Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2013:1449 - Security Advisory
Issued:
2013-10-22
Updated:
2013-10-22

RHSA-2013:1449 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and one bug are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A flaw was found in the way the Linux kernel handled the creation of

temporary IPv6 addresses. If the IPv6 privacy extension was enabled
(/proc/sys/net/ipv6/conf/eth0/use_tempaddr is set to '2'), an attacker on
the local network could disable IPv6 temporary address generation, leading
to a potential information disclosure. (CVE-2013-0343, Moderate)

  • An information leak flaw was found in the way Linux kernel's device

mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data from
disk blocks in free space, which are normally inaccessible. (CVE-2013-4299,
Moderate)

  • An off-by-one flaw was found in the way the ANSI CPRNG implementation in

the Linux kernel processed non-block size aligned requests. This could lead
to random numbers being generated with less bits of entropy than expected
when ANSI CPRNG was used. (CVE-2013-4345, Moderate)

  • An information leak flaw was found in the way Xen hypervisor emulated the

OUTS instruction for 64-bit paravirtualized guests. A privileged guest user
could use this flaw to leak hypervisor stack memory to the guest.
(CVE-2013-4368, Moderate)

Red Hat would like to thank Fujitsu for reporting CVE-2013-4299, Stephan
Mueller for reporting CVE-2013-4345, and the Xen project for reporting
CVE-2013-4368.

This update also fixes the following bug:

  • A bug in the GFS2 code prevented glock work queues from freeing

glock-related memory while the glock memory shrinker repeatedly queued a
large number of demote requests, for example when performing a simultaneous
backup of several live GFS2 volumes with a large file count. As a
consequence, the glock work queues became overloaded which resulted in a
high CPU usage and the GFS2 file systems being unresponsive for a
significant amount of time. A patch has been applied to alleviate this
problem by calling the yield() function after scheduling a certain amount
of tasks on the glock work queues. The problem can now occur only with
extremely high work loads. (BZ#1014714)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 914664 - CVE-2013-0343 kernel: handling of IPv6 temporary addresses
  • BZ - 1004233 - CVE-2013-4299 kernel: dm: dm-snapshot data leak
  • BZ - 1007690 - CVE-2013-4345 kernel: ansi_cprng: off by one error in non-block size request
  • BZ - 1012550 - CVE-2013-4368 xen: information leak through outs instruction emulation (XSA-67)

CVEs

  • CVE-2013-4299
  • CVE-2013-0343
  • CVE-2013-4345
  • CVE-2013-4368

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-371.1.2.el5.src.rpm SHA-256: 814cbb70e85cf0aa2b5f237b12c35fcae2b6ab36f665bdf20b83e50a1ee1a165
x86_64
kernel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: e4fc226eed77107b6fc1bd15ac1126f63e0b919d0434966a86fb8ebebc72fe91
kernel-debug-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: f2426af446d7a18ac950d37c1945228c408ca017dbd54d1dd0892cda5ca35686
kernel-debug-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 9112b232cb365b66564328fa01057bb9f5ab7d654a7a708dff892452b4789d80
kernel-debug-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 19ae0d8b065fe3fa19d58084d2c53969ee370f73cdb624fd33f4154800d5a81a
kernel-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 92177e0d4b1a7527a27bf2906eef5915639df18e68a4656228503c8351c17664
kernel-debuginfo-common-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 7965a4d05ade3486def7abca74dd4e59051141d8936f7ee81bd4d35741ebdec9
kernel-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: b817b69507bc3e7ce1a3de17b9494cb0e60e70837c771b4f8444b48201cda7f6
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: cdb7c69698d5e8fa50c1900782de58ad7349c34dccb9159d331a8a2edfa70d8d
kernel-xen-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 97fcbdac529b31c1ffefd57c9cb9f3027a42257000703b9d700aa2f2a73cfccb
kernel-xen-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 21b34f07da477376ed6f515b8f5ed6d8b0320a6fe8443fae8b2d3c8d9a73f3f5
kernel-xen-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: bd9cf49a5691a1fb664f0d95055dcfc2a25b7284c281e69ec5975d044ed3d1f5
ia64
kernel-2.6.18-371.1.2.el5.ia64.rpm SHA-256: cfb7f509b68128012d105a395ef9b5fb15f49d4cf7492953751abf030cb9b0fd
kernel-debug-2.6.18-371.1.2.el5.ia64.rpm SHA-256: f5ba5aba6ecd566054ab1de5db54a20ea4f0e5100ddebfc6e7689c7bd8b9818b
kernel-debug-debuginfo-2.6.18-371.1.2.el5.ia64.rpm SHA-256: cb09b5245fe45f74b95eb4d3eea0385c4da73b30157566654bbd8026faec8c99
kernel-debug-devel-2.6.18-371.1.2.el5.ia64.rpm SHA-256: ffcb391c6b2e3a832f7193a8750dc7945403ae60021c241f2d0af91ba7bb7284
kernel-debuginfo-2.6.18-371.1.2.el5.ia64.rpm SHA-256: 8596b8acaa674935d2bdd9bc9ab3bfd96eae2c2be55c806334067f98f74ee959
kernel-debuginfo-common-2.6.18-371.1.2.el5.ia64.rpm SHA-256: f1416fd35adad521ed7addbda5ae9dc6338d36b775ec70a6569335958536b7d5
kernel-devel-2.6.18-371.1.2.el5.ia64.rpm SHA-256: 532bf0e1777e18d60532d644a5fa927c261edf493ff88407f23a7ea8e8b52a86
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.ia64.rpm SHA-256: 7ed7b9b80804bac6d576719321e24f5d58c7297b83a477513cf69cc394e20c9b
kernel-xen-2.6.18-371.1.2.el5.ia64.rpm SHA-256: e90668871313203a807f59c9dd33fb8d439f68ba3f4d6712290a696c3dc104a8
kernel-xen-debuginfo-2.6.18-371.1.2.el5.ia64.rpm SHA-256: 382d34fd3e49709263437546954a2364bc66951ffc96133f672117b5d9dc7c4f
kernel-xen-devel-2.6.18-371.1.2.el5.ia64.rpm SHA-256: fe271bf780e26ea5bb16b0c2a4f88d2b0c1a30ac9b94b2c24edc715a576e0fed
i386
kernel-2.6.18-371.1.2.el5.i686.rpm SHA-256: 99d7887ba4a702bb18bf8cc0f744c69f16497494b81d4a8b8293d004a818eb7f
kernel-PAE-2.6.18-371.1.2.el5.i686.rpm SHA-256: 39ec8a43c8e75a2f03cdbc85f163e2c3bdbae2f621646611d7fa89875ecb6fba
kernel-PAE-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 5bffbc7cf6d6fdd92a55effbe811591502fea3d3d3c1e066c52bbd5adb93e764
kernel-PAE-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: 6a0918b38b6c1a4783bab6d2d4dda47d3d2fcccd9ec1efc71c19162824d92141
kernel-debug-2.6.18-371.1.2.el5.i686.rpm SHA-256: cd15aebf9209008eafbd178d05937ddab8d38d890283e4719a83607528c6f38c
kernel-debug-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: e661dfe1acbdd06aa056e68dada993e92d693a4ffdcc2c03699135352008b99d
kernel-debug-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e1ad1e13548f81198ceb26099a796524da4b44c4db0b481cf25ea6140f14bab8
kernel-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 44cf2c7cd8f524a498765f156ed73d285b30e81061f019bda7a4c4f0117da54a
kernel-debuginfo-common-2.6.18-371.1.2.el5.i686.rpm SHA-256: 44b04cfe837787c2ce6584dcfef89fde90c605b8b52061daf6e40fd8ce7d65ea
kernel-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e19d8782729cb8d7e638f1d5c5a2f7e99eb239f1f2a2adfe0805dd77ec76bdfc
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.i386.rpm SHA-256: d490c85e0debda2f0b823825b1db35bb686f9583e4f5b8e917ccefb03fca9f4d
kernel-xen-2.6.18-371.1.2.el5.i686.rpm SHA-256: 72d4fa60ba251d2284302b93ed73a9b2ffe20258563f2f3b9203941286da0fcd
kernel-xen-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 26838204683b2485ff9cc063b1ca64abd85711aafd0bdb86fbce754d42bdc9f4
kernel-xen-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e4e4788767ebbe98046d5895f6c8f3e3264c81a27188001d0716374f0636f11c

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-371.1.2.el5.src.rpm SHA-256: 814cbb70e85cf0aa2b5f237b12c35fcae2b6ab36f665bdf20b83e50a1ee1a165
x86_64
kernel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: e4fc226eed77107b6fc1bd15ac1126f63e0b919d0434966a86fb8ebebc72fe91
kernel-debug-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: f2426af446d7a18ac950d37c1945228c408ca017dbd54d1dd0892cda5ca35686
kernel-debug-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 9112b232cb365b66564328fa01057bb9f5ab7d654a7a708dff892452b4789d80
kernel-debug-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 19ae0d8b065fe3fa19d58084d2c53969ee370f73cdb624fd33f4154800d5a81a
kernel-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 92177e0d4b1a7527a27bf2906eef5915639df18e68a4656228503c8351c17664
kernel-debuginfo-common-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 7965a4d05ade3486def7abca74dd4e59051141d8936f7ee81bd4d35741ebdec9
kernel-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: b817b69507bc3e7ce1a3de17b9494cb0e60e70837c771b4f8444b48201cda7f6
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: cdb7c69698d5e8fa50c1900782de58ad7349c34dccb9159d331a8a2edfa70d8d
kernel-xen-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 97fcbdac529b31c1ffefd57c9cb9f3027a42257000703b9d700aa2f2a73cfccb
kernel-xen-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 21b34f07da477376ed6f515b8f5ed6d8b0320a6fe8443fae8b2d3c8d9a73f3f5
kernel-xen-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: bd9cf49a5691a1fb664f0d95055dcfc2a25b7284c281e69ec5975d044ed3d1f5
i386
kernel-2.6.18-371.1.2.el5.i686.rpm SHA-256: 99d7887ba4a702bb18bf8cc0f744c69f16497494b81d4a8b8293d004a818eb7f
kernel-PAE-2.6.18-371.1.2.el5.i686.rpm SHA-256: 39ec8a43c8e75a2f03cdbc85f163e2c3bdbae2f621646611d7fa89875ecb6fba
kernel-PAE-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 5bffbc7cf6d6fdd92a55effbe811591502fea3d3d3c1e066c52bbd5adb93e764
kernel-PAE-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: 6a0918b38b6c1a4783bab6d2d4dda47d3d2fcccd9ec1efc71c19162824d92141
kernel-debug-2.6.18-371.1.2.el5.i686.rpm SHA-256: cd15aebf9209008eafbd178d05937ddab8d38d890283e4719a83607528c6f38c
kernel-debug-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: e661dfe1acbdd06aa056e68dada993e92d693a4ffdcc2c03699135352008b99d
kernel-debug-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e1ad1e13548f81198ceb26099a796524da4b44c4db0b481cf25ea6140f14bab8
kernel-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 44cf2c7cd8f524a498765f156ed73d285b30e81061f019bda7a4c4f0117da54a
kernel-debuginfo-common-2.6.18-371.1.2.el5.i686.rpm SHA-256: 44b04cfe837787c2ce6584dcfef89fde90c605b8b52061daf6e40fd8ce7d65ea
kernel-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e19d8782729cb8d7e638f1d5c5a2f7e99eb239f1f2a2adfe0805dd77ec76bdfc
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.i386.rpm SHA-256: d490c85e0debda2f0b823825b1db35bb686f9583e4f5b8e917ccefb03fca9f4d
kernel-xen-2.6.18-371.1.2.el5.i686.rpm SHA-256: 72d4fa60ba251d2284302b93ed73a9b2ffe20258563f2f3b9203941286da0fcd
kernel-xen-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 26838204683b2485ff9cc063b1ca64abd85711aafd0bdb86fbce754d42bdc9f4
kernel-xen-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e4e4788767ebbe98046d5895f6c8f3e3264c81a27188001d0716374f0636f11c

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-371.1.2.el5.src.rpm SHA-256: 814cbb70e85cf0aa2b5f237b12c35fcae2b6ab36f665bdf20b83e50a1ee1a165
x86_64
kernel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: e4fc226eed77107b6fc1bd15ac1126f63e0b919d0434966a86fb8ebebc72fe91
kernel-debug-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: f2426af446d7a18ac950d37c1945228c408ca017dbd54d1dd0892cda5ca35686
kernel-debug-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 9112b232cb365b66564328fa01057bb9f5ab7d654a7a708dff892452b4789d80
kernel-debug-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 19ae0d8b065fe3fa19d58084d2c53969ee370f73cdb624fd33f4154800d5a81a
kernel-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 92177e0d4b1a7527a27bf2906eef5915639df18e68a4656228503c8351c17664
kernel-debuginfo-common-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 7965a4d05ade3486def7abca74dd4e59051141d8936f7ee81bd4d35741ebdec9
kernel-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: b817b69507bc3e7ce1a3de17b9494cb0e60e70837c771b4f8444b48201cda7f6
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: cdb7c69698d5e8fa50c1900782de58ad7349c34dccb9159d331a8a2edfa70d8d
kernel-xen-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 97fcbdac529b31c1ffefd57c9cb9f3027a42257000703b9d700aa2f2a73cfccb
kernel-xen-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 21b34f07da477376ed6f515b8f5ed6d8b0320a6fe8443fae8b2d3c8d9a73f3f5
kernel-xen-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: bd9cf49a5691a1fb664f0d95055dcfc2a25b7284c281e69ec5975d044ed3d1f5
i386
kernel-2.6.18-371.1.2.el5.i686.rpm SHA-256: 99d7887ba4a702bb18bf8cc0f744c69f16497494b81d4a8b8293d004a818eb7f
kernel-PAE-2.6.18-371.1.2.el5.i686.rpm SHA-256: 39ec8a43c8e75a2f03cdbc85f163e2c3bdbae2f621646611d7fa89875ecb6fba
kernel-PAE-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 5bffbc7cf6d6fdd92a55effbe811591502fea3d3d3c1e066c52bbd5adb93e764
kernel-PAE-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: 6a0918b38b6c1a4783bab6d2d4dda47d3d2fcccd9ec1efc71c19162824d92141
kernel-debug-2.6.18-371.1.2.el5.i686.rpm SHA-256: cd15aebf9209008eafbd178d05937ddab8d38d890283e4719a83607528c6f38c
kernel-debug-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: e661dfe1acbdd06aa056e68dada993e92d693a4ffdcc2c03699135352008b99d
kernel-debug-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e1ad1e13548f81198ceb26099a796524da4b44c4db0b481cf25ea6140f14bab8
kernel-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 44cf2c7cd8f524a498765f156ed73d285b30e81061f019bda7a4c4f0117da54a
kernel-debuginfo-common-2.6.18-371.1.2.el5.i686.rpm SHA-256: 44b04cfe837787c2ce6584dcfef89fde90c605b8b52061daf6e40fd8ce7d65ea
kernel-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e19d8782729cb8d7e638f1d5c5a2f7e99eb239f1f2a2adfe0805dd77ec76bdfc
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.i386.rpm SHA-256: d490c85e0debda2f0b823825b1db35bb686f9583e4f5b8e917ccefb03fca9f4d
kernel-xen-2.6.18-371.1.2.el5.i686.rpm SHA-256: 72d4fa60ba251d2284302b93ed73a9b2ffe20258563f2f3b9203941286da0fcd
kernel-xen-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 26838204683b2485ff9cc063b1ca64abd85711aafd0bdb86fbce754d42bdc9f4
kernel-xen-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e4e4788767ebbe98046d5895f6c8f3e3264c81a27188001d0716374f0636f11c

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-371.1.2.el5.src.rpm SHA-256: 814cbb70e85cf0aa2b5f237b12c35fcae2b6ab36f665bdf20b83e50a1ee1a165
s390x
kernel-2.6.18-371.1.2.el5.s390x.rpm SHA-256: 6b81fe50a8660f65c0a1df51de009d8085b6eb8890a3732757733c741462618f
kernel-debug-2.6.18-371.1.2.el5.s390x.rpm SHA-256: a601db5cbcaf5815b81d8d8e030defdcf8cae12b71b9db3bec42a3a9fc979e90
kernel-debug-debuginfo-2.6.18-371.1.2.el5.s390x.rpm SHA-256: 0ebf0700d07fcb9d4bdd62e15302f34d91200611a2ee4c53e652b61331e405ba
kernel-debug-devel-2.6.18-371.1.2.el5.s390x.rpm SHA-256: e75499b51d9cf295c4e9e038d029455a02920822f15ec4bcdd7f8bce2efba1ea
kernel-debuginfo-2.6.18-371.1.2.el5.s390x.rpm SHA-256: 23d4cd8adb04063bcd1cc7f9bcff2c926b586809f2427ba6af68826020e1bcae
kernel-debuginfo-common-2.6.18-371.1.2.el5.s390x.rpm SHA-256: 7c870001400c85277454e7616151a4e889fdf09275bda2eb57b42563e7a92490
kernel-devel-2.6.18-371.1.2.el5.s390x.rpm SHA-256: 4b0ed5974244828c4bccc4a56dbdc9f2fe16478d7b0abef96ef9931547b9f5e0
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.s390x.rpm SHA-256: ff7c4c559cee4a21dd97277505e5b544a4a1c8e4b67b511ef8ad0e9817a0538a
kernel-kdump-2.6.18-371.1.2.el5.s390x.rpm SHA-256: 8c8920dde6372c3dbf3aaf5b89e109bdcdd001b4601fb1c094ab6c8455b8ca0f
kernel-kdump-debuginfo-2.6.18-371.1.2.el5.s390x.rpm SHA-256: af398e08c29b4c88aaea2dc3e1f547eb876bd071d6185fac30570629a708e7c0
kernel-kdump-devel-2.6.18-371.1.2.el5.s390x.rpm SHA-256: 617169f96b239c3e87332e4d875fcd817372dd47fc112f5ab139d9110d97be49

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-371.1.2.el5.src.rpm SHA-256: 814cbb70e85cf0aa2b5f237b12c35fcae2b6ab36f665bdf20b83e50a1ee1a165
ppc
kernel-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: e14d947d64d3f30ba00a8668e9f17bcc78782ca241cd1692fe76a30c3745dc0d
kernel-debug-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: ef3e8683ae1948f79ffcbeeeb733efa642a45ae62bf75b9cb68ede07ff493c56
kernel-debug-debuginfo-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: 1bf8563058ff1f3949938d80f6a31336ee07f59ced5677bb0504f0a1b32a6495
kernel-debug-devel-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: 1dabb0e7acd418cbc3ad7f9447d82d27aa319d8392a069d11c6970f5bd2aac88
kernel-debuginfo-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: a029621fdee58335212db088a91b735c077247137298e85dda55f4a57b308e6c
kernel-debuginfo-common-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: 241bb2d5beda7cd46b8277a50763a011cf9f04db3cee6df302740d7e7bb51160
kernel-devel-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: 7cd1d3637187f2b0c0e12e4c21bbc68fc87b221690d33add8aa0613329847f3a
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.ppc.rpm SHA-256: 8918db9c3d8dbfd360d55a3262f968ecbab15fb93209e0e8e45131a5bc9b2a9b
kernel-headers-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: 4aa4cd8bf9c3e6b73e6504b679c2af546071e0bf57a0dc1895cd85d57686e870
kernel-kdump-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: aafc2a8b19596ab614e56c338c93dcb4da9f5408f305fa725f117dd3958b381a
kernel-kdump-debuginfo-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: 391713e4329cb281f67ccec3a51757239dc796c23ba50273b004c9ecff2f38d6
kernel-kdump-devel-2.6.18-371.1.2.el5.ppc64.rpm SHA-256: a57ea2eab3770d64d2d815c0720c7f5b2c076f283cbcaeaaf9310eafb4d07c7d

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-371.1.2.el5.src.rpm SHA-256: 814cbb70e85cf0aa2b5f237b12c35fcae2b6ab36f665bdf20b83e50a1ee1a165
x86_64
kernel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: e4fc226eed77107b6fc1bd15ac1126f63e0b919d0434966a86fb8ebebc72fe91
kernel-debug-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: f2426af446d7a18ac950d37c1945228c408ca017dbd54d1dd0892cda5ca35686
kernel-debug-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 9112b232cb365b66564328fa01057bb9f5ab7d654a7a708dff892452b4789d80
kernel-debug-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 19ae0d8b065fe3fa19d58084d2c53969ee370f73cdb624fd33f4154800d5a81a
kernel-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 92177e0d4b1a7527a27bf2906eef5915639df18e68a4656228503c8351c17664
kernel-debuginfo-common-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 7965a4d05ade3486def7abca74dd4e59051141d8936f7ee81bd4d35741ebdec9
kernel-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: b817b69507bc3e7ce1a3de17b9494cb0e60e70837c771b4f8444b48201cda7f6
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: cdb7c69698d5e8fa50c1900782de58ad7349c34dccb9159d331a8a2edfa70d8d
kernel-xen-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 97fcbdac529b31c1ffefd57c9cb9f3027a42257000703b9d700aa2f2a73cfccb
kernel-xen-debuginfo-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: 21b34f07da477376ed6f515b8f5ed6d8b0320a6fe8443fae8b2d3c8d9a73f3f5
kernel-xen-devel-2.6.18-371.1.2.el5.x86_64.rpm SHA-256: bd9cf49a5691a1fb664f0d95055dcfc2a25b7284c281e69ec5975d044ed3d1f5
i386
kernel-2.6.18-371.1.2.el5.i686.rpm SHA-256: 99d7887ba4a702bb18bf8cc0f744c69f16497494b81d4a8b8293d004a818eb7f
kernel-PAE-2.6.18-371.1.2.el5.i686.rpm SHA-256: 39ec8a43c8e75a2f03cdbc85f163e2c3bdbae2f621646611d7fa89875ecb6fba
kernel-PAE-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 5bffbc7cf6d6fdd92a55effbe811591502fea3d3d3c1e066c52bbd5adb93e764
kernel-PAE-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: 6a0918b38b6c1a4783bab6d2d4dda47d3d2fcccd9ec1efc71c19162824d92141
kernel-debug-2.6.18-371.1.2.el5.i686.rpm SHA-256: cd15aebf9209008eafbd178d05937ddab8d38d890283e4719a83607528c6f38c
kernel-debug-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: e661dfe1acbdd06aa056e68dada993e92d693a4ffdcc2c03699135352008b99d
kernel-debug-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e1ad1e13548f81198ceb26099a796524da4b44c4db0b481cf25ea6140f14bab8
kernel-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 44cf2c7cd8f524a498765f156ed73d285b30e81061f019bda7a4c4f0117da54a
kernel-debuginfo-common-2.6.18-371.1.2.el5.i686.rpm SHA-256: 44b04cfe837787c2ce6584dcfef89fde90c605b8b52061daf6e40fd8ce7d65ea
kernel-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e19d8782729cb8d7e638f1d5c5a2f7e99eb239f1f2a2adfe0805dd77ec76bdfc
kernel-doc-2.6.18-371.1.2.el5.noarch.rpm SHA-256: d41af4dea79f2fe38f153d01618caeed4f0bafb379c9d31833d0552d357104ca
kernel-headers-2.6.18-371.1.2.el5.i386.rpm SHA-256: d490c85e0debda2f0b823825b1db35bb686f9583e4f5b8e917ccefb03fca9f4d
kernel-xen-2.6.18-371.1.2.el5.i686.rpm SHA-256: 72d4fa60ba251d2284302b93ed73a9b2ffe20258563f2f3b9203941286da0fcd
kernel-xen-debuginfo-2.6.18-371.1.2.el5.i686.rpm SHA-256: 26838204683b2485ff9cc063b1ca64abd85711aafd0bdb86fbce754d42bdc9f4
kernel-xen-devel-2.6.18-371.1.2.el5.i686.rpm SHA-256: e4e4788767ebbe98046d5895f6c8f3e3264c81a27188001d0716374f0636f11c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter