Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:1106 - Security Advisory
Issued:
2009-06-16
Updated:
2009-06-16

RHSA-2009:1106 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • several flaws were found in the way the Linux kernel CIFS implementation

handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)

  • the Linux kernel Network File System daemon (nfsd) implementation did not

drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)

  • Frank Filz reported the NFSv4 client was missing a file permission check

for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)

  • a missing check was found in the hypervisor_callback() function in the

Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)

  • a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and

agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)

Bug fixes:

  • a race in the NFS client between destroying cached access rights and

unmounting an NFS file system could have caused a system crash. "Busy
inodes" messages may have been logged. (BZ#498653)

  • nanosleep() could sleep several milliseconds less than the specified time

on Intel Itanium(r)-based systems. (BZ#500349)

  • LEDs for disk drives in AHCI mode may have displayed a fault state when

there were no faults. (BZ#500120)

  • ptrace_do_wait() reported tasks were stopped each time the process doing

the trace called wait(), instead of reporting it once. (BZ#486945)

  • epoll_wait() may have caused a system lockup and problems for

applications. (BZ#497322)

  • missing capabilities could possibly allow users with an fsuid other than

0 to perform actions on some file system types that would otherwise be
prevented. (BZ#497271)

  • on NFS mounted file systems, heavy write loads may have blocked

nfs_getattr() for long periods, causing commands that use stat(2), such as
ls, to hang. (BZ#486926)

  • in rare circumstances, if an application performed multiple O_DIRECT

reads per virtual memory page and also performed fork(2), the buffer
storing the result of the I/O may have ended up with invalid data.
(BZ#486921)

  • when using GFS2, gfs2_quotad may have entered an uninterpretable sleep

state. (BZ#501742)

  • with this update, get_random_int() is more random and no longer uses a

common seed value, reducing the possibility of predicting the values
returned. (BZ#499783)

  • the "-fwrapv" flag was added to the gcc build options to prevent gcc from

optimizing away wrapping. (BZ#501751)

  • a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)
  • using the Broadcom NetXtreme BCM5704 network device with the tg3 driver

caused high system load and very bad performance. (BZ#502837)

  • "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes

able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps. (BZ#499546)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 486921 - Corruption on ext3/xfs with O_DIRECT and unaligned user buffers
  • BZ - 486926 - [RHEL5.2] nfs_getattr() hangs during heavy write workloads
  • BZ - 486945 - waitpid() reports stopped process more than once
  • BZ - 491572 - CVE-2009-1072 kernel: nfsd should drop CAP_MKNOD for non-root
  • BZ - 494275 - CVE-2009-1439 kernel: cifs: memory overwrite when saving nativeFileSystem field during mount
  • BZ - 496572 - CVE-2009-1633 kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server
  • BZ - 497020 - CVE-2009-1192 kernel: agp: zero pages before sending to userspace
  • BZ - 497322 - crm #1896100 port epoll_wait fix from RHSA-2008-0665 to RHEL 5
  • BZ - 498653 - fault in iget() - suspected race between nfs_access_cache_shrinker() and umount - Ref.: Bug #433249
  • BZ - 499546 - kernel: proc: avoid information leaks to non-privileged processes [rhel-5.3.z]
  • BZ - 499783 - kernel: random: make get_random_int() more random [rhel-5.3.z]
  • BZ - 500120 - Problem with drive status leds after update to 2.6.18-128.el5
  • BZ - 500297 - CVE-2009-1630 kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission
  • BZ - 500349 - RHEL5.3.z LTP nanosleep02 Test Case Failure on Fujitsu Machine
  • BZ - 500945 - CVE-2009-1758 kernel: xen: local denial of service
  • BZ - 501742 - GFS2: gfs2_quotad in uninterruptible sleep while idle
  • BZ - 501751 - kernel should be built with -fwrapv [rhel-5.3.z]
  • BZ - 502837 - BCM5704 NIC results in CPU 100%SI , sluggish system performance
  • BZ - 502916 - kernel BUG at drivers/scsi/libiscsi.c:301!

CVEs

  • CVE-2009-1439
  • CVE-2009-1192
  • CVE-2009-1072
  • CVE-2009-1633
  • CVE-2009-1630
  • CVE-2009-1758
  • CVE-2009-3238

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
x86_64
kernel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 5dd1ce85f9470425935e340f0278f27c6a4a1736c24dffd5212e798a247a4cbd
kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: b7503ef0843e414992bb21fde2771945c44eb80394675361dbacb00a3b550c21
kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 7d77e8ad6149167b38fd084efc72759213f77cc259ef02434310abaad861f605
kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 84d5d5b6ae155c6604af03a5212719de60eab9de613c2c454819b14a758abe78
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 43193e9bbe0ff1f5669dc77f4bee4f4a2069a91b0d22767de36a920b6288fbf7
kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 675591d9d437ae534da31fef3eab3f7ff3e3abe62a119dd16eed10efc659149b
kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: dc1efeef5939348e3acda86cdb24cffc96b22d20d1b48c9f6cee59c8a1d17add
ia64
kernel-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 26fe10a8dd8b38c10562d51bd2a50cdc24beb073a0bb98a6e87ec29c5fa9b4c1
kernel-debug-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 93329c62604f93ab67e5a4a45fca98e942af0e18934c1ef6a281cfb1ea523e9d
kernel-debug-devel-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 63eb03afe815127d8e6be7f3daeef26204ce4e332e467616467b2a94d00cbdb4
kernel-devel-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 6eb1e32e633ab351a2450cd31a8802add37f6a368c1a212c4104b44489cfab46
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 4d16183fb38d961451fc291c69513ace4c43d83773c1befd91ae688b7be4a8f6
kernel-xen-2.6.18-128.1.14.el5.ia64.rpm SHA-256: cf523ee3126a9643a4fff3201744081803038ce3987eb4a4123bd87973c8b8c8
kernel-xen-devel-2.6.18-128.1.14.el5.ia64.rpm SHA-256: 5d6022bae740fae6c55854f0c096b8d9097ab7dfbbdaa233ed323d77bae6abff
i386
kernel-2.6.18-128.1.14.el5.i686.rpm SHA-256: ec5699ea3b5e7ca2620f8464be7d4003f8892cc3fb5bf615583b0d79c3131c3b
kernel-PAE-2.6.18-128.1.14.el5.i686.rpm SHA-256: 8423f55a0e366bdcc36c0ae646c824c241f720d431bcd5c6dc326228d0499649
kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 9adbc47bc8dabe746b4b365be5a0fd81469d1068334675fe8a08c0a04d97b3e2
kernel-debug-2.6.18-128.1.14.el5.i686.rpm SHA-256: 23c1b3359bb5fac88b6562374fe896be0479b68d8bf525204cd8e87c0c413719
kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: af3873fef302a09dac95b3ac9bd2a0494d543b4337e422c0f5842bd7f4cbec8b
kernel-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 40924925ac897f03cdeeec8ece94617ab3e204f334d6fb97cccd534baf583f41
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.i386.rpm SHA-256: 9225d8f67bd4e41f9b30aa973486e9cd9264f00f395abec64b92ca8e72779e80
kernel-xen-2.6.18-128.1.14.el5.i686.rpm SHA-256: fbc21634a9a1dc0ea27f7dc33d663521a98232d7de64badd74a063aebba3c4e9
kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: e6fca5a30881509a79d98f6ad6712e633b6142c91937d609d625025c47920e8f

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
x86_64
kernel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 5dd1ce85f9470425935e340f0278f27c6a4a1736c24dffd5212e798a247a4cbd
kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: b7503ef0843e414992bb21fde2771945c44eb80394675361dbacb00a3b550c21
kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 7d77e8ad6149167b38fd084efc72759213f77cc259ef02434310abaad861f605
kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 84d5d5b6ae155c6604af03a5212719de60eab9de613c2c454819b14a758abe78
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 43193e9bbe0ff1f5669dc77f4bee4f4a2069a91b0d22767de36a920b6288fbf7
kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 675591d9d437ae534da31fef3eab3f7ff3e3abe62a119dd16eed10efc659149b
kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: dc1efeef5939348e3acda86cdb24cffc96b22d20d1b48c9f6cee59c8a1d17add
i386
kernel-2.6.18-128.1.14.el5.i686.rpm SHA-256: ec5699ea3b5e7ca2620f8464be7d4003f8892cc3fb5bf615583b0d79c3131c3b
kernel-PAE-2.6.18-128.1.14.el5.i686.rpm SHA-256: 8423f55a0e366bdcc36c0ae646c824c241f720d431bcd5c6dc326228d0499649
kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 9adbc47bc8dabe746b4b365be5a0fd81469d1068334675fe8a08c0a04d97b3e2
kernel-debug-2.6.18-128.1.14.el5.i686.rpm SHA-256: 23c1b3359bb5fac88b6562374fe896be0479b68d8bf525204cd8e87c0c413719
kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: af3873fef302a09dac95b3ac9bd2a0494d543b4337e422c0f5842bd7f4cbec8b
kernel-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 40924925ac897f03cdeeec8ece94617ab3e204f334d6fb97cccd534baf583f41
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.i386.rpm SHA-256: 9225d8f67bd4e41f9b30aa973486e9cd9264f00f395abec64b92ca8e72779e80
kernel-xen-2.6.18-128.1.14.el5.i686.rpm SHA-256: fbc21634a9a1dc0ea27f7dc33d663521a98232d7de64badd74a063aebba3c4e9
kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: e6fca5a30881509a79d98f6ad6712e633b6142c91937d609d625025c47920e8f

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
x86_64
kernel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 5dd1ce85f9470425935e340f0278f27c6a4a1736c24dffd5212e798a247a4cbd
kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: b7503ef0843e414992bb21fde2771945c44eb80394675361dbacb00a3b550c21
kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 7d77e8ad6149167b38fd084efc72759213f77cc259ef02434310abaad861f605
kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 84d5d5b6ae155c6604af03a5212719de60eab9de613c2c454819b14a758abe78
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 43193e9bbe0ff1f5669dc77f4bee4f4a2069a91b0d22767de36a920b6288fbf7
kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 675591d9d437ae534da31fef3eab3f7ff3e3abe62a119dd16eed10efc659149b
kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: dc1efeef5939348e3acda86cdb24cffc96b22d20d1b48c9f6cee59c8a1d17add
i386
kernel-2.6.18-128.1.14.el5.i686.rpm SHA-256: ec5699ea3b5e7ca2620f8464be7d4003f8892cc3fb5bf615583b0d79c3131c3b
kernel-PAE-2.6.18-128.1.14.el5.i686.rpm SHA-256: 8423f55a0e366bdcc36c0ae646c824c241f720d431bcd5c6dc326228d0499649
kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 9adbc47bc8dabe746b4b365be5a0fd81469d1068334675fe8a08c0a04d97b3e2
kernel-debug-2.6.18-128.1.14.el5.i686.rpm SHA-256: 23c1b3359bb5fac88b6562374fe896be0479b68d8bf525204cd8e87c0c413719
kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: af3873fef302a09dac95b3ac9bd2a0494d543b4337e422c0f5842bd7f4cbec8b
kernel-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 40924925ac897f03cdeeec8ece94617ab3e204f334d6fb97cccd534baf583f41
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.i386.rpm SHA-256: 9225d8f67bd4e41f9b30aa973486e9cd9264f00f395abec64b92ca8e72779e80
kernel-xen-2.6.18-128.1.14.el5.i686.rpm SHA-256: fbc21634a9a1dc0ea27f7dc33d663521a98232d7de64badd74a063aebba3c4e9
kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: e6fca5a30881509a79d98f6ad6712e633b6142c91937d609d625025c47920e8f

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
s390x
kernel-2.6.18-128.1.14.el5.s390x.rpm SHA-256: 71bc8064a1136be2b57abc424ac06c244d92da156282332228ced0cf263c99d3
kernel-debug-2.6.18-128.1.14.el5.s390x.rpm SHA-256: adae358482293be51970ccbfa481a4ee714f9a5b76714bc7779e323b8db8a535
kernel-debug-devel-2.6.18-128.1.14.el5.s390x.rpm SHA-256: 1b24768f48c7c49e02231e963b197ce87cc3d0de0ffba8343bfd5c65c5b0e991
kernel-devel-2.6.18-128.1.14.el5.s390x.rpm SHA-256: 8ec71650a9d4c9c5851417d8f2e29e33a7fb188eb6f785f2a818b1a45caa854f
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.s390x.rpm SHA-256: a985a18033e347e68675820f347fe52fc3a7417e6217fbc17a0dd0bb92c2daef
kernel-kdump-2.6.18-128.1.14.el5.s390x.rpm SHA-256: 52cfb037a9bf50826cb0053cb42d32c5947bd49db20cb4fdafbf9093078cb948
kernel-kdump-devel-2.6.18-128.1.14.el5.s390x.rpm SHA-256: f159ea54ebe09ab516b2564139aec99a54bd9b110e89ef052e145b34b3efccf6

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
ppc
kernel-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: c84351f60186b9f52eb948259d41a5c1c9330c9fc3dc59ca012ada8ac2ad66fa
kernel-debug-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: b27025a870c95be9322e5d6601e22b7a6fc84824a657d40ae2b264bd4f0912ad
kernel-debug-devel-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: d72621e277a9081cc42d3cbab12ada3864dffd1355eef6ce6c6342cf738f8c24
kernel-devel-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: 4f9d239cea727553f51754aaea6b3724bc5a3bb87e8020132e87745cce74bdc5
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.ppc.rpm SHA-256: 21256fa8ae2fd21c880eb9874d75d7082272c84543cb1be6a204a9a1c2ea41c8
kernel-headers-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: 78ccfba71c8f76ef49207710491ee4466fae3cfc8cb24eb7241e6701d1c38a23
kernel-kdump-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: a54ccc559fa8b986cf23efb972afbd00004a74847fdb5c57e74c7b4540a1a74d
kernel-kdump-devel-2.6.18-128.1.14.el5.ppc64.rpm SHA-256: 8fd3eac836db68c00aedb48f851f065d599d2d49099519cb169a60e67895e7ae

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-128.1.14.el5.src.rpm SHA-256: 387d487c77acfe88a27d1232db7ea2689dfda50b93e4e80ec330dc903f2f36ef
x86_64
kernel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 5dd1ce85f9470425935e340f0278f27c6a4a1736c24dffd5212e798a247a4cbd
kernel-debug-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: b7503ef0843e414992bb21fde2771945c44eb80394675361dbacb00a3b550c21
kernel-debug-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 7d77e8ad6149167b38fd084efc72759213f77cc259ef02434310abaad861f605
kernel-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 84d5d5b6ae155c6604af03a5212719de60eab9de613c2c454819b14a758abe78
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 43193e9bbe0ff1f5669dc77f4bee4f4a2069a91b0d22767de36a920b6288fbf7
kernel-xen-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: 675591d9d437ae534da31fef3eab3f7ff3e3abe62a119dd16eed10efc659149b
kernel-xen-devel-2.6.18-128.1.14.el5.x86_64.rpm SHA-256: dc1efeef5939348e3acda86cdb24cffc96b22d20d1b48c9f6cee59c8a1d17add
i386
kernel-2.6.18-128.1.14.el5.i686.rpm SHA-256: ec5699ea3b5e7ca2620f8464be7d4003f8892cc3fb5bf615583b0d79c3131c3b
kernel-PAE-2.6.18-128.1.14.el5.i686.rpm SHA-256: 8423f55a0e366bdcc36c0ae646c824c241f720d431bcd5c6dc326228d0499649
kernel-PAE-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 9adbc47bc8dabe746b4b365be5a0fd81469d1068334675fe8a08c0a04d97b3e2
kernel-debug-2.6.18-128.1.14.el5.i686.rpm SHA-256: 23c1b3359bb5fac88b6562374fe896be0479b68d8bf525204cd8e87c0c413719
kernel-debug-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: af3873fef302a09dac95b3ac9bd2a0494d543b4337e422c0f5842bd7f4cbec8b
kernel-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: 40924925ac897f03cdeeec8ece94617ab3e204f334d6fb97cccd534baf583f41
kernel-doc-2.6.18-128.1.14.el5.noarch.rpm SHA-256: 59914e53e749abddb27e9b575460957087750c7811ea93005d63a5cb37c596f3
kernel-headers-2.6.18-128.1.14.el5.i386.rpm SHA-256: 9225d8f67bd4e41f9b30aa973486e9cd9264f00f395abec64b92ca8e72779e80
kernel-xen-2.6.18-128.1.14.el5.i686.rpm SHA-256: fbc21634a9a1dc0ea27f7dc33d663521a98232d7de64badd74a063aebba3c4e9
kernel-xen-devel-2.6.18-128.1.14.el5.i686.rpm SHA-256: e6fca5a30881509a79d98f6ad6712e633b6142c91937d609d625025c47920e8f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility