Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2013:1790 - Security Advisory
Issued:
2013-12-05
Updated:
2013-12-05

RHSA-2013:1790 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • An information leak flaw was found in the way the Xen hypervisor handled

error conditions when reading guest memory during certain guest-originated
operations, such as port or memory mapped I/O writes. A privileged user in
a fully-virtualized guest could use this flaw to leak hypervisor stack
memory to a guest. (CVE-2013-4355, Moderate)

Red Hat would like to thank the Xen project for reporting this issue.

This update also fixes the following bugs:

  • A previous fix to the kernel did not contain a memory barrier in the

percpu_up_write() function. Consequently, under certain circumstances, a
race condition could occur leading to memory corruption and a subsequent
kernel panic. This update introduces a new memory barrier pair, light_mb()
and heavy_mb(), for per-CPU basis read and write semaphores
(percpu-rw-semaphores) ensuring that the race condition can no longer
occur. In addition, the read path performance of "percpu-rw-semaphores" has
been improved. (BZ#1014715)

  • Due to a bug in the tg3 driver, systems that had the Wake-on-LAN (WOL)

feature enabled on their NICs could not have been woken up from suspension
or hibernation using WOL. A missing pci_wake_from_d3() function call has
been added to the tg3 driver, which ensures that WOL functions properly by
setting the PME_ENABLE bit. (BZ#1014973)

  • Due to an incorrect test condition in the mpt2sas driver, the driver was

unable to catch failures to map a SCSI scatter-gather list. The test
condition has been corrected so that the mpt2sas driver now handles SCSI
scatter-gather mapping failures as expected. (BZ#1018458)

  • A previous patch to the kernel introduced the "VLAN tag re-insertion"

workaround to resolve a problem with incorrectly handled VLAN-tagged
packets with no assigned VLAN group while the be2net driver was in
promiscuous mode. However, this solution led to packet corruption and a
subsequent kernel oops if such a processed packed was a GRO packet.
Therefore, a patch has been applied to restrict VLAN tag re-insertion only
to non-GRO packets. The be2net driver now processes VLAN-tagged packets
with no assigned VLAN group correctly in this situation. (BZ#1023348)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1009598 - CVE-2013-4355 Kernel: Xen: Xsa-63: information leak via I/O instruction emulation

CVEs

  • CVE-2013-4355

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-371.3.1.el5.src.rpm SHA-256: f322dc9f85f50fa866ae6f3ba5df87bd648236fab7970a06040e260a93d8add6
x86_64
kernel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 988c3d8367930da4f980a2ef116a630641b904fbdf9c81e9b762cf7aeafae081
kernel-debug-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 4c56c8ad4f88fe61fad65f1b987113b6f88854636a5e5b249cd554ff0cf2f76b
kernel-debug-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 524e6c676828fed3c99d481862f48b0ce2ebb6c7a9106696362fc43bc2fe622b
kernel-debug-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: a8ee00d0d0da9c554aba27378e195ccf7d2fd4a88393e857ab9cf53d050b6764
kernel-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: cfaa9bb9b4e424db134e37cf47f98504b36878a8f31b8a46d2d5de5fc3606a82
kernel-debuginfo-common-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: b76413be728436b998ef251fb04076e880e036e410dace7273a164eb32bc3e19
kernel-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 991acc243b9524f7d72daaa6722ea3e2a700b9f1d7abe3707fc2b0faa227ee82
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 2a802213966bf9da684809aa456e6eb23b4274b45e6e6ce8db581865a8a29211
kernel-xen-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 3a571288387b4b3360dd96d880ce6e126c8d8a9bec86126f5855223ef3323361
kernel-xen-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 4e9e34e4b03d648df517dafd0a67bb8c2d99bdf7a319a8e8e790f72ed68cfb7b
kernel-xen-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 7c0352bfa81673e4dd36b4b718c8be2cc2a06baae5e3182df0de074ce8563e20
ia64
kernel-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 976a26c41d029785a60cd33f3011be1c7fbd5cedbf73c26f8d7fb4625367064c
kernel-debug-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 1513f9871295ae795c57b5f24a5dac7ea43c5af0486163cbf66aedfce2ca7d0a
kernel-debug-debuginfo-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 713d083b8a2fc243cb49a2f676e38704ea831208249597dae530017d4a276821
kernel-debug-devel-2.6.18-371.3.1.el5.ia64.rpm SHA-256: e1f0255a98ce381725a81bed67b4ef5ee616efc162e7e09a94abbcdfc3ad4558
kernel-debuginfo-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 1a61f5b64b3d2b9b261a03bb1881a903718d2ccbcebee566e71877c408164295
kernel-debuginfo-common-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 7ef9103ff761f2e50f88a693dfbfe9e2434e4579c9dad2225ea3cd76cae1d89e
kernel-devel-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 373a3dbfb7fd58b54c9c2fe106b0e7ba62e35a9a84fab311fb3ebb4b65594383
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 83d39da5263c86fec3bf15689b9b4b7485e7c2f12845955aeb28f2f71ee6c888
kernel-xen-2.6.18-371.3.1.el5.ia64.rpm SHA-256: f6e8268fa4cacd9f61f9d44b53745b950e8492e2c052ae75ccce0842b8ab333e
kernel-xen-debuginfo-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 39da64d3c1e02cef20cb65f10fc89c53322a25133ae4b232a442be19afff503c
kernel-xen-devel-2.6.18-371.3.1.el5.ia64.rpm SHA-256: 0d7dbf0c93e6c89e2b846e61d75da52d5960db58d7f1dc387a6dc730635da2f8
i386
kernel-2.6.18-371.3.1.el5.i686.rpm SHA-256: 7482e65fe72e0cc876b346a2b3c8647f0d8a4ab0436f23e9c4ba8b6c60726217
kernel-PAE-2.6.18-371.3.1.el5.i686.rpm SHA-256: 2d67171db252b5b98c9da691579d756b0a40ae90cd631f0e3cdf938df9136651
kernel-PAE-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 2734f128c43cf221301d1b8d90b9cacc668da4e048f8c7ba9d3d14dbe584d59c
kernel-PAE-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: b6099b3dccc018a8324dbf564441af02a468d8c03643b464cc7f9c5a604a6886
kernel-debug-2.6.18-371.3.1.el5.i686.rpm SHA-256: 92bca081f2dd903ef92c7300c0dd0cd59abac27a2bec7bd92aa15b4efc2dd505
kernel-debug-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: eff5dfe0331d76c9c2b95d1875effc8ccef9f80bfafd5fcdee8fcd8b9415d6f6
kernel-debug-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: d6eb6b7c00d6679cd576064c9ec492e6f6052f1504009534f948f85bc4fb1487
kernel-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 52cf7abdfb107b1712528d756f5efd70ac5697baa5671e45d4a5595be596767b
kernel-debuginfo-common-2.6.18-371.3.1.el5.i686.rpm SHA-256: 738360ae098dc74f94c7092fcca0170441c56a7411f27fbc9c0407863bec5c6f
kernel-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: 826c32b350c35b9c6d2bfd4557ec67974c1cb0afd2a32d99e77e94f577e61f85
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.i386.rpm SHA-256: 538111a0e16854fb4d7b146203bac9b70b2b4104ee579c098e493662903b3a99
kernel-xen-2.6.18-371.3.1.el5.i686.rpm SHA-256: 6a75c3d6467d098a88b713c6b146c7ac7e3021c9205d16bf7c116fa5e72fea72
kernel-xen-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 08696077cc112b8d43fd2ba1dfc4b2838e71c8033ecb0feb6d626d6efd6e52c3
kernel-xen-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: b572586af1f6322329c2656fca7fd152e92b8323e2c8e65b4b4f471bf8fd3ed8

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-371.3.1.el5.src.rpm SHA-256: f322dc9f85f50fa866ae6f3ba5df87bd648236fab7970a06040e260a93d8add6
x86_64
kernel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 988c3d8367930da4f980a2ef116a630641b904fbdf9c81e9b762cf7aeafae081
kernel-debug-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 4c56c8ad4f88fe61fad65f1b987113b6f88854636a5e5b249cd554ff0cf2f76b
kernel-debug-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 524e6c676828fed3c99d481862f48b0ce2ebb6c7a9106696362fc43bc2fe622b
kernel-debug-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: a8ee00d0d0da9c554aba27378e195ccf7d2fd4a88393e857ab9cf53d050b6764
kernel-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: cfaa9bb9b4e424db134e37cf47f98504b36878a8f31b8a46d2d5de5fc3606a82
kernel-debuginfo-common-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: b76413be728436b998ef251fb04076e880e036e410dace7273a164eb32bc3e19
kernel-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 991acc243b9524f7d72daaa6722ea3e2a700b9f1d7abe3707fc2b0faa227ee82
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 2a802213966bf9da684809aa456e6eb23b4274b45e6e6ce8db581865a8a29211
kernel-xen-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 3a571288387b4b3360dd96d880ce6e126c8d8a9bec86126f5855223ef3323361
kernel-xen-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 4e9e34e4b03d648df517dafd0a67bb8c2d99bdf7a319a8e8e790f72ed68cfb7b
kernel-xen-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 7c0352bfa81673e4dd36b4b718c8be2cc2a06baae5e3182df0de074ce8563e20
i386
kernel-2.6.18-371.3.1.el5.i686.rpm SHA-256: 7482e65fe72e0cc876b346a2b3c8647f0d8a4ab0436f23e9c4ba8b6c60726217
kernel-PAE-2.6.18-371.3.1.el5.i686.rpm SHA-256: 2d67171db252b5b98c9da691579d756b0a40ae90cd631f0e3cdf938df9136651
kernel-PAE-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 2734f128c43cf221301d1b8d90b9cacc668da4e048f8c7ba9d3d14dbe584d59c
kernel-PAE-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: b6099b3dccc018a8324dbf564441af02a468d8c03643b464cc7f9c5a604a6886
kernel-debug-2.6.18-371.3.1.el5.i686.rpm SHA-256: 92bca081f2dd903ef92c7300c0dd0cd59abac27a2bec7bd92aa15b4efc2dd505
kernel-debug-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: eff5dfe0331d76c9c2b95d1875effc8ccef9f80bfafd5fcdee8fcd8b9415d6f6
kernel-debug-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: d6eb6b7c00d6679cd576064c9ec492e6f6052f1504009534f948f85bc4fb1487
kernel-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 52cf7abdfb107b1712528d756f5efd70ac5697baa5671e45d4a5595be596767b
kernel-debuginfo-common-2.6.18-371.3.1.el5.i686.rpm SHA-256: 738360ae098dc74f94c7092fcca0170441c56a7411f27fbc9c0407863bec5c6f
kernel-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: 826c32b350c35b9c6d2bfd4557ec67974c1cb0afd2a32d99e77e94f577e61f85
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.i386.rpm SHA-256: 538111a0e16854fb4d7b146203bac9b70b2b4104ee579c098e493662903b3a99
kernel-xen-2.6.18-371.3.1.el5.i686.rpm SHA-256: 6a75c3d6467d098a88b713c6b146c7ac7e3021c9205d16bf7c116fa5e72fea72
kernel-xen-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 08696077cc112b8d43fd2ba1dfc4b2838e71c8033ecb0feb6d626d6efd6e52c3
kernel-xen-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: b572586af1f6322329c2656fca7fd152e92b8323e2c8e65b4b4f471bf8fd3ed8

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-371.3.1.el5.src.rpm SHA-256: f322dc9f85f50fa866ae6f3ba5df87bd648236fab7970a06040e260a93d8add6
x86_64
kernel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 988c3d8367930da4f980a2ef116a630641b904fbdf9c81e9b762cf7aeafae081
kernel-debug-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 4c56c8ad4f88fe61fad65f1b987113b6f88854636a5e5b249cd554ff0cf2f76b
kernel-debug-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 524e6c676828fed3c99d481862f48b0ce2ebb6c7a9106696362fc43bc2fe622b
kernel-debug-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: a8ee00d0d0da9c554aba27378e195ccf7d2fd4a88393e857ab9cf53d050b6764
kernel-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: cfaa9bb9b4e424db134e37cf47f98504b36878a8f31b8a46d2d5de5fc3606a82
kernel-debuginfo-common-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: b76413be728436b998ef251fb04076e880e036e410dace7273a164eb32bc3e19
kernel-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 991acc243b9524f7d72daaa6722ea3e2a700b9f1d7abe3707fc2b0faa227ee82
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 2a802213966bf9da684809aa456e6eb23b4274b45e6e6ce8db581865a8a29211
kernel-xen-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 3a571288387b4b3360dd96d880ce6e126c8d8a9bec86126f5855223ef3323361
kernel-xen-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 4e9e34e4b03d648df517dafd0a67bb8c2d99bdf7a319a8e8e790f72ed68cfb7b
kernel-xen-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 7c0352bfa81673e4dd36b4b718c8be2cc2a06baae5e3182df0de074ce8563e20
i386
kernel-2.6.18-371.3.1.el5.i686.rpm SHA-256: 7482e65fe72e0cc876b346a2b3c8647f0d8a4ab0436f23e9c4ba8b6c60726217
kernel-PAE-2.6.18-371.3.1.el5.i686.rpm SHA-256: 2d67171db252b5b98c9da691579d756b0a40ae90cd631f0e3cdf938df9136651
kernel-PAE-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 2734f128c43cf221301d1b8d90b9cacc668da4e048f8c7ba9d3d14dbe584d59c
kernel-PAE-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: b6099b3dccc018a8324dbf564441af02a468d8c03643b464cc7f9c5a604a6886
kernel-debug-2.6.18-371.3.1.el5.i686.rpm SHA-256: 92bca081f2dd903ef92c7300c0dd0cd59abac27a2bec7bd92aa15b4efc2dd505
kernel-debug-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: eff5dfe0331d76c9c2b95d1875effc8ccef9f80bfafd5fcdee8fcd8b9415d6f6
kernel-debug-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: d6eb6b7c00d6679cd576064c9ec492e6f6052f1504009534f948f85bc4fb1487
kernel-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 52cf7abdfb107b1712528d756f5efd70ac5697baa5671e45d4a5595be596767b
kernel-debuginfo-common-2.6.18-371.3.1.el5.i686.rpm SHA-256: 738360ae098dc74f94c7092fcca0170441c56a7411f27fbc9c0407863bec5c6f
kernel-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: 826c32b350c35b9c6d2bfd4557ec67974c1cb0afd2a32d99e77e94f577e61f85
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.i386.rpm SHA-256: 538111a0e16854fb4d7b146203bac9b70b2b4104ee579c098e493662903b3a99
kernel-xen-2.6.18-371.3.1.el5.i686.rpm SHA-256: 6a75c3d6467d098a88b713c6b146c7ac7e3021c9205d16bf7c116fa5e72fea72
kernel-xen-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 08696077cc112b8d43fd2ba1dfc4b2838e71c8033ecb0feb6d626d6efd6e52c3
kernel-xen-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: b572586af1f6322329c2656fca7fd152e92b8323e2c8e65b4b4f471bf8fd3ed8

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-371.3.1.el5.src.rpm SHA-256: f322dc9f85f50fa866ae6f3ba5df87bd648236fab7970a06040e260a93d8add6
s390x
kernel-2.6.18-371.3.1.el5.s390x.rpm SHA-256: a1a9b822f5bf26251c7244045d17c080ecc766bc130b3e08580316238c9b1e79
kernel-debug-2.6.18-371.3.1.el5.s390x.rpm SHA-256: bedca928a095f2ab3a4adfc2c52e327df24a4f1f86b1f14fd6d3a5eeafd3943e
kernel-debug-debuginfo-2.6.18-371.3.1.el5.s390x.rpm SHA-256: 306bb4bccdee9a3fcd02815cf18651aa7d94b19bea0fa89f3b708711244ec0c1
kernel-debug-devel-2.6.18-371.3.1.el5.s390x.rpm SHA-256: f07197108384ce88acc4ef397e5b5c72303909990f41c04b25773b40ee646a5c
kernel-debuginfo-2.6.18-371.3.1.el5.s390x.rpm SHA-256: 467b3a7df605efd9b3c7e30ba8292e34b53d41bd7372d8eee0ae4aaf6162c3b7
kernel-debuginfo-common-2.6.18-371.3.1.el5.s390x.rpm SHA-256: 6d89888ca914cf87a4d5971caa0f19882864e0f7af5edc5cf00e5cd9219d5292
kernel-devel-2.6.18-371.3.1.el5.s390x.rpm SHA-256: 16ae60db8aea6db848548e6abfece1e9c082b3a053bacecce82ab816f9f142a1
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.s390x.rpm SHA-256: 7cbcea7f367d73419dc029c498836f860c21e602e32dc7f56d96295a7dc34259
kernel-kdump-2.6.18-371.3.1.el5.s390x.rpm SHA-256: 30c457b57f10ef1be9d018671014c68a5613081ccc9efc2853c3f3105e4c1fad
kernel-kdump-debuginfo-2.6.18-371.3.1.el5.s390x.rpm SHA-256: 6fb5be9f956914c9c709804803480b9ef6833586bfc52c725b4e6b185f452971
kernel-kdump-devel-2.6.18-371.3.1.el5.s390x.rpm SHA-256: 8fec121762a02c4054855ea8b459a8d5315088ecc86b619f025744da156a3e96

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-371.3.1.el5.src.rpm SHA-256: f322dc9f85f50fa866ae6f3ba5df87bd648236fab7970a06040e260a93d8add6
ppc
kernel-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: 4a450e54a65767b62fc4453a05497e35c7c37006af38a4cad99cb4cf561f53d6
kernel-debug-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: 6c029ab5eed8094c103211b6a2837bb987db5518068751b1a0d785b330b543ff
kernel-debug-debuginfo-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: eb02d77ebe5cc4a6f89d67fb9e5000873156c4f60c88d5d4e8a4efcecf3499fe
kernel-debug-devel-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: 0762b1c0c1328727bfa14b92c39bb2c73747d20ca3d6816dad319c9e741f27f5
kernel-debuginfo-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: 0c530822ae78d87fca5616dc7a4105b6d32c49c89a4dfb29fd04da5b32eea9a0
kernel-debuginfo-common-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: 634e7ac612738e1f8cd5ec8dcdaa4b25a731d1a96f214f38614b804c184e1f7f
kernel-devel-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: 731c23a1c781d4ce1bc47f7c91ee2a6b38646337aba817f429be7e5807dcfea3
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.ppc.rpm SHA-256: 208ade60e0aabca8f625552993ada5c75e91e71d68d00446152fb94d7a030ff1
kernel-headers-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: f8d15384cd1e5039977c38fd1a1c5fb4e074e6ecebff3c3e9d08072fa5963b9c
kernel-kdump-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: db8edf3738f1ff6a9d8c57b4387996fa465f86ad506dd6d7f4018e0d87aa1e3f
kernel-kdump-debuginfo-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: 89aec045afecca6d8792d7abfe3cfd9ee825178a18ec8b201530f5ce726def73
kernel-kdump-devel-2.6.18-371.3.1.el5.ppc64.rpm SHA-256: e190503edc3c48b6efc8270095b741c6c6d35c96d74f29ec5a4305fd88ee6600

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-371.3.1.el5.src.rpm SHA-256: f322dc9f85f50fa866ae6f3ba5df87bd648236fab7970a06040e260a93d8add6
x86_64
kernel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 988c3d8367930da4f980a2ef116a630641b904fbdf9c81e9b762cf7aeafae081
kernel-debug-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 4c56c8ad4f88fe61fad65f1b987113b6f88854636a5e5b249cd554ff0cf2f76b
kernel-debug-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 524e6c676828fed3c99d481862f48b0ce2ebb6c7a9106696362fc43bc2fe622b
kernel-debug-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: a8ee00d0d0da9c554aba27378e195ccf7d2fd4a88393e857ab9cf53d050b6764
kernel-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: cfaa9bb9b4e424db134e37cf47f98504b36878a8f31b8a46d2d5de5fc3606a82
kernel-debuginfo-common-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: b76413be728436b998ef251fb04076e880e036e410dace7273a164eb32bc3e19
kernel-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 991acc243b9524f7d72daaa6722ea3e2a700b9f1d7abe3707fc2b0faa227ee82
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 2a802213966bf9da684809aa456e6eb23b4274b45e6e6ce8db581865a8a29211
kernel-xen-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 3a571288387b4b3360dd96d880ce6e126c8d8a9bec86126f5855223ef3323361
kernel-xen-debuginfo-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 4e9e34e4b03d648df517dafd0a67bb8c2d99bdf7a319a8e8e790f72ed68cfb7b
kernel-xen-devel-2.6.18-371.3.1.el5.x86_64.rpm SHA-256: 7c0352bfa81673e4dd36b4b718c8be2cc2a06baae5e3182df0de074ce8563e20
i386
kernel-2.6.18-371.3.1.el5.i686.rpm SHA-256: 7482e65fe72e0cc876b346a2b3c8647f0d8a4ab0436f23e9c4ba8b6c60726217
kernel-PAE-2.6.18-371.3.1.el5.i686.rpm SHA-256: 2d67171db252b5b98c9da691579d756b0a40ae90cd631f0e3cdf938df9136651
kernel-PAE-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 2734f128c43cf221301d1b8d90b9cacc668da4e048f8c7ba9d3d14dbe584d59c
kernel-PAE-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: b6099b3dccc018a8324dbf564441af02a468d8c03643b464cc7f9c5a604a6886
kernel-debug-2.6.18-371.3.1.el5.i686.rpm SHA-256: 92bca081f2dd903ef92c7300c0dd0cd59abac27a2bec7bd92aa15b4efc2dd505
kernel-debug-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: eff5dfe0331d76c9c2b95d1875effc8ccef9f80bfafd5fcdee8fcd8b9415d6f6
kernel-debug-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: d6eb6b7c00d6679cd576064c9ec492e6f6052f1504009534f948f85bc4fb1487
kernel-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 52cf7abdfb107b1712528d756f5efd70ac5697baa5671e45d4a5595be596767b
kernel-debuginfo-common-2.6.18-371.3.1.el5.i686.rpm SHA-256: 738360ae098dc74f94c7092fcca0170441c56a7411f27fbc9c0407863bec5c6f
kernel-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: 826c32b350c35b9c6d2bfd4557ec67974c1cb0afd2a32d99e77e94f577e61f85
kernel-doc-2.6.18-371.3.1.el5.noarch.rpm SHA-256: 15411924124cfd6f6d8d5ae1f8950e8eb978e143b6491b6ad1034cc4e195a623
kernel-headers-2.6.18-371.3.1.el5.i386.rpm SHA-256: 538111a0e16854fb4d7b146203bac9b70b2b4104ee579c098e493662903b3a99
kernel-xen-2.6.18-371.3.1.el5.i686.rpm SHA-256: 6a75c3d6467d098a88b713c6b146c7ac7e3021c9205d16bf7c116fa5e72fea72
kernel-xen-debuginfo-2.6.18-371.3.1.el5.i686.rpm SHA-256: 08696077cc112b8d43fd2ba1dfc4b2838e71c8033ecb0feb6d626d6efd6e52c3
kernel-xen-devel-2.6.18-371.3.1.el5.i686.rpm SHA-256: b572586af1f6322329c2656fca7fd152e92b8323e2c8e65b4b4f471bf8fd3ed8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter