Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:0783 - Security Advisory
Issued:
2015-04-07
Updated:
2015-04-07

RHSA-2015:0783 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues and two bugs are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • It was found that the Linux kernel's Infiniband subsystem did not

properly sanitize input parameters while registering memory regions from
user space via the (u)verbs API. A local user with access to a
/dev/infiniband/uverbsX device could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2014-8159,
Important)

  • An insufficient bound checking flaw was found in the Xen hypervisor's

implementation of acceleration support for the "REP MOVS" instructions.
A privileged HVM guest user could potentially use this flaw to crash the
host. (CVE-2014-8867, Important)

Red Hat would like to thank Mellanox for reporting CVE-2014-8159, and the
Xen project for reporting CVE-2014-8867.

This update also fixes the following bugs:

  • Under memory pressure, cached data was previously flushed to the backing

server using the PID of the thread responsible for flushing the data in the
Server Message Block (SMB) headers instead of the PID of the thread which
actually wrote the data. As a consequence, when a file was locked by the
writing thread prior to writing, the server considered writes by the thread
flushing the pagecache as being a separate process from writing to a locked
file, and thus rejected the writes. In addition, the data to be written was
discarded. This update ensures that the correct PID is sent to the server,
and data corruption is avoided when data is being written from a client
under memory pressure. (BZ#1169304)

  • This update adds support for new cryptographic hardware in toleration

mode for IBM System z. (BZ#1182522)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1164255 - CVE-2014-8867 xen: Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor (xsa112)
  • BZ - 1181166 - CVE-2014-8159 kernel: infiniband: uverbs: unprotected physical memory access

CVEs

  • CVE-2014-8159
  • CVE-2014-8867

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-404.el5.src.rpm SHA-256: 143edf2dc90e310318b16021fb7235b414ddc5216abd91a783afa1b0fc9dcd4d
x86_64
kernel-2.6.18-404.el5.x86_64.rpm SHA-256: 75dc1578a5641a10175f0d4c5a73bdcc2e01ee0954653207b9b8852099334d69
kernel-debug-2.6.18-404.el5.x86_64.rpm SHA-256: ec978598a9f2177e990cff7f787648b8c0a49efea4cd878ba4fc4a0cf80fe202
kernel-debug-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 8705b450ab6a5bb49095a302eebd4aeedff6ab4d3f9686a47047f5f3cac5c65b
kernel-debug-devel-2.6.18-404.el5.x86_64.rpm SHA-256: d1472feec624588df20c3580b083f168a8b920039396b2dee561cd3d768fcc09
kernel-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 4cb1290d43601edac456ab51a209525044c537a059cdaa90e1a3ed0990a7395a
kernel-debuginfo-common-2.6.18-404.el5.x86_64.rpm SHA-256: 89a88949ccd47fdcabedae6b0f751369b8b5d3ca054f0c92634483b69bc6a6f5
kernel-devel-2.6.18-404.el5.x86_64.rpm SHA-256: bf89475c6501cfda0bba94233396df9df8577fbfae3d5052642841dbae42c446
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.x86_64.rpm SHA-256: 1bed2e594659bf309e92696286fd520d7d53a23d537a47785795799749bea814
kernel-xen-2.6.18-404.el5.x86_64.rpm SHA-256: 8f0984c174902d0b876bec86c38257b33d2cc522497b13fcaed984292d66ef89
kernel-xen-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 21b9be07f7082de74d9e22c8c147ab2ad5ceef1c4021f2c2877f2e83ae2b18bd
kernel-xen-devel-2.6.18-404.el5.x86_64.rpm SHA-256: 3e5785512d6d4414e3b6ad7166d6508ac8f0ff1a0593ca32a0218a23e1285a82
ia64
kernel-2.6.18-404.el5.ia64.rpm SHA-256: 470fe3812bcb96a93c70c8d8e5e882c61c83d81d15d597148f247511874b0f6f
kernel-debug-2.6.18-404.el5.ia64.rpm SHA-256: 7a75c33f9626fece6200284939ded788b509206f2feb369d590ccc5ea16e58c7
kernel-debug-debuginfo-2.6.18-404.el5.ia64.rpm SHA-256: 939a66ef57d012744fbc46ba78142d271cb8cdf540ce0ec2d032519cb01ff696
kernel-debug-devel-2.6.18-404.el5.ia64.rpm SHA-256: 0986d0a92dcef87225966486065fb1de334f3327337bca3f7d409debfc112b89
kernel-debuginfo-2.6.18-404.el5.ia64.rpm SHA-256: f9f2856ee2d83543cbde9dccd48fcd262b55ab89729a76f104fe596e0897db28
kernel-debuginfo-common-2.6.18-404.el5.ia64.rpm SHA-256: 245a6c75efe9e46c95ece07b25481a3643b05024166feab3a63ed9f2d3b2ac59
kernel-devel-2.6.18-404.el5.ia64.rpm SHA-256: d54073e4f6a5fed951e3a85267b55e80ca35da8b35761e05f5107e69229c73ef
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.ia64.rpm SHA-256: 7de4dfef6f81c02903965d7f47dc9994056083f95806e5e6669a2656fa416b23
kernel-xen-2.6.18-404.el5.ia64.rpm SHA-256: cae9c1780e7885bce5d221a9945a395ba56549b202c3df1e1dcb760ef3642561
kernel-xen-debuginfo-2.6.18-404.el5.ia64.rpm SHA-256: b95978c318f15faef86647fce4fd331ff32fe25f2f64ac71e86d2dff6f27e6b4
kernel-xen-devel-2.6.18-404.el5.ia64.rpm SHA-256: 22dee89f9e730f04c3d5d43127eeb77972172854bac950dcec0e61a4ec881529
i386
kernel-2.6.18-404.el5.i686.rpm SHA-256: 9af8b7583bd0efa2705d5eeea2afb22e4d76299e9a599525e814de6fc468a665
kernel-PAE-2.6.18-404.el5.i686.rpm SHA-256: e18fe91d9bf718822fc2b73f90a2a727ace837c8c5691d39d7b883746a262612
kernel-PAE-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: fd92f53e61e6c6d7a7dcb126f7d5c2aeff136fd69768bfce5d2d923c78686ea4
kernel-PAE-devel-2.6.18-404.el5.i686.rpm SHA-256: 7645c552629cab406dc89fa873a7f6300d48b65eda622a0b501e6acc20569914
kernel-debug-2.6.18-404.el5.i686.rpm SHA-256: 13a074fd90b15be575bd671ba42f3f805daba0044ffe45babfd92de4a3315139
kernel-debug-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: 18582914e346cbcc97e2d3118d3566097f7a64b7a70da8a023f43c1403f135f1
kernel-debug-devel-2.6.18-404.el5.i686.rpm SHA-256: 88a23322834bb9dcd4f47feab668f1d35e6415c8d780f9df19b29d7e0b7ac26f
kernel-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: eba15d46337737125abbf6e7f400f7f15cfdb9e165be87cfc408ba2a2d7dd658
kernel-debuginfo-common-2.6.18-404.el5.i686.rpm SHA-256: f83f18fb1ee9ecb6f62345c262f1e83784ad6acc06ac882714f7cfeb03ccdd2f
kernel-devel-2.6.18-404.el5.i686.rpm SHA-256: eec83a354975a4a3adfb354b5f12a68a3b6e5087254936b3a900c6011939e1fe
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.i386.rpm SHA-256: b9e551ce6feff319914184b97263d4a0c78fc27bde6ade843ce7d730684b3e47
kernel-xen-2.6.18-404.el5.i686.rpm SHA-256: fae7dac32fa2a66b13a5692967647438c6739503d2b9cc8d31ec82fb7499bd20
kernel-xen-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: fde0e901b42edb4b2c04ea089deec10ebaa41e92c2c1ec82ad4213ec3b8983eb
kernel-xen-devel-2.6.18-404.el5.i686.rpm SHA-256: a7b3e293ae335c34f847f210a0b178818412f107323eee24dbcc878403aa7e94

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-404.el5.src.rpm SHA-256: 143edf2dc90e310318b16021fb7235b414ddc5216abd91a783afa1b0fc9dcd4d
x86_64
kernel-2.6.18-404.el5.x86_64.rpm SHA-256: 75dc1578a5641a10175f0d4c5a73bdcc2e01ee0954653207b9b8852099334d69
kernel-debug-2.6.18-404.el5.x86_64.rpm SHA-256: ec978598a9f2177e990cff7f787648b8c0a49efea4cd878ba4fc4a0cf80fe202
kernel-debug-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 8705b450ab6a5bb49095a302eebd4aeedff6ab4d3f9686a47047f5f3cac5c65b
kernel-debug-devel-2.6.18-404.el5.x86_64.rpm SHA-256: d1472feec624588df20c3580b083f168a8b920039396b2dee561cd3d768fcc09
kernel-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 4cb1290d43601edac456ab51a209525044c537a059cdaa90e1a3ed0990a7395a
kernel-debuginfo-common-2.6.18-404.el5.x86_64.rpm SHA-256: 89a88949ccd47fdcabedae6b0f751369b8b5d3ca054f0c92634483b69bc6a6f5
kernel-devel-2.6.18-404.el5.x86_64.rpm SHA-256: bf89475c6501cfda0bba94233396df9df8577fbfae3d5052642841dbae42c446
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.x86_64.rpm SHA-256: 1bed2e594659bf309e92696286fd520d7d53a23d537a47785795799749bea814
kernel-xen-2.6.18-404.el5.x86_64.rpm SHA-256: 8f0984c174902d0b876bec86c38257b33d2cc522497b13fcaed984292d66ef89
kernel-xen-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 21b9be07f7082de74d9e22c8c147ab2ad5ceef1c4021f2c2877f2e83ae2b18bd
kernel-xen-devel-2.6.18-404.el5.x86_64.rpm SHA-256: 3e5785512d6d4414e3b6ad7166d6508ac8f0ff1a0593ca32a0218a23e1285a82
i386
kernel-2.6.18-404.el5.i686.rpm SHA-256: 9af8b7583bd0efa2705d5eeea2afb22e4d76299e9a599525e814de6fc468a665
kernel-PAE-2.6.18-404.el5.i686.rpm SHA-256: e18fe91d9bf718822fc2b73f90a2a727ace837c8c5691d39d7b883746a262612
kernel-PAE-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: fd92f53e61e6c6d7a7dcb126f7d5c2aeff136fd69768bfce5d2d923c78686ea4
kernel-PAE-devel-2.6.18-404.el5.i686.rpm SHA-256: 7645c552629cab406dc89fa873a7f6300d48b65eda622a0b501e6acc20569914
kernel-debug-2.6.18-404.el5.i686.rpm SHA-256: 13a074fd90b15be575bd671ba42f3f805daba0044ffe45babfd92de4a3315139
kernel-debug-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: 18582914e346cbcc97e2d3118d3566097f7a64b7a70da8a023f43c1403f135f1
kernel-debug-devel-2.6.18-404.el5.i686.rpm SHA-256: 88a23322834bb9dcd4f47feab668f1d35e6415c8d780f9df19b29d7e0b7ac26f
kernel-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: eba15d46337737125abbf6e7f400f7f15cfdb9e165be87cfc408ba2a2d7dd658
kernel-debuginfo-common-2.6.18-404.el5.i686.rpm SHA-256: f83f18fb1ee9ecb6f62345c262f1e83784ad6acc06ac882714f7cfeb03ccdd2f
kernel-devel-2.6.18-404.el5.i686.rpm SHA-256: eec83a354975a4a3adfb354b5f12a68a3b6e5087254936b3a900c6011939e1fe
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.i386.rpm SHA-256: b9e551ce6feff319914184b97263d4a0c78fc27bde6ade843ce7d730684b3e47
kernel-xen-2.6.18-404.el5.i686.rpm SHA-256: fae7dac32fa2a66b13a5692967647438c6739503d2b9cc8d31ec82fb7499bd20
kernel-xen-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: fde0e901b42edb4b2c04ea089deec10ebaa41e92c2c1ec82ad4213ec3b8983eb
kernel-xen-devel-2.6.18-404.el5.i686.rpm SHA-256: a7b3e293ae335c34f847f210a0b178818412f107323eee24dbcc878403aa7e94

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-404.el5.src.rpm SHA-256: 143edf2dc90e310318b16021fb7235b414ddc5216abd91a783afa1b0fc9dcd4d
x86_64
kernel-2.6.18-404.el5.x86_64.rpm SHA-256: 75dc1578a5641a10175f0d4c5a73bdcc2e01ee0954653207b9b8852099334d69
kernel-debug-2.6.18-404.el5.x86_64.rpm SHA-256: ec978598a9f2177e990cff7f787648b8c0a49efea4cd878ba4fc4a0cf80fe202
kernel-debug-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 8705b450ab6a5bb49095a302eebd4aeedff6ab4d3f9686a47047f5f3cac5c65b
kernel-debug-devel-2.6.18-404.el5.x86_64.rpm SHA-256: d1472feec624588df20c3580b083f168a8b920039396b2dee561cd3d768fcc09
kernel-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 4cb1290d43601edac456ab51a209525044c537a059cdaa90e1a3ed0990a7395a
kernel-debuginfo-common-2.6.18-404.el5.x86_64.rpm SHA-256: 89a88949ccd47fdcabedae6b0f751369b8b5d3ca054f0c92634483b69bc6a6f5
kernel-devel-2.6.18-404.el5.x86_64.rpm SHA-256: bf89475c6501cfda0bba94233396df9df8577fbfae3d5052642841dbae42c446
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.x86_64.rpm SHA-256: 1bed2e594659bf309e92696286fd520d7d53a23d537a47785795799749bea814
kernel-xen-2.6.18-404.el5.x86_64.rpm SHA-256: 8f0984c174902d0b876bec86c38257b33d2cc522497b13fcaed984292d66ef89
kernel-xen-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 21b9be07f7082de74d9e22c8c147ab2ad5ceef1c4021f2c2877f2e83ae2b18bd
kernel-xen-devel-2.6.18-404.el5.x86_64.rpm SHA-256: 3e5785512d6d4414e3b6ad7166d6508ac8f0ff1a0593ca32a0218a23e1285a82
i386
kernel-2.6.18-404.el5.i686.rpm SHA-256: 9af8b7583bd0efa2705d5eeea2afb22e4d76299e9a599525e814de6fc468a665
kernel-PAE-2.6.18-404.el5.i686.rpm SHA-256: e18fe91d9bf718822fc2b73f90a2a727ace837c8c5691d39d7b883746a262612
kernel-PAE-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: fd92f53e61e6c6d7a7dcb126f7d5c2aeff136fd69768bfce5d2d923c78686ea4
kernel-PAE-devel-2.6.18-404.el5.i686.rpm SHA-256: 7645c552629cab406dc89fa873a7f6300d48b65eda622a0b501e6acc20569914
kernel-debug-2.6.18-404.el5.i686.rpm SHA-256: 13a074fd90b15be575bd671ba42f3f805daba0044ffe45babfd92de4a3315139
kernel-debug-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: 18582914e346cbcc97e2d3118d3566097f7a64b7a70da8a023f43c1403f135f1
kernel-debug-devel-2.6.18-404.el5.i686.rpm SHA-256: 88a23322834bb9dcd4f47feab668f1d35e6415c8d780f9df19b29d7e0b7ac26f
kernel-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: eba15d46337737125abbf6e7f400f7f15cfdb9e165be87cfc408ba2a2d7dd658
kernel-debuginfo-common-2.6.18-404.el5.i686.rpm SHA-256: f83f18fb1ee9ecb6f62345c262f1e83784ad6acc06ac882714f7cfeb03ccdd2f
kernel-devel-2.6.18-404.el5.i686.rpm SHA-256: eec83a354975a4a3adfb354b5f12a68a3b6e5087254936b3a900c6011939e1fe
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.i386.rpm SHA-256: b9e551ce6feff319914184b97263d4a0c78fc27bde6ade843ce7d730684b3e47
kernel-xen-2.6.18-404.el5.i686.rpm SHA-256: fae7dac32fa2a66b13a5692967647438c6739503d2b9cc8d31ec82fb7499bd20
kernel-xen-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: fde0e901b42edb4b2c04ea089deec10ebaa41e92c2c1ec82ad4213ec3b8983eb
kernel-xen-devel-2.6.18-404.el5.i686.rpm SHA-256: a7b3e293ae335c34f847f210a0b178818412f107323eee24dbcc878403aa7e94

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-404.el5.src.rpm SHA-256: 143edf2dc90e310318b16021fb7235b414ddc5216abd91a783afa1b0fc9dcd4d
s390x
kernel-2.6.18-404.el5.s390x.rpm SHA-256: f69492457f567ef1ab2003eaa74aad3b59463acc95f1602f0969beda47208264
kernel-debug-2.6.18-404.el5.s390x.rpm SHA-256: cdba360104964de3895481be35172a89b51a4356860b8cff6173bc56edbb0186
kernel-debug-debuginfo-2.6.18-404.el5.s390x.rpm SHA-256: 11dc0fadab7eb2a9c77db904abe46db069d049c79a2c54fb00c07b3c2e891d60
kernel-debug-devel-2.6.18-404.el5.s390x.rpm SHA-256: d3a993a085a378d09e9f555aa792ccf53a7f093cf7d395b737eed6246be4c59c
kernel-debuginfo-2.6.18-404.el5.s390x.rpm SHA-256: 438b87c15d52f6ede0c984898586e6f3f1933413b0c97a9f03647a39672e28aa
kernel-debuginfo-common-2.6.18-404.el5.s390x.rpm SHA-256: db03840c4cbb23eb7fcb08060c9c842720fa01efe72647ba87d4b50566fc356b
kernel-devel-2.6.18-404.el5.s390x.rpm SHA-256: e01d78b0030569720e54f696b20abc964b531d26a1d140b06e8b17a65fe5688e
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.s390x.rpm SHA-256: aa1571d057a9a00be88ecc473fc244d110c71cf2f8a38af00a48f8886ee1c553
kernel-kdump-2.6.18-404.el5.s390x.rpm SHA-256: 55d146473cc21d299c89d3ecf8f226eb80b2e8ce62ed082024527d17fa89dca3
kernel-kdump-debuginfo-2.6.18-404.el5.s390x.rpm SHA-256: 379c20fae1ea6af203a6642351b49e55a0ffe09ca6773ef6e976bd3f5cc93d54
kernel-kdump-devel-2.6.18-404.el5.s390x.rpm SHA-256: ba732d0f35ebecac75ebc6d986eea523c20940a3ad30330e5290d3a91fe11fe7

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-404.el5.src.rpm SHA-256: 143edf2dc90e310318b16021fb7235b414ddc5216abd91a783afa1b0fc9dcd4d
ppc
kernel-2.6.18-404.el5.ppc64.rpm SHA-256: c9a9ef0fd4191ab7b3d7d848cc319292187373d99e0f3cb5ae6aaa0e10bc63a0
kernel-debug-2.6.18-404.el5.ppc64.rpm SHA-256: 9922398dd5f1d4e6a0f5492128dca3954ba88094f5aa886fe81fb719cece67b4
kernel-debug-debuginfo-2.6.18-404.el5.ppc64.rpm SHA-256: 4a2bc1a0011ce9c03c521fa47247da89681e22fbc5e017551b8d7dad27ab2309
kernel-debug-devel-2.6.18-404.el5.ppc64.rpm SHA-256: 3d975f2b81a0c6a65e67937330374e05aaa1d5bc8b686c7ef0a1b965b8c29223
kernel-debuginfo-2.6.18-404.el5.ppc64.rpm SHA-256: 544acf2e3d3c478e41af99f9d14b1f6c4793517d8d1b5f7191c2b1ac08d3cdef
kernel-debuginfo-common-2.6.18-404.el5.ppc64.rpm SHA-256: 76f6f640e33d12832fa021dff4d69a423da8b4b08fc83ea9facca739a6f371c4
kernel-devel-2.6.18-404.el5.ppc64.rpm SHA-256: 32e259940f7191e31fed2f4682e415c13e878d8a1bd2fa19f86f0192a0b6634e
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.ppc.rpm SHA-256: 401639c577f7d21d488cc438fada5477ba56e84996c3771f8c6e9f900b66d3d1
kernel-headers-2.6.18-404.el5.ppc64.rpm SHA-256: 031d72d5e1bc788d89943edc194108bdfd3848d5150a1f820ea18714c8cf5bbe
kernel-kdump-2.6.18-404.el5.ppc64.rpm SHA-256: c02d819b0ec527ee5398ce996a6ebcb7fed01af1941264969815fb3e8855ddaf
kernel-kdump-debuginfo-2.6.18-404.el5.ppc64.rpm SHA-256: dbefe3b50fc422306ed85adf12b2b8866e0cfe156328e4871f369283c7ea294f
kernel-kdump-devel-2.6.18-404.el5.ppc64.rpm SHA-256: cc7d3b23dd2ae25e2426503706394145ee3afcf0df10a7034344d80226236ae0

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-404.el5.src.rpm SHA-256: 143edf2dc90e310318b16021fb7235b414ddc5216abd91a783afa1b0fc9dcd4d
x86_64
kernel-2.6.18-404.el5.x86_64.rpm SHA-256: 75dc1578a5641a10175f0d4c5a73bdcc2e01ee0954653207b9b8852099334d69
kernel-debug-2.6.18-404.el5.x86_64.rpm SHA-256: ec978598a9f2177e990cff7f787648b8c0a49efea4cd878ba4fc4a0cf80fe202
kernel-debug-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 8705b450ab6a5bb49095a302eebd4aeedff6ab4d3f9686a47047f5f3cac5c65b
kernel-debug-devel-2.6.18-404.el5.x86_64.rpm SHA-256: d1472feec624588df20c3580b083f168a8b920039396b2dee561cd3d768fcc09
kernel-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 4cb1290d43601edac456ab51a209525044c537a059cdaa90e1a3ed0990a7395a
kernel-debuginfo-common-2.6.18-404.el5.x86_64.rpm SHA-256: 89a88949ccd47fdcabedae6b0f751369b8b5d3ca054f0c92634483b69bc6a6f5
kernel-devel-2.6.18-404.el5.x86_64.rpm SHA-256: bf89475c6501cfda0bba94233396df9df8577fbfae3d5052642841dbae42c446
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.x86_64.rpm SHA-256: 1bed2e594659bf309e92696286fd520d7d53a23d537a47785795799749bea814
kernel-xen-2.6.18-404.el5.x86_64.rpm SHA-256: 8f0984c174902d0b876bec86c38257b33d2cc522497b13fcaed984292d66ef89
kernel-xen-debuginfo-2.6.18-404.el5.x86_64.rpm SHA-256: 21b9be07f7082de74d9e22c8c147ab2ad5ceef1c4021f2c2877f2e83ae2b18bd
kernel-xen-devel-2.6.18-404.el5.x86_64.rpm SHA-256: 3e5785512d6d4414e3b6ad7166d6508ac8f0ff1a0593ca32a0218a23e1285a82
i386
kernel-2.6.18-404.el5.i686.rpm SHA-256: 9af8b7583bd0efa2705d5eeea2afb22e4d76299e9a599525e814de6fc468a665
kernel-PAE-2.6.18-404.el5.i686.rpm SHA-256: e18fe91d9bf718822fc2b73f90a2a727ace837c8c5691d39d7b883746a262612
kernel-PAE-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: fd92f53e61e6c6d7a7dcb126f7d5c2aeff136fd69768bfce5d2d923c78686ea4
kernel-PAE-devel-2.6.18-404.el5.i686.rpm SHA-256: 7645c552629cab406dc89fa873a7f6300d48b65eda622a0b501e6acc20569914
kernel-debug-2.6.18-404.el5.i686.rpm SHA-256: 13a074fd90b15be575bd671ba42f3f805daba0044ffe45babfd92de4a3315139
kernel-debug-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: 18582914e346cbcc97e2d3118d3566097f7a64b7a70da8a023f43c1403f135f1
kernel-debug-devel-2.6.18-404.el5.i686.rpm SHA-256: 88a23322834bb9dcd4f47feab668f1d35e6415c8d780f9df19b29d7e0b7ac26f
kernel-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: eba15d46337737125abbf6e7f400f7f15cfdb9e165be87cfc408ba2a2d7dd658
kernel-debuginfo-common-2.6.18-404.el5.i686.rpm SHA-256: f83f18fb1ee9ecb6f62345c262f1e83784ad6acc06ac882714f7cfeb03ccdd2f
kernel-devel-2.6.18-404.el5.i686.rpm SHA-256: eec83a354975a4a3adfb354b5f12a68a3b6e5087254936b3a900c6011939e1fe
kernel-doc-2.6.18-404.el5.noarch.rpm SHA-256: ebcb326eb01cb8d4f54cde6e91b1e4eea671ac32e9aa2ac95b25b693113cbb5e
kernel-headers-2.6.18-404.el5.i386.rpm SHA-256: b9e551ce6feff319914184b97263d4a0c78fc27bde6ade843ce7d730684b3e47
kernel-xen-2.6.18-404.el5.i686.rpm SHA-256: fae7dac32fa2a66b13a5692967647438c6739503d2b9cc8d31ec82fb7499bd20
kernel-xen-debuginfo-2.6.18-404.el5.i686.rpm SHA-256: fde0e901b42edb4b2c04ea089deec10ebaa41e92c2c1ec82ad4213ec3b8983eb
kernel-xen-devel-2.6.18-404.el5.i686.rpm SHA-256: a7b3e293ae335c34f847f210a0b178818412f107323eee24dbcc878403aa7e94

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter