Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2010:0046 - Security Advisory
Issued:
2010-01-19
Updated:
2010-01-19

RHSA-2010:0046 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • an array index error was found in the gdth driver. A local user could

send a specially-crafted IOCTL request that would cause a denial of service
or, possibly, privilege escalation. (CVE-2009-3080, Important)

  • a flaw was found in the FUSE implementation. When a system is low on

memory, fuse_put_request() could dereference an invalid pointer, possibly
leading to a local denial of service or privilege escalation.
(CVE-2009-4021, Important)

  • Tavis Ormandy discovered a deficiency in the fasync_helper()

implementation. This could allow a local, unprivileged user to leverage a
use-after-free of locked, asynchronous file descriptors to cause a denial
of service or privilege escalation. (CVE-2009-4141, Important)

  • the Parallels Virtuozzo Containers team reported the RHSA-2009:1243

update introduced two flaws in the routing implementation. If an attacker
was able to cause a large enough number of collisions in the routing hash
table (via specially-crafted packets) for the emergency route flush to
trigger, a deadlock could occur. Secondly, if the kernel routing cache was
disabled, an uninitialized pointer would be left behind after a route
lookup, leading to a kernel panic. (CVE-2009-4272, Important)

  • the RHSA-2009:0225 update introduced a rewrite attack flaw in the

do_coredump() function. A local attacker able to guess the file name a
process is going to dump its core to, prior to the process crashing, could
use this flaw to append data to the dumped core file. This issue only
affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the
default value is 0). (CVE-2006-6304, Moderate)

The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable
set to 2, the core file will not be recorded if the file already exists.
For example, core files will not be overwritten on subsequent crashes of
processes whose core files map to the same name.

  • an information leak was found in the Linux kernel. On AMD64 systems,

32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)

  • the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)

support in the qla2xxx driver, resulting in two new sysfs pseudo files,
"/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete".
These two files were world-writable by default, allowing a local user to
change SCSI host attributes. This flaw only affects systems using the
qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)

  • permission issues were found in the megaraid_sas driver. The "dbg_lvl"

and "poll_mode_io" files on the sysfs file system ("/sys/") had
world-writable permissions. This could allow local, unprivileged users to
change the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)

  • a NULL pointer dereference flaw was found in the firewire-ohci driver

used for OHCI compliant IEEE 1394 controllers. A local, unprivileged user
with access to /dev/fw* files could issue certain IOCTL calls, causing a
denial of service or privilege escalation. The FireWire modules are
blacklisted by default, and if enabled, only root has access to the files
noted above by default. (CVE-2009-4138, Moderate)

  • a buffer overflow flaw was found in the hfs_bnode_read() function in the

HFS file system implementation. This could lead to a denial of service if a
user browsed a specially-crafted HFS file system, for example, by running
"ls". (CVE-2009-4020, Low)

Bug fix documentation for this update will be available shortly from
www.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/
index.html

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 526068 - CVE-2009-3889 CVE-2009-3939 kernel: megaraid_sas permissions in sysfs
  • BZ - 526788 - CVE-2009-2910 kernel: x86_64 32 bit process register leak
  • BZ - 537027 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour [rhel-5.4.z]
  • BZ - 537177 - CVE-2009-3556 kernel: qla2xxx NPIV vport management pseudofiles are world writable
  • BZ - 537273 - CVE-2006-6304 kernel: use flag in do_coredump()
  • BZ - 538734 - CVE-2009-4021 kernel: fuse: prevent fuse_put_request on invalid pointer
  • BZ - 539414 - CVE-2009-3080 kernel: gdth: Prevent negative offsets in ioctl
  • BZ - 539686 - bnx2: panic in bnx2_poll_work() [rhel-5.4.z]
  • BZ - 540736 - CVE-2009-4020 kernel: hfs buffer overflow
  • BZ - 540896 - PV clock fix throws off database application time [rhel-5.4.z]
  • BZ - 542582 - kdump corefile cannot be backtraced in IA64 [rhel-5.4.z]
  • BZ - 543448 - Using IPoIB, losing connectivity with 1 host, other hosts accessible [rhel-5.4.z]
  • BZ - 544978 - glock_workqueue -- glock ref count via gfs2_glock_hold [rhel-5.4.z]
  • BZ - 545411 - CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock
  • BZ - 547236 - CVE-2009-4138 kernel: firewire: ohci: handle receive packets with a data length of zero
  • BZ - 547521 - CRM#1971672, Data loss in GFS2 when multiple nodes writes to same file [rhel-5.4.z]
  • BZ - 547530 - kernel: BUG: soft lockup - CPU#1 stuck for 13s! [httpd:4490] [rhel-5.4.z]
  • BZ - 547906 - CVE-2009-4141 kernel: create_elf_tables can leave urandom in a bad state
  • BZ - 548370 - kernel: sleeping vfs_check_frozen in called in atomic context from do_wp_page [rhel-5.4.z]
  • BZ - 549905 - hvm, x86_64 guest panic on 2.6.18-164.9.1.el5 [rhel-5.4.z]
  • BZ - 549906 - [NetApp 5.4.z bug] Emulex FC ports on RHEL 5.4 GA offlined during target controller faults [rhel-5.4.z]
  • BZ - 549907 - Hang when echoing to /proc/sys/net/ipv4/route/secret_interval [rhel-5.4.z]
  • BZ - 549908 - resize2fs online resize hangs [rhel-5.4.z]
  • BZ - 550968 - RHEL5.4 guest with PV clock: inconsistent times returned by clock_gettime(CLOCK_REALTIME) and gettimeofday() [rhel-5.4.z]

CVEs

  • CVE-2009-2910
  • CVE-2009-3939
  • CVE-2009-3889
  • CVE-2009-4138
  • CVE-2009-4272
  • CVE-2009-3080
  • CVE-2009-4141
  • CVE-2009-3556
  • CVE-2009-4020
  • CVE-2009-4021
  • CVE-2006-6304

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://kbase.redhat.com/faq/docs/DOC-20536
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
x86_64
kernel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: baed8de8372b4dca687e45256520cddfd92fcb7ea13017e584d7f0830b75befc
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 5e56cb036ecac693dfeaba9e1716079124a88f34739e9dccf4ef2462c638105c
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 4e9ffb9fe2498884b03bc519e05ae7bab65e2490733c5906ab5505e842a90bba
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 370cf4e9620dc82ad948d2d78065bc9aef34274136ca7eeeb6d54ee05952796c
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: bb36ea06b8a11318bc362c1361dbc9d530574cf7246f177763c10bbbe6cdabb4
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: d72118c9058b6316c057de55eb00d1499d1eedc4a262304730f2a083ad206a09
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: a3795bbd5dfa705090341cf42f6a5bed233ff1f75185fc78d76451c4cf2241f7
ia64
kernel-2.6.18-164.11.1.el5.ia64.rpm SHA-256: ff1622669dc0ec747133b075d09d6f76c379f110c51f70b913f3ca5466a97b58
kernel-debug-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 5457e5757ef8ea2bddc02c0916049b6bdd7a09ba789a7a663c383562e66e057d
kernel-debug-devel-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 49d6386c5c5c13fe21dad06ab042486de3a56bb5c4343e6bbce293fbdceb9fca
kernel-devel-2.6.18-164.11.1.el5.ia64.rpm SHA-256: b2ea9fe11ecdc8851d2df5f886f5e62bbc6fc2b6e1725340ac81f91c6963e3e3
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 3d98bb5abf6729d1763f6c80969288e7df17203ca3b033abb46a052064c5db26
kernel-xen-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 45183f7523cec9dbe170960b76e40b0c19f592b83c872402f64389415bf71491
kernel-xen-devel-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 0e91948dc4a34289fa84359bd1c098771653e5fe29a439cd8c4e1581fa66f25e
i386
kernel-2.6.18-164.11.1.el5.i686.rpm SHA-256: a9e0dbea13a28d3115a12be509494d83d859afb0a30f32226aee44d82295f562
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm SHA-256: 903ed5b1251d4870761b3b2212eba6b45aaabe4c5258468f4bee2d073dbcef18
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: e396dbaf468f974e98e8a84adcae4b64c04fcd7bb70cab1ea6734dda5884f3d8
kernel-debug-2.6.18-164.11.1.el5.i686.rpm SHA-256: ffd39f0cac297c1d8b67ec6d5911a49d77c6af75ea08f7731d3aeb7fd7b98bab
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: f86a62dd0e7ac29607c01f502e58dcb08c75c9c77c7208eb153142ea28aaf9f0
kernel-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: 7e451b4901990e789d86f608e2325d525ebc96060405bb0d58304b3b180e8484
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.i386.rpm SHA-256: 1260d1b5d61ea5849eb40d9e503e9f73890d19d0ce28a3bb6a95df536484d611
kernel-xen-2.6.18-164.11.1.el5.i686.rpm SHA-256: aedf398fc363abb3f4b5533744e9d22c7088d8b6fb8f4dd97ae1cfe80d784a6a
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: ab487daf30e63fb45de773792bb19300d1b1dc7d341fbf8ec3876b2965f91ab7

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
x86_64
kernel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: baed8de8372b4dca687e45256520cddfd92fcb7ea13017e584d7f0830b75befc
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 5e56cb036ecac693dfeaba9e1716079124a88f34739e9dccf4ef2462c638105c
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 4e9ffb9fe2498884b03bc519e05ae7bab65e2490733c5906ab5505e842a90bba
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 370cf4e9620dc82ad948d2d78065bc9aef34274136ca7eeeb6d54ee05952796c
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: bb36ea06b8a11318bc362c1361dbc9d530574cf7246f177763c10bbbe6cdabb4
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: d72118c9058b6316c057de55eb00d1499d1eedc4a262304730f2a083ad206a09
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: a3795bbd5dfa705090341cf42f6a5bed233ff1f75185fc78d76451c4cf2241f7
i386
kernel-2.6.18-164.11.1.el5.i686.rpm SHA-256: a9e0dbea13a28d3115a12be509494d83d859afb0a30f32226aee44d82295f562
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm SHA-256: 903ed5b1251d4870761b3b2212eba6b45aaabe4c5258468f4bee2d073dbcef18
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: e396dbaf468f974e98e8a84adcae4b64c04fcd7bb70cab1ea6734dda5884f3d8
kernel-debug-2.6.18-164.11.1.el5.i686.rpm SHA-256: ffd39f0cac297c1d8b67ec6d5911a49d77c6af75ea08f7731d3aeb7fd7b98bab
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: f86a62dd0e7ac29607c01f502e58dcb08c75c9c77c7208eb153142ea28aaf9f0
kernel-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: 7e451b4901990e789d86f608e2325d525ebc96060405bb0d58304b3b180e8484
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.i386.rpm SHA-256: 1260d1b5d61ea5849eb40d9e503e9f73890d19d0ce28a3bb6a95df536484d611
kernel-xen-2.6.18-164.11.1.el5.i686.rpm SHA-256: aedf398fc363abb3f4b5533744e9d22c7088d8b6fb8f4dd97ae1cfe80d784a6a
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: ab487daf30e63fb45de773792bb19300d1b1dc7d341fbf8ec3876b2965f91ab7

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
x86_64
kernel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: baed8de8372b4dca687e45256520cddfd92fcb7ea13017e584d7f0830b75befc
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 5e56cb036ecac693dfeaba9e1716079124a88f34739e9dccf4ef2462c638105c
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 4e9ffb9fe2498884b03bc519e05ae7bab65e2490733c5906ab5505e842a90bba
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 370cf4e9620dc82ad948d2d78065bc9aef34274136ca7eeeb6d54ee05952796c
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: bb36ea06b8a11318bc362c1361dbc9d530574cf7246f177763c10bbbe6cdabb4
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: d72118c9058b6316c057de55eb00d1499d1eedc4a262304730f2a083ad206a09
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: a3795bbd5dfa705090341cf42f6a5bed233ff1f75185fc78d76451c4cf2241f7
i386
kernel-2.6.18-164.11.1.el5.i686.rpm SHA-256: a9e0dbea13a28d3115a12be509494d83d859afb0a30f32226aee44d82295f562
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm SHA-256: 903ed5b1251d4870761b3b2212eba6b45aaabe4c5258468f4bee2d073dbcef18
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: e396dbaf468f974e98e8a84adcae4b64c04fcd7bb70cab1ea6734dda5884f3d8
kernel-debug-2.6.18-164.11.1.el5.i686.rpm SHA-256: ffd39f0cac297c1d8b67ec6d5911a49d77c6af75ea08f7731d3aeb7fd7b98bab
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: f86a62dd0e7ac29607c01f502e58dcb08c75c9c77c7208eb153142ea28aaf9f0
kernel-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: 7e451b4901990e789d86f608e2325d525ebc96060405bb0d58304b3b180e8484
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.i386.rpm SHA-256: 1260d1b5d61ea5849eb40d9e503e9f73890d19d0ce28a3bb6a95df536484d611
kernel-xen-2.6.18-164.11.1.el5.i686.rpm SHA-256: aedf398fc363abb3f4b5533744e9d22c7088d8b6fb8f4dd97ae1cfe80d784a6a
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: ab487daf30e63fb45de773792bb19300d1b1dc7d341fbf8ec3876b2965f91ab7

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
s390x
kernel-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 3e64f578d1e5e0a67c462bca3942826790490a98b7cb156655417b8a93d891f1
kernel-debug-2.6.18-164.11.1.el5.s390x.rpm SHA-256: d49389764c9a9ba30d4da9a225cc110f4236d3be79ad2dfcbc0d873a22b31496
kernel-debug-devel-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 10d5cce7182ade2f5439244ee3d35d55786bd04f7c293af61ceb9be3b8bdef4d
kernel-devel-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 66729f5844684de95c17e5580d770670ac3a54f23efafbef3d2549c58ad3b34e
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.s390x.rpm SHA-256: b53ffd404852a73f1fd35dac0c1ae5c2fa55d6da993c6c0b046f67d8e3ee0fd3
kernel-kdump-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 98eddc5e89f49a94d44a77b63693e9284b577c675b59219165a6508c868a4187
kernel-kdump-devel-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 561d730b8ca932d9810b5530a5f3ce320015c05f65d76ff7f3797b9596568b84

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
ppc
kernel-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: dcd2cb07734062917b3662cc33b337650b0899ecce74f9a2ee0ab7f85a91ede2
kernel-debug-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 93711f55fc58c786994ce8f7b90c3d86a06f3c6432fbc9393adb400824971e51
kernel-debug-devel-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: c72556651e45f5f73eb4a7c7a2004f13d5cbacfe2f9e6f37924eb4f06df5cd46
kernel-devel-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 294d73ebd61570f8355ba29740b7ad56d0504c0c31c1d097ed41f66d65a696d1
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.ppc.rpm SHA-256: 3c5661e8ab1fa6f6cc351d12785f70d77cd813b93c1ffee68a1e27d19a13826d
kernel-headers-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 1ac93410af094873879b6ba6ead2622ab80b2dffdf364eb40aeedeb9a3b80d9f
kernel-kdump-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 74d0c3ce023a8d14f729ee737bf5e973880bb90d9040b182d8f885491917641e
kernel-kdump-devel-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 22b7ba5b10fda509a307e0af15f1fbac56f40d7d0348c906653e9e186bb8ea2a

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
x86_64
kernel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: baed8de8372b4dca687e45256520cddfd92fcb7ea13017e584d7f0830b75befc
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 5e56cb036ecac693dfeaba9e1716079124a88f34739e9dccf4ef2462c638105c
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 4e9ffb9fe2498884b03bc519e05ae7bab65e2490733c5906ab5505e842a90bba
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 370cf4e9620dc82ad948d2d78065bc9aef34274136ca7eeeb6d54ee05952796c
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: bb36ea06b8a11318bc362c1361dbc9d530574cf7246f177763c10bbbe6cdabb4
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: d72118c9058b6316c057de55eb00d1499d1eedc4a262304730f2a083ad206a09
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: a3795bbd5dfa705090341cf42f6a5bed233ff1f75185fc78d76451c4cf2241f7
i386
kernel-2.6.18-164.11.1.el5.i686.rpm SHA-256: a9e0dbea13a28d3115a12be509494d83d859afb0a30f32226aee44d82295f562
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm SHA-256: 903ed5b1251d4870761b3b2212eba6b45aaabe4c5258468f4bee2d073dbcef18
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: e396dbaf468f974e98e8a84adcae4b64c04fcd7bb70cab1ea6734dda5884f3d8
kernel-debug-2.6.18-164.11.1.el5.i686.rpm SHA-256: ffd39f0cac297c1d8b67ec6d5911a49d77c6af75ea08f7731d3aeb7fd7b98bab
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: f86a62dd0e7ac29607c01f502e58dcb08c75c9c77c7208eb153142ea28aaf9f0
kernel-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: 7e451b4901990e789d86f608e2325d525ebc96060405bb0d58304b3b180e8484
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.i386.rpm SHA-256: 1260d1b5d61ea5849eb40d9e503e9f73890d19d0ce28a3bb6a95df536484d611
kernel-xen-2.6.18-164.11.1.el5.i686.rpm SHA-256: aedf398fc363abb3f4b5533744e9d22c7088d8b6fb8f4dd97ae1cfe80d784a6a
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: ab487daf30e63fb45de773792bb19300d1b1dc7d341fbf8ec3876b2965f91ab7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter