Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0450 - Security Advisory
Issued:
2016-03-15
Updated:
2016-03-15

RHSA-2016:0450 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues and two bugs are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • An integer overflow flaw was found in the way the Linux kernel's Frame

Buffer device implementation mapped kernel memory to user space via the
mmap syscall. A local user able to access a frame buffer device file
(/dev/fb*) could possibly use this flaw to escalate their privileges on the
system. (CVE-2013-2596, Important)

  • It was found that the Xen hypervisor x86 CPU emulator implementation did

not correctly handle certain instructions with segment overrides,
potentially resulting in a memory corruption. A malicious guest user could
use this flaw to read arbitrary data relating to other guests, cause a
denial of service on the host, or potentially escalate their privileges on
the host. (CVE-2015-2151, Important)

This update also fixes the following bugs:

  • Previously, the CPU power of a CPU group could be zero. As a consequence,

a kernel panic occurred at "find_busiest_group+570" with do_divide_error.
The provided patch ensures that the division is only performed if the CPU
power is not zero, and the aforementioned panic no longer occurs.
(BZ#1209728)

  • Prior to this update, a bug occurred when performing an online resize of

an ext4 file system which had been previously converted from ext3. As a
consequence, the kernel crashed. The provided patch fixes online resizing
for such file systems by limiting the blockgroup search loop for non-extent
files, and the mentioned kernel crash no longer occurs. (BZ#1301100)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1034490 - CVE-2013-2596 kernel: integer overflow in fb_mmap
  • BZ - 1196274 - CVE-2015-2151 xen: hypervisor memory corruption due to x86 emulator flaw (xsa123)

CVEs

  • CVE-2013-2596
  • CVE-2015-2151

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-409.el5.src.rpm SHA-256: 5e9ea2ebb8fbc95223c647fdc7bdefa85a04e4a05c9b9f295e147f71e48ff70e
x86_64
kernel-2.6.18-409.el5.x86_64.rpm SHA-256: fa833169d22d14f0a73ea2d48335866a69fcbec4ebd6df43059ad1e363c48dfb
kernel-debug-2.6.18-409.el5.x86_64.rpm SHA-256: 279189a92550d940f0a797788816b02e7b5687461e1a5d3f5e6417ed5e39128c
kernel-debug-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: 7d0cfabf9596d47f6f6ada039508a631fe4a2faa9701d34055df89d5610faadf
kernel-debug-devel-2.6.18-409.el5.x86_64.rpm SHA-256: fd2918bc17c23d7d2ac3bebd689e9fae67464ba2ce54e59bb5a638abd6166df8
kernel-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: 644de4d7b88454387845a2176ebb6c3ed8a0494d958eae060bf67f33a2616091
kernel-debuginfo-common-2.6.18-409.el5.x86_64.rpm SHA-256: 995a5f8eb935fd8d526a2c8aeea3a8eff8d1857e035a1eab8aa9626270b0eabd
kernel-devel-2.6.18-409.el5.x86_64.rpm SHA-256: 484215781b003f1c0ba07d9fe022636d8fcd2294cd5f5826058c7a413635f602
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.x86_64.rpm SHA-256: 923819098c6b8c97a2eaa0a109834a494ea47f9ec9063d0ff4f6417c23049c84
kernel-xen-2.6.18-409.el5.x86_64.rpm SHA-256: 3533803e6681368d7d6b196be820eff25dfeddbb69f7d3462da6fb50f07e78ad
kernel-xen-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: d00541368dee4a37e18d91de93dab7c45b904fb82ef3e4f5f7f6d398868264b6
kernel-xen-devel-2.6.18-409.el5.x86_64.rpm SHA-256: c60ef3756104f2b4d7a13ba83ac88c5ab1b4e32132c21491b9ae5e679a1ded2a
ia64
kernel-2.6.18-409.el5.ia64.rpm SHA-256: c4939020f863a68f5318de9b93245a06cfc558c335087e8a4137acd03071ed63
kernel-debug-2.6.18-409.el5.ia64.rpm SHA-256: f42b85202332caf6a4c7fd92601873e3d0c366575ab7658bf0c78441411fdf14
kernel-debug-debuginfo-2.6.18-409.el5.ia64.rpm SHA-256: 7d74b6cb33bf8e499553d08ec2424ca242f0565f3adadb6535debaf04172bddf
kernel-debug-devel-2.6.18-409.el5.ia64.rpm SHA-256: 85ec386e66d6afe4a59923544cdf60dccf915cbafdedb8f71904fe4205d82c9e
kernel-debuginfo-2.6.18-409.el5.ia64.rpm SHA-256: 430c0b9f83735b667974f30cbb3950b23eb3bf1838773a599b8a4942de9b3af2
kernel-debuginfo-common-2.6.18-409.el5.ia64.rpm SHA-256: af83914e55934fbba42796c38031b608eccdf15915b1f18e9d1e4fa916ca08db
kernel-devel-2.6.18-409.el5.ia64.rpm SHA-256: 9d264b5646381b8f606aa2be4a4f3aba64b60d95e7b64ca02f56a8b046867a29
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.ia64.rpm SHA-256: 43b2a904b5b543559d04aba2aecce9557a47674013263b3515b496b44dba1fff
kernel-xen-2.6.18-409.el5.ia64.rpm SHA-256: 412e9554f99aaa243b580c3dc03a296bd9ba1786b3edfaba1f608367d9db440b
kernel-xen-debuginfo-2.6.18-409.el5.ia64.rpm SHA-256: 30cd57552a42c7c2d2ad1396a94e4a7141358f15990fbab2cab752590b03e4d9
kernel-xen-devel-2.6.18-409.el5.ia64.rpm SHA-256: f0683df24b04dae7b9793869369ad296302703d5b8184c728253f6c5d307c7f1
i386
kernel-2.6.18-409.el5.i686.rpm SHA-256: 70b5cedbc0d7e117103562f5a692d0b527f13edc558d20847ca3f00313a0353b
kernel-PAE-2.6.18-409.el5.i686.rpm SHA-256: 883ba39c626d883b4ddd4cd76976ac74abb6714db8ffc37d4accd803af7bc175
kernel-PAE-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: d07859ff8271da5780eeb452c74b0cae6393bce539318f69c1b83a8222c0ae25
kernel-PAE-devel-2.6.18-409.el5.i686.rpm SHA-256: 4b5aeb718a9a1da3570cd437dadc7a73f230a599b06978b04b398aafcbd3047d
kernel-debug-2.6.18-409.el5.i686.rpm SHA-256: 61c321a565849b5135884f8dd67baa127fc04f02b785eb1c299624b6cae78b2b
kernel-debug-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: 86b471adc867c2d27eaae7b807b331453f9132373e9b4eeeee62779f43e5f1b4
kernel-debug-devel-2.6.18-409.el5.i686.rpm SHA-256: 56ef26e2180b0ca605f91a2469cd15c22029c6d35683a0ae7670823e05e7c576
kernel-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: e8bc2de3e49795eef4d7c44484bb7d41fbf77ea862fb89ca7c6c5d0fa7bdab15
kernel-debuginfo-common-2.6.18-409.el5.i686.rpm SHA-256: fdd7dd63d7ff04cda92905cbcc81894bcb34666d5b9371978f99b006f048d636
kernel-devel-2.6.18-409.el5.i686.rpm SHA-256: 246cf88a839205e24ec32e4928c31213b704bfec24caa8a2961fee533dd45e66
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.i386.rpm SHA-256: 11041886c0926675874ee6bab50608e97d8aaa06977d690f494f83dcfe19fc39
kernel-xen-2.6.18-409.el5.i686.rpm SHA-256: a37d466edd9f745acd5343a3453c40524fc00428b4bc5cb0747c9cb6b5cdc53c
kernel-xen-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: db5cd92e85006cc1bd033051b8b4c69a9f3e5871f3abb94735e63029e54a651b
kernel-xen-devel-2.6.18-409.el5.i686.rpm SHA-256: cb72351ebb7b969a462fd0ff815e7f03699103650fbacab19f418fe919a2bb7f

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-409.el5.src.rpm SHA-256: 5e9ea2ebb8fbc95223c647fdc7bdefa85a04e4a05c9b9f295e147f71e48ff70e
x86_64
kernel-2.6.18-409.el5.x86_64.rpm SHA-256: fa833169d22d14f0a73ea2d48335866a69fcbec4ebd6df43059ad1e363c48dfb
kernel-debug-2.6.18-409.el5.x86_64.rpm SHA-256: 279189a92550d940f0a797788816b02e7b5687461e1a5d3f5e6417ed5e39128c
kernel-debug-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: 7d0cfabf9596d47f6f6ada039508a631fe4a2faa9701d34055df89d5610faadf
kernel-debug-devel-2.6.18-409.el5.x86_64.rpm SHA-256: fd2918bc17c23d7d2ac3bebd689e9fae67464ba2ce54e59bb5a638abd6166df8
kernel-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: 644de4d7b88454387845a2176ebb6c3ed8a0494d958eae060bf67f33a2616091
kernel-debuginfo-common-2.6.18-409.el5.x86_64.rpm SHA-256: 995a5f8eb935fd8d526a2c8aeea3a8eff8d1857e035a1eab8aa9626270b0eabd
kernel-devel-2.6.18-409.el5.x86_64.rpm SHA-256: 484215781b003f1c0ba07d9fe022636d8fcd2294cd5f5826058c7a413635f602
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.x86_64.rpm SHA-256: 923819098c6b8c97a2eaa0a109834a494ea47f9ec9063d0ff4f6417c23049c84
kernel-xen-2.6.18-409.el5.x86_64.rpm SHA-256: 3533803e6681368d7d6b196be820eff25dfeddbb69f7d3462da6fb50f07e78ad
kernel-xen-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: d00541368dee4a37e18d91de93dab7c45b904fb82ef3e4f5f7f6d398868264b6
kernel-xen-devel-2.6.18-409.el5.x86_64.rpm SHA-256: c60ef3756104f2b4d7a13ba83ac88c5ab1b4e32132c21491b9ae5e679a1ded2a
i386
kernel-2.6.18-409.el5.i686.rpm SHA-256: 70b5cedbc0d7e117103562f5a692d0b527f13edc558d20847ca3f00313a0353b
kernel-PAE-2.6.18-409.el5.i686.rpm SHA-256: 883ba39c626d883b4ddd4cd76976ac74abb6714db8ffc37d4accd803af7bc175
kernel-PAE-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: d07859ff8271da5780eeb452c74b0cae6393bce539318f69c1b83a8222c0ae25
kernel-PAE-devel-2.6.18-409.el5.i686.rpm SHA-256: 4b5aeb718a9a1da3570cd437dadc7a73f230a599b06978b04b398aafcbd3047d
kernel-debug-2.6.18-409.el5.i686.rpm SHA-256: 61c321a565849b5135884f8dd67baa127fc04f02b785eb1c299624b6cae78b2b
kernel-debug-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: 86b471adc867c2d27eaae7b807b331453f9132373e9b4eeeee62779f43e5f1b4
kernel-debug-devel-2.6.18-409.el5.i686.rpm SHA-256: 56ef26e2180b0ca605f91a2469cd15c22029c6d35683a0ae7670823e05e7c576
kernel-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: e8bc2de3e49795eef4d7c44484bb7d41fbf77ea862fb89ca7c6c5d0fa7bdab15
kernel-debuginfo-common-2.6.18-409.el5.i686.rpm SHA-256: fdd7dd63d7ff04cda92905cbcc81894bcb34666d5b9371978f99b006f048d636
kernel-devel-2.6.18-409.el5.i686.rpm SHA-256: 246cf88a839205e24ec32e4928c31213b704bfec24caa8a2961fee533dd45e66
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.i386.rpm SHA-256: 11041886c0926675874ee6bab50608e97d8aaa06977d690f494f83dcfe19fc39
kernel-xen-2.6.18-409.el5.i686.rpm SHA-256: a37d466edd9f745acd5343a3453c40524fc00428b4bc5cb0747c9cb6b5cdc53c
kernel-xen-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: db5cd92e85006cc1bd033051b8b4c69a9f3e5871f3abb94735e63029e54a651b
kernel-xen-devel-2.6.18-409.el5.i686.rpm SHA-256: cb72351ebb7b969a462fd0ff815e7f03699103650fbacab19f418fe919a2bb7f

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-409.el5.src.rpm SHA-256: 5e9ea2ebb8fbc95223c647fdc7bdefa85a04e4a05c9b9f295e147f71e48ff70e
x86_64
kernel-2.6.18-409.el5.x86_64.rpm SHA-256: fa833169d22d14f0a73ea2d48335866a69fcbec4ebd6df43059ad1e363c48dfb
kernel-debug-2.6.18-409.el5.x86_64.rpm SHA-256: 279189a92550d940f0a797788816b02e7b5687461e1a5d3f5e6417ed5e39128c
kernel-debug-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: 7d0cfabf9596d47f6f6ada039508a631fe4a2faa9701d34055df89d5610faadf
kernel-debug-devel-2.6.18-409.el5.x86_64.rpm SHA-256: fd2918bc17c23d7d2ac3bebd689e9fae67464ba2ce54e59bb5a638abd6166df8
kernel-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: 644de4d7b88454387845a2176ebb6c3ed8a0494d958eae060bf67f33a2616091
kernel-debuginfo-common-2.6.18-409.el5.x86_64.rpm SHA-256: 995a5f8eb935fd8d526a2c8aeea3a8eff8d1857e035a1eab8aa9626270b0eabd
kernel-devel-2.6.18-409.el5.x86_64.rpm SHA-256: 484215781b003f1c0ba07d9fe022636d8fcd2294cd5f5826058c7a413635f602
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.x86_64.rpm SHA-256: 923819098c6b8c97a2eaa0a109834a494ea47f9ec9063d0ff4f6417c23049c84
kernel-xen-2.6.18-409.el5.x86_64.rpm SHA-256: 3533803e6681368d7d6b196be820eff25dfeddbb69f7d3462da6fb50f07e78ad
kernel-xen-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: d00541368dee4a37e18d91de93dab7c45b904fb82ef3e4f5f7f6d398868264b6
kernel-xen-devel-2.6.18-409.el5.x86_64.rpm SHA-256: c60ef3756104f2b4d7a13ba83ac88c5ab1b4e32132c21491b9ae5e679a1ded2a
i386
kernel-2.6.18-409.el5.i686.rpm SHA-256: 70b5cedbc0d7e117103562f5a692d0b527f13edc558d20847ca3f00313a0353b
kernel-PAE-2.6.18-409.el5.i686.rpm SHA-256: 883ba39c626d883b4ddd4cd76976ac74abb6714db8ffc37d4accd803af7bc175
kernel-PAE-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: d07859ff8271da5780eeb452c74b0cae6393bce539318f69c1b83a8222c0ae25
kernel-PAE-devel-2.6.18-409.el5.i686.rpm SHA-256: 4b5aeb718a9a1da3570cd437dadc7a73f230a599b06978b04b398aafcbd3047d
kernel-debug-2.6.18-409.el5.i686.rpm SHA-256: 61c321a565849b5135884f8dd67baa127fc04f02b785eb1c299624b6cae78b2b
kernel-debug-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: 86b471adc867c2d27eaae7b807b331453f9132373e9b4eeeee62779f43e5f1b4
kernel-debug-devel-2.6.18-409.el5.i686.rpm SHA-256: 56ef26e2180b0ca605f91a2469cd15c22029c6d35683a0ae7670823e05e7c576
kernel-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: e8bc2de3e49795eef4d7c44484bb7d41fbf77ea862fb89ca7c6c5d0fa7bdab15
kernel-debuginfo-common-2.6.18-409.el5.i686.rpm SHA-256: fdd7dd63d7ff04cda92905cbcc81894bcb34666d5b9371978f99b006f048d636
kernel-devel-2.6.18-409.el5.i686.rpm SHA-256: 246cf88a839205e24ec32e4928c31213b704bfec24caa8a2961fee533dd45e66
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.i386.rpm SHA-256: 11041886c0926675874ee6bab50608e97d8aaa06977d690f494f83dcfe19fc39
kernel-xen-2.6.18-409.el5.i686.rpm SHA-256: a37d466edd9f745acd5343a3453c40524fc00428b4bc5cb0747c9cb6b5cdc53c
kernel-xen-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: db5cd92e85006cc1bd033051b8b4c69a9f3e5871f3abb94735e63029e54a651b
kernel-xen-devel-2.6.18-409.el5.i686.rpm SHA-256: cb72351ebb7b969a462fd0ff815e7f03699103650fbacab19f418fe919a2bb7f

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-409.el5.src.rpm SHA-256: 5e9ea2ebb8fbc95223c647fdc7bdefa85a04e4a05c9b9f295e147f71e48ff70e
s390x
kernel-2.6.18-409.el5.s390x.rpm SHA-256: b33cd7682679e3c80d6c31cedf08779e7704f0f57b356f98bc0b4ffa9e102d66
kernel-debug-2.6.18-409.el5.s390x.rpm SHA-256: a66b25e06fc20a9d1922ec78146b2876e0b965b0a88b2f67967e3b4a18585318
kernel-debug-debuginfo-2.6.18-409.el5.s390x.rpm SHA-256: 2002a956f8f6fbbf2649c5175be750a02fdfacd1118c10b165471e89100703f5
kernel-debug-devel-2.6.18-409.el5.s390x.rpm SHA-256: 0b898d66708a2bf7c40f0569a6c4cb94e0277dc5c81913b5052e136b1d66cceb
kernel-debuginfo-2.6.18-409.el5.s390x.rpm SHA-256: 98ffd9604c0d59b84c6b68b8d55da96ef3de305d35fdab15bfd0614da2aed02a
kernel-debuginfo-common-2.6.18-409.el5.s390x.rpm SHA-256: 97b87ffd9760c7ea3ba870ec2825943e24fc0438e9c65d6596b99bbfa758c638
kernel-devel-2.6.18-409.el5.s390x.rpm SHA-256: aeac36a8ace2b1f8d18740169230b17961b68d053285178cf6c6949294b6783a
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.s390x.rpm SHA-256: f2b18f89b83a2758399c8f7a0fba69a9a600fca4fc7e18cac7310c8df6479a6d
kernel-kdump-2.6.18-409.el5.s390x.rpm SHA-256: d473908adf3d081b1f56a067ef0b4cf327334e9807415cb21c419b280dda01e8
kernel-kdump-debuginfo-2.6.18-409.el5.s390x.rpm SHA-256: 75aa85715a92baf55578c59ffa4966bd7faeb039aec7684b31c25f5fe07e886d
kernel-kdump-devel-2.6.18-409.el5.s390x.rpm SHA-256: b5a797cc50bed150398d01e3e484bc3bd4535e4e56f93f9f3cf4177b299ca3fd

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-409.el5.src.rpm SHA-256: 5e9ea2ebb8fbc95223c647fdc7bdefa85a04e4a05c9b9f295e147f71e48ff70e
ppc
kernel-2.6.18-409.el5.ppc64.rpm SHA-256: 0a4c63c7f1b1470c256eb18eecc855b3f3eb5f59aa14e18b1c4074ae94b90215
kernel-debug-2.6.18-409.el5.ppc64.rpm SHA-256: 8236c841fb055e3a799d850a43961d324fb113174e9364424d3c956ccdff35e4
kernel-debug-debuginfo-2.6.18-409.el5.ppc64.rpm SHA-256: 1273dc3ebb011bbb512edddb6e905d7e2f755d22215da5f8d0fbfb23d2c8c90f
kernel-debug-devel-2.6.18-409.el5.ppc64.rpm SHA-256: a7d667c21764e0bfc81a61461b1f598d06ce6f3dab5f338be5fc54e40dbcaa69
kernel-debuginfo-2.6.18-409.el5.ppc64.rpm SHA-256: 35da389543dacd0bef938501f481c2908cfbbeff2b452dff6ccbe75767eb296d
kernel-debuginfo-common-2.6.18-409.el5.ppc64.rpm SHA-256: 70edb409a9b67f7f39fddfe6662d0c1eb2ff4ff998413ad4702e1dd7ce3638d8
kernel-devel-2.6.18-409.el5.ppc64.rpm SHA-256: d4131014374ab909c4e24f4d8aea2ac39bc71519b566d1c4c90508d04bb61517
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.ppc.rpm SHA-256: 555af72cac25e0ee65024a7daaf95309a126fe2a85d7be8960ce8b94f09b9008
kernel-headers-2.6.18-409.el5.ppc64.rpm SHA-256: 7d496abb477a079a968a341a845791ec48b9c87c7e6fe46b0c07298861a06c40
kernel-kdump-2.6.18-409.el5.ppc64.rpm SHA-256: 7d9c3586af544c105032764459e69f875cf18e5aa8758a3baa1354b1d1f2e5f4
kernel-kdump-debuginfo-2.6.18-409.el5.ppc64.rpm SHA-256: 74d01baeda790d70dfa281c1f53afe74a38eb567f77f48cd4da140b40a925e7b
kernel-kdump-devel-2.6.18-409.el5.ppc64.rpm SHA-256: f7fa2abd628af89a16fe9b1bea283e3f60dc9b1f367e64910d1f76eb1915ae18

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-409.el5.src.rpm SHA-256: 5e9ea2ebb8fbc95223c647fdc7bdefa85a04e4a05c9b9f295e147f71e48ff70e
x86_64
kernel-2.6.18-409.el5.x86_64.rpm SHA-256: fa833169d22d14f0a73ea2d48335866a69fcbec4ebd6df43059ad1e363c48dfb
kernel-debug-2.6.18-409.el5.x86_64.rpm SHA-256: 279189a92550d940f0a797788816b02e7b5687461e1a5d3f5e6417ed5e39128c
kernel-debug-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: 7d0cfabf9596d47f6f6ada039508a631fe4a2faa9701d34055df89d5610faadf
kernel-debug-devel-2.6.18-409.el5.x86_64.rpm SHA-256: fd2918bc17c23d7d2ac3bebd689e9fae67464ba2ce54e59bb5a638abd6166df8
kernel-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: 644de4d7b88454387845a2176ebb6c3ed8a0494d958eae060bf67f33a2616091
kernel-debuginfo-common-2.6.18-409.el5.x86_64.rpm SHA-256: 995a5f8eb935fd8d526a2c8aeea3a8eff8d1857e035a1eab8aa9626270b0eabd
kernel-devel-2.6.18-409.el5.x86_64.rpm SHA-256: 484215781b003f1c0ba07d9fe022636d8fcd2294cd5f5826058c7a413635f602
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.x86_64.rpm SHA-256: 923819098c6b8c97a2eaa0a109834a494ea47f9ec9063d0ff4f6417c23049c84
kernel-xen-2.6.18-409.el5.x86_64.rpm SHA-256: 3533803e6681368d7d6b196be820eff25dfeddbb69f7d3462da6fb50f07e78ad
kernel-xen-debuginfo-2.6.18-409.el5.x86_64.rpm SHA-256: d00541368dee4a37e18d91de93dab7c45b904fb82ef3e4f5f7f6d398868264b6
kernel-xen-devel-2.6.18-409.el5.x86_64.rpm SHA-256: c60ef3756104f2b4d7a13ba83ac88c5ab1b4e32132c21491b9ae5e679a1ded2a
i386
kernel-2.6.18-409.el5.i686.rpm SHA-256: 70b5cedbc0d7e117103562f5a692d0b527f13edc558d20847ca3f00313a0353b
kernel-PAE-2.6.18-409.el5.i686.rpm SHA-256: 883ba39c626d883b4ddd4cd76976ac74abb6714db8ffc37d4accd803af7bc175
kernel-PAE-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: d07859ff8271da5780eeb452c74b0cae6393bce539318f69c1b83a8222c0ae25
kernel-PAE-devel-2.6.18-409.el5.i686.rpm SHA-256: 4b5aeb718a9a1da3570cd437dadc7a73f230a599b06978b04b398aafcbd3047d
kernel-debug-2.6.18-409.el5.i686.rpm SHA-256: 61c321a565849b5135884f8dd67baa127fc04f02b785eb1c299624b6cae78b2b
kernel-debug-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: 86b471adc867c2d27eaae7b807b331453f9132373e9b4eeeee62779f43e5f1b4
kernel-debug-devel-2.6.18-409.el5.i686.rpm SHA-256: 56ef26e2180b0ca605f91a2469cd15c22029c6d35683a0ae7670823e05e7c576
kernel-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: e8bc2de3e49795eef4d7c44484bb7d41fbf77ea862fb89ca7c6c5d0fa7bdab15
kernel-debuginfo-common-2.6.18-409.el5.i686.rpm SHA-256: fdd7dd63d7ff04cda92905cbcc81894bcb34666d5b9371978f99b006f048d636
kernel-devel-2.6.18-409.el5.i686.rpm SHA-256: 246cf88a839205e24ec32e4928c31213b704bfec24caa8a2961fee533dd45e66
kernel-doc-2.6.18-409.el5.noarch.rpm SHA-256: 691eeb42cbe5e316644f92dc32179ad09dc204352ea06587cc6c4ed74c7c0fcc
kernel-headers-2.6.18-409.el5.i386.rpm SHA-256: 11041886c0926675874ee6bab50608e97d8aaa06977d690f494f83dcfe19fc39
kernel-xen-2.6.18-409.el5.i686.rpm SHA-256: a37d466edd9f745acd5343a3453c40524fc00428b4bc5cb0747c9cb6b5cdc53c
kernel-xen-debuginfo-2.6.18-409.el5.i686.rpm SHA-256: db5cd92e85006cc1bd033051b8b4c69a9f3e5871f3abb94735e63029e54a651b
kernel-xen-devel-2.6.18-409.el5.i686.rpm SHA-256: cb72351ebb7b969a462fd0ff815e7f03699103650fbacab19f418fe919a2bb7f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility