Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2015:1042 - Security Advisory
Issued:
2015-06-02
Updated:
2015-06-02

RHSA-2015:1042 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • It was found that the Linux kernel's implementation of vectored pipe read

and write functionality did not take into account the I/O vectors that were
already processed when retrying after a failed atomic access operation,
potentially resulting in memory corruption due to an I/O vector array
overrun. A local, unprivileged user could use this flaw to crash the system
or, potentially, escalate their privileges on the system. (CVE-2015-1805,
Important)

The security impact of this issue was discovered by Red Hat.

This update fixes the following bugs:

  • Due to a bug in the lpfc_device_reset_handler() function, a scsi command

timeout could lead to a system crash. With this update,
lpfc_device_reset_handler recovers storage without crashing. (BZ#1070964)

  • Due to the code decrementing the reclaim_in_progress counter without

having incremented it first, severe spinlock contention occurred in the
shrink_zone() function even though the vm.max_reclaims_in_progress feature
was set to 1. This update provides a patch fixing the underlying source
code, and spinlock contention no longer occurs in this scenario.
(BZ#1164105)

  • A TCP socket using SACK that had a retransmission but recovered from it,

failed to reset the retransmission timestamp. As a consequence, on certain
connections, if a packet had to be re-transmitted, the retrans_stamp
variable was only cleared when the next acked packet was received.
This could lead to an early abortion of the TCP connection if this next
packet also got lost. With this update, the socket clears retrans_stamp
when the recovery is completed, thus fixing the bug. (BZ#1205521)

  • Previously, the signal delivery paths did not clear the TS_USEDFPU flag,

which could cause problems in the switch_to() function and lead to
floating-point unit (FPU) corruption. With this update, TS_USEDFPU is
cleared as expected, and FPU is no longer under threat of corruption.
(BZ#1193505)

  • A race condition in the exit_sem() function previously caused the

semaphore undo list corruption. As a consequence, a kernel crash could
occur. The corruption in the semaphore undo list has been fixed, and the
kernel no longer crashes in this situation. (BZ#1124574)

  • Previously, when running the "virsh blockresize [Device] [Newsize]"

command to resize the disk, the new size was not reflected in a Red Hat
Enterprise Linux 5 Virtual Machine (VM). With this update, the new size is
now reflected online immediately in a Red Hat Enterprise Linux 5 VM so it
is no longer necessary to reboot the VM to see the new disk size.
(BZ#1200855)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption

CVEs

  • CVE-2015-1805

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-406.el5.src.rpm SHA-256: 9862e7361a6993ad3893f2dcdd60b174cfdcdc25d1117fe4c8baf9b8f381a10c
x86_64
kernel-2.6.18-406.el5.x86_64.rpm SHA-256: cb8b0f16bb2e620d0cc71276fcc6757f36c66fd6ad82567f0799a23813ae1fa9
kernel-debug-2.6.18-406.el5.x86_64.rpm SHA-256: 327bbbbc4c7a4dedc644a8b4f563d50e4e8be35a9994971862e1b5d9280f3ab7
kernel-debug-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: deeb908a6e6f1ae0faec4e91bc3b6a2979185324d2aaf49000093998c9468d69
kernel-debug-devel-2.6.18-406.el5.x86_64.rpm SHA-256: ff95c8ebf4392b5777a2c09d8f3cee29446d7e4509469e6d92bac4be6121fa9b
kernel-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: 2a1324ee23d0cdd779d3a876cd689495f14a7cd906767ffe9aa2866c11d1614d
kernel-debuginfo-common-2.6.18-406.el5.x86_64.rpm SHA-256: 38a17fa9e55a41b04b69f8f7442b386c1ff67cfe1e64f8e7893a78cd16b69f66
kernel-devel-2.6.18-406.el5.x86_64.rpm SHA-256: 033907d9b6b471bbbd111c9a5d538bfdfcf564849df5ac34e550cbe6a4c6b1a8
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.x86_64.rpm SHA-256: 112cd68d3e2756789b93c14cc22c1c86919d208a32cb0bcb8b3d1a4843608f3f
kernel-xen-2.6.18-406.el5.x86_64.rpm SHA-256: c4df00a0fa902c3b65f5e2539876c7706f1a741bcb15485b56c4ae57112c90fc
kernel-xen-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: 33f00b978f00889230b7f98d8db9386180f7fa5f404d86360dad2ced34971a73
kernel-xen-devel-2.6.18-406.el5.x86_64.rpm SHA-256: d59ea8eabb9df32f45c25ee6e78f2ffe651073fcaf2222fe5a19ab43360c495e
ia64
kernel-2.6.18-406.el5.ia64.rpm SHA-256: df594f566ef07775d84419942cd23f844e9e27e5e3c0f73fcd1b63ac518612b0
kernel-debug-2.6.18-406.el5.ia64.rpm SHA-256: b091cec5538b55eb356093821a0698b63a8d58f007acb33a96ce30cd3baceb51
kernel-debug-debuginfo-2.6.18-406.el5.ia64.rpm SHA-256: 2b748b4dbf8259132e762359b1b8df0bbc712c7df8acdc6dcbfa88214603a8d7
kernel-debug-devel-2.6.18-406.el5.ia64.rpm SHA-256: be7b680dfd4ff345df3a2852119cc1ff849b605c36fa215776a8e4582cb2e1ff
kernel-debuginfo-2.6.18-406.el5.ia64.rpm SHA-256: df39d861b3f662c78d1d2b685b7375652d12f92ccedff539a06be6bd6283e256
kernel-debuginfo-common-2.6.18-406.el5.ia64.rpm SHA-256: b800412ca8d26a293b9ae6a7e5dac1de4ffdc26c2380fc19e1db8f7141006722
kernel-devel-2.6.18-406.el5.ia64.rpm SHA-256: 5483938d13132fae334182c82596a6ac62fad29d05e0923f26fee8d6ef56de4a
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.ia64.rpm SHA-256: 0a516306c312c5b6755a9b46c8e20b57bed5a4751ff9c2736a6b531e7dc77568
kernel-xen-2.6.18-406.el5.ia64.rpm SHA-256: 54c494e93f34a7b2ff99bd8ac56c5b397ce460a1603702bac75bc690c430f774
kernel-xen-debuginfo-2.6.18-406.el5.ia64.rpm SHA-256: b14c611ebf869dfcbb4227fcdd785941b66d4879f3436db1eff6789c58ff17d6
kernel-xen-devel-2.6.18-406.el5.ia64.rpm SHA-256: 983fd7c81a4b04a9292a0d5af82dbba535d6a5e3c0d797e833209b1f6cdb074d
i386
kernel-2.6.18-406.el5.i686.rpm SHA-256: b16ad1ad88e8c7de74773363397f35ac393fef716d38a3315bfd804b1d9d11ba
kernel-PAE-2.6.18-406.el5.i686.rpm SHA-256: f693b40182c238b0d093408c1cdb7e658513da05042004c5a4752120a645b911
kernel-PAE-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 9a4640f5e2b221767e507704e2a94e0b01b58c674724bcbc4a7ed2d40ba907b0
kernel-PAE-devel-2.6.18-406.el5.i686.rpm SHA-256: 8893003d5a7f4f5b9033e6842e0253d332ce1478f53e2050191c81ff05762163
kernel-debug-2.6.18-406.el5.i686.rpm SHA-256: 6b65e2317fbabd5ab86038b1762ba6df30d7759c56cee31e66b793fe13e63dfa
kernel-debug-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 827367f6c517658534b19d8bf16aed5b2d3ae381d83d14bb6af088d4da455239
kernel-debug-devel-2.6.18-406.el5.i686.rpm SHA-256: c6321292db954befe72815deb7b0bc9977d5cc4812b12c10a002a0f71850e6d7
kernel-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: e7e85c047602fb461c708ddace9f87b8c8e27461760b4d3726dbaedccf45de10
kernel-debuginfo-common-2.6.18-406.el5.i686.rpm SHA-256: 6cd138c6748489932ac46826ecbc5775a2df1daa3566f99aae59c01e88bd4f12
kernel-devel-2.6.18-406.el5.i686.rpm SHA-256: f13277a2ac0a5652283d8b3d9b6b9b6a313f9af1fb02dc69d5b3de7e49af3cf2
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.i386.rpm SHA-256: af80f7066147c42f622992ca205348cd296e915750e2dbe1ed59aed78805feaa
kernel-xen-2.6.18-406.el5.i686.rpm SHA-256: b66b25a44b66173958441a81697d33f245f70de53b11edcb4ff7ffb10f659666
kernel-xen-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 9bb45de21940c4daa02fbd8f9c2f4b538617df421e363797db457b39e129bea5
kernel-xen-devel-2.6.18-406.el5.i686.rpm SHA-256: b7283e84d684475775d670414f1d6d669d733d72e38ad7e3ec69c5d649bb81c9

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-406.el5.src.rpm SHA-256: 9862e7361a6993ad3893f2dcdd60b174cfdcdc25d1117fe4c8baf9b8f381a10c
x86_64
kernel-2.6.18-406.el5.x86_64.rpm SHA-256: cb8b0f16bb2e620d0cc71276fcc6757f36c66fd6ad82567f0799a23813ae1fa9
kernel-debug-2.6.18-406.el5.x86_64.rpm SHA-256: 327bbbbc4c7a4dedc644a8b4f563d50e4e8be35a9994971862e1b5d9280f3ab7
kernel-debug-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: deeb908a6e6f1ae0faec4e91bc3b6a2979185324d2aaf49000093998c9468d69
kernel-debug-devel-2.6.18-406.el5.x86_64.rpm SHA-256: ff95c8ebf4392b5777a2c09d8f3cee29446d7e4509469e6d92bac4be6121fa9b
kernel-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: 2a1324ee23d0cdd779d3a876cd689495f14a7cd906767ffe9aa2866c11d1614d
kernel-debuginfo-common-2.6.18-406.el5.x86_64.rpm SHA-256: 38a17fa9e55a41b04b69f8f7442b386c1ff67cfe1e64f8e7893a78cd16b69f66
kernel-devel-2.6.18-406.el5.x86_64.rpm SHA-256: 033907d9b6b471bbbd111c9a5d538bfdfcf564849df5ac34e550cbe6a4c6b1a8
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.x86_64.rpm SHA-256: 112cd68d3e2756789b93c14cc22c1c86919d208a32cb0bcb8b3d1a4843608f3f
kernel-xen-2.6.18-406.el5.x86_64.rpm SHA-256: c4df00a0fa902c3b65f5e2539876c7706f1a741bcb15485b56c4ae57112c90fc
kernel-xen-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: 33f00b978f00889230b7f98d8db9386180f7fa5f404d86360dad2ced34971a73
kernel-xen-devel-2.6.18-406.el5.x86_64.rpm SHA-256: d59ea8eabb9df32f45c25ee6e78f2ffe651073fcaf2222fe5a19ab43360c495e
i386
kernel-2.6.18-406.el5.i686.rpm SHA-256: b16ad1ad88e8c7de74773363397f35ac393fef716d38a3315bfd804b1d9d11ba
kernel-PAE-2.6.18-406.el5.i686.rpm SHA-256: f693b40182c238b0d093408c1cdb7e658513da05042004c5a4752120a645b911
kernel-PAE-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 9a4640f5e2b221767e507704e2a94e0b01b58c674724bcbc4a7ed2d40ba907b0
kernel-PAE-devel-2.6.18-406.el5.i686.rpm SHA-256: 8893003d5a7f4f5b9033e6842e0253d332ce1478f53e2050191c81ff05762163
kernel-debug-2.6.18-406.el5.i686.rpm SHA-256: 6b65e2317fbabd5ab86038b1762ba6df30d7759c56cee31e66b793fe13e63dfa
kernel-debug-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 827367f6c517658534b19d8bf16aed5b2d3ae381d83d14bb6af088d4da455239
kernel-debug-devel-2.6.18-406.el5.i686.rpm SHA-256: c6321292db954befe72815deb7b0bc9977d5cc4812b12c10a002a0f71850e6d7
kernel-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: e7e85c047602fb461c708ddace9f87b8c8e27461760b4d3726dbaedccf45de10
kernel-debuginfo-common-2.6.18-406.el5.i686.rpm SHA-256: 6cd138c6748489932ac46826ecbc5775a2df1daa3566f99aae59c01e88bd4f12
kernel-devel-2.6.18-406.el5.i686.rpm SHA-256: f13277a2ac0a5652283d8b3d9b6b9b6a313f9af1fb02dc69d5b3de7e49af3cf2
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.i386.rpm SHA-256: af80f7066147c42f622992ca205348cd296e915750e2dbe1ed59aed78805feaa
kernel-xen-2.6.18-406.el5.i686.rpm SHA-256: b66b25a44b66173958441a81697d33f245f70de53b11edcb4ff7ffb10f659666
kernel-xen-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 9bb45de21940c4daa02fbd8f9c2f4b538617df421e363797db457b39e129bea5
kernel-xen-devel-2.6.18-406.el5.i686.rpm SHA-256: b7283e84d684475775d670414f1d6d669d733d72e38ad7e3ec69c5d649bb81c9

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-406.el5.src.rpm SHA-256: 9862e7361a6993ad3893f2dcdd60b174cfdcdc25d1117fe4c8baf9b8f381a10c
x86_64
kernel-2.6.18-406.el5.x86_64.rpm SHA-256: cb8b0f16bb2e620d0cc71276fcc6757f36c66fd6ad82567f0799a23813ae1fa9
kernel-debug-2.6.18-406.el5.x86_64.rpm SHA-256: 327bbbbc4c7a4dedc644a8b4f563d50e4e8be35a9994971862e1b5d9280f3ab7
kernel-debug-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: deeb908a6e6f1ae0faec4e91bc3b6a2979185324d2aaf49000093998c9468d69
kernel-debug-devel-2.6.18-406.el5.x86_64.rpm SHA-256: ff95c8ebf4392b5777a2c09d8f3cee29446d7e4509469e6d92bac4be6121fa9b
kernel-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: 2a1324ee23d0cdd779d3a876cd689495f14a7cd906767ffe9aa2866c11d1614d
kernel-debuginfo-common-2.6.18-406.el5.x86_64.rpm SHA-256: 38a17fa9e55a41b04b69f8f7442b386c1ff67cfe1e64f8e7893a78cd16b69f66
kernel-devel-2.6.18-406.el5.x86_64.rpm SHA-256: 033907d9b6b471bbbd111c9a5d538bfdfcf564849df5ac34e550cbe6a4c6b1a8
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.x86_64.rpm SHA-256: 112cd68d3e2756789b93c14cc22c1c86919d208a32cb0bcb8b3d1a4843608f3f
kernel-xen-2.6.18-406.el5.x86_64.rpm SHA-256: c4df00a0fa902c3b65f5e2539876c7706f1a741bcb15485b56c4ae57112c90fc
kernel-xen-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: 33f00b978f00889230b7f98d8db9386180f7fa5f404d86360dad2ced34971a73
kernel-xen-devel-2.6.18-406.el5.x86_64.rpm SHA-256: d59ea8eabb9df32f45c25ee6e78f2ffe651073fcaf2222fe5a19ab43360c495e
i386
kernel-2.6.18-406.el5.i686.rpm SHA-256: b16ad1ad88e8c7de74773363397f35ac393fef716d38a3315bfd804b1d9d11ba
kernel-PAE-2.6.18-406.el5.i686.rpm SHA-256: f693b40182c238b0d093408c1cdb7e658513da05042004c5a4752120a645b911
kernel-PAE-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 9a4640f5e2b221767e507704e2a94e0b01b58c674724bcbc4a7ed2d40ba907b0
kernel-PAE-devel-2.6.18-406.el5.i686.rpm SHA-256: 8893003d5a7f4f5b9033e6842e0253d332ce1478f53e2050191c81ff05762163
kernel-debug-2.6.18-406.el5.i686.rpm SHA-256: 6b65e2317fbabd5ab86038b1762ba6df30d7759c56cee31e66b793fe13e63dfa
kernel-debug-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 827367f6c517658534b19d8bf16aed5b2d3ae381d83d14bb6af088d4da455239
kernel-debug-devel-2.6.18-406.el5.i686.rpm SHA-256: c6321292db954befe72815deb7b0bc9977d5cc4812b12c10a002a0f71850e6d7
kernel-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: e7e85c047602fb461c708ddace9f87b8c8e27461760b4d3726dbaedccf45de10
kernel-debuginfo-common-2.6.18-406.el5.i686.rpm SHA-256: 6cd138c6748489932ac46826ecbc5775a2df1daa3566f99aae59c01e88bd4f12
kernel-devel-2.6.18-406.el5.i686.rpm SHA-256: f13277a2ac0a5652283d8b3d9b6b9b6a313f9af1fb02dc69d5b3de7e49af3cf2
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.i386.rpm SHA-256: af80f7066147c42f622992ca205348cd296e915750e2dbe1ed59aed78805feaa
kernel-xen-2.6.18-406.el5.i686.rpm SHA-256: b66b25a44b66173958441a81697d33f245f70de53b11edcb4ff7ffb10f659666
kernel-xen-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 9bb45de21940c4daa02fbd8f9c2f4b538617df421e363797db457b39e129bea5
kernel-xen-devel-2.6.18-406.el5.i686.rpm SHA-256: b7283e84d684475775d670414f1d6d669d733d72e38ad7e3ec69c5d649bb81c9

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-406.el5.src.rpm SHA-256: 9862e7361a6993ad3893f2dcdd60b174cfdcdc25d1117fe4c8baf9b8f381a10c
s390x
kernel-2.6.18-406.el5.s390x.rpm SHA-256: 6efac73d90f8a55806197dd56a39f85221f8eb8c5acfacea1a24734175163de7
kernel-debug-2.6.18-406.el5.s390x.rpm SHA-256: aeacd90e55a35db27153b84f9376760f7a5d9e55560a104cf8ed835eb2e57608
kernel-debug-debuginfo-2.6.18-406.el5.s390x.rpm SHA-256: 9343d870181ce289e8f79cc56f6849be907bec439274bf5ebecfc8df78d576c3
kernel-debug-devel-2.6.18-406.el5.s390x.rpm SHA-256: 48fb08f0c1ae63c71af049650e0329213df756bc73f78777d0598c4ba8a1e33d
kernel-debuginfo-2.6.18-406.el5.s390x.rpm SHA-256: 9675c669ad60600d037298d775bab72021aead20d2afb4845256a6b51a960c53
kernel-debuginfo-common-2.6.18-406.el5.s390x.rpm SHA-256: cff5a714b01feb2473f814bb4f5490f7d1d803b161d0a243c7085d8d12295fe5
kernel-devel-2.6.18-406.el5.s390x.rpm SHA-256: 0c04a8135485b2315f185f767d9980eec15649d301c33d217a4ca06fbd297579
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.s390x.rpm SHA-256: f32f73b84722cc748b71e060e5174ec3c9583901986747b7408a82674de11f09
kernel-kdump-2.6.18-406.el5.s390x.rpm SHA-256: a313503754c840d67b083adafcbd1765465083e41f4d0af756124675fae94332
kernel-kdump-debuginfo-2.6.18-406.el5.s390x.rpm SHA-256: 7b330084991c31814110ae50192bb2edafc27d48f98b0345e50d500628dc54b1
kernel-kdump-devel-2.6.18-406.el5.s390x.rpm SHA-256: 47ffd34dcadadc6f241c9952cbe68f8fc6151cd5109de0e68176ca0741c6c7cd

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-406.el5.src.rpm SHA-256: 9862e7361a6993ad3893f2dcdd60b174cfdcdc25d1117fe4c8baf9b8f381a10c
ppc
kernel-2.6.18-406.el5.ppc64.rpm SHA-256: e50a2530ceaa21b153eff844882dd3680db04fee75254d9ac7282b93e742bfc4
kernel-debug-2.6.18-406.el5.ppc64.rpm SHA-256: 4aa6b69c566dc1b9223f621acdc0a680f0a7b7241e2ac5a6413c5f995a562036
kernel-debug-debuginfo-2.6.18-406.el5.ppc64.rpm SHA-256: 63a19d0e7d96029b830367b53366a7dccc3b5d72f77c72daeb4ca0bf1e1e15b5
kernel-debug-devel-2.6.18-406.el5.ppc64.rpm SHA-256: faf734ea64782b405dc27bb3de6e742d078f42644a514dd9156ab7acf094369b
kernel-debuginfo-2.6.18-406.el5.ppc64.rpm SHA-256: 921c618d03433647d1cfa8624345df4c8c8c10b20e42444a97cbf3a0806caee2
kernel-debuginfo-common-2.6.18-406.el5.ppc64.rpm SHA-256: d5218715c2004f68a17d6c71ebff6cb002c18595c5a7beecc2f45b0bfb3fd7ef
kernel-devel-2.6.18-406.el5.ppc64.rpm SHA-256: e5cca6b42754fdb24644085812c342cfaaef181332537174a88517ff5aa26ada
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.ppc.rpm SHA-256: 568b1ccdbb67131949c06b347fed7efb10b13095a6975bd1d8d7d0d156266062
kernel-headers-2.6.18-406.el5.ppc64.rpm SHA-256: 3bc60f8dc5391c32a8d754adbe0a8119b85e8462ceb776ff02670acef616ce1a
kernel-kdump-2.6.18-406.el5.ppc64.rpm SHA-256: 3251ec3224f5ae6680714cb0c9535396fa438ab44e114064da27e314795152b2
kernel-kdump-debuginfo-2.6.18-406.el5.ppc64.rpm SHA-256: e9d26cf42d64cbc18b58d1856637aba98c706170908a5134ce090fd0bd7fdba4
kernel-kdump-devel-2.6.18-406.el5.ppc64.rpm SHA-256: 94e4b0cb0b3b776ed9ffd576e6b9bfb0a53e4b9b09c8bc700ccd289e126f0d14

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-406.el5.src.rpm SHA-256: 9862e7361a6993ad3893f2dcdd60b174cfdcdc25d1117fe4c8baf9b8f381a10c
x86_64
kernel-2.6.18-406.el5.x86_64.rpm SHA-256: cb8b0f16bb2e620d0cc71276fcc6757f36c66fd6ad82567f0799a23813ae1fa9
kernel-debug-2.6.18-406.el5.x86_64.rpm SHA-256: 327bbbbc4c7a4dedc644a8b4f563d50e4e8be35a9994971862e1b5d9280f3ab7
kernel-debug-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: deeb908a6e6f1ae0faec4e91bc3b6a2979185324d2aaf49000093998c9468d69
kernel-debug-devel-2.6.18-406.el5.x86_64.rpm SHA-256: ff95c8ebf4392b5777a2c09d8f3cee29446d7e4509469e6d92bac4be6121fa9b
kernel-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: 2a1324ee23d0cdd779d3a876cd689495f14a7cd906767ffe9aa2866c11d1614d
kernel-debuginfo-common-2.6.18-406.el5.x86_64.rpm SHA-256: 38a17fa9e55a41b04b69f8f7442b386c1ff67cfe1e64f8e7893a78cd16b69f66
kernel-devel-2.6.18-406.el5.x86_64.rpm SHA-256: 033907d9b6b471bbbd111c9a5d538bfdfcf564849df5ac34e550cbe6a4c6b1a8
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.x86_64.rpm SHA-256: 112cd68d3e2756789b93c14cc22c1c86919d208a32cb0bcb8b3d1a4843608f3f
kernel-xen-2.6.18-406.el5.x86_64.rpm SHA-256: c4df00a0fa902c3b65f5e2539876c7706f1a741bcb15485b56c4ae57112c90fc
kernel-xen-debuginfo-2.6.18-406.el5.x86_64.rpm SHA-256: 33f00b978f00889230b7f98d8db9386180f7fa5f404d86360dad2ced34971a73
kernel-xen-devel-2.6.18-406.el5.x86_64.rpm SHA-256: d59ea8eabb9df32f45c25ee6e78f2ffe651073fcaf2222fe5a19ab43360c495e
i386
kernel-2.6.18-406.el5.i686.rpm SHA-256: b16ad1ad88e8c7de74773363397f35ac393fef716d38a3315bfd804b1d9d11ba
kernel-PAE-2.6.18-406.el5.i686.rpm SHA-256: f693b40182c238b0d093408c1cdb7e658513da05042004c5a4752120a645b911
kernel-PAE-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 9a4640f5e2b221767e507704e2a94e0b01b58c674724bcbc4a7ed2d40ba907b0
kernel-PAE-devel-2.6.18-406.el5.i686.rpm SHA-256: 8893003d5a7f4f5b9033e6842e0253d332ce1478f53e2050191c81ff05762163
kernel-debug-2.6.18-406.el5.i686.rpm SHA-256: 6b65e2317fbabd5ab86038b1762ba6df30d7759c56cee31e66b793fe13e63dfa
kernel-debug-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 827367f6c517658534b19d8bf16aed5b2d3ae381d83d14bb6af088d4da455239
kernel-debug-devel-2.6.18-406.el5.i686.rpm SHA-256: c6321292db954befe72815deb7b0bc9977d5cc4812b12c10a002a0f71850e6d7
kernel-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: e7e85c047602fb461c708ddace9f87b8c8e27461760b4d3726dbaedccf45de10
kernel-debuginfo-common-2.6.18-406.el5.i686.rpm SHA-256: 6cd138c6748489932ac46826ecbc5775a2df1daa3566f99aae59c01e88bd4f12
kernel-devel-2.6.18-406.el5.i686.rpm SHA-256: f13277a2ac0a5652283d8b3d9b6b9b6a313f9af1fb02dc69d5b3de7e49af3cf2
kernel-doc-2.6.18-406.el5.noarch.rpm SHA-256: 34ae7a301034c274be4df22308b9f3ac53bb17b4187a1532e36a1cc6ef5c950a
kernel-headers-2.6.18-406.el5.i386.rpm SHA-256: af80f7066147c42f622992ca205348cd296e915750e2dbe1ed59aed78805feaa
kernel-xen-2.6.18-406.el5.i686.rpm SHA-256: b66b25a44b66173958441a81697d33f245f70de53b11edcb4ff7ffb10f659666
kernel-xen-debuginfo-2.6.18-406.el5.i686.rpm SHA-256: 9bb45de21940c4daa02fbd8f9c2f4b538617df421e363797db457b39e129bea5
kernel-xen-devel-2.6.18-406.el5.i686.rpm SHA-256: b7283e84d684475775d670414f1d6d669d733d72e38ad7e3ec69c5d649bb81c9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter