Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2009:1193 - Security Advisory
Issued:
2009-08-04
Updated:
2009-08-04

RHSA-2009:1193 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • the possibility of a timeout value overflow was found in the Linux kernel

high-resolution timers functionality, hrtimers. This could allow a local,
unprivileged user to execute arbitrary code, or cause a denial of service
(kernel panic). (CVE-2007-5966, Important)

  • a flaw was found in the Intel PRO/1000 network driver in the Linux

kernel. Frames with sizes near the MTU of an interface may be split across
multiple hardware receive descriptors. Receipt of such a frame could leak
through a validation check, leading to a corruption of the length check. A
remote attacker could use this flaw to send a specially-crafted packet that
would cause a denial of service or code execution. (CVE-2009-1385,
Important)

  • Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in

the Linux kernel. This driver allowed interfaces using this driver to
receive frames larger than could be handled, which could lead to a remote
denial of service or code execution. (CVE-2009-1389, Important)

  • the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a

setuid or setgid program was executed. A local, unprivileged user could use
this flaw to bypass the mmap_min_addr protection mechanism and perform a
NULL pointer dereference attack, or bypass the Address Space Layout
Randomization (ASLR) security feature. (CVE-2009-1895, Important)

  • Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs

implementation. A local attacker with permissions to perform an eCryptfs
mount could modify the metadata of the files in that eCrypfts mount to
cause a buffer overflow, leading to a denial of service or privilege
escalation. (CVE-2009-2406, CVE-2009-2407, Important)

  • Konstantin Khlebnikov discovered a race condition in the ptrace

implementation in the Linux kernel. This race condition can occur when the
process tracing and the process being traced participate in a core dump. A
local, unprivileged user could use this flaw to trigger a deadlock,
resulting in a partial denial of service. (CVE-2009-1388, Moderate)

Bug fixes (see References below for a link to more detailed notes):

  • possible dom0 crash when a Xen para-virtualized guest was installed while

another para-virtualized guest was rebooting. (BZ#497812)

  • no directory removal audit record if the directory and its subtree were

recursively watched by an audit rule. (BZ#507561)

  • running "echo 1 > /proc/sys/vm/drop_caches" under high memory load could

cause a kernel panic. (BZ#503692)

  • on 32-bit systems, core dumps for some multithreaded applications did not

include all thread information. (BZ#505322)

  • a stack buffer used by get_event_name() was too small for nul terminator

sprintf() writes. This could lead to an invalid pointer or kernel panic.
(BZ#506906)

  • when using the aic94xx driver, systems with SATA drives may not boot due

to a libsas bug. (BZ#506029)

  • Wacom Cintiq 21UX and Intuos stylus buttons were handled incorrectly when

moved away from and back to these tablets. (BZ#508275)

  • CPU "soft lockup" messages and possibe system hangs on systems with

certain Broadcom network devices and running the Linux kernel from the
kernel-xen package. (BZ#503689)

  • on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL

timer that were also compiled for 64-bit systems. This caused such programs
to abort. (BZ#510018)

  • write operations could be blocked even when using O_NONBLOCK. (BZ#510239)
  • the "pci=nomsi" option was required for installing and booting Red Hat

Enterprise Linux 5.2 on systems with VIA VT3364 chipsets. (BZ#507529)

  • shutting down, destroying, or migrating Xen guests with large amounts of

memory could cause other guests to be temporarily unresponsive. (BZ#512311)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. Systems must be rebooted for this update
to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 453135 - CVE-2007-5966 kernel: non-root can trigger cpu_idle soft lockup
  • BZ - 497812 - RH5.3 x64 RC2 reboots while installing a virtual machine
  • BZ - 502981 - CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
  • BZ - 503689 - Call trace thrown up when stressing the network with bw_tcp
  • BZ - 503692 - Possible panic when drop_pagecache_sb() and prune_icache() run concurrently.
  • BZ - 504263 - CVE-2009-1388 kernel: do_coredump() vs ptrace_start() deadlock
  • BZ - 504726 - CVE-2009-1389 kernel: r8169: fix crash when large packets are received
  • BZ - 505322 - [Reg][RHEL5.3] Multi-threaded application dumps a core with wrong thread information
  • BZ - 506029 - With Red Hat errata 128.1.6 installed system hangs with SATA drives installed.
  • BZ - 506906 - kernel: TPM: get_event_name stack corruption [rhel-5.3.z]
  • BZ - 507529 - disable MSI on VIA VT3364 chipsets
  • BZ - 507561 - Removal of directory doesn't produce audit record if rule is recursive
  • BZ - 508275 - Wacom driver with Intuos tablet does not report button press after a proximity leave/re-enter
  • BZ - 510018 - setitimer(ITIMER_REAL, ...) failing in 64bit enviroment
  • BZ - 510239 - [5.3]Write operation with O_NONBLOCK flag to TTY terminal is blocked
  • BZ - 511171 - CVE-2009-1895 kernel: personality: fix PER_CLEAR_ON_SETID
  • BZ - 512311 - A Shut down of a 32GB domU's freezes other domU's for several seconds
  • BZ - 512861 - CVE-2009-2406 kernel: ecryptfs stack overflow in parse_tag_11_packet()
  • BZ - 512885 - CVE-2009-2407 kernel: ecryptfs heap overflow in parse_tag_3_packet()

CVEs

  • CVE-2007-5966
  • CVE-2009-1385
  • CVE-2009-1389
  • CVE-2009-1895
  • CVE-2009-1388
  • CVE-2009-2406
  • CVE-2009-2407

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-128.4.1.el5.src.rpm SHA-256: 5b42d7cf98a6694f0899aa5338398c0bd493dd36f14a679f39bf54a791f5de05
x86_64
kernel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 21ff74bd9d8cd3aac7c5ec272389be458bfff53c65b8facd5c51321cb115bd94
kernel-debug-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 36314a168674befbb39eaeeac0b7c2d92277c2d7b8aed6562b7e8c73e33e103a
kernel-debug-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 89365c5482c60d4cd6e99ea46e75616fdb44bbe79581e7f4a19c4419d42f3880
kernel-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 173fd78a13279f6b96063cb82852a89717bfeaa8ac9be1364e31ea4f37db010b
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 8991385520080a7581ed2a7ff66546611f60d7490aedebaca5820b734f7217a7
kernel-xen-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 2f8696c841d40c021b6abc7bcbf8e57ed61365737445954ef2302842d0aaec86
kernel-xen-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 7f7d5f1295284ae71edf7c2eea568875a83f6c0314fa801d3ab2b5724a24ef61
ia64
kernel-2.6.18-128.4.1.el5.ia64.rpm SHA-256: 54cf0ac180ae6b7b0e42b041445ec69bb18f2bcb9e4164c901f1ad9751f55610
kernel-debug-2.6.18-128.4.1.el5.ia64.rpm SHA-256: c93d5e66ecae9d64c18984edb42651daa4c8758d8b28f8082358a65926b62e73
kernel-debug-devel-2.6.18-128.4.1.el5.ia64.rpm SHA-256: 1d45499cde6adcb50bc04be16a581a1ca15f78988249f0d4dbf02e6beb58e521
kernel-devel-2.6.18-128.4.1.el5.ia64.rpm SHA-256: b5dd51e2aafaf91dbf80b80e9702c111c526a32578c914d9258ea31a77c79e4b
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.ia64.rpm SHA-256: 0b96bcb4eca0782f3ae4c0ceb896e369466925ec64813611b8efe855d5537aca
kernel-xen-2.6.18-128.4.1.el5.ia64.rpm SHA-256: 1e9c409acdd4b0f9f4c6ca766988b9df01c74ade9746d8ce779e569e5d86b4f8
kernel-xen-devel-2.6.18-128.4.1.el5.ia64.rpm SHA-256: f6e7430e2e6b7344b7fcf6eb75e1eca4c61d92967415459af1bcbe63f7752213
i386
kernel-2.6.18-128.4.1.el5.i686.rpm SHA-256: c33090285fc963faa9c1893b162422f2efb2d142c5b200aa357aa8a501b83ac8
kernel-PAE-2.6.18-128.4.1.el5.i686.rpm SHA-256: 6d5f567a5d6ccdf01f244507a5ec081f013ba07f47ad28894d47411b8f33b4da
kernel-PAE-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: b526e15dc9f2a6ec59833eb9bcc25624d3e7f1f285ec808bcd991377efdf8eb8
kernel-debug-2.6.18-128.4.1.el5.i686.rpm SHA-256: 344c8d770c72b57bac49430250dec02e6a78369ab5152c937913640bef9fca64
kernel-debug-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: 93c1049ddd565213b4cfef7caeb15df9e589a6c2cb26ce1d45b552aff269b269
kernel-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: b72bee2e86545ba1602545399c00b9502e47497fd3a2ba49ec77fb9c2dcad57d
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.i386.rpm SHA-256: edf101812ee69cd87d334572fef3d0d10f6e97029db6803b85f62b8a8035d00b
kernel-xen-2.6.18-128.4.1.el5.i686.rpm SHA-256: 1c2b523afaa687f26f4b000940861a375f9f8672aa66a6af6b8f24c34f2632a4
kernel-xen-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: 1fe0e1514aebdf83780ae7d0de487e968fe6f5a4d8f1757374af677b1254a5d0

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-128.4.1.el5.src.rpm SHA-256: 5b42d7cf98a6694f0899aa5338398c0bd493dd36f14a679f39bf54a791f5de05
x86_64
kernel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 21ff74bd9d8cd3aac7c5ec272389be458bfff53c65b8facd5c51321cb115bd94
kernel-debug-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 36314a168674befbb39eaeeac0b7c2d92277c2d7b8aed6562b7e8c73e33e103a
kernel-debug-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 89365c5482c60d4cd6e99ea46e75616fdb44bbe79581e7f4a19c4419d42f3880
kernel-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 173fd78a13279f6b96063cb82852a89717bfeaa8ac9be1364e31ea4f37db010b
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 8991385520080a7581ed2a7ff66546611f60d7490aedebaca5820b734f7217a7
kernel-xen-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 2f8696c841d40c021b6abc7bcbf8e57ed61365737445954ef2302842d0aaec86
kernel-xen-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 7f7d5f1295284ae71edf7c2eea568875a83f6c0314fa801d3ab2b5724a24ef61
i386
kernel-2.6.18-128.4.1.el5.i686.rpm SHA-256: c33090285fc963faa9c1893b162422f2efb2d142c5b200aa357aa8a501b83ac8
kernel-PAE-2.6.18-128.4.1.el5.i686.rpm SHA-256: 6d5f567a5d6ccdf01f244507a5ec081f013ba07f47ad28894d47411b8f33b4da
kernel-PAE-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: b526e15dc9f2a6ec59833eb9bcc25624d3e7f1f285ec808bcd991377efdf8eb8
kernel-debug-2.6.18-128.4.1.el5.i686.rpm SHA-256: 344c8d770c72b57bac49430250dec02e6a78369ab5152c937913640bef9fca64
kernel-debug-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: 93c1049ddd565213b4cfef7caeb15df9e589a6c2cb26ce1d45b552aff269b269
kernel-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: b72bee2e86545ba1602545399c00b9502e47497fd3a2ba49ec77fb9c2dcad57d
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.i386.rpm SHA-256: edf101812ee69cd87d334572fef3d0d10f6e97029db6803b85f62b8a8035d00b
kernel-xen-2.6.18-128.4.1.el5.i686.rpm SHA-256: 1c2b523afaa687f26f4b000940861a375f9f8672aa66a6af6b8f24c34f2632a4
kernel-xen-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: 1fe0e1514aebdf83780ae7d0de487e968fe6f5a4d8f1757374af677b1254a5d0

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-128.4.1.el5.src.rpm SHA-256: 5b42d7cf98a6694f0899aa5338398c0bd493dd36f14a679f39bf54a791f5de05
x86_64
kernel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 21ff74bd9d8cd3aac7c5ec272389be458bfff53c65b8facd5c51321cb115bd94
kernel-debug-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 36314a168674befbb39eaeeac0b7c2d92277c2d7b8aed6562b7e8c73e33e103a
kernel-debug-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 89365c5482c60d4cd6e99ea46e75616fdb44bbe79581e7f4a19c4419d42f3880
kernel-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 173fd78a13279f6b96063cb82852a89717bfeaa8ac9be1364e31ea4f37db010b
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 8991385520080a7581ed2a7ff66546611f60d7490aedebaca5820b734f7217a7
kernel-xen-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 2f8696c841d40c021b6abc7bcbf8e57ed61365737445954ef2302842d0aaec86
kernel-xen-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 7f7d5f1295284ae71edf7c2eea568875a83f6c0314fa801d3ab2b5724a24ef61
i386
kernel-2.6.18-128.4.1.el5.i686.rpm SHA-256: c33090285fc963faa9c1893b162422f2efb2d142c5b200aa357aa8a501b83ac8
kernel-PAE-2.6.18-128.4.1.el5.i686.rpm SHA-256: 6d5f567a5d6ccdf01f244507a5ec081f013ba07f47ad28894d47411b8f33b4da
kernel-PAE-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: b526e15dc9f2a6ec59833eb9bcc25624d3e7f1f285ec808bcd991377efdf8eb8
kernel-debug-2.6.18-128.4.1.el5.i686.rpm SHA-256: 344c8d770c72b57bac49430250dec02e6a78369ab5152c937913640bef9fca64
kernel-debug-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: 93c1049ddd565213b4cfef7caeb15df9e589a6c2cb26ce1d45b552aff269b269
kernel-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: b72bee2e86545ba1602545399c00b9502e47497fd3a2ba49ec77fb9c2dcad57d
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.i386.rpm SHA-256: edf101812ee69cd87d334572fef3d0d10f6e97029db6803b85f62b8a8035d00b
kernel-xen-2.6.18-128.4.1.el5.i686.rpm SHA-256: 1c2b523afaa687f26f4b000940861a375f9f8672aa66a6af6b8f24c34f2632a4
kernel-xen-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: 1fe0e1514aebdf83780ae7d0de487e968fe6f5a4d8f1757374af677b1254a5d0

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-128.4.1.el5.src.rpm SHA-256: 5b42d7cf98a6694f0899aa5338398c0bd493dd36f14a679f39bf54a791f5de05
s390x
kernel-2.6.18-128.4.1.el5.s390x.rpm SHA-256: 011fde21259955fc5f55c6aa47852b430387ab85d42664cb249dff2149aa46b9
kernel-debug-2.6.18-128.4.1.el5.s390x.rpm SHA-256: adbd33d133cbc43afa98193bea60eb6cc75e8be08dbe59a6e023a3f292e5abcc
kernel-debug-devel-2.6.18-128.4.1.el5.s390x.rpm SHA-256: 17b23ab3d2517cb6218042ebd3694445e4fbf7a0abd9ed23f83464541a635064
kernel-devel-2.6.18-128.4.1.el5.s390x.rpm SHA-256: b5ad757a6ba243778e7f365e85d303871205d11015afcbb5fd9cf3e293d30c20
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.s390x.rpm SHA-256: d5137e795e8fde525bfa89730411815f3bf9920d30ab89f110be5d95def58ceb
kernel-kdump-2.6.18-128.4.1.el5.s390x.rpm SHA-256: 6d8c557e44f7e29b8a380c14d202f18f29946167024c848d9f923328c6a12139
kernel-kdump-devel-2.6.18-128.4.1.el5.s390x.rpm SHA-256: 5a1414820fd4eff98de48bc6dd81610be6393748792eb4e934230b0ccfc80adf

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-128.4.1.el5.src.rpm SHA-256: 5b42d7cf98a6694f0899aa5338398c0bd493dd36f14a679f39bf54a791f5de05
ppc
kernel-2.6.18-128.4.1.el5.ppc64.rpm SHA-256: bdefbf6c7d85b605a60395f25af4e414df0a196b1c659729c61f0704b4cd1acc
kernel-debug-2.6.18-128.4.1.el5.ppc64.rpm SHA-256: 66c01ddc7101415d1dea097ea53eaa60858e12696868b47da54274327e8dda4d
kernel-debug-devel-2.6.18-128.4.1.el5.ppc64.rpm SHA-256: 92efffd0d7bdfbdd709c28214eb4628bd747b9b50a94c0efb164e06cfc54dce9
kernel-devel-2.6.18-128.4.1.el5.ppc64.rpm SHA-256: 160ac3f7eaadd8b9f7960e036b15764563036823c25d94dfc9c1186857a117da
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.ppc.rpm SHA-256: 5682d4d056531938952e8d34a1b5538bc6bf3c474cddd23f63162be0b3ca2880
kernel-headers-2.6.18-128.4.1.el5.ppc64.rpm SHA-256: 721795c524807403b599241a51f967ea9edb406481d1af109073415a72fbb3fc
kernel-kdump-2.6.18-128.4.1.el5.ppc64.rpm SHA-256: 4afb8f7615b1508d6c0ff6405902e76d91e97abe297db9119bd1bd72ad6989e0
kernel-kdump-devel-2.6.18-128.4.1.el5.ppc64.rpm SHA-256: 82b8a1d97d343d41e888b9a83019994ae3875fff721cc5e652a906674411abc8

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-128.4.1.el5.src.rpm SHA-256: 5b42d7cf98a6694f0899aa5338398c0bd493dd36f14a679f39bf54a791f5de05
x86_64
kernel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 21ff74bd9d8cd3aac7c5ec272389be458bfff53c65b8facd5c51321cb115bd94
kernel-debug-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 36314a168674befbb39eaeeac0b7c2d92277c2d7b8aed6562b7e8c73e33e103a
kernel-debug-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 89365c5482c60d4cd6e99ea46e75616fdb44bbe79581e7f4a19c4419d42f3880
kernel-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 173fd78a13279f6b96063cb82852a89717bfeaa8ac9be1364e31ea4f37db010b
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 8991385520080a7581ed2a7ff66546611f60d7490aedebaca5820b734f7217a7
kernel-xen-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 2f8696c841d40c021b6abc7bcbf8e57ed61365737445954ef2302842d0aaec86
kernel-xen-devel-2.6.18-128.4.1.el5.x86_64.rpm SHA-256: 7f7d5f1295284ae71edf7c2eea568875a83f6c0314fa801d3ab2b5724a24ef61
i386
kernel-2.6.18-128.4.1.el5.i686.rpm SHA-256: c33090285fc963faa9c1893b162422f2efb2d142c5b200aa357aa8a501b83ac8
kernel-PAE-2.6.18-128.4.1.el5.i686.rpm SHA-256: 6d5f567a5d6ccdf01f244507a5ec081f013ba07f47ad28894d47411b8f33b4da
kernel-PAE-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: b526e15dc9f2a6ec59833eb9bcc25624d3e7f1f285ec808bcd991377efdf8eb8
kernel-debug-2.6.18-128.4.1.el5.i686.rpm SHA-256: 344c8d770c72b57bac49430250dec02e6a78369ab5152c937913640bef9fca64
kernel-debug-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: 93c1049ddd565213b4cfef7caeb15df9e589a6c2cb26ce1d45b552aff269b269
kernel-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: b72bee2e86545ba1602545399c00b9502e47497fd3a2ba49ec77fb9c2dcad57d
kernel-doc-2.6.18-128.4.1.el5.noarch.rpm SHA-256: 76f17853fe7e9c594f524431ae3435ef393b886daf72528135a911f8fcd5ccf9
kernel-headers-2.6.18-128.4.1.el5.i386.rpm SHA-256: edf101812ee69cd87d334572fef3d0d10f6e97029db6803b85f62b8a8035d00b
kernel-xen-2.6.18-128.4.1.el5.i686.rpm SHA-256: 1c2b523afaa687f26f4b000940861a375f9f8672aa66a6af6b8f24c34f2632a4
kernel-xen-devel-2.6.18-128.4.1.el5.i686.rpm SHA-256: 1fe0e1514aebdf83780ae7d0de487e968fe6f5a4d8f1757374af677b1254a5d0

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter