Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0747 - Security Advisory
Issued:
2013-04-16
Updated:
2013-04-16

RHSA-2013:0747 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues and three bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the Xen netback driver implementation in the Linux

kernel. A privileged guest user with access to a para-virtualized network
device could use this flaw to cause a long loop in netback, leading to a
denial of service that could potentially affect the entire system.
(CVE-2013-0216, Moderate)

  • A flaw was found in the Xen PCI device back-end driver implementation in

the Linux kernel. A privileged guest user in a guest that has a PCI
passthrough device could use this flaw to cause a denial of service that
could potentially affect the entire system. (CVE-2013-0231, Moderate)

  • A NULL pointer dereference flaw was found in the IP packet transformation

framework (XFRM) implementation in the Linux kernel. A local user who has
the CAP_NET_ADMIN capability could use this flaw to cause a denial of
service. (CVE-2013-1826, Moderate)

  • Information leak flaws were found in the XFRM implementation in the

Linux kernel. A local user who has the CAP_NET_ADMIN capability could use
these flaws to leak kernel stack memory to user-space. (CVE-2012-6537, Low)

  • An information leak flaw was found in the logical link control (LLC)

implementation in the Linux kernel. A local, unprivileged user could use
this flaw to leak kernel stack memory to user-space. (CVE-2012-6542, Low)

  • Two information leak flaws were found in the Linux kernel's Asynchronous

Transfer Mode (ATM) subsystem. A local, unprivileged user could use these
flaws to leak kernel stack memory to user-space. (CVE-2012-6546, Low)

  • An information leak flaw was found in the TUN/TAP device driver in the

Linux kernel's networking implementation. A local user with access to a
TUN/TAP virtual interface could use this flaw to leak kernel stack memory
to user-space. (CVE-2012-6547, Low)

Red Hat would like to thank the Xen project for reporting the CVE-2013-0216
and CVE-2013-0231 issues.

This update also fixes the following bugs:

  • The IPv4 code did not correctly update the Maximum Transfer Unit (MTU) of

the designed interface when receiving ICMP Fragmentation Needed packets.
Consequently, a remote host did not respond correctly to ping attempts.
With this update, the IPv4 code has been modified so the MTU of the
designed interface is adjusted as expected in this situation. The ping
command now provides the expected output. (BZ#923353)

  • Previously, the be2net code expected the last word of an MCC completion

message from the firmware to be transferred by direct memory access (DMA)
at once. However, this is not always true, and could therefore cause the
BUG_ON() macro to be triggered in the be_mcc_compl_is_new() function,
consequently leading to a kernel panic. The BUG_ON() macro has been
removed from be_mcc_compl_is_new(), and the kernel panic no longer occurs
in this scenario. (BZ#923910)

  • Previously, the NFSv3 server incorrectly converted 64-bit cookies to

32-bit. Consequently, the cookies became invalid, which affected all file
system operations depending on these cookies, such as the READDIR operation
that is used to read entries from a directory. This led to various
problems, such as exported directories being empty or displayed
incorrectly, or an endless loop of the READDIRPLUS procedure which could
potentially cause a buffer overflow. This update modifies knfsd code so
that 64-bit cookies are now handled correctly and all file system
operations work as expected. (BZ#924087)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386

Fixes

  • BZ - 910874 - CVE-2013-0231 kernel: xen: pciback DoS via not rate limited log messages
  • BZ - 910883 - CVE-2013-0216 CVE-2013-0217 kernel: xen: Linux netback DoS via malicious guest ring.
  • BZ - 919384 - CVE-2013-1826 Kernel: xfrm_user: return error pointer instead of NULL
  • BZ - 922322 - CVE-2012-6542 Kernel: llc: information leak via getsockname
  • BZ - 922344 - CVE-2012-6547 Kernel: net/tun: ioctl() based information leaks
  • BZ - 922383 - CVE-2012-6546 Kernel: atm: information leak in getsockopt & getsockname
  • BZ - 922424 - CVE-2012-6537 Kernel: xfrm_user information leaks copy_to_user_

CVEs

  • CVE-2012-6547
  • CVE-2012-6546
  • CVE-2013-0216
  • CVE-2012-6542
  • CVE-2013-1826
  • CVE-2013-0231
  • CVE-2012-6537

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
ia64
kernel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 091943eea04e9416e2fd0daf39f5a37ca3c3783853687a7c9cc3429fb68d6459
kernel-debug-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 85c0cb662ca1f2424692eddb5c488762225de7c5758424219f02f856e8972e7d
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c05564a948085d0660ab0bb9b8339da11bf5bb1126f29a1e5cd767e21a1b28b7
kernel-debug-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 3f75fd66c094e44d6f71a32981cffea7c0fed8f421e27c41b86351c6a38dabb6
kernel-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: ba419eac4554fece423228ccd9375d75df477a8925227dbf925be21b7445a129
kernel-debuginfo-common-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c4567400a2584f823d7d0b4e5823e39314e697808c77de816304fdc79b77f146
kernel-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 541ceead37144d900e99869a8bfd35e5412a43f8cdb2085eaeed219c8624544b
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 15301c7902d8222048114200c25de41814eb892f076912b862e5b4031d255bc7
kernel-xen-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 9b06c026f08ad99f37c72e77cd787e75696b1cdc188d6c7d80f52aaea9767abc
kernel-xen-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 0134ccf9f69f79512739ed13b2401e8bc13e02f9624781911b1bbef1b31e5bb9
kernel-xen-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: a72789faeae54810f0d2f8e9397dc95ceb0ac975d5c6af628ecb1777103566e1
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
ia64
kernel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 091943eea04e9416e2fd0daf39f5a37ca3c3783853687a7c9cc3429fb68d6459
kernel-debug-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 85c0cb662ca1f2424692eddb5c488762225de7c5758424219f02f856e8972e7d
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c05564a948085d0660ab0bb9b8339da11bf5bb1126f29a1e5cd767e21a1b28b7
kernel-debug-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 3f75fd66c094e44d6f71a32981cffea7c0fed8f421e27c41b86351c6a38dabb6
kernel-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: ba419eac4554fece423228ccd9375d75df477a8925227dbf925be21b7445a129
kernel-debuginfo-common-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c4567400a2584f823d7d0b4e5823e39314e697808c77de816304fdc79b77f146
kernel-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 541ceead37144d900e99869a8bfd35e5412a43f8cdb2085eaeed219c8624544b
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 15301c7902d8222048114200c25de41814eb892f076912b862e5b4031d255bc7
kernel-xen-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 9b06c026f08ad99f37c72e77cd787e75696b1cdc188d6c7d80f52aaea9767abc
kernel-xen-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 0134ccf9f69f79512739ed13b2401e8bc13e02f9624781911b1bbef1b31e5bb9
kernel-xen-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: a72789faeae54810f0d2f8e9397dc95ceb0ac975d5c6af628ecb1777103566e1
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
ia64
kernel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 091943eea04e9416e2fd0daf39f5a37ca3c3783853687a7c9cc3429fb68d6459
kernel-debug-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 85c0cb662ca1f2424692eddb5c488762225de7c5758424219f02f856e8972e7d
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c05564a948085d0660ab0bb9b8339da11bf5bb1126f29a1e5cd767e21a1b28b7
kernel-debug-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 3f75fd66c094e44d6f71a32981cffea7c0fed8f421e27c41b86351c6a38dabb6
kernel-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: ba419eac4554fece423228ccd9375d75df477a8925227dbf925be21b7445a129
kernel-debuginfo-common-2.6.18-348.4.1.el5.ia64.rpm SHA-256: c4567400a2584f823d7d0b4e5823e39314e697808c77de816304fdc79b77f146
kernel-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 541ceead37144d900e99869a8bfd35e5412a43f8cdb2085eaeed219c8624544b
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 15301c7902d8222048114200c25de41814eb892f076912b862e5b4031d255bc7
kernel-xen-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 9b06c026f08ad99f37c72e77cd787e75696b1cdc188d6c7d80f52aaea9767abc
kernel-xen-debuginfo-2.6.18-348.4.1.el5.ia64.rpm SHA-256: 0134ccf9f69f79512739ed13b2401e8bc13e02f9624781911b1bbef1b31e5bb9
kernel-xen-devel-2.6.18-348.4.1.el5.ia64.rpm SHA-256: a72789faeae54810f0d2f8e9397dc95ceb0ac975d5c6af628ecb1777103566e1
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
s390x
kernel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 3607456dfb7f296d976d21d90125f1e7049e4ebb6ba1fd046e11ab4bf5712a07
kernel-debug-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 918799d6c818c2233bde5e9c42a778a4ad96cab549f0eb1a3c0f0c82d7b60b60
kernel-debug-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 9e3c3221210e154920753cb7a95435dad00bd786f86ef7d767da0213f9c0749b
kernel-debug-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: f34f8d3f326f494a2f4235ab11a7043a4c9bb616dceff860687a350bae6ee9e4
kernel-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: bdab61832a344969209ac0e9d9508fdabce065ff9d8b68317905232576e2ff1f
kernel-debuginfo-common-2.6.18-348.4.1.el5.s390x.rpm SHA-256: c16efb9fbc8b3d80f7bbbd0f88dc5603fae771169fdd9b5f6e6252e5c69a6310
kernel-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 867264e649bff52b4b62481152c6ca39cbb258e0bafb4acf7d3b35be97f874c4
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 82df5fc49897951382fbd229b786205b77dd1fd32269e90a03ffe7f9951195f7
kernel-kdump-2.6.18-348.4.1.el5.s390x.rpm SHA-256: d2bac77051c47627d393fa319b1dcdc8c2b53d872e07e0fe6cba97c769c16a77
kernel-kdump-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 3537e2293422adfbc578b550d41e2002849017ee5119f534c17a62953e9baa6e
kernel-kdump-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 07e5b760857615b96732cda7f8702d60ae2a350943b1714e6eeed7df24dd0ccb

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
s390x
kernel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 3607456dfb7f296d976d21d90125f1e7049e4ebb6ba1fd046e11ab4bf5712a07
kernel-debug-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 918799d6c818c2233bde5e9c42a778a4ad96cab549f0eb1a3c0f0c82d7b60b60
kernel-debug-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 9e3c3221210e154920753cb7a95435dad00bd786f86ef7d767da0213f9c0749b
kernel-debug-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: f34f8d3f326f494a2f4235ab11a7043a4c9bb616dceff860687a350bae6ee9e4
kernel-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: bdab61832a344969209ac0e9d9508fdabce065ff9d8b68317905232576e2ff1f
kernel-debuginfo-common-2.6.18-348.4.1.el5.s390x.rpm SHA-256: c16efb9fbc8b3d80f7bbbd0f88dc5603fae771169fdd9b5f6e6252e5c69a6310
kernel-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 867264e649bff52b4b62481152c6ca39cbb258e0bafb4acf7d3b35be97f874c4
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 82df5fc49897951382fbd229b786205b77dd1fd32269e90a03ffe7f9951195f7
kernel-kdump-2.6.18-348.4.1.el5.s390x.rpm SHA-256: d2bac77051c47627d393fa319b1dcdc8c2b53d872e07e0fe6cba97c769c16a77
kernel-kdump-debuginfo-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 3537e2293422adfbc578b550d41e2002849017ee5119f534c17a62953e9baa6e
kernel-kdump-devel-2.6.18-348.4.1.el5.s390x.rpm SHA-256: 07e5b760857615b96732cda7f8702d60ae2a350943b1714e6eeed7df24dd0ccb

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
ppc
kernel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: dacc30a2f8f1e0249cddc52bc31082a8e79d456f9e9ca20c021c15f626543bfa
kernel-debug-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: be09e2138361eab88f7135bf6c191a3858df0e898f910a66ec56a0a525ae8958
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: d99ff4c7ce7122c29d40d3f99e25ed23b5d08cccf845733aee0fc3bde5a586c9
kernel-debug-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: f1cd87b9e4f0260ed46687a1da7820184113c32a8e96290eed3ecf6e3919f5f4
kernel-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 1cc6f4ce1db1e0481272d1a576494d82da7e255f5f5ccadc3549119835a993c8
kernel-debuginfo-common-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 8f28df27a780686f7b0ed7e650729c7df76a3fb7d4d0d2a9a91f02726588587b
kernel-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 2d94d4548769b23cb6d2608fa295533b5c425ce5f8f785419f3c5fd78de603bb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ppc.rpm SHA-256: 638d8837eb7ca7a330b530254ea4990edae22603998e70757abbe2ee9542981d
kernel-headers-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: c6a416d54e03bfd797dd962f4817930addacd32905a0a62f85d0bc54682fd6b3
kernel-kdump-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 84dbd7b1d7f92133ff802e49b7410325df03de5b6be919aae9c27facb8acdb06
kernel-kdump-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: ccb78222e2b892d0047f9481bfa5e89c861f0faf812de922e1784747913c66e0
kernel-kdump-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: ec7ce0e0661aed8e380004ddfdf6e00148118640c0b194177b228e9ca3c6867b

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
ppc
kernel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: dacc30a2f8f1e0249cddc52bc31082a8e79d456f9e9ca20c021c15f626543bfa
kernel-debug-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: be09e2138361eab88f7135bf6c191a3858df0e898f910a66ec56a0a525ae8958
kernel-debug-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: d99ff4c7ce7122c29d40d3f99e25ed23b5d08cccf845733aee0fc3bde5a586c9
kernel-debug-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: f1cd87b9e4f0260ed46687a1da7820184113c32a8e96290eed3ecf6e3919f5f4
kernel-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 1cc6f4ce1db1e0481272d1a576494d82da7e255f5f5ccadc3549119835a993c8
kernel-debuginfo-common-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 8f28df27a780686f7b0ed7e650729c7df76a3fb7d4d0d2a9a91f02726588587b
kernel-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 2d94d4548769b23cb6d2608fa295533b5c425ce5f8f785419f3c5fd78de603bb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.ppc.rpm SHA-256: 638d8837eb7ca7a330b530254ea4990edae22603998e70757abbe2ee9542981d
kernel-headers-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: c6a416d54e03bfd797dd962f4817930addacd32905a0a62f85d0bc54682fd6b3
kernel-kdump-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: 84dbd7b1d7f92133ff802e49b7410325df03de5b6be919aae9c27facb8acdb06
kernel-kdump-debuginfo-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: ccb78222e2b892d0047f9481bfa5e89c861f0faf812de922e1784747913c66e0
kernel-kdump-devel-2.6.18-348.4.1.el5.ppc64.rpm SHA-256: ec7ce0e0661aed8e380004ddfdf6e00148118640c0b194177b228e9ca3c6867b

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
kernel-2.6.18-348.4.1.el5.src.rpm SHA-256: 092e76fdce8fff1176e6fb0f68fe8419e39981f8f092a3688f49b914e5b26f4c
x86_64
kernel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3b28cf2bc8766293640684df55276c3213b34f1c5bf6a6ba294227449426050c
kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 41627bbc47b53ed7c57802851cd12d8b68f2c8ab6742261a02a2474c874f076a
kernel-debug-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 881a999e24784960f798af017813dfad78808e31cb42fcbb5c6564a481f6eaae
kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 7f529a6cf22b26980136354d9f3f361a8c57541ff3032eb462e36a0bcad27abd
kernel-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 3530374ffd3108fd13049cdecbbabcd644de005e63ccefe6b3269c406786eec6
kernel-debuginfo-common-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 94c8719d29faedadc23868b66b20ddfd22c898ac663053da16f7cf9bce2b3027
kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 9f00b93597f14a02eebbd5bc6398df4c74652a0b8fe91bc7e21094f01cb02177
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: af8084f2d5adc2be2737de3486f1fccfecf8b493b3ecbf4c994f1a66238dac99
kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: f4ba237ba063ec92b6ebe5c592d2eb8ec43c886521e75975040f17fb510bb737
kernel-xen-debuginfo-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 2ee308f1d5c12cff5d7db8911df9dd4e56bc772f2c96f0ebfc6f045b4ff113a0
kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm SHA-256: 946e912c00821ff09827f4074ecd5f240d7934ee71c6db18b95f57ddcb9281a0
i386
kernel-2.6.18-348.4.1.el5.i686.rpm SHA-256: cb14ee46eeb9d40e764fc90de9b32f376632742001a6914ae6e8c405ebf81a78
kernel-PAE-2.6.18-348.4.1.el5.i686.rpm SHA-256: 98fd9e4e2dd10afb3c45786cc3f917f775ef13731a8ed409a8033231fb6deddf
kernel-PAE-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: dfd5c4e55d7800993d8acbabf63e019cd227b54d71fda68297524f8081327cc6
kernel-PAE-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: ebd4ed14f8e42d45cdf56454075fb3866941daf64edf0bb6c4d1dee1fa9018ae
kernel-debug-2.6.18-348.4.1.el5.i686.rpm SHA-256: b4091a03db9a6ff208bae746d80b8a1614134e0b2fb748b9678ec459c67f6b3e
kernel-debug-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3678e3425604cf29e764d98c136558d7b0c8c1447439b71713f013669fce0e87
kernel-debug-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 021e83a39f7f24cc0e0de549c588fcc1cfdd8461b213b91e897b419ea80d3b22
kernel-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: fa08bb2d51a50c60891d84424cd3b43e36a78b00aae1bc841e00f1e2b7226c42
kernel-debuginfo-common-2.6.18-348.4.1.el5.i686.rpm SHA-256: 135e0f5864d14183dd84765e8a68a686a4cd51462734f5b7a93ac175b9c15f81
kernel-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: eebab41fbe7cb15411feaff2c116e89df7d8420f328d0606ed6a32ebef9f7eeb
kernel-doc-2.6.18-348.4.1.el5.noarch.rpm SHA-256: 86cb3bc4e9ca891bd9901f253ad14f3a9c175c0b05987ffe7a6b1f3445c1d178
kernel-headers-2.6.18-348.4.1.el5.i386.rpm SHA-256: 430297230ec9c2a9ab600c480c496a55efb305ee641c93c90c6dc466da43e11f
kernel-xen-2.6.18-348.4.1.el5.i686.rpm SHA-256: a6f45a0e5848109363d5f87f84aaf1bfebd4e8e3eb975cf8c8d03d8ff4ba38f0
kernel-xen-debuginfo-2.6.18-348.4.1.el5.i686.rpm SHA-256: e7e7e6e05457ffb85a2278066db25c520dd5c14662fa3819e0c6745dd46c0da9
kernel-xen-devel-2.6.18-348.4.1.el5.i686.rpm SHA-256: 3adc18c7254a049a56b9a858595569225d7a624e1abf96ca1496719d5c10cb9e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility