Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:1959 - Security Advisory
Issued:
2014-12-04
Updated:
2014-12-04

RHSA-2014:1959 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and three bugs are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • It was found that the permission checks performed by the Linux kernel

when a netlink message was received were not sufficient. A local,
unprivileged user could potentially bypass these restrictions by passing a
netlink socket as stdout or stderr to a more privileged process and
altering the output of this process. (CVE-2014-0181, Moderate)

Red Hat would like to thank Andy Lutomirski for reporting this issue.

This update also fixes the following bugs:

  • Previously, the kernel did not successfully deliver multicast packets

when the multicast querier was disabled. Consequently, the corosync utility
terminated unexpectedly and the affected storage node did not join its
intended cluster. With this update, multicast packets are delivered
properly when the multicast querier is disabled, and corosync handles the
node as expected. (BZ#902454)

  • Previously, the kernel wrote the metadata contained in all system

information blocks on a single page of the /proc/sysinfo file. However,
when the machine configuration was very extensive and the data did not fit
on a single page, the system overwrote random memory regions, which in turn
caused data corruption when reading the /proc/sysconf file. With this
update, /proc/sysinfo automatically allocates a larger buffer if the data
output does not fit the current buffer, which prevents the data corruption.
(BZ#1131283)

  • Prior to this update, the it_real_fn() function did not, in certain

cases, successfully acquire the SIGLOCK signal when the do_setitimer()
function used the ITIMER_REAL timer. As a consequence, the current process
entered an endless loop and became unresponsive. This update fixes the bug
and it_real_fn() no longer causes the kernel to become unresponsive.
(BZ#1134654)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1094265 - CVE-2014-0181 kernel: net: insufficient permision checks of netlink messages

CVEs

  • CVE-2014-0181

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-400.el5.src.rpm SHA-256: d0002164103a251702b1d3b11932c5c184bdacdd51666a4493dfd8c54ba1c139
x86_64
kernel-2.6.18-400.el5.x86_64.rpm SHA-256: e2826e35ba5f8e0c2f0b66d05c6a5d88d491417b21ba0fc18fb8ef5477889d47
kernel-debug-2.6.18-400.el5.x86_64.rpm SHA-256: d03d3ecbb5d093314777fb75f4c78a8edd921efa423469cc29021e0fe30cffa1
kernel-debug-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 1ec21ca542053aec332c1c7a75890f6c2bddaca5cf24398e8c4e1a0e34b70642
kernel-debug-devel-2.6.18-400.el5.x86_64.rpm SHA-256: c7cc9377c2d52a293acf19f612f29936d920f7a0c81e69ca0b32e1303cf7d4d6
kernel-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 7d8b0427024f1f263a4f122bf1d801c5ec4c6494c1f18db37bd7f66be39a1297
kernel-debuginfo-common-2.6.18-400.el5.x86_64.rpm SHA-256: 493316f7e1cb01b3f4ad4b8b177b32fa703a89df7779668ca2a08f76d2573159
kernel-devel-2.6.18-400.el5.x86_64.rpm SHA-256: 01a2d85ebfef60cbd5639c71b2e529c1158f29343ffa3d8dea76e457d6765950
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.x86_64.rpm SHA-256: 5f15163b5b407a9e68482ea808ac928a41de039f581182d58772f5c831c531cd
kernel-xen-2.6.18-400.el5.x86_64.rpm SHA-256: b5c7c552ea0cfa1aa713458f29e5cf757d621465d43f49e8c965b48ca67cce10
kernel-xen-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 03486ca892cf4e28d407533928ee342ea147b8eb72f6cb5086f5fdaba0823b69
kernel-xen-devel-2.6.18-400.el5.x86_64.rpm SHA-256: 35e51e75956b5816637dafd917fa1a9b9d20d2385916fa57da987c860099eaaf
ia64
kernel-2.6.18-400.el5.ia64.rpm SHA-256: bf8aa31e18d419b31fb2e4f1e737550a93b77f79fa77c4097ae7ab800fed346a
kernel-debug-2.6.18-400.el5.ia64.rpm SHA-256: e4b8ce7e0fed2ddbb7c8f7dd8d9594478fa915afb8e6720fa60f55a999d38049
kernel-debug-debuginfo-2.6.18-400.el5.ia64.rpm SHA-256: e75c05cbc0e1c26d5c68679c0d4a6a33f9a6beb277a8c7e90b1750921887b745
kernel-debug-devel-2.6.18-400.el5.ia64.rpm SHA-256: ed36ecc21e6f26d2d2e61ef42602d16f4b137f38127db6595c4683125fa4f998
kernel-debuginfo-2.6.18-400.el5.ia64.rpm SHA-256: 02beb9de1dd3944886b65f2802b83b7fcf091c51cf5100b3dc417695b515eec7
kernel-debuginfo-common-2.6.18-400.el5.ia64.rpm SHA-256: 9d87069b4388f23d8a102bdec4d22f9569cf1e595b8364152b85fd633d521e6e
kernel-devel-2.6.18-400.el5.ia64.rpm SHA-256: 09ee234c37f4e1916c59d2eb7386abbc60a2372733c71fbbbd51272a11ab8c39
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.ia64.rpm SHA-256: 2056a99508d289fe7a4d3873a5a38b6e4535f92e276b71cb7ca46db02cd60440
kernel-xen-2.6.18-400.el5.ia64.rpm SHA-256: 89007b842d50574a455a6c862481014fb2fa20988db995ff3e1e7216ad6c48ac
kernel-xen-debuginfo-2.6.18-400.el5.ia64.rpm SHA-256: 28a0735cbeb27b848c3cbfa54ca0b354fd65ebf8d7bb444870aa80bd361e7d58
kernel-xen-devel-2.6.18-400.el5.ia64.rpm SHA-256: ac7fe16d8fce61df66c9fd05d5dad850c09107bb6fc7d327b8d1e633a5ccbdaf
i386
kernel-2.6.18-400.el5.i686.rpm SHA-256: 4ce97d65cadda81f1f92e13a1c95eaf3e249d5351402b9c7899ed8d350b51872
kernel-PAE-2.6.18-400.el5.i686.rpm SHA-256: 8654e98590ac63129f13775a472b58c9388aa7a13b4c409a23cdd1a75bb2de8f
kernel-PAE-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 53fa74eb2d821c96bf67eca66fadb5d68a4fdb9355be91fb286701567226db86
kernel-PAE-devel-2.6.18-400.el5.i686.rpm SHA-256: 6f09efd8361933a7de6937e61a66afeb08b7f16318509de052966f25d517302d
kernel-debug-2.6.18-400.el5.i686.rpm SHA-256: bf53d250f2a57de4e2029cb21721b13a929f19705acb4269169a9a3ee57421c1
kernel-debug-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 511b2b707f8da062a3728d4ec7fbc0c75ed0681d067b282600ed7846ee39d826
kernel-debug-devel-2.6.18-400.el5.i686.rpm SHA-256: 7b15e3f8c58c0a1b154b7d3393b27bfb78dc00e88475b59f563eea47ad47b0a5
kernel-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: be25e814a0c9e579d3af8705c8ce71994b6a7c971ae0a855609411ec2c657d1e
kernel-debuginfo-common-2.6.18-400.el5.i686.rpm SHA-256: e479208bc1ce078bf8c7f61410251b8df7d9cdf08f6875c71d3aa18a34176966
kernel-devel-2.6.18-400.el5.i686.rpm SHA-256: df63d14f991098009f301c548d617583af72a0df9bcb04eb4e97a02ed128f5ba
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.i386.rpm SHA-256: 83ea332abbc46787f626ec2239893a3cd64fa2e73edbd16488e99fcb1510521d
kernel-xen-2.6.18-400.el5.i686.rpm SHA-256: 8c2b36be7cd1a7a7d78a71243fcee37528b4a7d1c455e15a62cdd75e0e9d31df
kernel-xen-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 071cec770babf26ba0d978abdc449af9b7517c777dda2a52d878cf827d7bd5ba
kernel-xen-devel-2.6.18-400.el5.i686.rpm SHA-256: 556d7f97fdd07d8c5d8f35ea4859d8e25558fb95245bb3723caecb1ba732db81

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-400.el5.src.rpm SHA-256: d0002164103a251702b1d3b11932c5c184bdacdd51666a4493dfd8c54ba1c139
x86_64
kernel-2.6.18-400.el5.x86_64.rpm SHA-256: e2826e35ba5f8e0c2f0b66d05c6a5d88d491417b21ba0fc18fb8ef5477889d47
kernel-debug-2.6.18-400.el5.x86_64.rpm SHA-256: d03d3ecbb5d093314777fb75f4c78a8edd921efa423469cc29021e0fe30cffa1
kernel-debug-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 1ec21ca542053aec332c1c7a75890f6c2bddaca5cf24398e8c4e1a0e34b70642
kernel-debug-devel-2.6.18-400.el5.x86_64.rpm SHA-256: c7cc9377c2d52a293acf19f612f29936d920f7a0c81e69ca0b32e1303cf7d4d6
kernel-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 7d8b0427024f1f263a4f122bf1d801c5ec4c6494c1f18db37bd7f66be39a1297
kernel-debuginfo-common-2.6.18-400.el5.x86_64.rpm SHA-256: 493316f7e1cb01b3f4ad4b8b177b32fa703a89df7779668ca2a08f76d2573159
kernel-devel-2.6.18-400.el5.x86_64.rpm SHA-256: 01a2d85ebfef60cbd5639c71b2e529c1158f29343ffa3d8dea76e457d6765950
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.x86_64.rpm SHA-256: 5f15163b5b407a9e68482ea808ac928a41de039f581182d58772f5c831c531cd
kernel-xen-2.6.18-400.el5.x86_64.rpm SHA-256: b5c7c552ea0cfa1aa713458f29e5cf757d621465d43f49e8c965b48ca67cce10
kernel-xen-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 03486ca892cf4e28d407533928ee342ea147b8eb72f6cb5086f5fdaba0823b69
kernel-xen-devel-2.6.18-400.el5.x86_64.rpm SHA-256: 35e51e75956b5816637dafd917fa1a9b9d20d2385916fa57da987c860099eaaf
i386
kernel-2.6.18-400.el5.i686.rpm SHA-256: 4ce97d65cadda81f1f92e13a1c95eaf3e249d5351402b9c7899ed8d350b51872
kernel-PAE-2.6.18-400.el5.i686.rpm SHA-256: 8654e98590ac63129f13775a472b58c9388aa7a13b4c409a23cdd1a75bb2de8f
kernel-PAE-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 53fa74eb2d821c96bf67eca66fadb5d68a4fdb9355be91fb286701567226db86
kernel-PAE-devel-2.6.18-400.el5.i686.rpm SHA-256: 6f09efd8361933a7de6937e61a66afeb08b7f16318509de052966f25d517302d
kernel-debug-2.6.18-400.el5.i686.rpm SHA-256: bf53d250f2a57de4e2029cb21721b13a929f19705acb4269169a9a3ee57421c1
kernel-debug-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 511b2b707f8da062a3728d4ec7fbc0c75ed0681d067b282600ed7846ee39d826
kernel-debug-devel-2.6.18-400.el5.i686.rpm SHA-256: 7b15e3f8c58c0a1b154b7d3393b27bfb78dc00e88475b59f563eea47ad47b0a5
kernel-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: be25e814a0c9e579d3af8705c8ce71994b6a7c971ae0a855609411ec2c657d1e
kernel-debuginfo-common-2.6.18-400.el5.i686.rpm SHA-256: e479208bc1ce078bf8c7f61410251b8df7d9cdf08f6875c71d3aa18a34176966
kernel-devel-2.6.18-400.el5.i686.rpm SHA-256: df63d14f991098009f301c548d617583af72a0df9bcb04eb4e97a02ed128f5ba
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.i386.rpm SHA-256: 83ea332abbc46787f626ec2239893a3cd64fa2e73edbd16488e99fcb1510521d
kernel-xen-2.6.18-400.el5.i686.rpm SHA-256: 8c2b36be7cd1a7a7d78a71243fcee37528b4a7d1c455e15a62cdd75e0e9d31df
kernel-xen-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 071cec770babf26ba0d978abdc449af9b7517c777dda2a52d878cf827d7bd5ba
kernel-xen-devel-2.6.18-400.el5.i686.rpm SHA-256: 556d7f97fdd07d8c5d8f35ea4859d8e25558fb95245bb3723caecb1ba732db81

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-400.el5.src.rpm SHA-256: d0002164103a251702b1d3b11932c5c184bdacdd51666a4493dfd8c54ba1c139
x86_64
kernel-2.6.18-400.el5.x86_64.rpm SHA-256: e2826e35ba5f8e0c2f0b66d05c6a5d88d491417b21ba0fc18fb8ef5477889d47
kernel-debug-2.6.18-400.el5.x86_64.rpm SHA-256: d03d3ecbb5d093314777fb75f4c78a8edd921efa423469cc29021e0fe30cffa1
kernel-debug-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 1ec21ca542053aec332c1c7a75890f6c2bddaca5cf24398e8c4e1a0e34b70642
kernel-debug-devel-2.6.18-400.el5.x86_64.rpm SHA-256: c7cc9377c2d52a293acf19f612f29936d920f7a0c81e69ca0b32e1303cf7d4d6
kernel-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 7d8b0427024f1f263a4f122bf1d801c5ec4c6494c1f18db37bd7f66be39a1297
kernel-debuginfo-common-2.6.18-400.el5.x86_64.rpm SHA-256: 493316f7e1cb01b3f4ad4b8b177b32fa703a89df7779668ca2a08f76d2573159
kernel-devel-2.6.18-400.el5.x86_64.rpm SHA-256: 01a2d85ebfef60cbd5639c71b2e529c1158f29343ffa3d8dea76e457d6765950
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.x86_64.rpm SHA-256: 5f15163b5b407a9e68482ea808ac928a41de039f581182d58772f5c831c531cd
kernel-xen-2.6.18-400.el5.x86_64.rpm SHA-256: b5c7c552ea0cfa1aa713458f29e5cf757d621465d43f49e8c965b48ca67cce10
kernel-xen-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 03486ca892cf4e28d407533928ee342ea147b8eb72f6cb5086f5fdaba0823b69
kernel-xen-devel-2.6.18-400.el5.x86_64.rpm SHA-256: 35e51e75956b5816637dafd917fa1a9b9d20d2385916fa57da987c860099eaaf
i386
kernel-2.6.18-400.el5.i686.rpm SHA-256: 4ce97d65cadda81f1f92e13a1c95eaf3e249d5351402b9c7899ed8d350b51872
kernel-PAE-2.6.18-400.el5.i686.rpm SHA-256: 8654e98590ac63129f13775a472b58c9388aa7a13b4c409a23cdd1a75bb2de8f
kernel-PAE-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 53fa74eb2d821c96bf67eca66fadb5d68a4fdb9355be91fb286701567226db86
kernel-PAE-devel-2.6.18-400.el5.i686.rpm SHA-256: 6f09efd8361933a7de6937e61a66afeb08b7f16318509de052966f25d517302d
kernel-debug-2.6.18-400.el5.i686.rpm SHA-256: bf53d250f2a57de4e2029cb21721b13a929f19705acb4269169a9a3ee57421c1
kernel-debug-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 511b2b707f8da062a3728d4ec7fbc0c75ed0681d067b282600ed7846ee39d826
kernel-debug-devel-2.6.18-400.el5.i686.rpm SHA-256: 7b15e3f8c58c0a1b154b7d3393b27bfb78dc00e88475b59f563eea47ad47b0a5
kernel-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: be25e814a0c9e579d3af8705c8ce71994b6a7c971ae0a855609411ec2c657d1e
kernel-debuginfo-common-2.6.18-400.el5.i686.rpm SHA-256: e479208bc1ce078bf8c7f61410251b8df7d9cdf08f6875c71d3aa18a34176966
kernel-devel-2.6.18-400.el5.i686.rpm SHA-256: df63d14f991098009f301c548d617583af72a0df9bcb04eb4e97a02ed128f5ba
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.i386.rpm SHA-256: 83ea332abbc46787f626ec2239893a3cd64fa2e73edbd16488e99fcb1510521d
kernel-xen-2.6.18-400.el5.i686.rpm SHA-256: 8c2b36be7cd1a7a7d78a71243fcee37528b4a7d1c455e15a62cdd75e0e9d31df
kernel-xen-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 071cec770babf26ba0d978abdc449af9b7517c777dda2a52d878cf827d7bd5ba
kernel-xen-devel-2.6.18-400.el5.i686.rpm SHA-256: 556d7f97fdd07d8c5d8f35ea4859d8e25558fb95245bb3723caecb1ba732db81

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-400.el5.src.rpm SHA-256: d0002164103a251702b1d3b11932c5c184bdacdd51666a4493dfd8c54ba1c139
s390x
kernel-2.6.18-400.el5.s390x.rpm SHA-256: b89156dc44004876f0e24fdfd0cd829a4d588946532fcf81018725826b21cd98
kernel-debug-2.6.18-400.el5.s390x.rpm SHA-256: 0597bbce09964bab20e59cf89f21ef56fe382558e78044bf658d53f7806cf01c
kernel-debug-debuginfo-2.6.18-400.el5.s390x.rpm SHA-256: d54358b70236eb897b1ab56f01a84616cec903475e4699f28332032f61e660d0
kernel-debug-devel-2.6.18-400.el5.s390x.rpm SHA-256: f53652f97c849de7f14cbd7b2e6621fb8f1344509be6cc4813d48161e448663d
kernel-debuginfo-2.6.18-400.el5.s390x.rpm SHA-256: da401247f9e02a6f44e355121a1580ecbd0031df6be6a1638a78b21f25d025eb
kernel-debuginfo-common-2.6.18-400.el5.s390x.rpm SHA-256: 6643447f0c90364dea9651d299ae1da27528677404c6eb11ce332ec90cdd3ba4
kernel-devel-2.6.18-400.el5.s390x.rpm SHA-256: 7d5764df69db0ca48c987c1d638dfa3cc1df490fd29f694c299dbbd7398d4da0
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.s390x.rpm SHA-256: 37ddd2bbe690b5f1c791736700006f29a249a94f0e45f27bfdf79d97158612c8
kernel-kdump-2.6.18-400.el5.s390x.rpm SHA-256: 6f4bb4ee67ef40db53b0f51340f0f1f7c3c59c1480534c239b94955d19b817c6
kernel-kdump-debuginfo-2.6.18-400.el5.s390x.rpm SHA-256: 92669766a366e97660d5dce3820f2cb5096d7c5be7bf61be01097b2015284239
kernel-kdump-devel-2.6.18-400.el5.s390x.rpm SHA-256: 84deb6ae898bcddd2969577013429c8d2c50441e270757c28d58cdd316ab24a1

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-400.el5.src.rpm SHA-256: d0002164103a251702b1d3b11932c5c184bdacdd51666a4493dfd8c54ba1c139
ppc
kernel-2.6.18-400.el5.ppc64.rpm SHA-256: b1c780775a4013bf799823320b4dadfaaa23f1f07eba88ef47b2c56da43419c3
kernel-debug-2.6.18-400.el5.ppc64.rpm SHA-256: 75be1e4a0a46c51ab15e45c3d1eb6ef0f50af2ac2cb053b09277fb5aedbcb175
kernel-debug-debuginfo-2.6.18-400.el5.ppc64.rpm SHA-256: 47657afdba9ccb4f4fffaee672280c38c2e2596c7c9c1467100bb9ecca760180
kernel-debug-devel-2.6.18-400.el5.ppc64.rpm SHA-256: 1a001a0631a5db8a73dede5ee87029024a31a19281211bbb8e8c846d311d0d5a
kernel-debuginfo-2.6.18-400.el5.ppc64.rpm SHA-256: 4e81ef7d39913410575500134339c3093f53497d9b2504a281f449b6dc56026f
kernel-debuginfo-common-2.6.18-400.el5.ppc64.rpm SHA-256: afbc99ce8987a53f8e79b781e7190296ee0b13408aef53dde3ef78920a44ac2f
kernel-devel-2.6.18-400.el5.ppc64.rpm SHA-256: c77aa3068208ab53d805d5e4ed33536fc5c8e387cbb98a4e0eebb99229eddf17
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.ppc.rpm SHA-256: 7aff9b268fcda34b899474163534218805e4b1c463d59308250587484eb376bd
kernel-headers-2.6.18-400.el5.ppc64.rpm SHA-256: 2a39276e21cda6ae2be3532c37616f37a963f8d4699bfcccdc82a8e29c322438
kernel-kdump-2.6.18-400.el5.ppc64.rpm SHA-256: c616818a6e193bbfdcedac04fb1f968dc675370a4a4f66ed13e3373dd95df5ef
kernel-kdump-debuginfo-2.6.18-400.el5.ppc64.rpm SHA-256: 479db2cf3d761a0096cf051f1314044ea0f070d00d4f3055c13180a19ef7de59
kernel-kdump-devel-2.6.18-400.el5.ppc64.rpm SHA-256: 7514802a8cc2ef557013c1418ba707be32e1f49477c322cbf98c92456bdd9ffa

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-400.el5.src.rpm SHA-256: d0002164103a251702b1d3b11932c5c184bdacdd51666a4493dfd8c54ba1c139
x86_64
kernel-2.6.18-400.el5.x86_64.rpm SHA-256: e2826e35ba5f8e0c2f0b66d05c6a5d88d491417b21ba0fc18fb8ef5477889d47
kernel-debug-2.6.18-400.el5.x86_64.rpm SHA-256: d03d3ecbb5d093314777fb75f4c78a8edd921efa423469cc29021e0fe30cffa1
kernel-debug-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 1ec21ca542053aec332c1c7a75890f6c2bddaca5cf24398e8c4e1a0e34b70642
kernel-debug-devel-2.6.18-400.el5.x86_64.rpm SHA-256: c7cc9377c2d52a293acf19f612f29936d920f7a0c81e69ca0b32e1303cf7d4d6
kernel-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 7d8b0427024f1f263a4f122bf1d801c5ec4c6494c1f18db37bd7f66be39a1297
kernel-debuginfo-common-2.6.18-400.el5.x86_64.rpm SHA-256: 493316f7e1cb01b3f4ad4b8b177b32fa703a89df7779668ca2a08f76d2573159
kernel-devel-2.6.18-400.el5.x86_64.rpm SHA-256: 01a2d85ebfef60cbd5639c71b2e529c1158f29343ffa3d8dea76e457d6765950
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.x86_64.rpm SHA-256: 5f15163b5b407a9e68482ea808ac928a41de039f581182d58772f5c831c531cd
kernel-xen-2.6.18-400.el5.x86_64.rpm SHA-256: b5c7c552ea0cfa1aa713458f29e5cf757d621465d43f49e8c965b48ca67cce10
kernel-xen-debuginfo-2.6.18-400.el5.x86_64.rpm SHA-256: 03486ca892cf4e28d407533928ee342ea147b8eb72f6cb5086f5fdaba0823b69
kernel-xen-devel-2.6.18-400.el5.x86_64.rpm SHA-256: 35e51e75956b5816637dafd917fa1a9b9d20d2385916fa57da987c860099eaaf
i386
kernel-2.6.18-400.el5.i686.rpm SHA-256: 4ce97d65cadda81f1f92e13a1c95eaf3e249d5351402b9c7899ed8d350b51872
kernel-PAE-2.6.18-400.el5.i686.rpm SHA-256: 8654e98590ac63129f13775a472b58c9388aa7a13b4c409a23cdd1a75bb2de8f
kernel-PAE-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 53fa74eb2d821c96bf67eca66fadb5d68a4fdb9355be91fb286701567226db86
kernel-PAE-devel-2.6.18-400.el5.i686.rpm SHA-256: 6f09efd8361933a7de6937e61a66afeb08b7f16318509de052966f25d517302d
kernel-debug-2.6.18-400.el5.i686.rpm SHA-256: bf53d250f2a57de4e2029cb21721b13a929f19705acb4269169a9a3ee57421c1
kernel-debug-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 511b2b707f8da062a3728d4ec7fbc0c75ed0681d067b282600ed7846ee39d826
kernel-debug-devel-2.6.18-400.el5.i686.rpm SHA-256: 7b15e3f8c58c0a1b154b7d3393b27bfb78dc00e88475b59f563eea47ad47b0a5
kernel-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: be25e814a0c9e579d3af8705c8ce71994b6a7c971ae0a855609411ec2c657d1e
kernel-debuginfo-common-2.6.18-400.el5.i686.rpm SHA-256: e479208bc1ce078bf8c7f61410251b8df7d9cdf08f6875c71d3aa18a34176966
kernel-devel-2.6.18-400.el5.i686.rpm SHA-256: df63d14f991098009f301c548d617583af72a0df9bcb04eb4e97a02ed128f5ba
kernel-doc-2.6.18-400.el5.noarch.rpm SHA-256: a75fa47cb97e66c38f92ad38399a2ce8622a68faff26b0288bed45e1f2725f9a
kernel-headers-2.6.18-400.el5.i386.rpm SHA-256: 83ea332abbc46787f626ec2239893a3cd64fa2e73edbd16488e99fcb1510521d
kernel-xen-2.6.18-400.el5.i686.rpm SHA-256: 8c2b36be7cd1a7a7d78a71243fcee37528b4a7d1c455e15a62cdd75e0e9d31df
kernel-xen-debuginfo-2.6.18-400.el5.i686.rpm SHA-256: 071cec770babf26ba0d978abdc449af9b7517c777dda2a52d878cf827d7bd5ba
kernel-xen-devel-2.6.18-400.el5.i686.rpm SHA-256: 556d7f97fdd07d8c5d8f35ea4859d8e25558fb95245bb3723caecb1ba732db81

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter