Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2009:1670 - Security Advisory
Issued:
2009-12-15
Updated:
2009-12-15

RHSA-2009:1670 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • NULL pointer dereference flaws in the r128 driver. Checks to test if the
    Concurrent Command Engine state was initialized were missing in private
    IOCTL functions. An attacker could use these flaws to cause a local denial
    of service or escalate their privileges. (CVE-2009-3620, Important)
  • a NULL pointer dereference flaw in the NFSv4 implementation. Several
    NFSv4 file locking functions failed to check whether a file had been opened
    on the server before performing locking operations on it. A local user on a
    system with an NFSv4 share mounted could possibly use this flaw to cause a
    denial of service or escalate their privileges. (CVE-2009-3726, Important)
  • a flaw in tcf_fill_node(). A certain data structure in this function was
    not initialized properly before being copied to user-space. This could lead
    to an information leak. (CVE-2009-3612, Moderate)
  • unix_stream_connect() did not check if a UNIX domain socket was in the
    shutdown state. This could lead to a deadlock. A local, unprivileged user
    could use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)

Knowledgebase DOC-20536 has steps to mitigate NULL pointer dereference
flaws.

Bug fixes:

  • frequently changing a CPU between online and offline caused a kernel
    panic on some systems. (BZ#545583)
  • for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent
    could receive incorrect data, preventing correct data transfer. (BZ#529308)
  • pciehp could not detect PCI Express hot plug slots on some systems.
    (BZ#530383)
  • soft lockups: inotify race and contention on dcache_lock. (BZ#533822,
    BZ#537019)
  • priority ordered lists are now used for threads waiting for a given
    mutex. (BZ#533858)
  • a deadlock in DLM could cause GFS2 file systems to lock up. (BZ#533859)
  • use-after-free bug in the audit subsystem crashed certain systems when
    running usermod. (BZ#533861)
  • on certain hardware configurations, a kernel panic when the Broadcom
    iSCSI offload driver (bnx2i.ko and cnic.ko) was loaded. (BZ#537014)
  • qla2xxx: Enabled MSI-X, and correctly handle the module parameter to
    control it. This improves performance for certain systems. (BZ#537020)
  • system crash when reading the cpuaffinity file on a system. (BZ#537346)
  • suspend-resume problems on systems with lots of logical CPUs, e.g. BX-EX.
    (BZ#539674)
  • off-by-one error in the legacy PCI bus check. (BZ#539675)
  • TSC was not made available on systems with multi-clustered APICs. This
    could cause slow performance for time-sensitive applications. (BZ#539676)
  • ACPI: ARB_DISABLE now disabled on platforms that do not need it.
    (BZ#539677)
  • fix node to core and power-aware scheduling issues, and a kernel panic
    during boot on certain AMD Opteron processors. (BZ#539678, BZ#540469,
    BZ#539680, BZ#539682)
  • APIC timer interrupt issues on some AMD Opteron systems prevented
    achieving full power savings. (BZ#539681)
  • general OProfile support for some newer Intel processors. (BZ#539683)
  • system crash during boot when NUMA is enabled on systems using MC and
    kernel-xen. (BZ#539684)
  • on some larger systems, performance issues due to a spinlock. (BZ#539685)
  • APIC errors when IOMMU is enabled on some AMD Opteron systems.
    (BZ#539687)
  • on some AMD Opteron systems, repeatedly taking a CPU offline then online
    caused a system hang. (BZ#539688)
  • I/O page fault errors on some systems. (BZ#539689)
  • certain memory configurations could cause the kernel-xen kernel to fail
    to boot on some AMD Opteron systems. (BZ#539690)
  • NMI watchdog is now disabled for offline CPUs. (BZ#539691)
  • duplicate directories in /proc/acpi/processor/ on BX-EX systems.
    (BZ#539692)
  • links did not come up when using bnx2x with certain Broadcom devices.
    (BZ#540381)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server - Extended Update Support 5.4 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.4 ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.4 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 528868 - CVE-2009-3612 kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7
  • BZ - 529227 - CVE-2009-3726 kernel: nfsv4: kernel panic in nfs4_proc_lock()
  • BZ - 529308 - [5.4]The errata 28 fix on LSI53C1030 hasn't been included yet. [rhel-5.4.z]
  • BZ - 529597 - CVE-2009-3620 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised
  • BZ - 529626 - CVE-2009-3621 kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket
  • BZ - 530383 - [5.3] PCIe hotplug slot detection failure [rhel-5.4.z]
  • BZ - 533822 - CRM 1908390 - BUG: warning at fs/inotify.c:181/set_dentry_child_flags() [rhel-5.4.z]
  • BZ - 533858 - threads on pthread_mutex_lock wake in fifo order, but posix specifies by priority [rhel-5.4.z]
  • BZ - 533859 - dlm_recv deadlock under memory pressure while processing GFP_KERNEL locks. [rhel-5.4.z]
  • BZ - 533861 - system crashes in audit_update_watch() [rhel-5.4.z]
  • BZ - 537014 - Panic on boot when loading iscsid with broadcom NIC [rhel-5.4.z]
  • BZ - 537019 - kernel: BUG: soft lockup with dcache_lock [rhel-5.4.z]
  • BZ - 537020 - [QLogic 5.4.z bug] qla2xxx - enable MSI-X and correct/cleanup irq request code [rhel-5.4.z]
  • BZ - 537346 - kernel: NULL pointer dereference in pci_bus_show_cpuaffinity() [rhel-5.4.z]
  • BZ - 539675 - [Intel 5.5 FEAT] Add ability to access Nehalem uncore config space [rhel-5.4.z]
  • BZ - 539676 - [Intel 5.5 FEAT] Support Intel multi-APIC-cluster systems [rhel-5.4.z]
  • BZ - 539677 - [Intel 5.5 FEAT] ACPI: Disable ARB_DISABLE on platforms where it is not needed [rhel-5.4.z]
  • BZ - 539678 - Fix node to core association [rhel-5.4.z]
  • BZ - 539680 - Fix Power-aware scheduling [rhel-5.4.z]
  • BZ - 539681 - Fix AMD erratum - server C1E [rhel-5.4.z]
  • BZ - 539682 - Fix kernel panic while booting RHEL5 32-bit kernel [rhel-5.4.z]
  • BZ - 539683 - [Intel 5.5 FEAT] Oprofile: Add support for arch perfmon - kernel component [rhel-5.4.z]
  • BZ - 539684 - EXPERIMENTAL EX/MC: Fix Xen NUMA [rhel-5.4.z]
  • BZ - 539685 - [Intel 5.5 FEAT] Fix spinlock issue which causes performance impact on large systems [rhel-5.4.z]
  • BZ - 539687 - EXPERIMENTAL MC/EX: Fix APIC error IOMMU issues [rhel-5.4.z]
  • BZ - 539688 - EXPERIMENTAL MC/EX: Issue when bringing CPU offline and online with 32-bit kernel [rhel-5.4.z]
  • BZ - 539689 - EXPERIMENTAL EX/MC: AMD IOMMU Linux driver with latest BIOS has IO PAGE FAULTS [rhel-5.4.z]
  • BZ - 539690 - EXPERIMENTAL MC/EX: Incorrect memory setup can cause Xen crash [rhel-5.4.z]
  • BZ - 539691 - [Intel 5.5 BUG] NMI and Watchdog are not disabled on CPU when CPU is off-lined [rhel-5.4.z]
  • BZ - 540381 - Broadcom Everest Dual port 10Gb with SFP+ (57711) NIC fails with no link [rhel-5.4.z]
  • BZ - 540469 - EXPERIMENTAL EX/MC: Fix node to core issue [rhel-5.4.z]
  • BZ - 545583 - kernel panic when doing cpu offline/online frequently on hp-dl785g5-01.rhts.eng.bos.redhat.com [rhel-5.4.z]

CVEs

  • CVE-2009-3612
  • CVE-2009-3621
  • CVE-2009-3620
  • CVE-2009-3726

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://kbase.redhat.com/faq/docs/DOC-20536
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
x86_64
kernel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 33eab2b9c0c3bb5ae348652ab11544ca19269f5d229442f876cad2757bf345e8
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: a5c4fe3a4a1cb10ee46dbb6e5b1cf01d55802c46934365f12c2242ea4475fb1b
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 4bc547dc18dc11f2f3fc5212342e63853c485fb2b0a8fb891d5818e74800c6aa
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: c07102a930a0a577c766d775f43e0636ed6a6a85480199d61421ef57b82f68cc
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 70020dc7bda134059143bc664831e1ec7bbc7259c0e735f6d70d3a5aa58aa8e2
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: bb08d90013fe25e1ed5be86cc9fe7ad570613cb1d573dc35119e81fde723540e
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 02cd15a395e57c1ff072566459e5380634acf6a911710f4ada4af87dcad923eb
ia64
kernel-2.6.18-164.9.1.el5.ia64.rpm SHA-256: dbd348b0d725d7d21f0a850c1822af60a8d01421f5f5230d43e16c4439244631
kernel-debug-2.6.18-164.9.1.el5.ia64.rpm SHA-256: 5980a32945fb969a3c5ae32f942127697dcb0cf7d92e87bfa3012f97b6f3cbad
kernel-debug-devel-2.6.18-164.9.1.el5.ia64.rpm SHA-256: acb9b1d0c9af75d78f35f23de5a7c741873e165bf3fbcb7aaa61b29da2e214de
kernel-devel-2.6.18-164.9.1.el5.ia64.rpm SHA-256: d47b20e07f350b87d61d0dbd0431e166b8a2de3f09a88d6fd707bbf71d8a82f1
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.ia64.rpm SHA-256: 27c41e8e4a937a06feed9590a5b4df98f63d3e44ee411a40e1fee081c8760d0b
kernel-xen-2.6.18-164.9.1.el5.ia64.rpm SHA-256: ec2afde345b6c5ff1d345e421b1a71df79b580be0fffb9ef38e9ab0c1cae1ded
kernel-xen-devel-2.6.18-164.9.1.el5.ia64.rpm SHA-256: bb19fa4a8518a30ebd3a3430f0d15eecdd2edaf6057ab32494434ab6bca0cdac
i386
kernel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 0900904c9257a435e38848a10df981845b26b046dd2f43d43974a8b62299fd1c
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm SHA-256: 49e65d57ce930e7394ac4805e5536a414592c249b696531c8c2bf704086b3745
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 97daf2b719d9c4c09238eb7c8edc5d0390b6a317d57d1226d4b5394844fe06eb
kernel-debug-2.6.18-164.9.1.el5.i686.rpm SHA-256: eda848a0089ad028e15e664700748f382349847d75e652240760e4675a2e42ed
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: edfeb327b688e373341d356ef1aa17ea3a5bf144edcfb124bc9d129dbe8fd411
kernel-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: f374fcb5e78fee2b90de8c92c31673e9bceb9e0bcca549ee489d49c384bf858e
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.i386.rpm SHA-256: e87810a1b11da2376e5763d9c341df87bee0ac7c275a392080c97bc1bd53efb0
kernel-xen-2.6.18-164.9.1.el5.i686.rpm SHA-256: 4bcd729c1c2fd171a24048d3ec107e3ff97a941e8311e2a554a1cbfc4e99db24
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 2531dba2afcb2faa0ef18bf579321effc437137185067c82fc299886684ce2a8

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
x86_64
kernel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 33eab2b9c0c3bb5ae348652ab11544ca19269f5d229442f876cad2757bf345e8
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: a5c4fe3a4a1cb10ee46dbb6e5b1cf01d55802c46934365f12c2242ea4475fb1b
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 4bc547dc18dc11f2f3fc5212342e63853c485fb2b0a8fb891d5818e74800c6aa
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: c07102a930a0a577c766d775f43e0636ed6a6a85480199d61421ef57b82f68cc
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 70020dc7bda134059143bc664831e1ec7bbc7259c0e735f6d70d3a5aa58aa8e2
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: bb08d90013fe25e1ed5be86cc9fe7ad570613cb1d573dc35119e81fde723540e
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 02cd15a395e57c1ff072566459e5380634acf6a911710f4ada4af87dcad923eb
i386
kernel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 0900904c9257a435e38848a10df981845b26b046dd2f43d43974a8b62299fd1c
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm SHA-256: 49e65d57ce930e7394ac4805e5536a414592c249b696531c8c2bf704086b3745
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 97daf2b719d9c4c09238eb7c8edc5d0390b6a317d57d1226d4b5394844fe06eb
kernel-debug-2.6.18-164.9.1.el5.i686.rpm SHA-256: eda848a0089ad028e15e664700748f382349847d75e652240760e4675a2e42ed
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: edfeb327b688e373341d356ef1aa17ea3a5bf144edcfb124bc9d129dbe8fd411
kernel-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: f374fcb5e78fee2b90de8c92c31673e9bceb9e0bcca549ee489d49c384bf858e
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.i386.rpm SHA-256: e87810a1b11da2376e5763d9c341df87bee0ac7c275a392080c97bc1bd53efb0
kernel-xen-2.6.18-164.9.1.el5.i686.rpm SHA-256: 4bcd729c1c2fd171a24048d3ec107e3ff97a941e8311e2a554a1cbfc4e99db24
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 2531dba2afcb2faa0ef18bf579321effc437137185067c82fc299886684ce2a8

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
x86_64
kernel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 33eab2b9c0c3bb5ae348652ab11544ca19269f5d229442f876cad2757bf345e8
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: a5c4fe3a4a1cb10ee46dbb6e5b1cf01d55802c46934365f12c2242ea4475fb1b
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 4bc547dc18dc11f2f3fc5212342e63853c485fb2b0a8fb891d5818e74800c6aa
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: c07102a930a0a577c766d775f43e0636ed6a6a85480199d61421ef57b82f68cc
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 70020dc7bda134059143bc664831e1ec7bbc7259c0e735f6d70d3a5aa58aa8e2
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: bb08d90013fe25e1ed5be86cc9fe7ad570613cb1d573dc35119e81fde723540e
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 02cd15a395e57c1ff072566459e5380634acf6a911710f4ada4af87dcad923eb
i386
kernel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 0900904c9257a435e38848a10df981845b26b046dd2f43d43974a8b62299fd1c
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm SHA-256: 49e65d57ce930e7394ac4805e5536a414592c249b696531c8c2bf704086b3745
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 97daf2b719d9c4c09238eb7c8edc5d0390b6a317d57d1226d4b5394844fe06eb
kernel-debug-2.6.18-164.9.1.el5.i686.rpm SHA-256: eda848a0089ad028e15e664700748f382349847d75e652240760e4675a2e42ed
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: edfeb327b688e373341d356ef1aa17ea3a5bf144edcfb124bc9d129dbe8fd411
kernel-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: f374fcb5e78fee2b90de8c92c31673e9bceb9e0bcca549ee489d49c384bf858e
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.i386.rpm SHA-256: e87810a1b11da2376e5763d9c341df87bee0ac7c275a392080c97bc1bd53efb0
kernel-xen-2.6.18-164.9.1.el5.i686.rpm SHA-256: 4bcd729c1c2fd171a24048d3ec107e3ff97a941e8311e2a554a1cbfc4e99db24
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 2531dba2afcb2faa0ef18bf579321effc437137185067c82fc299886684ce2a8

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
s390x
kernel-2.6.18-164.9.1.el5.s390x.rpm SHA-256: 409765aeec274d7c32c2bd001e2eec5ebaeccb227ad82088afc31ee2d00a8eba
kernel-debug-2.6.18-164.9.1.el5.s390x.rpm SHA-256: 788b8a08eda6058b30290ce16bb31258a2914a00a2c2900cbed97c4da4623c55
kernel-debug-devel-2.6.18-164.9.1.el5.s390x.rpm SHA-256: f9322c12c2c1c5825fe9d00a024c64170ba3eeee0f88d7ef5206ff2db3b1fb25
kernel-devel-2.6.18-164.9.1.el5.s390x.rpm SHA-256: 59997588de36884321d501ef12407d639597a69c72cbe55da7e2f6f1091d0576
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.s390x.rpm SHA-256: 3648322dd85788f82594f04b1b8ff9880774379a0d1591d29a14ebd415259d1a
kernel-kdump-2.6.18-164.9.1.el5.s390x.rpm SHA-256: f1ebf1cc7fb7f4097692eb27ed713012a36a87f7cb2787d20e9725dc77a8d140
kernel-kdump-devel-2.6.18-164.9.1.el5.s390x.rpm SHA-256: fc270645be546da353c3b529b7da6cf5db1378de33f350deade5a593f3d90dbe

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
ppc
kernel-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: e9ed7e8c8347b5ed97e86dbbc8adf0adee37b755c068facd8148282f040338b4
kernel-debug-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: fe1d848364566217d45e5a775e3478448124b2fe26acdce4773a98dd7d0424d7
kernel-debug-devel-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: a8d1526fdfa9ab56c779577508c172e7d5a4bdb19ed912b68376a2ce96d369ec
kernel-devel-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: 8f656fe34820286659a256062846980bff007a43e24975d30dd8d3a21ad4f36d
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.ppc.rpm SHA-256: 1a28e1dac280caf8c9c944bdf9514c7e29d0502edc23be22132bbba8f4454a71
kernel-headers-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: c4bffb2cfa38139e8d7d6c3f41b266d5790aa87376e9c217b7bd96fcd8520dd1
kernel-kdump-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: 338b8b988a75628de0fc2ff8924903a334af5646331ef1a9464001ca28f7d225
kernel-kdump-devel-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: cad7667c4bea79a4f4e7818673f2592837b30f785e0e6ac7c854f1e6dcd02538

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
x86_64
kernel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 33eab2b9c0c3bb5ae348652ab11544ca19269f5d229442f876cad2757bf345e8
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: a5c4fe3a4a1cb10ee46dbb6e5b1cf01d55802c46934365f12c2242ea4475fb1b
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 4bc547dc18dc11f2f3fc5212342e63853c485fb2b0a8fb891d5818e74800c6aa
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: c07102a930a0a577c766d775f43e0636ed6a6a85480199d61421ef57b82f68cc
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 70020dc7bda134059143bc664831e1ec7bbc7259c0e735f6d70d3a5aa58aa8e2
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: bb08d90013fe25e1ed5be86cc9fe7ad570613cb1d573dc35119e81fde723540e
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 02cd15a395e57c1ff072566459e5380634acf6a911710f4ada4af87dcad923eb
i386
kernel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 0900904c9257a435e38848a10df981845b26b046dd2f43d43974a8b62299fd1c
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm SHA-256: 49e65d57ce930e7394ac4805e5536a414592c249b696531c8c2bf704086b3745
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 97daf2b719d9c4c09238eb7c8edc5d0390b6a317d57d1226d4b5394844fe06eb
kernel-debug-2.6.18-164.9.1.el5.i686.rpm SHA-256: eda848a0089ad028e15e664700748f382349847d75e652240760e4675a2e42ed
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: edfeb327b688e373341d356ef1aa17ea3a5bf144edcfb124bc9d129dbe8fd411
kernel-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: f374fcb5e78fee2b90de8c92c31673e9bceb9e0bcca549ee489d49c384bf858e
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.i386.rpm SHA-256: e87810a1b11da2376e5763d9c341df87bee0ac7c275a392080c97bc1bd53efb0
kernel-xen-2.6.18-164.9.1.el5.i686.rpm SHA-256: 4bcd729c1c2fd171a24048d3ec107e3ff97a941e8311e2a554a1cbfc4e99db24
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 2531dba2afcb2faa0ef18bf579321effc437137185067c82fc299886684ce2a8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+