Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:1670 - Security Advisory
Issued:
2009-12-15
Updated:
2009-12-15

RHSA-2009:1670 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • NULL pointer dereference flaws in the r128 driver. Checks to test if the

Concurrent Command Engine state was initialized were missing in private
IOCTL functions. An attacker could use these flaws to cause a local denial
of service or escalate their privileges. (CVE-2009-3620, Important)

  • a NULL pointer dereference flaw in the NFSv4 implementation. Several

NFSv4 file locking functions failed to check whether a file had been opened
on the server before performing locking operations on it. A local user on a
system with an NFSv4 share mounted could possibly use this flaw to cause a
denial of service or escalate their privileges. (CVE-2009-3726, Important)

  • a flaw in tcf_fill_node(). A certain data structure in this function was

not initialized properly before being copied to user-space. This could lead
to an information leak. (CVE-2009-3612, Moderate)

  • unix_stream_connect() did not check if a UNIX domain socket was in the

shutdown state. This could lead to a deadlock. A local, unprivileged user
could use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)

Knowledgebase DOC-20536 has steps to mitigate NULL pointer dereference
flaws.

Bug fixes:

  • frequently changing a CPU between online and offline caused a kernel

panic on some systems. (BZ#545583)

  • for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent

could receive incorrect data, preventing correct data transfer. (BZ#529308)

  • pciehp could not detect PCI Express hot plug slots on some systems.

(BZ#530383)

  • soft lockups: inotify race and contention on dcache_lock. (BZ#533822,

BZ#537019)

  • priority ordered lists are now used for threads waiting for a given

mutex. (BZ#533858)

  • a deadlock in DLM could cause GFS2 file systems to lock up. (BZ#533859)
  • use-after-free bug in the audit subsystem crashed certain systems when

running usermod. (BZ#533861)

  • on certain hardware configurations, a kernel panic when the Broadcom

iSCSI offload driver (bnx2i.ko and cnic.ko) was loaded. (BZ#537014)

  • qla2xxx: Enabled MSI-X, and correctly handle the module parameter to

control it. This improves performance for certain systems. (BZ#537020)

  • system crash when reading the cpuaffinity file on a system. (BZ#537346)
  • suspend-resume problems on systems with lots of logical CPUs, e.g. BX-EX.

(BZ#539674)

  • off-by-one error in the legacy PCI bus check. (BZ#539675)
  • TSC was not made available on systems with multi-clustered APICs. This

could cause slow performance for time-sensitive applications. (BZ#539676)

  • ACPI: ARB_DISABLE now disabled on platforms that do not need it.

(BZ#539677)

  • fix node to core and power-aware scheduling issues, and a kernel panic

during boot on certain AMD Opteron processors. (BZ#539678, BZ#540469,
BZ#539680, BZ#539682)

  • APIC timer interrupt issues on some AMD Opteron systems prevented

achieving full power savings. (BZ#539681)

  • general OProfile support for some newer Intel processors. (BZ#539683)
  • system crash during boot when NUMA is enabled on systems using MC and

kernel-xen. (BZ#539684)

  • on some larger systems, performance issues due to a spinlock. (BZ#539685)
  • APIC errors when IOMMU is enabled on some AMD Opteron systems.

(BZ#539687)

  • on some AMD Opteron systems, repeatedly taking a CPU offline then online

caused a system hang. (BZ#539688)

  • I/O page fault errors on some systems. (BZ#539689)
  • certain memory configurations could cause the kernel-xen kernel to fail

to boot on some AMD Opteron systems. (BZ#539690)

  • NMI watchdog is now disabled for offline CPUs. (BZ#539691)
  • duplicate directories in /proc/acpi/processor/ on BX-EX systems.

(BZ#539692)

  • links did not come up when using bnx2x with certain Broadcom devices.

(BZ#540381)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 528868 - CVE-2009-3612 kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7
  • BZ - 529227 - CVE-2009-3726 kernel: nfsv4: kernel panic in nfs4_proc_lock()
  • BZ - 529308 - [5.4]The errata 28 fix on LSI53C1030 hasn't been included yet. [rhel-5.4.z]
  • BZ - 529597 - CVE-2009-3620 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised
  • BZ - 529626 - CVE-2009-3621 kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket
  • BZ - 530383 - [5.3] PCIe hotplug slot detection failure [rhel-5.4.z]
  • BZ - 533822 - CRM 1908390 - BUG: warning at fs/inotify.c:181/set_dentry_child_flags() [rhel-5.4.z]
  • BZ - 533858 - threads on pthread_mutex_lock wake in fifo order, but posix specifies by priority [rhel-5.4.z]
  • BZ - 533859 - dlm_recv deadlock under memory pressure while processing GFP_KERNEL locks. [rhel-5.4.z]
  • BZ - 533861 - system crashes in audit_update_watch() [rhel-5.4.z]
  • BZ - 537014 - Panic on boot when loading iscsid with broadcom NIC [rhel-5.4.z]
  • BZ - 537019 - kernel: BUG: soft lockup with dcache_lock [rhel-5.4.z]
  • BZ - 537020 - [QLogic 5.4.z bug] qla2xxx - enable MSI-X and correct/cleanup irq request code [rhel-5.4.z]
  • BZ - 537346 - kernel: NULL pointer dereference in pci_bus_show_cpuaffinity() [rhel-5.4.z]
  • BZ - 539675 - [Intel 5.5 FEAT] Add ability to access Nehalem uncore config space [rhel-5.4.z]
  • BZ - 539676 - [Intel 5.5 FEAT] Support Intel multi-APIC-cluster systems [rhel-5.4.z]
  • BZ - 539677 - [Intel 5.5 FEAT] ACPI: Disable ARB_DISABLE on platforms where it is not needed [rhel-5.4.z]
  • BZ - 539678 - Fix node to core association [rhel-5.4.z]
  • BZ - 539680 - Fix Power-aware scheduling [rhel-5.4.z]
  • BZ - 539681 - Fix AMD erratum - server C1E [rhel-5.4.z]
  • BZ - 539682 - Fix kernel panic while booting RHEL5 32-bit kernel [rhel-5.4.z]
  • BZ - 539683 - [Intel 5.5 FEAT] Oprofile: Add support for arch perfmon - kernel component [rhel-5.4.z]
  • BZ - 539684 - EXPERIMENTAL EX/MC: Fix Xen NUMA [rhel-5.4.z]
  • BZ - 539685 - [Intel 5.5 FEAT] Fix spinlock issue which causes performance impact on large systems [rhel-5.4.z]
  • BZ - 539687 - EXPERIMENTAL MC/EX: Fix APIC error IOMMU issues [rhel-5.4.z]
  • BZ - 539688 - EXPERIMENTAL MC/EX: Issue when bringing CPU offline and online with 32-bit kernel [rhel-5.4.z]
  • BZ - 539689 - EXPERIMENTAL EX/MC: AMD IOMMU Linux driver with latest BIOS has IO PAGE FAULTS [rhel-5.4.z]
  • BZ - 539690 - EXPERIMENTAL MC/EX: Incorrect memory setup can cause Xen crash [rhel-5.4.z]
  • BZ - 539691 - [Intel 5.5 BUG] NMI and Watchdog are not disabled on CPU when CPU is off-lined [rhel-5.4.z]
  • BZ - 540381 - Broadcom Everest Dual port 10Gb with SFP+ (57711) NIC fails with no link [rhel-5.4.z]
  • BZ - 540469 - EXPERIMENTAL EX/MC: Fix node to core issue [rhel-5.4.z]
  • BZ - 545583 - kernel panic when doing cpu offline/online frequently on hp-dl785g5-01.rhts.eng.bos.redhat.com [rhel-5.4.z]

CVEs

  • CVE-2009-3612
  • CVE-2009-3621
  • CVE-2009-3620
  • CVE-2009-3726

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://kbase.redhat.com/faq/docs/DOC-20536
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
x86_64
kernel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 33eab2b9c0c3bb5ae348652ab11544ca19269f5d229442f876cad2757bf345e8
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: a5c4fe3a4a1cb10ee46dbb6e5b1cf01d55802c46934365f12c2242ea4475fb1b
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 4bc547dc18dc11f2f3fc5212342e63853c485fb2b0a8fb891d5818e74800c6aa
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: c07102a930a0a577c766d775f43e0636ed6a6a85480199d61421ef57b82f68cc
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 70020dc7bda134059143bc664831e1ec7bbc7259c0e735f6d70d3a5aa58aa8e2
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: bb08d90013fe25e1ed5be86cc9fe7ad570613cb1d573dc35119e81fde723540e
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 02cd15a395e57c1ff072566459e5380634acf6a911710f4ada4af87dcad923eb
ia64
kernel-2.6.18-164.9.1.el5.ia64.rpm SHA-256: dbd348b0d725d7d21f0a850c1822af60a8d01421f5f5230d43e16c4439244631
kernel-debug-2.6.18-164.9.1.el5.ia64.rpm SHA-256: 5980a32945fb969a3c5ae32f942127697dcb0cf7d92e87bfa3012f97b6f3cbad
kernel-debug-devel-2.6.18-164.9.1.el5.ia64.rpm SHA-256: acb9b1d0c9af75d78f35f23de5a7c741873e165bf3fbcb7aaa61b29da2e214de
kernel-devel-2.6.18-164.9.1.el5.ia64.rpm SHA-256: d47b20e07f350b87d61d0dbd0431e166b8a2de3f09a88d6fd707bbf71d8a82f1
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.ia64.rpm SHA-256: 27c41e8e4a937a06feed9590a5b4df98f63d3e44ee411a40e1fee081c8760d0b
kernel-xen-2.6.18-164.9.1.el5.ia64.rpm SHA-256: ec2afde345b6c5ff1d345e421b1a71df79b580be0fffb9ef38e9ab0c1cae1ded
kernel-xen-devel-2.6.18-164.9.1.el5.ia64.rpm SHA-256: bb19fa4a8518a30ebd3a3430f0d15eecdd2edaf6057ab32494434ab6bca0cdac
i386
kernel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 0900904c9257a435e38848a10df981845b26b046dd2f43d43974a8b62299fd1c
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm SHA-256: 49e65d57ce930e7394ac4805e5536a414592c249b696531c8c2bf704086b3745
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 97daf2b719d9c4c09238eb7c8edc5d0390b6a317d57d1226d4b5394844fe06eb
kernel-debug-2.6.18-164.9.1.el5.i686.rpm SHA-256: eda848a0089ad028e15e664700748f382349847d75e652240760e4675a2e42ed
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: edfeb327b688e373341d356ef1aa17ea3a5bf144edcfb124bc9d129dbe8fd411
kernel-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: f374fcb5e78fee2b90de8c92c31673e9bceb9e0bcca549ee489d49c384bf858e
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.i386.rpm SHA-256: e87810a1b11da2376e5763d9c341df87bee0ac7c275a392080c97bc1bd53efb0
kernel-xen-2.6.18-164.9.1.el5.i686.rpm SHA-256: 4bcd729c1c2fd171a24048d3ec107e3ff97a941e8311e2a554a1cbfc4e99db24
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 2531dba2afcb2faa0ef18bf579321effc437137185067c82fc299886684ce2a8

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
x86_64
kernel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 33eab2b9c0c3bb5ae348652ab11544ca19269f5d229442f876cad2757bf345e8
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: a5c4fe3a4a1cb10ee46dbb6e5b1cf01d55802c46934365f12c2242ea4475fb1b
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 4bc547dc18dc11f2f3fc5212342e63853c485fb2b0a8fb891d5818e74800c6aa
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: c07102a930a0a577c766d775f43e0636ed6a6a85480199d61421ef57b82f68cc
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 70020dc7bda134059143bc664831e1ec7bbc7259c0e735f6d70d3a5aa58aa8e2
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: bb08d90013fe25e1ed5be86cc9fe7ad570613cb1d573dc35119e81fde723540e
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 02cd15a395e57c1ff072566459e5380634acf6a911710f4ada4af87dcad923eb
i386
kernel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 0900904c9257a435e38848a10df981845b26b046dd2f43d43974a8b62299fd1c
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm SHA-256: 49e65d57ce930e7394ac4805e5536a414592c249b696531c8c2bf704086b3745
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 97daf2b719d9c4c09238eb7c8edc5d0390b6a317d57d1226d4b5394844fe06eb
kernel-debug-2.6.18-164.9.1.el5.i686.rpm SHA-256: eda848a0089ad028e15e664700748f382349847d75e652240760e4675a2e42ed
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: edfeb327b688e373341d356ef1aa17ea3a5bf144edcfb124bc9d129dbe8fd411
kernel-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: f374fcb5e78fee2b90de8c92c31673e9bceb9e0bcca549ee489d49c384bf858e
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.i386.rpm SHA-256: e87810a1b11da2376e5763d9c341df87bee0ac7c275a392080c97bc1bd53efb0
kernel-xen-2.6.18-164.9.1.el5.i686.rpm SHA-256: 4bcd729c1c2fd171a24048d3ec107e3ff97a941e8311e2a554a1cbfc4e99db24
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 2531dba2afcb2faa0ef18bf579321effc437137185067c82fc299886684ce2a8

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
x86_64
kernel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 33eab2b9c0c3bb5ae348652ab11544ca19269f5d229442f876cad2757bf345e8
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: a5c4fe3a4a1cb10ee46dbb6e5b1cf01d55802c46934365f12c2242ea4475fb1b
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 4bc547dc18dc11f2f3fc5212342e63853c485fb2b0a8fb891d5818e74800c6aa
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: c07102a930a0a577c766d775f43e0636ed6a6a85480199d61421ef57b82f68cc
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 70020dc7bda134059143bc664831e1ec7bbc7259c0e735f6d70d3a5aa58aa8e2
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: bb08d90013fe25e1ed5be86cc9fe7ad570613cb1d573dc35119e81fde723540e
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 02cd15a395e57c1ff072566459e5380634acf6a911710f4ada4af87dcad923eb
i386
kernel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 0900904c9257a435e38848a10df981845b26b046dd2f43d43974a8b62299fd1c
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm SHA-256: 49e65d57ce930e7394ac4805e5536a414592c249b696531c8c2bf704086b3745
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 97daf2b719d9c4c09238eb7c8edc5d0390b6a317d57d1226d4b5394844fe06eb
kernel-debug-2.6.18-164.9.1.el5.i686.rpm SHA-256: eda848a0089ad028e15e664700748f382349847d75e652240760e4675a2e42ed
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: edfeb327b688e373341d356ef1aa17ea3a5bf144edcfb124bc9d129dbe8fd411
kernel-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: f374fcb5e78fee2b90de8c92c31673e9bceb9e0bcca549ee489d49c384bf858e
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.i386.rpm SHA-256: e87810a1b11da2376e5763d9c341df87bee0ac7c275a392080c97bc1bd53efb0
kernel-xen-2.6.18-164.9.1.el5.i686.rpm SHA-256: 4bcd729c1c2fd171a24048d3ec107e3ff97a941e8311e2a554a1cbfc4e99db24
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 2531dba2afcb2faa0ef18bf579321effc437137185067c82fc299886684ce2a8

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
s390x
kernel-2.6.18-164.9.1.el5.s390x.rpm SHA-256: 409765aeec274d7c32c2bd001e2eec5ebaeccb227ad82088afc31ee2d00a8eba
kernel-debug-2.6.18-164.9.1.el5.s390x.rpm SHA-256: 788b8a08eda6058b30290ce16bb31258a2914a00a2c2900cbed97c4da4623c55
kernel-debug-devel-2.6.18-164.9.1.el5.s390x.rpm SHA-256: f9322c12c2c1c5825fe9d00a024c64170ba3eeee0f88d7ef5206ff2db3b1fb25
kernel-devel-2.6.18-164.9.1.el5.s390x.rpm SHA-256: 59997588de36884321d501ef12407d639597a69c72cbe55da7e2f6f1091d0576
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.s390x.rpm SHA-256: 3648322dd85788f82594f04b1b8ff9880774379a0d1591d29a14ebd415259d1a
kernel-kdump-2.6.18-164.9.1.el5.s390x.rpm SHA-256: f1ebf1cc7fb7f4097692eb27ed713012a36a87f7cb2787d20e9725dc77a8d140
kernel-kdump-devel-2.6.18-164.9.1.el5.s390x.rpm SHA-256: fc270645be546da353c3b529b7da6cf5db1378de33f350deade5a593f3d90dbe

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
ppc
kernel-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: e9ed7e8c8347b5ed97e86dbbc8adf0adee37b755c068facd8148282f040338b4
kernel-debug-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: fe1d848364566217d45e5a775e3478448124b2fe26acdce4773a98dd7d0424d7
kernel-debug-devel-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: a8d1526fdfa9ab56c779577508c172e7d5a4bdb19ed912b68376a2ce96d369ec
kernel-devel-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: 8f656fe34820286659a256062846980bff007a43e24975d30dd8d3a21ad4f36d
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.ppc.rpm SHA-256: 1a28e1dac280caf8c9c944bdf9514c7e29d0502edc23be22132bbba8f4454a71
kernel-headers-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: c4bffb2cfa38139e8d7d6c3f41b266d5790aa87376e9c217b7bd96fcd8520dd1
kernel-kdump-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: 338b8b988a75628de0fc2ff8924903a334af5646331ef1a9464001ca28f7d225
kernel-kdump-devel-2.6.18-164.9.1.el5.ppc64.rpm SHA-256: cad7667c4bea79a4f4e7818673f2592837b30f785e0e6ac7c854f1e6dcd02538

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-164.9.1.el5.src.rpm SHA-256: 8674c9cfca76103114a6a7a39c2cb5f55f21f7a1a3670aba1781efd3e58960c6
x86_64
kernel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 33eab2b9c0c3bb5ae348652ab11544ca19269f5d229442f876cad2757bf345e8
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: a5c4fe3a4a1cb10ee46dbb6e5b1cf01d55802c46934365f12c2242ea4475fb1b
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 4bc547dc18dc11f2f3fc5212342e63853c485fb2b0a8fb891d5818e74800c6aa
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: c07102a930a0a577c766d775f43e0636ed6a6a85480199d61421ef57b82f68cc
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 70020dc7bda134059143bc664831e1ec7bbc7259c0e735f6d70d3a5aa58aa8e2
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: bb08d90013fe25e1ed5be86cc9fe7ad570613cb1d573dc35119e81fde723540e
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm SHA-256: 02cd15a395e57c1ff072566459e5380634acf6a911710f4ada4af87dcad923eb
i386
kernel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 0900904c9257a435e38848a10df981845b26b046dd2f43d43974a8b62299fd1c
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm SHA-256: 49e65d57ce930e7394ac4805e5536a414592c249b696531c8c2bf704086b3745
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 97daf2b719d9c4c09238eb7c8edc5d0390b6a317d57d1226d4b5394844fe06eb
kernel-debug-2.6.18-164.9.1.el5.i686.rpm SHA-256: eda848a0089ad028e15e664700748f382349847d75e652240760e4675a2e42ed
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: edfeb327b688e373341d356ef1aa17ea3a5bf144edcfb124bc9d129dbe8fd411
kernel-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: f374fcb5e78fee2b90de8c92c31673e9bceb9e0bcca549ee489d49c384bf858e
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm SHA-256: eef3567009b964c676c9d76bd3bcefdc61474d5298f828effad959db5488ba43
kernel-headers-2.6.18-164.9.1.el5.i386.rpm SHA-256: e87810a1b11da2376e5763d9c341df87bee0ac7c275a392080c97bc1bd53efb0
kernel-xen-2.6.18-164.9.1.el5.i686.rpm SHA-256: 4bcd729c1c2fd171a24048d3ec107e3ff97a941e8311e2a554a1cbfc4e99db24
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm SHA-256: 2531dba2afcb2faa0ef18bf579321effc437137185067c82fc299886684ce2a8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility