99ab1bd6de089fbc043f55e4433e71100ad4f86c5e5
kernel-xen-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: a3ea5eba3c1914937044362829a8a8cda64194b488d11ab221a286037e1c9296

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
s390x
kernel-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 0cefc2523bf8febc58f436519115683d7e22a3cd2bc5816c95e0a67d8b68114b
kernel-debug-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 55e8c2a15184fd25abf0e8d35816b7b252ca806c203004e0d962ffa7ee831708
kernel-debug-devel-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 5437cdbe8326e81789432dfe8586d6f3d271355f0fe30179d5be7cda6b6b7eaa
kernel-devel-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 7e470e90ab54e8d86a2b1e5cd9eab6e99ca2d2efb290bf735aac5b2ba1c125dc
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 6a3f6088d92257580d6b7cbe925d608ea5d42f16802cfe4320e8538384b29958
kernel-kdump-2.6.18-128.1.6.el5.s390x.rpm SHA-256: 26f97c9ab719848d9e7d97c290b982e1f31b9a066c13846f7e8b9068d380d9fc
kernel-kdump-devel-2.6.18-128.1.6.el5.s390x.rpm SHA-256: c3c8db8a8fe01fc1184fca692673ca2c9d5f36b0d9beb9ab4c401baee1d089d4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
ppc
kernel-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 8e39c2dc53ffc45e72edff4a591af1cba9994ff6c4fa149fda29e2080cbb8b36
kernel-debug-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: d5e884655ec546569ba082bb28c0edec2ec12fde683c0db1ebfb818410717eed
kernel-debug-devel-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 04c146be4a55e9301811a32629c8d1b50f71661394bf968acf8d343bf1f4f8c1
kernel-devel-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 0c0c75e3cc8fa307bcd6344eb655e9dea6a6e14c4d35adf5f19aa4b09b7dc824
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.ppc.rpm SHA-256: 0f756ca1b4de5c48d9d5c6466af766a43128a089ca6433eee1fc0db28e199d77
kernel-headers-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 9117f116bd613778f1e22580c6decee8286c7dfd0202b437b9a69a94bc10742b
kernel-kdump-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: d3e6dee2716dfb7dd73f47e0ef316410bbb1d3fe9aed336e8405fe26514a347f
kernel-kdump-devel-2.6.18-128.1.6.el5.ppc64.rpm SHA-256: 5cb8e4b7178aa2ab6a40a93fe4287ee6ffc0c134cc2fc4d0efc9b9488cf06637

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-128.1.6.el5.src.rpm SHA-256: c3da4b1ab5dbcc612b36571d1ade6309312a6f41742039831b7a9cc63d691679
x86_64
kernel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: eca9165ace422049e75ae517f7fde2e1c03bc3c9ff53716e1339314cb79730aa
kernel-debug-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 582e8d9b6fd93c35e5b05f96ccfc9dfd10ef2aaf1efffc330afb421feec33011
kernel-debug-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e11638ff2593111615406ed8e9cf6b58cc350c488a3e9c72e9557c179d72f021
kernel-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 7fa55258914f677821772f0ab5bc5dfbde84c728507e9ceda54c7a00c0c8a40c
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: 0bdbec5b6f5b834bb34c363343920d5f3b9a1020ba59b460ddf21ca7aee97db6
kernel-xen-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: e1a46dcd0f05cc30da4929526e79a4c1f556ec9ca26936b5c50e23bbc559e1f5
kernel-xen-devel-2.6.18-128.1.6.el5.x86_64.rpm SHA-256: b9309d16ea5b3a57011ff29206558cf51dbbf92b6d4b69f0f7ee3d856e0a9617
i386
kernel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 3aebbba3ef1cb7895ab2340ff1735bccf3d48b6f22ac81efabb043a6dc783b5a
kernel-PAE-2.6.18-128.1.6.el5.i686.rpm SHA-256: f405ea0f28121eb155d098212134d4b32725598c93d0a7b08453d31b1789989a
kernel-PAE-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 07310ea062b67bc6342e6ed3472f783af70edea1fa4f490ac3820eb5c1ebddbc
kernel-debug-2.6.18-128.1.6.el5.i686.rpm SHA-256: edeef1abd6d52ace5544307e76010076437da6fd6af176414a3baf423cf8ede8
kernel-debug-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 29e80aeeae49e084241c1354257cba4b9eb382945dbadd9846fcee309870a675
kernel-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: 33d723c8eea2f24000946d444cf69a8887e33441a103c72893106de08fae9691
kernel-doc-2.6.18-128.1.6.el5.noarch.rpm SHA-256: d6262d9b0cdbd6fc1aa250cd405f1f6c52d502038dde0bc06d8a5c0bda98beeb
kernel-headers-2.6.18-128.1.6.el5.i386.rpm SHA-256: 1c16b37143a0ffb72b78684b4a92c1017cf2162dfb83a3439f1c27547875ca6c
kernel-xen-2.6.18-128.1.6.el5.i686.rpm SHA-256: 1b1e98fc9411d5437ac2d99ab1bd6de089fbc043f55e4433e71100ad4f86c5e5
kernel-xen-devel-2.6.18-128.1.6.el5.i686.rpm SHA-256: a3ea5eba3c1914937044362829a8a8cda64194b488d11ab221a286037e1c9296

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility