Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:1860 - Security Advisory
Issued:
2013-12-19
Updated:
2013-12-19

RHSA-2013:1860 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.9 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • An information leak flaw was found in the way the Linux kernel's device

mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data from
disk blocks in free space, which are normally inaccessible. (CVE-2013-4299,
Moderate)

Red Hat would like to thank Fujitsu for reporting this issue.

This update also fixes the following bugs:

  • A previous fix to the kernel did not contain a memory barrier in the

percpu_up_write() function. Consequently, under certain circumstances, a race
condition could occur, leading to memory corruption and a subsequent kernel
panic. This update introduces a new memory barrier pair, light_mb() and
heavy_mb(), for per-CPU basis read and write semaphores (percpu-rw-semaphores)
ensuring that the race condition can no longer occur. In addition, the read path
performance of "percpu-rw-semaphores" has been improved. (BZ#884735)

  • Due to several related bugs in the be2net driver, the driver did not handle

firmware manipulation of the network cards using the Emulex XE201 I/O controller
properly. As a consequence, these NICs could not recover from an error
successfully. A series of patches has been applied that fix the initialization
sequence, and firmware download and activation for the XE201 controller. Error
recovery now works as expected for the be2net NICs using the Emulex XE201 I/O
controller. (BZ#1019892)

  • A bug in the be2net driver could cause packet corruption when handling

VLAN-tagged packets with no assigned VLAN group. This happened because the
be2net driver called a function responsible for VLAN tag reinsertion in a wrong
order in the code. The code has been restructured and the be2net driver now
calls the __vlan_put_tag() function correctly, thus avoiding the packet
corruption. (BZ#1019893)

  • A previous patch to the kernel introduced the "VLAN tag re-insertion"

workaround to resolve a problem with incorrectly handled VLAN-tagged packets
with no assigned VLAN group while the be2net driver was in promiscuous mode.
However, this solution led to packet corruption and a subsequent kernel oops if
such a processed packet was a GRO packet. Therefore, a patch has been applied to
restrict VLAN tag re-insertion only to non-GRO packets. The be2net driver now
processes VLAN-tagged packets with no assigned VLAN group correctly in this
situation. (BZ#1023347)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux Server - AUS 5.9 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386

Fixes

  • BZ - 1004233 - CVE-2013-4299 kernel: dm: dm-snapshot data leak

CVEs

  • CVE-2013-4299

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
x86_64
kernel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 559dd78988a9c5df73920de0dafcec41a532a42864f98e2415f22cd734ccb70c
kernel-debug-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: f4d646bf7bf9df85eae17c9c9d786b8124ce535c3d9d4fc05e3699d893e1dfec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3174c2cd80f36b4a920b46fe8bfe131261d170b76b9bbee4b974162bd83024b2
kernel-debug-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 957883d9445c168539adf2ce440a6f9f7cb6f3499af9ccbf65a264707e3d889e
kernel-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3a7e4be31bd9b5d439151a46be68ca8e34d4a014ff50357a63550458760be927
kernel-debuginfo-common-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 5cdc4e89bfb74ef7f4c9285015ab40856db83198bb4baf17dea24dd6030bbbfa
kernel-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 74697dc69535dcac877fb4682aa509d2c9155391fdfa6c1217db30dd9b91f7e4
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 54ae8048351684a78d3ab0382076c8bc1126614f3da9eebdc829b72ff67cb5d7
kernel-xen-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: ac73518cb762c8e871415a8cfdc82cc6987c9f8f9dabf2fc41137cf4487c2dd8
kernel-xen-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 9ab6cc41c6b1d4c605fc9ea2e2c6189a7a7d5aa3ad9f3002c1da271bf4b05571
kernel-xen-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 458c5eeec89a52145725affa5897bf693f4d5f74f8a98265bdba8bf12749ece5
ia64
kernel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: b3ee1a6c0c6c00d74e0ad918264d83f9a38720cc30d5e79e4c8c1c041a3db7a8
kernel-debug-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 1fbbe2fe17e7f5996cac8616f436ac41dfff4c9ec9f295a52f772860c08e3ba4
kernel-debug-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 257d417015938781fddbc6036f1912f93bb6426f394322122f4f29040c06d9c4
kernel-debug-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 46847b00d59066378e31a7c0bff3c56f9b6a3b2a8dac303a6e1c35e605cfc544
kernel-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: b1fd487dd22dcd36b684c0dcc2c85d20d5a66834b6699856beb04dc674023961
kernel-debuginfo-common-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 1839ed9d4df4e7fc596495d162d72295942aa977eab5e68bc42676fc01d8da4e
kernel-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 90ab73bbbe4f8629a4aca7c7a8a0649f8c9fde1a260e12d0adf17c73bba5ea68
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.ia64.rpm SHA-256: ab4064c0e9a980a59bf8a4a3168918dc2d2c7251aba90a08f766007d747cf65f
kernel-xen-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 19a18d5635b18f454cf50215c069c4d08831234212f754df16978cba67b48fcd
kernel-xen-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: c42f5152a96f6ee04b5d3120e2c4b7a34bf5e7a06bdd7c03880c62c719fa603b
kernel-xen-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: e0e7f9b145d33196bec45f95405c7d6050d6a7ae94156af5559ad7d83b8e7cfc
i386
kernel-2.6.18-348.21.1.el5.i686.rpm SHA-256: d748530c33b578a4c2b4462c984f36d82667cb4b5ae028382dc022758af7a88f
kernel-PAE-2.6.18-348.21.1.el5.i686.rpm SHA-256: 695632c7f90e3532c33baee75eebd87150d37e3b6872af560911e04b678d7b43
kernel-PAE-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 618da1f071ffa72ef95d0dfa536f2f6d36c3e217c312327a66802869547cbe3f
kernel-PAE-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 8530e7b663aa55fc67e911ec882a419f756a079c63803f4411b83b529f48f78b
kernel-debug-2.6.18-348.21.1.el5.i686.rpm SHA-256: ba4268b5c739dcb0efb6a9b12b3992930a6f3ffe45c399485399836457a809ec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6ef7f137b02b17cca5cc35300f15ec9d5c8a39634453ba27575aec91f95bf099
kernel-debug-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 52edebe7e0217eb7c0da1fab8baf869ed461aeafece5176041816f9f9d95ab38
kernel-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: ee67c4d4d0dd616b626f26f23cdf6edc7f1f3714b9d51eda7c64af35da6194fa
kernel-debuginfo-common-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6e0193215f61e6a9a4c77ead56c5b8353a2b1f949f44d3f67df806ddbdc5c71b
kernel-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 2d9dc5e2e268338d815a9ef467be69c19479b61e24fb6d81c2e58f65b5fb0f7e
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.i386.rpm SHA-256: 8f24c3d5e47065b5ecf5b7076e0a0d0f4a6dccfa645446950d6f18aed9724b74
kernel-xen-2.6.18-348.21.1.el5.i686.rpm SHA-256: 020c2176763e57b8841eed62e7a9650a4aace2a063529caa8421902ee2e77ee2
kernel-xen-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 684137122bb93492604519b1dd3ec3b0c14c8c88933ecf14aff45be2d2245c0a
kernel-xen-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 115dab4f0f6a64645b3bebebb755e060bc209ff72791cf39b7338c4ef7b40b50

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
x86_64
kernel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 559dd78988a9c5df73920de0dafcec41a532a42864f98e2415f22cd734ccb70c
kernel-debug-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: f4d646bf7bf9df85eae17c9c9d786b8124ce535c3d9d4fc05e3699d893e1dfec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3174c2cd80f36b4a920b46fe8bfe131261d170b76b9bbee4b974162bd83024b2
kernel-debug-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 957883d9445c168539adf2ce440a6f9f7cb6f3499af9ccbf65a264707e3d889e
kernel-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3a7e4be31bd9b5d439151a46be68ca8e34d4a014ff50357a63550458760be927
kernel-debuginfo-common-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 5cdc4e89bfb74ef7f4c9285015ab40856db83198bb4baf17dea24dd6030bbbfa
kernel-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 74697dc69535dcac877fb4682aa509d2c9155391fdfa6c1217db30dd9b91f7e4
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 54ae8048351684a78d3ab0382076c8bc1126614f3da9eebdc829b72ff67cb5d7
kernel-xen-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: ac73518cb762c8e871415a8cfdc82cc6987c9f8f9dabf2fc41137cf4487c2dd8
kernel-xen-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 9ab6cc41c6b1d4c605fc9ea2e2c6189a7a7d5aa3ad9f3002c1da271bf4b05571
kernel-xen-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 458c5eeec89a52145725affa5897bf693f4d5f74f8a98265bdba8bf12749ece5
ia64
kernel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: b3ee1a6c0c6c00d74e0ad918264d83f9a38720cc30d5e79e4c8c1c041a3db7a8
kernel-debug-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 1fbbe2fe17e7f5996cac8616f436ac41dfff4c9ec9f295a52f772860c08e3ba4
kernel-debug-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 257d417015938781fddbc6036f1912f93bb6426f394322122f4f29040c06d9c4
kernel-debug-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 46847b00d59066378e31a7c0bff3c56f9b6a3b2a8dac303a6e1c35e605cfc544
kernel-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: b1fd487dd22dcd36b684c0dcc2c85d20d5a66834b6699856beb04dc674023961
kernel-debuginfo-common-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 1839ed9d4df4e7fc596495d162d72295942aa977eab5e68bc42676fc01d8da4e
kernel-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 90ab73bbbe4f8629a4aca7c7a8a0649f8c9fde1a260e12d0adf17c73bba5ea68
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.ia64.rpm SHA-256: ab4064c0e9a980a59bf8a4a3168918dc2d2c7251aba90a08f766007d747cf65f
kernel-xen-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 19a18d5635b18f454cf50215c069c4d08831234212f754df16978cba67b48fcd
kernel-xen-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: c42f5152a96f6ee04b5d3120e2c4b7a34bf5e7a06bdd7c03880c62c719fa603b
kernel-xen-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: e0e7f9b145d33196bec45f95405c7d6050d6a7ae94156af5559ad7d83b8e7cfc
i386
kernel-2.6.18-348.21.1.el5.i686.rpm SHA-256: d748530c33b578a4c2b4462c984f36d82667cb4b5ae028382dc022758af7a88f
kernel-PAE-2.6.18-348.21.1.el5.i686.rpm SHA-256: 695632c7f90e3532c33baee75eebd87150d37e3b6872af560911e04b678d7b43
kernel-PAE-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 618da1f071ffa72ef95d0dfa536f2f6d36c3e217c312327a66802869547cbe3f
kernel-PAE-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 8530e7b663aa55fc67e911ec882a419f756a079c63803f4411b83b529f48f78b
kernel-debug-2.6.18-348.21.1.el5.i686.rpm SHA-256: ba4268b5c739dcb0efb6a9b12b3992930a6f3ffe45c399485399836457a809ec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6ef7f137b02b17cca5cc35300f15ec9d5c8a39634453ba27575aec91f95bf099
kernel-debug-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 52edebe7e0217eb7c0da1fab8baf869ed461aeafece5176041816f9f9d95ab38
kernel-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: ee67c4d4d0dd616b626f26f23cdf6edc7f1f3714b9d51eda7c64af35da6194fa
kernel-debuginfo-common-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6e0193215f61e6a9a4c77ead56c5b8353a2b1f949f44d3f67df806ddbdc5c71b
kernel-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 2d9dc5e2e268338d815a9ef467be69c19479b61e24fb6d81c2e58f65b5fb0f7e
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.i386.rpm SHA-256: 8f24c3d5e47065b5ecf5b7076e0a0d0f4a6dccfa645446950d6f18aed9724b74
kernel-xen-2.6.18-348.21.1.el5.i686.rpm SHA-256: 020c2176763e57b8841eed62e7a9650a4aace2a063529caa8421902ee2e77ee2
kernel-xen-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 684137122bb93492604519b1dd3ec3b0c14c8c88933ecf14aff45be2d2245c0a
kernel-xen-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 115dab4f0f6a64645b3bebebb755e060bc209ff72791cf39b7338c4ef7b40b50

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
s390x
kernel-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 710f3592d884e2c20677f599305a747a3105882fd2e76700b1872ac9b951dfb2
kernel-debug-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 90e0f74296382800a3861cc1a2e49f25afa95210d6da458df2d192fe3c6f7408
kernel-debug-debuginfo-2.6.18-348.21.1.el5.s390x.rpm SHA-256: ecab222106409fa1545d8fccd921971a17b3b4bc228f0924b48f7d787179a290
kernel-debug-devel-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 641c7a1afb63d0639a026f57096604d6cbe3cb0ad8455cd1ddf3c284c2f7cfbe
kernel-debuginfo-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 8b8ae2ee5d7aa41362e19a1107f9dd792d0984d968ccea7939e5d0194a7eaf05
kernel-debuginfo-common-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 2114deb3652382f025cc41e45f48224f42537355409bfe9eb7e49a39821c2880
kernel-devel-2.6.18-348.21.1.el5.s390x.rpm SHA-256: b3a20b0674e99dc2fbf8eafd0157f45bfc893572c0e88a3a424b755e76432922
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 80935987e0cc6b9f7724a3a448a9e4ae5fc20c87998e45e348609ede2c2712ce
kernel-kdump-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 145c43dce868c07061cd6da48796cc1ec8d19470678c0dd5fb522107f621acc3
kernel-kdump-debuginfo-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 3a39904530282a9e52525327031c43e65a61a7c456a60aaf650d510e548d7d77
kernel-kdump-devel-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 4ecd94933762e57e51711927c42140241b19cb12a16ffa843158b85f62694d25

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
ppc
kernel-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 8b996e4c100f7c2fdb615d5532324e0bf2705ba06ba6c9b97ab03942a3a0f524
kernel-debug-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 27b433f6ee205e6d9f08248a73cc42835953d724d995a091de54c73998a384e1
kernel-debug-debuginfo-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: adb065dffc3c23a920b51531589dda9707d8506bff31693174f97578b64d6af5
kernel-debug-devel-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: ab6b72e27159a57eeb86b2e7329c9d0ddda93d24f4a13053749f80bcb9046840
kernel-debuginfo-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 1535e73349500be94db30d02a00872c91ce2e2a5b6408cd27fdccf68dba64382
kernel-debuginfo-common-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 5064ae7425a415ce804340f0acfdf3788f5d90f3646d344f6e12e7286d0bbb75
kernel-devel-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 9c28d47272142692095ae8717ae69f6f7662a6a7ac396d3d775a5d3b4f39b716
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.ppc.rpm SHA-256: f8a7b32dfa35464f0ee8ad12f1cdba273d69b3d74ea0bf9bbdeb335cc584a642
kernel-headers-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 6469c99dd8cb5c63fbb594e96ee5bdb597d4db5cc30394be47a92b900e2a667d
kernel-kdump-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 0dd67124c7b399496c4744cd035ea90137621e9682d6bdeaa56009159f459a17
kernel-kdump-debuginfo-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 5cdfc5217b405be5f09b04e88d28ddb85928bfd9616956f8e6e040a0ccbb4057
kernel-kdump-devel-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 4f6de1005ba694c5bc9eeba6be9ff1b89ad55c7f0031de912ea77efab0d02f35

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
x86_64
kernel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 559dd78988a9c5df73920de0dafcec41a532a42864f98e2415f22cd734ccb70c
kernel-debug-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: f4d646bf7bf9df85eae17c9c9d786b8124ce535c3d9d4fc05e3699d893e1dfec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3174c2cd80f36b4a920b46fe8bfe131261d170b76b9bbee4b974162bd83024b2
kernel-debug-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 957883d9445c168539adf2ce440a6f9f7cb6f3499af9ccbf65a264707e3d889e
kernel-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3a7e4be31bd9b5d439151a46be68ca8e34d4a014ff50357a63550458760be927
kernel-debuginfo-common-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 5cdc4e89bfb74ef7f4c9285015ab40856db83198bb4baf17dea24dd6030bbbfa
kernel-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 74697dc69535dcac877fb4682aa509d2c9155391fdfa6c1217db30dd9b91f7e4
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 54ae8048351684a78d3ab0382076c8bc1126614f3da9eebdc829b72ff67cb5d7
kernel-xen-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: ac73518cb762c8e871415a8cfdc82cc6987c9f8f9dabf2fc41137cf4487c2dd8
kernel-xen-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 9ab6cc41c6b1d4c605fc9ea2e2c6189a7a7d5aa3ad9f3002c1da271bf4b05571
kernel-xen-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 458c5eeec89a52145725affa5897bf693f4d5f74f8a98265bdba8bf12749ece5
i386
kernel-2.6.18-348.21.1.el5.i686.rpm SHA-256: d748530c33b578a4c2b4462c984f36d82667cb4b5ae028382dc022758af7a88f
kernel-PAE-2.6.18-348.21.1.el5.i686.rpm SHA-256: 695632c7f90e3532c33baee75eebd87150d37e3b6872af560911e04b678d7b43
kernel-PAE-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 618da1f071ffa72ef95d0dfa536f2f6d36c3e217c312327a66802869547cbe3f
kernel-PAE-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 8530e7b663aa55fc67e911ec882a419f756a079c63803f4411b83b529f48f78b
kernel-debug-2.6.18-348.21.1.el5.i686.rpm SHA-256: ba4268b5c739dcb0efb6a9b12b3992930a6f3ffe45c399485399836457a809ec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6ef7f137b02b17cca5cc35300f15ec9d5c8a39634453ba27575aec91f95bf099
kernel-debug-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 52edebe7e0217eb7c0da1fab8baf869ed461aeafece5176041816f9f9d95ab38
kernel-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: ee67c4d4d0dd616b626f26f23cdf6edc7f1f3714b9d51eda7c64af35da6194fa
kernel-debuginfo-common-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6e0193215f61e6a9a4c77ead56c5b8353a2b1f949f44d3f67df806ddbdc5c71b
kernel-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 2d9dc5e2e268338d815a9ef467be69c19479b61e24fb6d81c2e58f65b5fb0f7e
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.i386.rpm SHA-256: 8f24c3d5e47065b5ecf5b7076e0a0d0f4a6dccfa645446950d6f18aed9724b74
kernel-xen-2.6.18-348.21.1.el5.i686.rpm SHA-256: 020c2176763e57b8841eed62e7a9650a4aace2a063529caa8421902ee2e77ee2
kernel-xen-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 684137122bb93492604519b1dd3ec3b0c14c8c88933ecf14aff45be2d2245c0a
kernel-xen-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 115dab4f0f6a64645b3bebebb755e060bc209ff72791cf39b7338c4ef7b40b50

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility