Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2009:1106 - Security Advisory
Issued:
2009-06-16
Updated:
2009-06-16

RHSA-2009:1106 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • several flaws were found in the way the Linux kernel CIFS implementation

handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)

  • the Linux kernel Network File System daemon (nfsd) implementation did not

drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)

  • Frank Filz reported the NFSv4 client was missing a file permission check

for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)

  • a missing check was found in the hypervisor_callback() function in the

Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)

  • a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and

agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)

Bug fixes:

  • a race in the NFS client between destroying cached access rights and

unmounting an NFS file system could have caused a system crash. "Busy
inodes" messages may have been logged. (BZ#498653)

  • nanosleep() could sleep several milliseconds less than the specified time

on Intel Itanium(r)-based systems. (BZ#500349)

  • LEDs for disk drives in AHCI mode may have displayed a fault state when

there were no faults. (BZ#500120)

  • ptrace_do_wait() reported tasks were stopped each time the process doing

the trace called wait(), instead of reporting it once. (BZ#486945)

  • epoll_wait() may have caused a system lockup and problems for

applications. (BZ#497322)

  • missing capabilities could possibly allow users with an fsuid other than

0 to perform actions on some file system types that would otherwise be
prevented. (BZ#497271)

  • on NFS mounted file systems, heavy write loads may have blocked

nfs_getattr() for long periods, causing commands that use stat(2), such as
ls, to hang. (BZ#486926)

  • in rare circumstances, if an application performed multiple O_DIRECT

reads per virtual memory page and also performed fork(2), the buffer
storing the result of the I/O may have ended up with invalid data.
(BZ#486921)

  • when using GFS2, gfs2_quotad may have entered an uninterpretable sleep

state. (BZ#501742)

  • with this update, get_random_int() is more random and no longer uses a

common seed value, reducing the possibility of predicting the values
returned. (BZ#499783)

  • the "-fwrapv" flag was added to the gcc build options to prevent gcc from

optimizing away wrapping. (BZ#501751)

  • a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)
  • using the Broadcom NetXtreme BCM5704 network device with the tg3 driver

caused high system load and very bad performance. (BZ#502837)

  • "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes

able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps. (BZ#499546)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 486921 - Corruption on ext3/xfs with O_DIRECT and unaligned user buffers
  • BZ - 486926 - [RHEL5.2] nfs_getattr() hangs during heavy write workloads
  • BZ - 486945 - waitpid() reports stopped process more than once
  • BZ - 491572 - CVE-2009-1072 kernel: nfsd should drop CAP_MKNOD for non-root
  • BZ - 494275 - CVE-2009-1439 kernel: cifs: memory overwrite when saving nativeFileSystem field during mount
  • BZ - 496572 - CVE-2009-1633 kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server
  • BZ - 497020 - CVE-2009-1192 kernel: agp: zero pages before sending to userspace
  • BZ - 497322 - crm #1896100 port epoll_wait fix from RHSA-2008-0665 to RHEL 5
  • BZ - 498653 - fault in iget() - suspected race between nfs_access_cache_shrinker() and umount - Ref.: Bug #433249
  • BZ - 499546 - kernel: proc: avoid information leaks to non-privileged processes [rhel-5.3.z]
  • BZ - 499783 - kernel: random: make get_random_int() more random [rhel-5.3.z]
  • BZ - 500120 - Problem with drive status leds after update to 2.6.18-128.el5
  • BZ - 500297 - CVE-2009-1630 kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission
  • BZ - 500349 - RHEL5.3.z LTP nanosleep02 Test Case Failure on Fujitsu Machine
  • BZ - 500945 - CVE-2009-1758 kernel: xen: local denial of service
  • BZ - 501742 - GFS2: gfs2_quotad in uninterruptible sleep while idle
  • BZ - 501751 - kernel should be built with -fwrapv [rhel-5.3.z]
  • BZ - 502837 - BCM5704 NIC results in CPU 100%SI , sluggish system performance
  • BZ - 502916 - kernel BUG at drivers/scsi/libiscsi.c:301!

CVEs

  • CVE-2009-1439
  • CVE-2009-1192
  • CVE-2009-1072
  • CVE-2009-1633
  • CVE-2009-1630
  • CVE-2009-1758
  • CVE-2009-3238

References

  • http://www.redhat.com/security/updates/classification/#important
  • Note: More recent versions of these packages may be available. Click a package name for more details.

    Red Hat Enterprise Linux Server 5

    SRPM
    kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
    x86_64
    kernel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 5dd1ce85f9470425935e340f0278f27c6a4a1736c24dffd5212e798a247a4cbd
    kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: b7503ef0843e414992bb21fde2771945c44eb80394675361dbacb00a3b550c21
    kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 7d77e8ad6149167b38fd084efc72759213f77cc259ef02434310abaad861f605
    kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 84d5d5b6ae155c6604af03a5212719de60eab9de613c2c454819b14a758abe78
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 43193e9bbe0ff1f5669dc77f4bee4f4a2069a91b0d22767de36a920b6288fbf7
    kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 675591d9d437ae534da31fef3eab3f7ff3e3abe62a119dd16eed10efc659149b
    kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: dc1efeef5939348e3acda86cdb24cffc96b22d20d1b48c9f6cee59c8a1d17add
    ia64
    kernel-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 26fe10a8dd8b38c10562d51bd2a50cdc24beb073a0bb98a6e87ec29c5fa9b4c1
    kernel-debug-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 93329c62604f93ab67e5a4a45fca98e942af0e18934c1ef6a281cfb1ea523e9d
    kernel-debug-devel-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 63eb03afe815127d8e6be7f3daeef26204ce4e332e467616467b2a94d00cbdb4
    kernel-devel-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 6eb1e32e633ab351a2450cd31a8802add37f6a368c1a212c4104b44489cfab46
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 4d16183fb38d961451fc291c69513ace4c43d83773c1befd91ae688b7be4a8f6
    kernel-xen-2.6.18-128.1.14.el5.ia64.rpm SHA-256: cf523ee3126a9643a4fff3201744081803038ce3987eb4a4123bd87973c8b8c8
    kernel-xen-devel-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 5d6022bae740fae6c55854f0c096b8d9097ab7dfbbdaa233ed323d77bae6abff
    i386
    kernel-2.6.18-128.1.14.el5.i686.rpm SHA-256: ec5699ea3b5e7ca2620f8464be7d4003f8892cc3fb5bf615583b0d79c3131c3b
    kernel-PAE-2.6.18-128.1.14.el5.i686.rpm SHA-256: 8423f55a0e366bdcc36c0ae646c824c241f720d431bcd5c6dc326228d0499649
    kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 9adbc47bc8dabe746b4b365be5a0fd81469d1068334675fe8a08c0a04d97b3e2
    kernel-debug-2.6.18-128.1.14.el5.i686.rpm SHA-256: 23c1b3359bb5fac88b6562374fe896be0479b68d8bf525204cd8e87c0c413719
    kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: af3873fef302a09dac95b3ac9bd2a0494d543b4337e422c0f5842bd7f4cbec8b
    kernel-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 40924925ac897f03cdeeec8ece94617ab3e204f334d6fb97cccd534baf583f41
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.i386.rpm SHA-256: 9225d8f67bd4e41f9b30aa973486e9cd9264f00f395abec64b92ca8e72779e80
    kernel-xen-2.6.18-128.1.14.el5.i686.rpm SHA-256: fbc21634a9a1dc0ea27f7dc33d663521a98232d7de64badd74a063aebba3c4e9
    kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: e6fca5a30881509a79d98f6ad6712e633b6142c91937d609d625025c47920e8f

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

    SRPM
    x86_64
    ia64
    i386

    Red Hat Enterprise Linux Server - AUS 5.3

    SRPM
    x86_64
    ia64
    i386

    Red Hat Enterprise Linux Workstation 5

    SRPM
    kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
    x86_64
    kernel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 5dd1ce85f9470425935e340f0278f27c6a4a1736c24dffd5212e798a247a4cbd
    kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: b7503ef0843e414992bb21fde2771945c44eb80394675361dbacb00a3b550c21
    kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 7d77e8ad6149167b38fd084efc72759213f77cc259ef02434310abaad861f605
    kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 84d5d5b6ae155c6604af03a5212719de60eab9de613c2c454819b14a758abe78
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 43193e9bbe0ff1f5669dc77f4bee4f4a2069a91b0d22767de36a920b6288fbf7
    kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 675591d9d437ae534da31fef3eab3f7ff3e3abe62a119dd16eed10efc659149b
    kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: dc1efeef5939348e3acda86cdb24cffc96b22d20d1b48c9f6cee59c8a1d17add
    i386
    kernel-2.6.18-128.1.14.el5.i686.rpm SHA-256: ec5699ea3b5e7ca2620f8464be7d4003f8892cc3fb5bf615583b0d79c3131c3b
    kernel-PAE-2.6.18-128.1.14.el5.i686.rpm SHA-256: 8423f55a0e366bdcc36c0ae646c824c241f720d431bcd5c6dc326228d0499649
    kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 9adbc47bc8dabe746b4b365be5a0fd81469d1068334675fe8a08c0a04d97b3e2
    kernel-debug-2.6.18-128.1.14.el5.i686.rpm SHA-256: 23c1b3359bb5fac88b6562374fe896be0479b68d8bf525204cd8e87c0c413719
    kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: af3873fef302a09dac95b3ac9bd2a0494d543b4337e422c0f5842bd7f4cbec8b
    kernel-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 40924925ac897f03cdeeec8ece94617ab3e204f334d6fb97cccd534baf583f41
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.i386.rpm SHA-256: 9225d8f67bd4e41f9b30aa973486e9cd9264f00f395abec64b92ca8e72779e80
    kernel-xen-2.6.18-128.1.14.el5.i686.rpm SHA-256: fbc21634a9a1dc0ea27f7dc33d663521a98232d7de64badd74a063aebba3c4e9
    kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: e6fca5a30881509a79d98f6ad6712e633b6142c91937d609d625025c47920e8f

    Red Hat Enterprise Linux Desktop 5

    SRPM
    kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
    x86_64
    kernel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 5dd1ce85f9470425935e340f0278f27c6a4a1736c24dffd5212e798a247a4cbd
    kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: b7503ef0843e414992bb21fde2771945c44eb80394675361dbacb00a3b550c21
    kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 7d77e8ad6149167b38fd084efc72759213f77cc259ef02434310abaad861f605
    kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 84d5d5b6ae155c6604af03a5212719de60eab9de613c2c454819b14a758abe78
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 43193e9bbe0ff1f5669dc77f4bee4f4a2069a91b0d22767de36a920b6288fbf7
    kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 675591d9d437ae534da31fef3eab3f7ff3e3abe62a119dd16eed10efc659149b
    kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: dc1efeef5939348e3acda86cdb24cffc96b22d20d1b48c9f6cee59c8a1d17add
    i386
    kernel-2.6.18-128.1.14.el5.i686.rpm SHA-256: ec5699ea3b5e7ca2620f8464be7d4003f8892cc3fb5bf615583b0d79c3131c3b
    kernel-PAE-2.6.18-128.1.14.el5.i686.rpm SHA-256: 8423f55a0e366bdcc36c0ae646c824c241f720d431bcd5c6dc326228d0499649
    kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 9adbc47bc8dabe746b4b365be5a0fd81469d1068334675fe8a08c0a04d97b3e2
    kernel-debug-2.6.18-128.1.14.el5.i686.rpm SHA-256: 23c1b3359bb5fac88b6562374fe896be0479b68d8bf525204cd8e87c0c413719
    kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: af3873fef302a09dac95b3ac9bd2a0494d543b4337e422c0f5842bd7f4cbec8b
    kernel-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 40924925ac897f03cdeeec8ece94617ab3e204f334d6fb97cccd534baf583f41
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.i386.rpm SHA-256: 9225d8f67bd4e41f9b30aa973486e9cd9264f00f395abec64b92ca8e72779e80
    kernel-xen-2.6.18-128.1.14.el5.i686.rpm SHA-256: fbc21634a9a1dc0ea27f7dc33d663521a98232d7de64badd74a063aebba3c4e9
    kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: e6fca5a30881509a79d98f6ad6712e633b6142c91937d609d625025c47920e8f

    Red Hat Enterprise Linux for IBM z Systems 5

    SRPM
    kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
    s390x
    kernel-2.6.18-128.1.14.el5.s390x.rpm SHA-256: 71bc8064a1136be2b57abc424ac06c244d92da156282332228ced0cf263c99d3
    kernel-debug-2.6.18-128.1.14.el5.s390x.rpm SHA-256: adae358482293be51970ccbfa481a4ee714f9a5b76714bc7779e323b8db8a535
    kernel-debug-devel-2.6.18-128.1.14.el5.s390x.rpm SHA-256: 1b24768f48c7c49e02231e963b197ce87cc3d0de0ffba8343bfd5c65c5b0e991
    kernel-devel-2.6.18-128.1.14.el5.s390x.rpm SHA-256: 8ec71650a9d4c9c5851417d8f2e29e33a7fb188eb6f785f2a818b1a45caa854f
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.s390x.rpm SHA-256: a985a18033e347e68675820f347fe52fc3a7417e6217fbc17a0dd0bb92c2daef
    kernel-kdump-2.6.18-128.1.14.el5.s390x.rpm SHA-256: 52cfb037a9bf50826cb0053cb42d32c5947bd49db20cb4fdafbf9093078cb948
    kernel-kdump-devel-2.6.18-128.1.14.el5.s390x.rpm SHA-256: f159ea54ebe09ab516b2564139aec99a54bd9b110e89ef052e145b34b3efccf6

    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

    SRPM
    s390x

    Red Hat Enterprise Linux for Power, big endian 5

    SRPM
    kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
    ppc
    kernel-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: c84351f60186b9f52eb948259d41a5c1c9330c9fc3dc59ca012ada8ac2ad66fa
    kernel-debug-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: b27025a870c95be9322e5d6601e22b7a6fc84824a657d40ae2b264bd4f0912ad
    kernel-debug-devel-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: d72621e277a9081cc42d3cbab12ada3864dffd1355eef6ce6c6342cf738f8c24
    kernel-devel-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: 4f9d239cea727553f51754aaea6b3724bc5a3bb87e8020132e87745cce74bdc5
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.ppc.rpm SHA-256: 21256fa8ae2fd21c880eb9874d75d7082272c84543cb1be6a204a9a1c2ea41c8
    kernel-headers-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: 78ccfba71c8f76ef49207710491ee4466fae3cfc8cb24eb7241e6701d1c38a23
    kernel-kdump-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: a54ccc559fa8b986cf23efb972afbd00004a74847fdb5c57e74c7b4540a1a74d
    kernel-kdump-devel-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: 8fd3eac836db68c00aedb48f851f065d599d2d49099519cb169a60e67895e7ae

    Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

    SRPM
    ppc

    Red Hat Enterprise Linux Server from RHUI 5

    SRPM
    kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
    x86_64
    kernel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 5dd1ce85f9470425935e340f0278f27c6a4a1736c24dffd5212e798a247a4cbd
    kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: b7503ef0843e414992bb21fde2771945c44eb80394675361dbacb00a3b550c21
    kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 7d77e8ad6149167b38fd084efc72759213f77cc259ef02434310abaad861f605
    kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 84d5d5b6ae155c6604af03a5212719de60eab9de613c2c454819b14a758abe78
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 43193e9bbe0ff1f5669dc77f4bee4f4a2069a91b0d22767de36a920b6288fbf7
    kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 675591d9d437ae534da31fef3eab3f7ff3e3abe62a119dd16eed10efc659149b
    kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: dc1efeef5939348e3acda86cdb24cffc96b22d20d1b48c9f6cee59c8a1d17add
    i386
    kernel-2.6.18-128.1.14.el5.i686.rpm SHA-256: ec5699ea3b5e7ca2620f8464be7d4003f8892cc3fb5bf615583b0d79c3131c3b
    kernel-PAE-2.6.18-128.1.14.el5.i686.rpm SHA-256: 8423f55a0e366bdcc36c0ae646c824c241f720d431bcd5c6dc326228d0499649
    kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 9adbc47bc8dabe746b4b365be5a0fd81469d1068334675fe8a08c0a04d97b3e2
    kernel-debug-2.6.18-128.1.14.el5.i686.rpm SHA-256: 23c1b3359bb5fac88b6562374fe896be0479b68d8bf525204cd8e87c0c413719
    kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: af3873fef302a09dac95b3ac9bd2a0494d543b4337e422c0f5842bd7f4cbec8b
    kernel-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 40924925ac897f03cdeeec8ece94617ab3e204f334d6fb97cccd534baf583f41
    kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
    kernel-headers-2.6.18-128.1.14.el5.i386.rpm SHA-256: 9225d8f67bd4e41f9b30aa973486e9cd9264f00f395abec64b92ca8e72779e80
    kernel-xen-2.6.18-128.1.14.el5.i686.rpm SHA-256: fbc21634a9a1dc0ea27f7dc33d663521a98232d7de64badd74a063aebba3c4e9
    kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: e6fca5a30881509a79d98f6ad6712e633b6142c91937d609d625025c47920e8f

    The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

    Red Hat

    Quick Links

    • Downloads
    • Subscriptions
    • Support Cases
    • Customer Service
    • Product Documentation

    Help

    • Contact Us
    • Customer Portal FAQ
    • Log-in Assistance

    Site Info

    • Trust Red Hat
    • Browser Support Policy
    • Accessibility
    • Awards and Recognition
    • Colophon

    Related Sites

    • redhat.com
    • openshift.com
    • developers.redhat.com
    • connect.redhat.com

    About

    • Red Hat Subscription Value
    • About Red Hat
    • Red Hat Jobs
    Copyright © 2021 Red Hat, Inc.
    • Privacy Statement
    • Customer Portal Terms of Use
    • All Policies and Guidelines
    Red Hat Summit
    Twitter Facebook