Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Troubleshoot a product issue
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2009:0473 - Security Advisory
Issued:
2009-05-07
Updated:
2009-05-07

RHSA-2009:0473 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • a logic error was found in the do_setlk() function of the Linux kernel

Network File System (NFS) implementation. If a signal interrupted a lock
request, the local POSIX lock was incorrectly created. This could cause a
denial of service on the NFS server if a file descriptor was closed before
its corresponding lock request returned. (CVE-2008-4307, Important)

  • a deficiency was found in the Linux kernel system call auditing

implementation on 64-bit systems. This could allow a local, unprivileged
user to circumvent a system call audit configuration, if that configuration
filtered based on the "syscall" number or arguments.
(CVE-2009-0834, Important)

  • the exit_notify() function in the Linux kernel did not properly reset the

exit signal if a process executed a set user ID (setuid) application before
exiting. This could allow a local, unprivileged user to elevate their
privileges. (CVE-2009-1337, Important)

  • a flaw was found in the ecryptfs_write_metadata_to_contents() function of

the Linux kernel eCryptfs implementation. On systems with a 4096 byte
page-size, this flaw may have caused 4096 bytes of uninitialized kernel
memory to be written into the eCryptfs file headers, leading to an
information leak. Note: Encrypted files created on systems running the
vulnerable version of eCryptfs may contain leaked data in the eCryptfs file
headers. This update does not remove any leaked data. Refer to the
Knowledgebase article in the References section for further information.
(CVE-2009-0787, Moderate)

  • the Linux kernel implementation of the Network File System (NFS) did not

properly initialize the file name limit in the nfs_server data structure.
This flaw could possibly lead to a denial of service on a client mounting
an NFS share. (CVE-2009-1336, Moderate)

This update also fixes the following bugs:

  • the enic driver (Cisco 10G Ethernet) did not operate under

virtualization. (BZ#472474)

  • network interfaces using the IBM eHEA Ethernet device driver could not be

successfully configured under low-memory conditions. (BZ#487035)

  • bonding with the "arp_validate=3" option may have prevented fail overs.

(BZ#488064)

  • when running under virtualization, the acpi-cpufreq module wrote "Domain

attempted WRMSR" errors to the dmesg log. (BZ#488928)

  • NFS clients may have experienced deadlocks during unmount. (BZ#488929)
  • the ixgbe driver double counted the number of received bytes and packets.

(BZ#489459)

  • the Wacom Intuos3 Lens Cursor device did not work correctly with the

Wacom Intuos3 12x12 tablet. (BZ#489460)

  • on the Itanium(r) architecture, nanosleep() caused commands which used it,

such as sleep and usleep, to sleep for one second more than expected.
(BZ#490434)

  • a panic and corruption of slab cache data structures occurred on 64-bit

PowerPC systems when clvmd was running. (BZ#491677)

  • the NONSTOP_TSC feature did not perform correctly on the Intel(r)

microarchitecture (Nehalem) when running in 32-bit mode. (BZ#493356)

  • keyboards may not have functioned on IBM eServer System p machines after

a certain point during installation or afterward. (BZ#494293)

  • using Device Mapper Multipathing with the qla2xxx driver resulted in

frequent path failures. (BZ#495635)

  • if the hypervisor was booted with the dom0_max_vcpus parameter set to

less than the actual number of CPUs in the system, and the cpuspeed service
was started, the hypervisor could crash. (BZ#495931)

  • using Openswan to provide an IPsec virtual private network eventually

resulted in a CPU soft lockup and a system crash. (BZ#496044)

  • it was possible for posix_locks_deadlock() to enter an infinite loop

(under the BKL), causing a system hang. (BZ#496842)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 456282 - CVE-2008-4307 Kernel BUG() in locks_remove_flock
  • BZ - 487035 - ehea network configuration fails during boot after fsck
  • BZ - 487990 - CVE-2009-0834 kernel: x86-64: syscall-audit: 32/64 syscall hole
  • BZ - 488064 - [RHEL-5.3] ARP packets aren't received by backup slaves breaking arp_validate=3
  • BZ - 488928 - xm dmesg printk spam -- Domain attempted WRMSR 00000000000000e8 from 00000016:3d0e9470 to 00000000:00000000
  • BZ - 488929 - Deadlock in flush_workqueue() results in hung nfs clients
  • BZ - 489459 - [Intel 5.4 bug] ixgbe driver double counts RX byte count
  • BZ - 489460 - Wacom driver does not with with mouse/lens device on intuos3
  • BZ - 490434 - [5.3] The nanosleep() syscall sleeps one second longer.
  • BZ - 491254 - CVE-2009-0787 kernel: ecryptfs file header infoleak
  • BZ - 491677 - slab corruption with dlm and clvmd on ppc64
  • BZ - 493356 - [Intel 5.4 FEAT] TSC keeps running in C3+[incremental patch for 5.3.z]
  • BZ - 493771 - CVE-2009-1337 kernel: exit_notify: kill the wrong capable(CAP_KILL) check
  • BZ - 494074 - CVE-2009-1336 kernel: nfsv4 client can be crashed by stating a long filename
  • BZ - 494293 - RHEL5-U2 Installation hangs on p-series--7029, 2078
  • BZ - 495635 - Frequent path failures during I/O on DM multipath devices
  • BZ - 495929 - [5.3][Xen] APERF/MPERF patch update
  • BZ - 495931 - [5.3][Xen] dom0 panic when we use dom0_max_vcpus=2.
  • BZ - 496044 - Running Openswan ipsec vpn server with rhel-5.3 kernel-2.6.18-128.el5 causes crash
  • BZ - 496842 - softlockups due to infinite loops in posix_locks_deadlock

CVEs

  • CVE-2009-0834
  • CVE-2008-4307
  • CVE-2009-1337
  • CVE-2009-1336
  • CVE-2009-0787

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://kbase.redhat.com/faq/docs/DOC-16748
  • Note: More recent versions of these packages may be available. Click a package name for more details.

    Red Hat Enterprise Linux Server 5

    SRPM
    kernel-2.6.18-128.1.10.el5.src.rpm SHA-256: 89baea0a6740a89d5f0682b5ea3e0c99b6788c16bdc98c7f77ba29e0f5044587
    x86_64
    kernel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: bdf72293c30938225525b395d4479290ba3f54a607a5bec0a846a2d9cb905248
    kernel-debug-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 1f8b25222ed8dcccd3245aeeb862db9a498194158cad60a376bc17dd9e2bf0a5
    kernel-debug-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 6ec3e4c64a172469d86fbf43fd66863faf80aadd017490328fc3f84f6e7e4e84
    kernel-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: d83dc8f8e288a76176b9da1228c017f4e9751d7ddf22b109817deb22d7506022
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 5b2d5bc8297d0517cd0b199a4e6e96fb1ee7c595b52d3597bb8b34a46e7eb929
    kernel-xen-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 68bd26d999d83b9b685b5179f52cfcdc51b66dcbdf3efc99a20bfc632d88ae48
    kernel-xen-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 7960f6fa724c8651a5011b32bb8e8058dfba16ed9fd76e9a2aad44ebb8bad7a5
    ia64
    kernel-2.6.18-128.1.10.el5.ia64.rpm SHA-256: 18eab9c440590e1034b7a6bb72eefbd3215ff4d5656d273b541c83cc7cf783ff
    kernel-debug-2.6.18-128.1.10.el5.ia64.rpm SHA-256: 0ea4525b0937d65e12ac5e13bf031705d3a2297b9832ffd43b281456c1bfc0dc
    kernel-debug-devel-2.6.18-128.1.10.el5.ia64.rpm SHA-256: e0a6eb00a3dc973b2df495cec86ea571ee319698f2b9999285d5fa6fee441eb1
    kernel-devel-2.6.18-128.1.10.el5.ia64.rpm SHA-256: 8297e7beddd637bf31d5f4774bd8488daaac73bd2b1901ebe21de62278082b16
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.ia64.rpm SHA-256: 0a0128f38ceff52d3aa1ef5ba35ab08eeb3257854bf6ccbc4d78c50f97273003
    kernel-xen-2.6.18-128.1.10.el5.ia64.rpm SHA-256: 98a3fea34729fd4842287591a4b3d687d8ccbe1d1adfdba08d82eed0b1468a3b
    kernel-xen-devel-2.6.18-128.1.10.el5.ia64.rpm SHA-256: 6e590e3adc94ce57a439fc6a2a17464aedea3a58a4db53b4cb4ffcd80f83df23
    i386
    kernel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 85d4a830a30b69fca176d8c5139731dc2dca91facd214d185a6d87e9c9d379ad
    kernel-PAE-2.6.18-128.1.10.el5.i686.rpm SHA-256: fad966de3aa877260d3d096066ee5bd18fcad8664d3bbaff20cd8b7b5149e1d8
    kernel-PAE-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 65f3bb1ef1eac52ae9c8a6983a3ef04c101ee701acd6d9240aa7d1f7cca1b8b2
    kernel-debug-2.6.18-128.1.10.el5.i686.rpm SHA-256: 7fd5867084c4e37f2abeae9377eed1ef37a9eaa86fe118b092f0e5c4fe08b289
    kernel-debug-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 5616596241c3156c32d12f5e7342131f3387cb8ef05395fd47aa3355a30d9060
    kernel-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 99e6748e5e36a77061b9ff32bb25d7fbe81de3cc1ea25bd059f6137d260179fb
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.i386.rpm SHA-256: 8bed56e094675dde79ebb26d1b283b09ef359705dc68804da3c1091654ce1f43
    kernel-xen-2.6.18-128.1.10.el5.i686.rpm SHA-256: 66bf835ff095d24b54cb04599e611cd79de8cc77f4b43608c9b5058d710e5a04
    kernel-xen-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 925bc0c126a3bf44a01b6ffc4ccd010cb71574737b179d14090167ed8f8deb63

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

    SRPM
    x86_64
    ia64
    i386

    Red Hat Enterprise Linux Server - AUS 5.3

    SRPM
    x86_64
    ia64
    i386

    Red Hat Enterprise Linux Workstation 5

    SRPM
    kernel-2.6.18-128.1.10.el5.src.rpm SHA-256: 89baea0a6740a89d5f0682b5ea3e0c99b6788c16bdc98c7f77ba29e0f5044587
    x86_64
    kernel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: bdf72293c30938225525b395d4479290ba3f54a607a5bec0a846a2d9cb905248
    kernel-debug-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 1f8b25222ed8dcccd3245aeeb862db9a498194158cad60a376bc17dd9e2bf0a5
    kernel-debug-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 6ec3e4c64a172469d86fbf43fd66863faf80aadd017490328fc3f84f6e7e4e84
    kernel-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: d83dc8f8e288a76176b9da1228c017f4e9751d7ddf22b109817deb22d7506022
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 5b2d5bc8297d0517cd0b199a4e6e96fb1ee7c595b52d3597bb8b34a46e7eb929
    kernel-xen-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 68bd26d999d83b9b685b5179f52cfcdc51b66dcbdf3efc99a20bfc632d88ae48
    kernel-xen-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 7960f6fa724c8651a5011b32bb8e8058dfba16ed9fd76e9a2aad44ebb8bad7a5
    i386
    kernel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 85d4a830a30b69fca176d8c5139731dc2dca91facd214d185a6d87e9c9d379ad
    kernel-PAE-2.6.18-128.1.10.el5.i686.rpm SHA-256: fad966de3aa877260d3d096066ee5bd18fcad8664d3bbaff20cd8b7b5149e1d8
    kernel-PAE-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 65f3bb1ef1eac52ae9c8a6983a3ef04c101ee701acd6d9240aa7d1f7cca1b8b2
    kernel-debug-2.6.18-128.1.10.el5.i686.rpm SHA-256: 7fd5867084c4e37f2abeae9377eed1ef37a9eaa86fe118b092f0e5c4fe08b289
    kernel-debug-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 5616596241c3156c32d12f5e7342131f3387cb8ef05395fd47aa3355a30d9060
    kernel-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 99e6748e5e36a77061b9ff32bb25d7fbe81de3cc1ea25bd059f6137d260179fb
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.i386.rpm SHA-256: 8bed56e094675dde79ebb26d1b283b09ef359705dc68804da3c1091654ce1f43
    kernel-xen-2.6.18-128.1.10.el5.i686.rpm SHA-256: 66bf835ff095d24b54cb04599e611cd79de8cc77f4b43608c9b5058d710e5a04
    kernel-xen-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 925bc0c126a3bf44a01b6ffc4ccd010cb71574737b179d14090167ed8f8deb63

    Red Hat Enterprise Linux Desktop 5

    SRPM
    kernel-2.6.18-128.1.10.el5.src.rpm SHA-256: 89baea0a6740a89d5f0682b5ea3e0c99b6788c16bdc98c7f77ba29e0f5044587
    x86_64
    kernel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: bdf72293c30938225525b395d4479290ba3f54a607a5bec0a846a2d9cb905248
    kernel-debug-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 1f8b25222ed8dcccd3245aeeb862db9a498194158cad60a376bc17dd9e2bf0a5
    kernel-debug-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 6ec3e4c64a172469d86fbf43fd66863faf80aadd017490328fc3f84f6e7e4e84
    kernel-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: d83dc8f8e288a76176b9da1228c017f4e9751d7ddf22b109817deb22d7506022
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 5b2d5bc8297d0517cd0b199a4e6e96fb1ee7c595b52d3597bb8b34a46e7eb929
    kernel-xen-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 68bd26d999d83b9b685b5179f52cfcdc51b66dcbdf3efc99a20bfc632d88ae48
    kernel-xen-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 7960f6fa724c8651a5011b32bb8e8058dfba16ed9fd76e9a2aad44ebb8bad7a5
    i386
    kernel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 85d4a830a30b69fca176d8c5139731dc2dca91facd214d185a6d87e9c9d379ad
    kernel-PAE-2.6.18-128.1.10.el5.i686.rpm SHA-256: fad966de3aa877260d3d096066ee5bd18fcad8664d3bbaff20cd8b7b5149e1d8
    kernel-PAE-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 65f3bb1ef1eac52ae9c8a6983a3ef04c101ee701acd6d9240aa7d1f7cca1b8b2
    kernel-debug-2.6.18-128.1.10.el5.i686.rpm SHA-256: 7fd5867084c4e37f2abeae9377eed1ef37a9eaa86fe118b092f0e5c4fe08b289
    kernel-debug-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 5616596241c3156c32d12f5e7342131f3387cb8ef05395fd47aa3355a30d9060
    kernel-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 99e6748e5e36a77061b9ff32bb25d7fbe81de3cc1ea25bd059f6137d260179fb
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.i386.rpm SHA-256: 8bed56e094675dde79ebb26d1b283b09ef359705dc68804da3c1091654ce1f43
    kernel-xen-2.6.18-128.1.10.el5.i686.rpm SHA-256: 66bf835ff095d24b54cb04599e611cd79de8cc77f4b43608c9b5058d710e5a04
    kernel-xen-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 925bc0c126a3bf44a01b6ffc4ccd010cb71574737b179d14090167ed8f8deb63

    Red Hat Enterprise Linux for IBM z Systems 5

    SRPM
    kernel-2.6.18-128.1.10.el5.src.rpm SHA-256: 89baea0a6740a89d5f0682b5ea3e0c99b6788c16bdc98c7f77ba29e0f5044587
    s390x
    kernel-2.6.18-128.1.10.el5.s390x.rpm SHA-256: e9388762949274993ba30be9e58c5b0787c19ac87970f39313b27bce76c3599f
    kernel-debug-2.6.18-128.1.10.el5.s390x.rpm SHA-256: be677f8b18ad194edc9a39431dd0408442079dff8470978f9cf3cd170e5971de
    kernel-debug-devel-2.6.18-128.1.10.el5.s390x.rpm SHA-256: 266bb1f1166ec0330030cde61f80a5a4fa70c31423cd83c83383ad7bfc253ada
    kernel-devel-2.6.18-128.1.10.el5.s390x.rpm SHA-256: cc05829c1657aed2f64f66e476ef366fe55b50f2b8bfbbe62a3f6efe945b30b3
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.s390x.rpm SHA-256: bcd157cf648efaee6dce896c91e02bd56bb5b31667dce6c8d8d97d0f677ed3c2
    kernel-kdump-2.6.18-128.1.10.el5.s390x.rpm SHA-256: 0e27a07ae17fd0d4239e2b35e53c53b53296ff15f7f993e65111badeb58f9877
    kernel-kdump-devel-2.6.18-128.1.10.el5.s390x.rpm SHA-256: e007d54afe8f13fa145773bf10e427682fa6d2bc17f6b05c60e1bd36ec840099

    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

    SRPM
    s390x

    Red Hat Enterprise Linux for Power, big endian 5

    SRPM
    kernel-2.6.18-128.1.10.el5.src.rpm SHA-256: 89baea0a6740a89d5f0682b5ea3e0c99b6788c16bdc98c7f77ba29e0f5044587
    ppc
    kernel-2.6.18-128.1.10.el5.ppc64.rpm SHA-256: c40ea56e98ab0f9360f566f686bf0795b4963ef1f4cf58ab93789a32b4c127a8
    kernel-debug-2.6.18-128.1.10.el5.ppc64.rpm SHA-256: 48f0d692659988d5a379a3ad4707b38de5bc27013d84670d393794d237a749fd
    kernel-debug-devel-2.6.18-128.1.10.el5.ppc64.rpm SHA-256: 08f909ad3e32a9c7c5fa488979c8402ed2963382806daa9684257130d15593ca
    kernel-devel-2.6.18-128.1.10.el5.ppc64.rpm SHA-256: b10d0fa9789c0da28f6f4c7f90c5179b2da4b5832d3cf11558e6e7c1b5d17a3f
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.ppc.rpm SHA-256: c88c3f36976e50c8ee6b89a5429545fa71ba0fecf4ee7970c7d239896e37beff
    kernel-headers-2.6.18-128.1.10.el5.ppc64.rpm SHA-256: d045964eca8f30d57a62f55285d6b19c04b5efb6cd97c8ac6effe578ec573029
    kernel-kdump-2.6.18-128.1.10.el5.ppc64.rpm SHA-256: 81c8283224922090b12d80cc04af045aa9c19e501dbf3cccba5b129add102c4c
    kernel-kdump-devel-2.6.18-128.1.10.el5.ppc64.rpm SHA-256: 0089564ef0a0557d3abdbf9171ece26d967c27b744dedfceb088d2d23df61d42

    Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

    SRPM
    ppc

    Red Hat Enterprise Linux Server from RHUI 5

    SRPM
    kernel-2.6.18-128.1.10.el5.src.rpm SHA-256: 89baea0a6740a89d5f0682b5ea3e0c99b6788c16bdc98c7f77ba29e0f5044587
    x86_64
    kernel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: bdf72293c30938225525b395d4479290ba3f54a607a5bec0a846a2d9cb905248
    kernel-debug-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 1f8b25222ed8dcccd3245aeeb862db9a498194158cad60a376bc17dd9e2bf0a5
    kernel-debug-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 6ec3e4c64a172469d86fbf43fd66863faf80aadd017490328fc3f84f6e7e4e84
    kernel-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: d83dc8f8e288a76176b9da1228c017f4e9751d7ddf22b109817deb22d7506022
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 5b2d5bc8297d0517cd0b199a4e6e96fb1ee7c595b52d3597bb8b34a46e7eb929
    kernel-xen-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 68bd26d999d83b9b685b5179f52cfcdc51b66dcbdf3efc99a20bfc632d88ae48
    kernel-xen-devel-2.6.18-128.1.10.el5.x86_64.rpm SHA-256: 7960f6fa724c8651a5011b32bb8e8058dfba16ed9fd76e9a2aad44ebb8bad7a5
    i386
    kernel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 85d4a830a30b69fca176d8c5139731dc2dca91facd214d185a6d87e9c9d379ad
    kernel-PAE-2.6.18-128.1.10.el5.i686.rpm SHA-256: fad966de3aa877260d3d096066ee5bd18fcad8664d3bbaff20cd8b7b5149e1d8
    kernel-PAE-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 65f3bb1ef1eac52ae9c8a6983a3ef04c101ee701acd6d9240aa7d1f7cca1b8b2
    kernel-debug-2.6.18-128.1.10.el5.i686.rpm SHA-256: 7fd5867084c4e37f2abeae9377eed1ef37a9eaa86fe118b092f0e5c4fe08b289
    kernel-debug-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 5616596241c3156c32d12f5e7342131f3387cb8ef05395fd47aa3355a30d9060
    kernel-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 99e6748e5e36a77061b9ff32bb25d7fbe81de3cc1ea25bd059f6137d260179fb
    kernel-doc-2.6.18-128.1.10.el5.noarch.rpm SHA-256: 3b1f5af13ac458cda3779b160ff1fcf2df13e3216860a9752db466e66ffab2f7
    kernel-headers-2.6.18-128.1.10.el5.i386.rpm SHA-256: 8bed56e094675dde79ebb26d1b283b09ef359705dc68804da3c1091654ce1f43
    kernel-xen-2.6.18-128.1.10.el5.i686.rpm SHA-256: 66bf835ff095d24b54cb04599e611cd79de8cc77f4b43608c9b5058d710e5a04
    kernel-xen-devel-2.6.18-128.1.10.el5.i686.rpm SHA-256: 925bc0c126a3bf44a01b6ffc4ccd010cb71574737b179d14090167ed8f8deb63

    The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

    Red Hat

    Quick Links

    • Downloads
    • Subscriptions
    • Support Cases
    • Customer Service
    • Product Documentation

    Help

    • Contact Us
    • Customer Portal FAQ
    • Log-in Assistance

    Site Info

    • Trust Red Hat
    • Browser Support Policy
    • Accessibility
    • Awards and Recognition
    • Colophon

    Related Sites

    • redhat.com
    • openshift.com
    • developers.redhat.com
    • connect.redhat.com
    • cloud.redhat.com

    About

    • Red Hat Subscription Value
    • About Red Hat
    • Red Hat Jobs
    Copyright © 2021 Red Hat, Inc.
    • Privacy Statement
    • Customer Portal Terms of Use
    • All Policies and Guidelines
    Red Hat Summit
    Twitter Facebook