Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2014:2008 - Security Advisory
Issued:
2014-12-17
Updated:
2014-12-17

RHSA-2014:2008 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A flaw was found in the way the Linux kernel handled GS segment register

base switching when recovering from a #SS (stack segment) fault on an
erroneous return to user space. A local, unprivileged user could use this
flaw to escalate their privileges on the system. (CVE-2014-9322, Important)

Red Hat would like to thank Andy Lutomirski for reporting this issue.

All kernel users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1172806 - CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility

CVEs

  • CVE-2014-9322

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-400.1.1.el5.src.rpm SHA-256: 8237306fdd94a50ef9e9f9e4a2539d4548b40570956114ee93f610571dbc0d6e
x86_64
kernel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 81c7bb99234bbcf4acd0309de2fcefbdc5388256755389903fc25e58ceeda6cc
kernel-debug-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: ef9d18f2b8f339043a67348f5c007bb6895c6cf0c9e7b3c39ccafb85ded5aa5e
kernel-debug-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 5466ec40cb65370ff14dea5aae9a7b15bb60c4d313ccbfea716bf17763fe2809
kernel-debug-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 1e53b7039ad4062258ff0e23d067f1bf96a670587cfbf9a79c20cda387cae3b2
kernel-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: da4b2939b5bd213229cef134f5314b71db0f9816930dfab2a8d5b2072deee7df
kernel-debuginfo-common-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 4e82f17d2b0147f35babda78309b07dc939bf9430e013c93058b5e547933f446
kernel-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 86076d26efb77f8b1639c9e1f1388becc281084ffc462515f1369050f895de64
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: a8c4345cc14229562a1f4e153a56ecde9d689f920063c291eda51e1e37c6ef82
kernel-xen-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 66d1a197045f89f837f94badeef4e86fbfbe132e1ce6c59e59e6b72b6d36b777
kernel-xen-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 85a0cedf4df84b0676e5bfe232044aae9ca841e8ce6b7a5a9c91b3a234010ea7
kernel-xen-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: a150d9b237b7e24ef4087685f5289da623f03537bfa77205e4a0d238d6eeaa54
ia64
kernel-2.6.18-400.1.1.el5.ia64.rpm SHA-256: 95d4b71ca5cc1de86d09928dbf6027430e134c59fbcae0a2a058d58123139ae5
kernel-debug-2.6.18-400.1.1.el5.ia64.rpm SHA-256: fc602978a7a15e0163fc926457f939640fc903b14984dfad2b812fa92eec0426
kernel-debug-debuginfo-2.6.18-400.1.1.el5.ia64.rpm SHA-256: 6f9d6099438fce4775306d0c29e3d31c5213faec32443867b293977c56bd0b0e
kernel-debug-devel-2.6.18-400.1.1.el5.ia64.rpm SHA-256: 5ffe60c39f6f5509701446be506eed7685f8df57afb2e217108939ae4882dde0
kernel-debuginfo-2.6.18-400.1.1.el5.ia64.rpm SHA-256: a0de5018bc4d7b35172fda4a640ca6d7915850fb587ee433b3693c292e290805
kernel-debuginfo-common-2.6.18-400.1.1.el5.ia64.rpm SHA-256: 621ca4bc32a32f350f0c1fb16497d7647b8d2b8d719397ffe36bf93bd5cacb5a
kernel-devel-2.6.18-400.1.1.el5.ia64.rpm SHA-256: 5897d81b2c7171451a325198381c23d4c98cdb04f692f7f04fc782a5c9220612
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.ia64.rpm SHA-256: 441433c820ce8efe7f1c03675af2f98ab06ee02847283cec5076f987e402b3f9
kernel-xen-2.6.18-400.1.1.el5.ia64.rpm SHA-256: dd3bd456d77ae89e670d83ad39a4aed38e8c0c6bc6a15386c716bce94cbb19fc
kernel-xen-debuginfo-2.6.18-400.1.1.el5.ia64.rpm SHA-256: ea1e4da86d1145a8a6315c929b2c72a02166253c2f6eeadb2e6c86d5d91483a9
kernel-xen-devel-2.6.18-400.1.1.el5.ia64.rpm SHA-256: 88d06bfe1d75cfe1bf6242143246cee6626cd4fa5b85cf68e9cd46ef5976db9a
i386
kernel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 0e9ff97de6edfee084c54996231e5f3a4c6ca693c73c95252c712b3443d60959
kernel-PAE-2.6.18-400.1.1.el5.i686.rpm SHA-256: bc91130b0dfead92d40b7551c1d32a5a2e8007a9d067a733d3b7df91ab5a03dd
kernel-PAE-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: d6d527ced9e80f0d3a395b3d8a50bc7df7c90677141cb3c00f0407e9d4ecf6db
kernel-PAE-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 042ce60f4b3d216a329fb0382081067e9ebcff4711fc6e45fc08bc126fcac2f5
kernel-debug-2.6.18-400.1.1.el5.i686.rpm SHA-256: b3cefd7a799ed79c7e916396d39c2aa015161235954438a0120d171efde8c2da
kernel-debug-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: c058af51ab4cc31b95f1babf3c02383807d65e2e49b07f9f0f1568606fa5e51b
kernel-debug-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 5b19682670c50e2dcef9268e1a90d5d4a94f1aee89976090d5f9d05a7b0c91bc
kernel-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: 01a9cdabb52dbca1faf30631371d6eb3db497982a5e4816cca31e4b894c758df
kernel-debuginfo-common-2.6.18-400.1.1.el5.i686.rpm SHA-256: 1f3a85f59ee0c40bd948eb98e91c06583ce9218d0967973b4fb9ade4ca5f0d60
kernel-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 56ba51c2656637e394451e277c0bd039b029342605ba32fac7e23930e0a0964a
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.i386.rpm SHA-256: 83c6ebd9d2623798434d766b5a7e7de772e231e60d02f9d01d4d6310cf6c0973
kernel-xen-2.6.18-400.1.1.el5.i686.rpm SHA-256: dce45c56bae060cd85f4783e013d471708062877742372e91613c06e9639f04f
kernel-xen-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: 51da789809a8d3fa81b1fc381acded05a6fa35447acf51eed969b400a055fffe
kernel-xen-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 33f8013d8cea80292e454c4db9cce82ffef196db7d77b325aef8fbfbb798ad75

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-400.1.1.el5.src.rpm SHA-256: 8237306fdd94a50ef9e9f9e4a2539d4548b40570956114ee93f610571dbc0d6e
x86_64
kernel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 81c7bb99234bbcf4acd0309de2fcefbdc5388256755389903fc25e58ceeda6cc
kernel-debug-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: ef9d18f2b8f339043a67348f5c007bb6895c6cf0c9e7b3c39ccafb85ded5aa5e
kernel-debug-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 5466ec40cb65370ff14dea5aae9a7b15bb60c4d313ccbfea716bf17763fe2809
kernel-debug-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 1e53b7039ad4062258ff0e23d067f1bf96a670587cfbf9a79c20cda387cae3b2
kernel-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: da4b2939b5bd213229cef134f5314b71db0f9816930dfab2a8d5b2072deee7df
kernel-debuginfo-common-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 4e82f17d2b0147f35babda78309b07dc939bf9430e013c93058b5e547933f446
kernel-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 86076d26efb77f8b1639c9e1f1388becc281084ffc462515f1369050f895de64
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: a8c4345cc14229562a1f4e153a56ecde9d689f920063c291eda51e1e37c6ef82
kernel-xen-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 66d1a197045f89f837f94badeef4e86fbfbe132e1ce6c59e59e6b72b6d36b777
kernel-xen-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 85a0cedf4df84b0676e5bfe232044aae9ca841e8ce6b7a5a9c91b3a234010ea7
kernel-xen-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: a150d9b237b7e24ef4087685f5289da623f03537bfa77205e4a0d238d6eeaa54
i386
kernel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 0e9ff97de6edfee084c54996231e5f3a4c6ca693c73c95252c712b3443d60959
kernel-PAE-2.6.18-400.1.1.el5.i686.rpm SHA-256: bc91130b0dfead92d40b7551c1d32a5a2e8007a9d067a733d3b7df91ab5a03dd
kernel-PAE-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: d6d527ced9e80f0d3a395b3d8a50bc7df7c90677141cb3c00f0407e9d4ecf6db
kernel-PAE-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 042ce60f4b3d216a329fb0382081067e9ebcff4711fc6e45fc08bc126fcac2f5
kernel-debug-2.6.18-400.1.1.el5.i686.rpm SHA-256: b3cefd7a799ed79c7e916396d39c2aa015161235954438a0120d171efde8c2da
kernel-debug-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: c058af51ab4cc31b95f1babf3c02383807d65e2e49b07f9f0f1568606fa5e51b
kernel-debug-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 5b19682670c50e2dcef9268e1a90d5d4a94f1aee89976090d5f9d05a7b0c91bc
kernel-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: 01a9cdabb52dbca1faf30631371d6eb3db497982a5e4816cca31e4b894c758df
kernel-debuginfo-common-2.6.18-400.1.1.el5.i686.rpm SHA-256: 1f3a85f59ee0c40bd948eb98e91c06583ce9218d0967973b4fb9ade4ca5f0d60
kernel-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 56ba51c2656637e394451e277c0bd039b029342605ba32fac7e23930e0a0964a
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.i386.rpm SHA-256: 83c6ebd9d2623798434d766b5a7e7de772e231e60d02f9d01d4d6310cf6c0973
kernel-xen-2.6.18-400.1.1.el5.i686.rpm SHA-256: dce45c56bae060cd85f4783e013d471708062877742372e91613c06e9639f04f
kernel-xen-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: 51da789809a8d3fa81b1fc381acded05a6fa35447acf51eed969b400a055fffe
kernel-xen-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 33f8013d8cea80292e454c4db9cce82ffef196db7d77b325aef8fbfbb798ad75

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-400.1.1.el5.src.rpm SHA-256: 8237306fdd94a50ef9e9f9e4a2539d4548b40570956114ee93f610571dbc0d6e
x86_64
kernel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 81c7bb99234bbcf4acd0309de2fcefbdc5388256755389903fc25e58ceeda6cc
kernel-debug-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: ef9d18f2b8f339043a67348f5c007bb6895c6cf0c9e7b3c39ccafb85ded5aa5e
kernel-debug-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 5466ec40cb65370ff14dea5aae9a7b15bb60c4d313ccbfea716bf17763fe2809
kernel-debug-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 1e53b7039ad4062258ff0e23d067f1bf96a670587cfbf9a79c20cda387cae3b2
kernel-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: da4b2939b5bd213229cef134f5314b71db0f9816930dfab2a8d5b2072deee7df
kernel-debuginfo-common-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 4e82f17d2b0147f35babda78309b07dc939bf9430e013c93058b5e547933f446
kernel-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 86076d26efb77f8b1639c9e1f1388becc281084ffc462515f1369050f895de64
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: a8c4345cc14229562a1f4e153a56ecde9d689f920063c291eda51e1e37c6ef82
kernel-xen-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 66d1a197045f89f837f94badeef4e86fbfbe132e1ce6c59e59e6b72b6d36b777
kernel-xen-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 85a0cedf4df84b0676e5bfe232044aae9ca841e8ce6b7a5a9c91b3a234010ea7
kernel-xen-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: a150d9b237b7e24ef4087685f5289da623f03537bfa77205e4a0d238d6eeaa54
i386
kernel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 0e9ff97de6edfee084c54996231e5f3a4c6ca693c73c95252c712b3443d60959
kernel-PAE-2.6.18-400.1.1.el5.i686.rpm SHA-256: bc91130b0dfead92d40b7551c1d32a5a2e8007a9d067a733d3b7df91ab5a03dd
kernel-PAE-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: d6d527ced9e80f0d3a395b3d8a50bc7df7c90677141cb3c00f0407e9d4ecf6db
kernel-PAE-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 042ce60f4b3d216a329fb0382081067e9ebcff4711fc6e45fc08bc126fcac2f5
kernel-debug-2.6.18-400.1.1.el5.i686.rpm SHA-256: b3cefd7a799ed79c7e916396d39c2aa015161235954438a0120d171efde8c2da
kernel-debug-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: c058af51ab4cc31b95f1babf3c02383807d65e2e49b07f9f0f1568606fa5e51b
kernel-debug-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 5b19682670c50e2dcef9268e1a90d5d4a94f1aee89976090d5f9d05a7b0c91bc
kernel-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: 01a9cdabb52dbca1faf30631371d6eb3db497982a5e4816cca31e4b894c758df
kernel-debuginfo-common-2.6.18-400.1.1.el5.i686.rpm SHA-256: 1f3a85f59ee0c40bd948eb98e91c06583ce9218d0967973b4fb9ade4ca5f0d60
kernel-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 56ba51c2656637e394451e277c0bd039b029342605ba32fac7e23930e0a0964a
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.i386.rpm SHA-256: 83c6ebd9d2623798434d766b5a7e7de772e231e60d02f9d01d4d6310cf6c0973
kernel-xen-2.6.18-400.1.1.el5.i686.rpm SHA-256: dce45c56bae060cd85f4783e013d471708062877742372e91613c06e9639f04f
kernel-xen-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: 51da789809a8d3fa81b1fc381acded05a6fa35447acf51eed969b400a055fffe
kernel-xen-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 33f8013d8cea80292e454c4db9cce82ffef196db7d77b325aef8fbfbb798ad75

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-400.1.1.el5.src.rpm SHA-256: 8237306fdd94a50ef9e9f9e4a2539d4548b40570956114ee93f610571dbc0d6e
s390x
kernel-2.6.18-400.1.1.el5.s390x.rpm SHA-256: 0490220fe7e1d4c1160da926285d104503df98b8abd0ee2b1a93b4039549234e
kernel-debug-2.6.18-400.1.1.el5.s390x.rpm SHA-256: 5e0dc883f88c8840a86ac4eb5501210c5fcd689b2e30ffd16b0950cc9e5636e2
kernel-debug-debuginfo-2.6.18-400.1.1.el5.s390x.rpm SHA-256: 777f265bde4d36d242d2cb7ac525654092216d1622b5c7d71490cdddea2d353e
kernel-debug-devel-2.6.18-400.1.1.el5.s390x.rpm SHA-256: e3108d988408282a28a422a1ff2859322011839a3f009930f91b4cb7d1f57d46
kernel-debuginfo-2.6.18-400.1.1.el5.s390x.rpm SHA-256: 584076d91d18e21bc7c49209de48c0c00402f396eba66ff7ae41721653df0af8
kernel-debuginfo-common-2.6.18-400.1.1.el5.s390x.rpm SHA-256: b4039d2cc903c6d67455d282773f0dda8253d01102c6bbd88deb489c65a254ab
kernel-devel-2.6.18-400.1.1.el5.s390x.rpm SHA-256: dab9d74d0b4f85f59e0756c78aa95556653ad4826a318e8ea24d527426511dd2
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.s390x.rpm SHA-256: 3fbee199c3e2847395d4dc64868051869d16b6d8b49a9b07f5eefea3978263fd
kernel-kdump-2.6.18-400.1.1.el5.s390x.rpm SHA-256: 6b23ce56eb84134c051fdca0623151be9c8cd5c01a2a52a848ac4b5d203245c8
kernel-kdump-debuginfo-2.6.18-400.1.1.el5.s390x.rpm SHA-256: 57d0c0bff4791b17b026c3e596646c8f0c268e03a3212945bbe1c64068a3c6d3
kernel-kdump-devel-2.6.18-400.1.1.el5.s390x.rpm SHA-256: e6fe887ebca8bce91c500734cef0c728ed05809ebc436052b03014da0227be5c

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-400.1.1.el5.src.rpm SHA-256: 8237306fdd94a50ef9e9f9e4a2539d4548b40570956114ee93f610571dbc0d6e
ppc
kernel-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: ed4d96c8e32ea1898c197552d1fe4ee1175bc454e89057f7384aa57ae475389f
kernel-debug-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: 2ff9e225edf2354fbe223b3e584e26c6ecb17e5ef56cdf2362b7f5bf7c28a434
kernel-debug-debuginfo-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: 03350ef01adad9f6665e3209487eec6ae0fbaa657c5b8b6c211b7603c0615521
kernel-debug-devel-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: 1054d18ea3f82adcba14ec475d884027c4585db40ca392a5c50be177731d0346
kernel-debuginfo-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: 5007b541c8db87fef19d573de8e81fa40cf3bd7f515a8607c4fc23f76182ff76
kernel-debuginfo-common-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: eaa285d6651a77e9d3dab070ecf1428999942dd7018dee1cbd3056b6df1574e2
kernel-devel-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: dbc6c012c4bed5582bf7330a460fd3e441a78b5ada9669e711f088ed990b0312
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.ppc.rpm SHA-256: 95d4ec3528ac3d475d79212c39464eb0c05ebb9028f6d59fbf2ae1fa39a82231
kernel-headers-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: 230e2ccf3344f7b0dd2fbf8b632dc824365658d2d1a3ab3a67630424ed36354d
kernel-kdump-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: 85b541ca2c5a953e4179e40a852d6cca41d1d78478aaa47674ab69d86e557aca
kernel-kdump-debuginfo-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: a4b61a2b841d8b588b4b7f714767ebe01ea15b587649f63fbe4f673e67fa878b
kernel-kdump-devel-2.6.18-400.1.1.el5.ppc64.rpm SHA-256: 6047361ec02761f4545474337d41690ad5c7f1569f874ea6ab56568a9173ea9f

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-400.1.1.el5.src.rpm SHA-256: 8237306fdd94a50ef9e9f9e4a2539d4548b40570956114ee93f610571dbc0d6e
x86_64
kernel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 81c7bb99234bbcf4acd0309de2fcefbdc5388256755389903fc25e58ceeda6cc
kernel-debug-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: ef9d18f2b8f339043a67348f5c007bb6895c6cf0c9e7b3c39ccafb85ded5aa5e
kernel-debug-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 5466ec40cb65370ff14dea5aae9a7b15bb60c4d313ccbfea716bf17763fe2809
kernel-debug-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 1e53b7039ad4062258ff0e23d067f1bf96a670587cfbf9a79c20cda387cae3b2
kernel-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: da4b2939b5bd213229cef134f5314b71db0f9816930dfab2a8d5b2072deee7df
kernel-debuginfo-common-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 4e82f17d2b0147f35babda78309b07dc939bf9430e013c93058b5e547933f446
kernel-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 86076d26efb77f8b1639c9e1f1388becc281084ffc462515f1369050f895de64
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: a8c4345cc14229562a1f4e153a56ecde9d689f920063c291eda51e1e37c6ef82
kernel-xen-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 66d1a197045f89f837f94badeef4e86fbfbe132e1ce6c59e59e6b72b6d36b777
kernel-xen-debuginfo-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: 85a0cedf4df84b0676e5bfe232044aae9ca841e8ce6b7a5a9c91b3a234010ea7
kernel-xen-devel-2.6.18-400.1.1.el5.x86_64.rpm SHA-256: a150d9b237b7e24ef4087685f5289da623f03537bfa77205e4a0d238d6eeaa54
i386
kernel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 0e9ff97de6edfee084c54996231e5f3a4c6ca693c73c95252c712b3443d60959
kernel-PAE-2.6.18-400.1.1.el5.i686.rpm SHA-256: bc91130b0dfead92d40b7551c1d32a5a2e8007a9d067a733d3b7df91ab5a03dd
kernel-PAE-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: d6d527ced9e80f0d3a395b3d8a50bc7df7c90677141cb3c00f0407e9d4ecf6db
kernel-PAE-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 042ce60f4b3d216a329fb0382081067e9ebcff4711fc6e45fc08bc126fcac2f5
kernel-debug-2.6.18-400.1.1.el5.i686.rpm SHA-256: b3cefd7a799ed79c7e916396d39c2aa015161235954438a0120d171efde8c2da
kernel-debug-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: c058af51ab4cc31b95f1babf3c02383807d65e2e49b07f9f0f1568606fa5e51b
kernel-debug-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 5b19682670c50e2dcef9268e1a90d5d4a94f1aee89976090d5f9d05a7b0c91bc
kernel-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: 01a9cdabb52dbca1faf30631371d6eb3db497982a5e4816cca31e4b894c758df
kernel-debuginfo-common-2.6.18-400.1.1.el5.i686.rpm SHA-256: 1f3a85f59ee0c40bd948eb98e91c06583ce9218d0967973b4fb9ade4ca5f0d60
kernel-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 56ba51c2656637e394451e277c0bd039b029342605ba32fac7e23930e0a0964a
kernel-doc-2.6.18-400.1.1.el5.noarch.rpm SHA-256: fcfebdffae7f1ea32c071440eb11acb45c0a3827234e0f60f57585fbc3b08d38
kernel-headers-2.6.18-400.1.1.el5.i386.rpm SHA-256: 83c6ebd9d2623798434d766b5a7e7de772e231e60d02f9d01d4d6310cf6c0973
kernel-xen-2.6.18-400.1.1.el5.i686.rpm SHA-256: dce45c56bae060cd85f4783e013d471708062877742372e91613c06e9639f04f
kernel-xen-debuginfo-2.6.18-400.1.1.el5.i686.rpm SHA-256: 51da789809a8d3fa81b1fc381acded05a6fa35447acf51eed969b400a055fffe
kernel-xen-devel-2.6.18-400.1.1.el5.i686.rpm SHA-256: 33f8013d8cea80292e454c4db9cce82ffef196db7d77b325aef8fbfbb798ad75

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Statement effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter