Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2013:0747 - Security Advisory
Issued:
2013-04-16
Updated:
2013-04-16

RHSA-2013:0747 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

Updated kernel packages that fix several security issues and three bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the Xen netback driver implementation in the Linux
    kernel. A privileged guest user with access to a para-virtualized network
    device could use this flaw to cause a long loop in netback, leading to a
    denial of service that could potentially affect the entire system.
    (CVE-2013-0216, Moderate)
  • A flaw was found in the Xen PCI device back-end driver implementation in
    the Linux kernel. A privileged guest user in a guest that has a PCI
    passthrough device could use this flaw to cause a denial of service that
    could potentially affect the entire system. (CVE-2013-0231, Moderate)
  • A NULL pointer dereference flaw was found in the IP packet transformation
    framework (XFRM) implementation in the Linux kernel. A local user who has
    the CAP_NET_ADMIN capability could use this flaw to cause a denial of
    service. (CVE-2013-1826, Moderate)
  • Information leak flaws were found in the XFRM implementation in the
    Linux kernel. A local user who has the CAP_NET_ADMIN capability could use
    these flaws to leak kernel stack memory to user-space. (CVE-2012-6537, Low)
  • An information leak flaw was found in the logical link control (LLC)
    implementation in the Linux kernel. A local, unprivileged user could use
    this flaw to leak kernel stack memory to user-space. (CVE-2012-6542, Low)
  • Two information leak flaws were found in the Linux kernel's Asynchronous
    Transfer Mode (ATM) subsystem. A local, unprivileged user could use these
    flaws to leak kernel stack memory to user-space. (CVE-2012-6546, Low)
  • An information leak flaw was found in the TUN/TAP device driver in the
    Linux kernel's networking implementation. A local user with access to a
    TUN/TAP virtual interface could use this flaw to leak kernel stack memory
    to user-space. (CVE-2012-6547, Low)

Red Hat would like to thank the Xen project for reporting the CVE-2013-0216
and CVE-2013-0231 issues.

This update also fixes the following bugs:

  • The IPv4 code did not correctly update the Maximum Transfer Unit (MTU) of
    the designed interface when receiving ICMP Fragmentation Needed packets.
    Consequently, a remote host did not respond correctly to ping attempts.
    With this update, the IPv4 code has been modified so the MTU of the
    designed interface is adjusted as expected in this situation. The ping
    command now provides the expected output. (BZ#923353)
  • Previously, the be2net code expected the last word of an MCC completion
    message from the firmware to be transferred by direct memory access (DMA)
    at once. However, this is not always true, and could therefore cause the
    BUG_ON() macro to be triggered in the be_mcc_compl_is_new() function,
    consequently leading to a kernel panic. The BUG_ON() macro has been
    removed from be_mcc_compl_is_new(), and the kernel panic no longer occurs
    in this scenario. (BZ#923910)
  • Previously, the NFSv3 server incorrectly converted 64-bit cookies to
    32-bit. Consequently, the cookies became invalid, which affected all file
    system operations depending on these cookies, such as the READDIR operation
    that is used to read entries from a directory. This led to various
    problems, such as exported directories being empty or displayed
    incorrectly, or an endless loop of the READDIRPLUS procedure which could
    potentially cause a buffer overflow. This update modifies knfsd code so
    that 64-bit cookies are now handled correctly and all file system
    operations work as expected. (BZ#924087)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 i386

Fixes

  • BZ - 910874 - CVE-2013-0231 kernel: xen: pciback DoS via not rate limited log messages
  • BZ - 910883 - CVE-2013-0216 CVE-2013-0217 kernel: xen: Linux netback DoS via malicious guest ring.
  • BZ - 919384 - CVE-2013-1826 Kernel: xfrm_user: return error pointer instead of NULL
  • BZ - 922322 - CVE-2012-6542 Kernel: llc: information leak via getsockname
  • BZ - 922344 - CVE-2012-6547 Kernel: net/tun: ioctl() based information leaks
  • BZ - 922383 - CVE-2012-6546 Kernel: atm: information leak in getsockopt & getsockname
  • BZ - 922424 - CVE-2012-6537 Kernel: xfrm_user information leaks copy_to_user_

CVEs

  • CVE-2012-6547
  • CVE-2012-6546
  • CVE-2013-0216
  • CVE-2012-6542
  • CVE-2013-1826
  • CVE-2013-0231
  • CVE-2012-6537

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
ia64
kernel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 091943eea04e9416e2fd0daf39f5a37ca3c3783853687a7c9cc3429fb68d6459
kernel-debug-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 85c0cb662ca1f2424692eddb5c488762225de7c5758424219f02f856e8972e7d
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c05564a948085d0660ab0bb9b8339da11bf5bb1126f29a1e5cd767e21a1b28b7
kernel-debug-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 3f75fd66c094e44d6f71a32981cffea7c0fed8f421e27c41b86351c6a38dabb6
kernel-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: ba419eac4554fece423228ccd9375d75df477a8925227dbf925be21b7445a129
kernel-debuginfo-common-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c4567400a2584f823d7d0b4e5823e39314e697808c77de816304fdc79b77f146
kernel-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 541ceead37144d900e99869a8bfd35e5412a43f8cdb2085eaeed219c8624544b
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 15301c7902d8222048114200c25de41814eb892f076912b862e5b4031d255bc7
kernel-xen-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 9b06c026f08ad99f37c72e77cd787e75696b1cdc188d6c7d80f52aaea9767abc
kernel-xen-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 0134ccf9f69f79512739ed13b2401e8bc13e02f9624781911b1bbef1b31e5bb9
kernel-xen-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: a72789faeae54810f0d2f8e9397dc95ceb0ac975d5c6af628ecb1777103566e1
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
ia64
kernel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 091943eea04e9416e2fd0daf39f5a37ca3c3783853687a7c9cc3429fb68d6459
kernel-debug-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 85c0cb662ca1f2424692eddb5c488762225de7c5758424219f02f856e8972e7d
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c05564a948085d0660ab0bb9b8339da11bf5bb1126f29a1e5cd767e21a1b28b7
kernel-debug-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 3f75fd66c094e44d6f71a32981cffea7c0fed8f421e27c41b86351c6a38dabb6
kernel-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: ba419eac4554fece423228ccd9375d75df477a8925227dbf925be21b7445a129
kernel-debuginfo-common-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c4567400a2584f823d7d0b4e5823e39314e697808c77de816304fdc79b77f146
kernel-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 541ceead37144d900e99869a8bfd35e5412a43f8cdb2085eaeed219c8624544b
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 15301c7902d8222048114200c25de41814eb892f076912b862e5b4031d255bc7
kernel-xen-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 9b06c026f08ad99f37c72e77cd787e75696b1cdc188d6c7d80f52aaea9767abc
kernel-xen-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 0134ccf9f69f79512739ed13b2401e8bc13e02f9624781911b1bbef1b31e5bb9
kernel-xen-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: a72789faeae54810f0d2f8e9397dc95ceb0ac975d5c6af628ecb1777103566e1
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
ia64
kernel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 091943eea04e9416e2fd0daf39f5a37ca3c3783853687a7c9cc3429fb68d6459
kernel-debug-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 85c0cb662ca1f2424692eddb5c488762225de7c5758424219f02f856e8972e7d
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c05564a948085d0660ab0bb9b8339da11bf5bb1126f29a1e5cd767e21a1b28b7
kernel-debug-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 3f75fd66c094e44d6f71a32981cffea7c0fed8f421e27c41b86351c6a38dabb6
kernel-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: ba419eac4554fece423228ccd9375d75df477a8925227dbf925be21b7445a129
kernel-debuginfo-common-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c4567400a2584f823d7d0b4e5823e39314e697808c77de816304fdc79b77f146
kernel-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 541ceead37144d900e99869a8bfd35e5412a43f8cdb2085eaeed219c8624544b
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 15301c7902d8222048114200c25de41814eb892f076912b862e5b4031d255bc7
kernel-xen-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 9b06c026f08ad99f37c72e77cd787e75696b1cdc188d6c7d80f52aaea9767abc
kernel-xen-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 0134ccf9f69f79512739ed13b2401e8bc13e02f9624781911b1bbef1b31e5bb9
kernel-xen-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: a72789faeae54810f0d2f8e9397dc95ceb0ac975d5c6af628ecb1777103566e1
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
s390x
kernel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 3607456dfb7f296d976d21d90125f1e7049e4ebb6ba1fd046e11ab4bf5712a07
kernel-debug-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 918799d6c818c2233bde5e9c42a778a4ad96cab549f0eb1a3c0f0c82d7b60b60
kernel-debug-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 9e3c3221210e154920753cb7a95435dad00bd786f86ef7d767da0213f9c0749b
kernel-debug-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: f34f8d3f326f494a2f4235ab11a7043a4c9bb616dceff860687a350bae6ee9e4
kernel-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: bdab61832a344969209ac0e9d9508fdabce065ff9d8b68317905232576e2ff1f
kernel-debuginfo-common-2.6.18-348.4.1.el5.s390x.rpm SHA-256: c16efb9fbc8b3d80f7bbbd0f88dc5603fae771169fdd9b5f6e6252e5c69a6310
kernel-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 867264e649bff52b4b62481152c6ca39cbb258e0bafb4acf7d3b35be97f874c4
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 82df5fc49897951382fbd229b786205b77dd1fd32269e90a03ffe7f9951195f7
kernel-kdump-2.6.18-348.4.1.el5.s390x.rpm SHA-256: d2bac77051c47627d393fa319b1dcdc8c2b53d872e07e0fe6cba97c769c16a77
kernel-kdump-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 3537e2293422adfbc578b550d41e2002849017ee5119f534c17a62953e9baa6e
kernel-kdump-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 07e5b760857615b96732cda7f8702d60ae2a350943b1714e6eeed7df24dd0ccb

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
s390x
kernel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 3607456dfb7f296d976d21d90125f1e7049e4ebb6ba1fd046e11ab4bf5712a07
kernel-debug-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 918799d6c818c2233bde5e9c42a778a4ad96cab549f0eb1a3c0f0c82d7b60b60
kernel-debug-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 9e3c3221210e154920753cb7a95435dad00bd786f86ef7d767da0213f9c0749b
kernel-debug-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: f34f8d3f326f494a2f4235ab11a7043a4c9bb616dceff860687a350bae6ee9e4
kernel-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: bdab61832a344969209ac0e9d9508fdabce065ff9d8b68317905232576e2ff1f
kernel-debuginfo-common-2.6.18-348.4.1.el5.s390x.rpm SHA-256: c16efb9fbc8b3d80f7bbbd0f88dc5603fae771169fdd9b5f6e6252e5c69a6310
kernel-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 867264e649bff52b4b62481152c6ca39cbb258e0bafb4acf7d3b35be97f874c4
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 82df5fc49897951382fbd229b786205b77dd1fd32269e90a03ffe7f9951195f7
kernel-kdump-2.6.18-348.4.1.el5.s390x.rpm SHA-256: d2bac77051c47627d393fa319b1dcdc8c2b53d872e07e0fe6cba97c769c16a77
kernel-kdump-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 3537e2293422adfbc578b550d41e2002849017ee5119f534c17a62953e9baa6e
kernel-kdump-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 07e5b760857615b96732cda7f8702d60ae2a350943b1714e6eeed7df24dd0ccb

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
ppc
kernel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: dacc30a2f8f1e0249cddc52bc31082a8e79d456f9e9ca20c021c15f626543bfa
kernel-debug-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: be09e2138361eab88f7135bf6c191a3858df0e898f910a66ec56a0a525ae8958
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: d99ff4c7ce7122c29d40d3f99e25ed23b5d08cccf845733aee0fc3bde5a586c9
kernel-debug-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: f1cd87b9e4f0260ed46687a1da7820184113c32a8e96290eed3ecf6e3919f5f4
kernel-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 1cc6f4ce1db1e0481272d1a576494d82da7e255f5f5ccadc3549119835a993c8
kernel-debuginfo-common-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 8f28df27a780686f7b0ed7e650729c7df76a3fb7d4d0d2a9a91f02726588587b
kernel-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 2d94d4548769b23cb6d2608fa295533b5c425ce5f8f785419f3c5fd78de603bb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ppc.rpm SHA-256: 638d8837eb7ca7a330b530254ea4990edae22603998e70757abbe2ee9542981d
kernel-headers-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: c6a416d54e03bfd797dd962f4817930addacd32905a0a62f85d0bc54682fd6b3
kernel-kdump-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 84dbd7b1d7f92133ff802e49b7410325df03de5b6be919aae9c27facb8acdb06
kernel-kdump-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: ccb78222e2b892d0047f9481bfa5e89c861f0faf812de922e1784747913c66e0
kernel-kdump-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: ec7ce0e0661aed8e380004ddfdf6e00148118640c0b194177b228e9ca3c6867b

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
ppc
kernel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: dacc30a2f8f1e0249cddc52bc31082a8e79d456f9e9ca20c021c15f626543bfa
kernel-debug-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: be09e2138361eab88f7135bf6c191a3858df0e898f910a66ec56a0a525ae8958
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: d99ff4c7ce7122c29d40d3f99e25ed23b5d08cccf845733aee0fc3bde5a586c9
kernel-debug-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: f1cd87b9e4f0260ed46687a1da7820184113c32a8e96290eed3ecf6e3919f5f4
kernel-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 1cc6f4ce1db1e0481272d1a576494d82da7e255f5f5ccadc3549119835a993c8
kernel-debuginfo-common-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 8f28df27a780686f7b0ed7e650729c7df76a3fb7d4d0d2a9a91f02726588587b
kernel-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 2d94d4548769b23cb6d2608fa295533b5c425ce5f8f785419f3c5fd78de603bb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ppc.rpm SHA-256: 638d8837eb7ca7a330b530254ea4990edae22603998e70757abbe2ee9542981d
kernel-headers-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: c6a416d54e03bfd797dd962f4817930addacd32905a0a62f85d0bc54682fd6b3
kernel-kdump-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 84dbd7b1d7f92133ff802e49b7410325df03de5b6be919aae9c27facb8acdb06
kernel-kdump-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: ccb78222e2b892d0047f9481bfa5e89c861f0faf812de922e1784747913c66e0
kernel-kdump-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: ec7ce0e0661aed8e380004ddfdf6e00148118640c0b194177b228e9ca3c6867b

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2021 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook