Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
红帽产品勘误 RHSA-2010:0046 - Security Advisory
发布:
2010-01-19
已更新:
2010-01-19

RHSA-2010:0046 - Security Advisory

  • 概述
  • 更新的软件包

概述

Important: kernel security and bug fix update

类型/严重性

Security Advisory: Important

Red Hat Insights 补丁分析

识别并修复受此公告影响的系统。

查看受影响的系统

标题

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

描述

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • an array index error was found in the gdth driver. A local user could

send a specially-crafted IOCTL request that would cause a denial of service
or, possibly, privilege escalation. (CVE-2009-3080, Important)

  • a flaw was found in the FUSE implementation. When a system is low on

memory, fuse_put_request() could dereference an invalid pointer, possibly
leading to a local denial of service or privilege escalation.
(CVE-2009-4021, Important)

  • Tavis Ormandy discovered a deficiency in the fasync_helper()

implementation. This could allow a local, unprivileged user to leverage a
use-after-free of locked, asynchronous file descriptors to cause a denial
of service or privilege escalation. (CVE-2009-4141, Important)

  • the Parallels Virtuozzo Containers team reported the RHSA-2009:1243

update introduced two flaws in the routing implementation. If an attacker
was able to cause a large enough number of collisions in the routing hash
table (via specially-crafted packets) for the emergency route flush to
trigger, a deadlock could occur. Secondly, if the kernel routing cache was
disabled, an uninitialized pointer would be left behind after a route
lookup, leading to a kernel panic. (CVE-2009-4272, Important)

  • the RHSA-2009:0225 update introduced a rewrite attack flaw in the

do_coredump() function. A local attacker able to guess the file name a
process is going to dump its core to, prior to the process crashing, could
use this flaw to append data to the dumped core file. This issue only
affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the
default value is 0). (CVE-2006-6304, Moderate)

The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable
set to 2, the core file will not be recorded if the file already exists.
For example, core files will not be overwritten on subsequent crashes of
processes whose core files map to the same name.

  • an information leak was found in the Linux kernel. On AMD64 systems,

32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)

  • the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)

support in the qla2xxx driver, resulting in two new sysfs pseudo files,
"/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete".
These two files were world-writable by default, allowing a local user to
change SCSI host attributes. This flaw only affects systems using the
qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)

  • permission issues were found in the megaraid_sas driver. The "dbg_lvl"

and "poll_mode_io" files on the sysfs file system ("/sys/") had
world-writable permissions. This could allow local, unprivileged users to
change the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)

  • a NULL pointer dereference flaw was found in the firewire-ohci driver

used for OHCI compliant IEEE 1394 controllers. A local, unprivileged user
with access to /dev/fw* files could issue certain IOCTL calls, causing a
denial of service or privilege escalation. The FireWire modules are
blacklisted by default, and if enabled, only root has access to the files
noted above by default. (CVE-2009-4138, Moderate)

  • a buffer overflow flaw was found in the hfs_bnode_read() function in the

HFS file system implementation. This could lead to a denial of service if a
user browsed a specially-crafted HFS file system, for example, by running
"ls". (CVE-2009-4020, Low)

Bug fix documentation for this update will be available shortly from
www.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/
index.html

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

解决方案

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

受影响的产品

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

修复

  • BZ - 526068 - CVE-2009-3889 CVE-2009-3939 kernel: megaraid_sas permissions in sysfs
  • BZ - 526788 - CVE-2009-2910 kernel: x86_64 32 bit process register leak
  • BZ - 537027 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour [rhel-5.4.z]
  • BZ - 537177 - CVE-2009-3556 kernel: qla2xxx NPIV vport management pseudofiles are world writable
  • BZ - 537273 - CVE-2006-6304 kernel: use flag in do_coredump()
  • BZ - 538734 - CVE-2009-4021 kernel: fuse: prevent fuse_put_request on invalid pointer
  • BZ - 539414 - CVE-2009-3080 kernel: gdth: Prevent negative offsets in ioctl
  • BZ - 539686 - bnx2: panic in bnx2_poll_work() [rhel-5.4.z]
  • BZ - 540736 - CVE-2009-4020 kernel: hfs buffer overflow
  • BZ - 540896 - PV clock fix throws off database application time [rhel-5.4.z]
  • BZ - 542582 - kdump corefile cannot be backtraced in IA64 [rhel-5.4.z]
  • BZ - 543448 - Using IPoIB, losing connectivity with 1 host, other hosts accessible [rhel-5.4.z]
  • BZ - 544978 - glock_workqueue -- glock ref count via gfs2_glock_hold [rhel-5.4.z]
  • BZ - 545411 - CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock
  • BZ - 547236 - CVE-2009-4138 kernel: firewire: ohci: handle receive packets with a data length of zero
  • BZ - 547521 - CRM#1971672, Data loss in GFS2 when multiple nodes writes to same file [rhel-5.4.z]
  • BZ - 547530 - kernel: BUG: soft lockup - CPU#1 stuck for 13s! [httpd:4490] [rhel-5.4.z]
  • BZ - 547906 - CVE-2009-4141 kernel: create_elf_tables can leave urandom in a bad state
  • BZ - 548370 - kernel: sleeping vfs_check_frozen in called in atomic context from do_wp_page [rhel-5.4.z]
  • BZ - 549905 - hvm, x86_64 guest panic on 2.6.18-164.9.1.el5 [rhel-5.4.z]
  • BZ - 549906 - [NetApp 5.4.z bug] Emulex FC ports on RHEL 5.4 GA offlined during target controller faults [rhel-5.4.z]
  • BZ - 549907 - Hang when echoing to /proc/sys/net/ipv4/route/secret_interval [rhel-5.4.z]
  • BZ - 549908 - resize2fs online resize hangs [rhel-5.4.z]
  • BZ - 550968 - RHEL5.4 guest with PV clock: inconsistent times returned by clock_gettime(CLOCK_REALTIME) and gettimeofday() [rhel-5.4.z]

CVE

  • CVE-2009-2910
  • CVE-2009-3939
  • CVE-2009-3889
  • CVE-2009-4138
  • CVE-2009-4272
  • CVE-2009-3080
  • CVE-2009-4141
  • CVE-2009-3556
  • CVE-2009-4020
  • CVE-2009-4021
  • CVE-2006-6304

参考

  • http://www.redhat.com/security/updates/classification/#important
  • http://kbase.redhat.com/faq/docs/DOC-20536
注:: 可能有这些软件包的更新版本。 点击软件包名称查看详情。

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
x86_64
kernel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: baed8de8372b4dca687e45256520cddfd92fcb7ea13017e584d7f0830b75befc
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 5e56cb036ecac693dfeaba9e1716079124a88f34739e9dccf4ef2462c638105c
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 4e9ffb9fe2498884b03bc519e05ae7bab65e2490733c5906ab5505e842a90bba
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 370cf4e9620dc82ad948d2d78065bc9aef34274136ca7eeeb6d54ee05952796c
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: bb36ea06b8a11318bc362c1361dbc9d530574cf7246f177763c10bbbe6cdabb4
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: d72118c9058b6316c057de55eb00d1499d1eedc4a262304730f2a083ad206a09
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: a3795bbd5dfa705090341cf42f6a5bed233ff1f75185fc78d76451c4cf2241f7
ia64
kernel-2.6.18-164.11.1.el5.ia64.rpm SHA-256: ff1622669dc0ec747133b075d09d6f76c379f110c51f70b913f3ca5466a97b58
kernel-debug-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 5457e5757ef8ea2bddc02c0916049b6bdd7a09ba789a7a663c383562e66e057d
kernel-debug-devel-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 49d6386c5c5c13fe21dad06ab042486de3a56bb5c4343e6bbce293fbdceb9fca
kernel-devel-2.6.18-164.11.1.el5.ia64.rpm SHA-256: b2ea9fe11ecdc8851d2df5f886f5e62bbc6fc2b6e1725340ac81f91c6963e3e3
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 3d98bb5abf6729d1763f6c80969288e7df17203ca3b033abb46a052064c5db26
kernel-xen-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 45183f7523cec9dbe170960b76e40b0c19f592b83c872402f64389415bf71491
kernel-xen-devel-2.6.18-164.11.1.el5.ia64.rpm SHA-256: 0e91948dc4a34289fa84359bd1c098771653e5fe29a439cd8c4e1581fa66f25e
i386
kernel-2.6.18-164.11.1.el5.i686.rpm SHA-256: a9e0dbea13a28d3115a12be509494d83d859afb0a30f32226aee44d82295f562
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm SHA-256: 903ed5b1251d4870761b3b2212eba6b45aaabe4c5258468f4bee2d073dbcef18
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: e396dbaf468f974e98e8a84adcae4b64c04fcd7bb70cab1ea6734dda5884f3d8
kernel-debug-2.6.18-164.11.1.el5.i686.rpm SHA-256: ffd39f0cac297c1d8b67ec6d5911a49d77c6af75ea08f7731d3aeb7fd7b98bab
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: f86a62dd0e7ac29607c01f502e58dcb08c75c9c77c7208eb153142ea28aaf9f0
kernel-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: 7e451b4901990e789d86f608e2325d525ebc96060405bb0d58304b3b180e8484
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.i386.rpm SHA-256: 1260d1b5d61ea5849eb40d9e503e9f73890d19d0ce28a3bb6a95df536484d611
kernel-xen-2.6.18-164.11.1.el5.i686.rpm SHA-256: aedf398fc363abb3f4b5533744e9d22c7088d8b6fb8f4dd97ae1cfe80d784a6a
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: ab487daf30e63fb45de773792bb19300d1b1dc7d341fbf8ec3876b2965f91ab7

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
x86_64
kernel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: baed8de8372b4dca687e45256520cddfd92fcb7ea13017e584d7f0830b75befc
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 5e56cb036ecac693dfeaba9e1716079124a88f34739e9dccf4ef2462c638105c
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 4e9ffb9fe2498884b03bc519e05ae7bab65e2490733c5906ab5505e842a90bba
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 370cf4e9620dc82ad948d2d78065bc9aef34274136ca7eeeb6d54ee05952796c
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: bb36ea06b8a11318bc362c1361dbc9d530574cf7246f177763c10bbbe6cdabb4
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: d72118c9058b6316c057de55eb00d1499d1eedc4a262304730f2a083ad206a09
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: a3795bbd5dfa705090341cf42f6a5bed233ff1f75185fc78d76451c4cf2241f7
i386
kernel-2.6.18-164.11.1.el5.i686.rpm SHA-256: a9e0dbea13a28d3115a12be509494d83d859afb0a30f32226aee44d82295f562
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm SHA-256: 903ed5b1251d4870761b3b2212eba6b45aaabe4c5258468f4bee2d073dbcef18
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: e396dbaf468f974e98e8a84adcae4b64c04fcd7bb70cab1ea6734dda5884f3d8
kernel-debug-2.6.18-164.11.1.el5.i686.rpm SHA-256: ffd39f0cac297c1d8b67ec6d5911a49d77c6af75ea08f7731d3aeb7fd7b98bab
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: f86a62dd0e7ac29607c01f502e58dcb08c75c9c77c7208eb153142ea28aaf9f0
kernel-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: 7e451b4901990e789d86f608e2325d525ebc96060405bb0d58304b3b180e8484
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.i386.rpm SHA-256: 1260d1b5d61ea5849eb40d9e503e9f73890d19d0ce28a3bb6a95df536484d611
kernel-xen-2.6.18-164.11.1.el5.i686.rpm SHA-256: aedf398fc363abb3f4b5533744e9d22c7088d8b6fb8f4dd97ae1cfe80d784a6a
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: ab487daf30e63fb45de773792bb19300d1b1dc7d341fbf8ec3876b2965f91ab7

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
x86_64
kernel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: baed8de8372b4dca687e45256520cddfd92fcb7ea13017e584d7f0830b75befc
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 5e56cb036ecac693dfeaba9e1716079124a88f34739e9dccf4ef2462c638105c
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 4e9ffb9fe2498884b03bc519e05ae7bab65e2490733c5906ab5505e842a90bba
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 370cf4e9620dc82ad948d2d78065bc9aef34274136ca7eeeb6d54ee05952796c
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: bb36ea06b8a11318bc362c1361dbc9d530574cf7246f177763c10bbbe6cdabb4
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: d72118c9058b6316c057de55eb00d1499d1eedc4a262304730f2a083ad206a09
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: a3795bbd5dfa705090341cf42f6a5bed233ff1f75185fc78d76451c4cf2241f7
i386
kernel-2.6.18-164.11.1.el5.i686.rpm SHA-256: a9e0dbea13a28d3115a12be509494d83d859afb0a30f32226aee44d82295f562
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm SHA-256: 903ed5b1251d4870761b3b2212eba6b45aaabe4c5258468f4bee2d073dbcef18
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: e396dbaf468f974e98e8a84adcae4b64c04fcd7bb70cab1ea6734dda5884f3d8
kernel-debug-2.6.18-164.11.1.el5.i686.rpm SHA-256: ffd39f0cac297c1d8b67ec6d5911a49d77c6af75ea08f7731d3aeb7fd7b98bab
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: f86a62dd0e7ac29607c01f502e58dcb08c75c9c77c7208eb153142ea28aaf9f0
kernel-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: 7e451b4901990e789d86f608e2325d525ebc96060405bb0d58304b3b180e8484
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.i386.rpm SHA-256: 1260d1b5d61ea5849eb40d9e503e9f73890d19d0ce28a3bb6a95df536484d611
kernel-xen-2.6.18-164.11.1.el5.i686.rpm SHA-256: aedf398fc363abb3f4b5533744e9d22c7088d8b6fb8f4dd97ae1cfe80d784a6a
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: ab487daf30e63fb45de773792bb19300d1b1dc7d341fbf8ec3876b2965f91ab7

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
s390x
kernel-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 3e64f578d1e5e0a67c462bca3942826790490a98b7cb156655417b8a93d891f1
kernel-debug-2.6.18-164.11.1.el5.s390x.rpm SHA-256: d49389764c9a9ba30d4da9a225cc110f4236d3be79ad2dfcbc0d873a22b31496
kernel-debug-devel-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 10d5cce7182ade2f5439244ee3d35d55786bd04f7c293af61ceb9be3b8bdef4d
kernel-devel-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 66729f5844684de95c17e5580d770670ac3a54f23efafbef3d2549c58ad3b34e
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.s390x.rpm SHA-256: b53ffd404852a73f1fd35dac0c1ae5c2fa55d6da993c6c0b046f67d8e3ee0fd3
kernel-kdump-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 98eddc5e89f49a94d44a77b63693e9284b577c675b59219165a6508c868a4187
kernel-kdump-devel-2.6.18-164.11.1.el5.s390x.rpm SHA-256: 561d730b8ca932d9810b5530a5f3ce320015c05f65d76ff7f3797b9596568b84

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
ppc
kernel-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: dcd2cb07734062917b3662cc33b337650b0899ecce74f9a2ee0ab7f85a91ede2
kernel-debug-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 93711f55fc58c786994ce8f7b90c3d86a06f3c6432fbc9393adb400824971e51
kernel-debug-devel-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: c72556651e45f5f73eb4a7c7a2004f13d5cbacfe2f9e6f37924eb4f06df5cd46
kernel-devel-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 294d73ebd61570f8355ba29740b7ad56d0504c0c31c1d097ed41f66d65a696d1
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.ppc.rpm SHA-256: 3c5661e8ab1fa6f6cc351d12785f70d77cd813b93c1ffee68a1e27d19a13826d
kernel-headers-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 1ac93410af094873879b6ba6ead2622ab80b2dffdf364eb40aeedeb9a3b80d9f
kernel-kdump-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 74d0c3ce023a8d14f729ee737bf5e973880bb90d9040b182d8f885491917641e
kernel-kdump-devel-2.6.18-164.11.1.el5.ppc64.rpm SHA-256: 22b7ba5b10fda509a307e0af15f1fbac56f40d7d0348c906653e9e186bb8ea2a

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-164.11.1.el5.src.rpm SHA-256: de68c9e7f1acd879115ddfb9ac4665bfa03788808309b462600cba4b7ea7a295
x86_64
kernel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: baed8de8372b4dca687e45256520cddfd92fcb7ea13017e584d7f0830b75befc
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 5e56cb036ecac693dfeaba9e1716079124a88f34739e9dccf4ef2462c638105c
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 4e9ffb9fe2498884b03bc519e05ae7bab65e2490733c5906ab5505e842a90bba
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: 370cf4e9620dc82ad948d2d78065bc9aef34274136ca7eeeb6d54ee05952796c
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: bb36ea06b8a11318bc362c1361dbc9d530574cf7246f177763c10bbbe6cdabb4
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: d72118c9058b6316c057de55eb00d1499d1eedc4a262304730f2a083ad206a09
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm SHA-256: a3795bbd5dfa705090341cf42f6a5bed233ff1f75185fc78d76451c4cf2241f7
i386
kernel-2.6.18-164.11.1.el5.i686.rpm SHA-256: a9e0dbea13a28d3115a12be509494d83d859afb0a30f32226aee44d82295f562
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm SHA-256: 903ed5b1251d4870761b3b2212eba6b45aaabe4c5258468f4bee2d073dbcef18
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: e396dbaf468f974e98e8a84adcae4b64c04fcd7bb70cab1ea6734dda5884f3d8
kernel-debug-2.6.18-164.11.1.el5.i686.rpm SHA-256: ffd39f0cac297c1d8b67ec6d5911a49d77c6af75ea08f7731d3aeb7fd7b98bab
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: f86a62dd0e7ac29607c01f502e58dcb08c75c9c77c7208eb153142ea28aaf9f0
kernel-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: 7e451b4901990e789d86f608e2325d525ebc96060405bb0d58304b3b180e8484
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm SHA-256: a58f8f894135dca2e7224c911570890cc7dd9d9be7db1aebcc2db34c83644cbd
kernel-headers-2.6.18-164.11.1.el5.i386.rpm SHA-256: 1260d1b5d61ea5849eb40d9e503e9f73890d19d0ce28a3bb6a95df536484d611
kernel-xen-2.6.18-164.11.1.el5.i686.rpm SHA-256: aedf398fc363abb3f4b5533744e9d22c7088d8b6fb8f4dd97ae1cfe80d784a6a
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm SHA-256: ab487daf30e63fb45de773792bb19300d1b1dc7d341fbf8ec3876b2965f91ab7

Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility