Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2013:1860 - Security Advisory
Issued:
2013-12-19
Updated:
2013-12-19

RHSA-2013:1860 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.9 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • An information leak flaw was found in the way the Linux kernel's device
    mapper subsystem, under certain conditions, interpreted data written to
    snapshot block devices. An attacker could use this flaw to read data from
    disk blocks in free space, which are normally inaccessible. (CVE-2013-4299,
    Moderate)

Red Hat would like to thank Fujitsu for reporting this issue.

This update also fixes the following bugs:

  • A previous fix to the kernel did not contain a memory barrier in the
    percpu_up_write() function. Consequently, under certain circumstances, a race
    condition could occur, leading to memory corruption and a subsequent kernel
    panic. This update introduces a new memory barrier pair, light_mb() and
    heavy_mb(), for per-CPU basis read and write semaphores (percpu-rw-semaphores)
    ensuring that the race condition can no longer occur. In addition, the read path
    performance of "percpu-rw-semaphores" has been improved. (BZ#884735)
  • Due to several related bugs in the be2net driver, the driver did not handle
    firmware manipulation of the network cards using the Emulex XE201 I/O controller
    properly. As a consequence, these NICs could not recover from an error
    successfully. A series of patches has been applied that fix the initialization
    sequence, and firmware download and activation for the XE201 controller. Error
    recovery now works as expected for the be2net NICs using the Emulex XE201 I/O
    controller. (BZ#1019892)
  • A bug in the be2net driver could cause packet corruption when handling
    VLAN-tagged packets with no assigned VLAN group. This happened because the
    be2net driver called a function responsible for VLAN tag reinsertion in a wrong
    order in the code. The code has been restructured and the be2net driver now
    calls the __vlan_put_tag() function correctly, thus avoiding the packet
    corruption. (BZ#1019893)
  • A previous patch to the kernel introduced the "VLAN tag re-insertion"
    workaround to resolve a problem with incorrectly handled VLAN-tagged packets
    with no assigned VLAN group while the be2net driver was in promiscuous mode.
    However, this solution led to packet corruption and a subsequent kernel oops if
    such a processed packet was a GRO packet. Therefore, a patch has been applied to
    restrict VLAN tag re-insertion only to non-GRO packets. The be2net driver now
    processes VLAN-tagged packets with no assigned VLAN group correctly in this
    situation. (BZ#1023347)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 i386

Fixes

  • BZ - 1004233 - CVE-2013-4299 kernel: dm: dm-snapshot data leak

CVEs

  • CVE-2013-4299

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
x86_64
kernel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 559dd78988a9c5df73920de0dafcec41a532a42864f98e2415f22cd734ccb70c
kernel-debug-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: f4d646bf7bf9df85eae17c9c9d786b8124ce535c3d9d4fc05e3699d893e1dfec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3174c2cd80f36b4a920b46fe8bfe131261d170b76b9bbee4b974162bd83024b2
kernel-debug-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 957883d9445c168539adf2ce440a6f9f7cb6f3499af9ccbf65a264707e3d889e
kernel-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3a7e4be31bd9b5d439151a46be68ca8e34d4a014ff50357a63550458760be927
kernel-debuginfo-common-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 5cdc4e89bfb74ef7f4c9285015ab40856db83198bb4baf17dea24dd6030bbbfa
kernel-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 74697dc69535dcac877fb4682aa509d2c9155391fdfa6c1217db30dd9b91f7e4
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 54ae8048351684a78d3ab0382076c8bc1126614f3da9eebdc829b72ff67cb5d7
kernel-xen-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: ac73518cb762c8e871415a8cfdc82cc6987c9f8f9dabf2fc41137cf4487c2dd8
kernel-xen-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 9ab6cc41c6b1d4c605fc9ea2e2c6189a7a7d5aa3ad9f3002c1da271bf4b05571
kernel-xen-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 458c5eeec89a52145725affa5897bf693f4d5f74f8a98265bdba8bf12749ece5
ia64
kernel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: b3ee1a6c0c6c00d74e0ad918264d83f9a38720cc30d5e79e4c8c1c041a3db7a8
kernel-debug-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 1fbbe2fe17e7f5996cac8616f436ac41dfff4c9ec9f295a52f772860c08e3ba4
kernel-debug-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 257d417015938781fddbc6036f1912f93bb6426f394322122f4f29040c06d9c4
kernel-debug-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 46847b00d59066378e31a7c0bff3c56f9b6a3b2a8dac303a6e1c35e605cfc544
kernel-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: b1fd487dd22dcd36b684c0dcc2c85d20d5a66834b6699856beb04dc674023961
kernel-debuginfo-common-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 1839ed9d4df4e7fc596495d162d72295942aa977eab5e68bc42676fc01d8da4e
kernel-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 90ab73bbbe4f8629a4aca7c7a8a0649f8c9fde1a260e12d0adf17c73bba5ea68
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.ia64.rpm SHA-256: ab4064c0e9a980a59bf8a4a3168918dc2d2c7251aba90a08f766007d747cf65f
kernel-xen-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 19a18d5635b18f454cf50215c069c4d08831234212f754df16978cba67b48fcd
kernel-xen-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: c42f5152a96f6ee04b5d3120e2c4b7a34bf5e7a06bdd7c03880c62c719fa603b
kernel-xen-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: e0e7f9b145d33196bec45f95405c7d6050d6a7ae94156af5559ad7d83b8e7cfc
i386
kernel-2.6.18-348.21.1.el5.i686.rpm SHA-256: d748530c33b578a4c2b4462c984f36d82667cb4b5ae028382dc022758af7a88f
kernel-PAE-2.6.18-348.21.1.el5.i686.rpm SHA-256: 695632c7f90e3532c33baee75eebd87150d37e3b6872af560911e04b678d7b43
kernel-PAE-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 618da1f071ffa72ef95d0dfa536f2f6d36c3e217c312327a66802869547cbe3f
kernel-PAE-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 8530e7b663aa55fc67e911ec882a419f756a079c63803f4411b83b529f48f78b
kernel-debug-2.6.18-348.21.1.el5.i686.rpm SHA-256: ba4268b5c739dcb0efb6a9b12b3992930a6f3ffe45c399485399836457a809ec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6ef7f137b02b17cca5cc35300f15ec9d5c8a39634453ba27575aec91f95bf099
kernel-debug-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 52edebe7e0217eb7c0da1fab8baf869ed461aeafece5176041816f9f9d95ab38
kernel-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: ee67c4d4d0dd616b626f26f23cdf6edc7f1f3714b9d51eda7c64af35da6194fa
kernel-debuginfo-common-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6e0193215f61e6a9a4c77ead56c5b8353a2b1f949f44d3f67df806ddbdc5c71b
kernel-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 2d9dc5e2e268338d815a9ef467be69c19479b61e24fb6d81c2e58f65b5fb0f7e
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.i386.rpm SHA-256: 8f24c3d5e47065b5ecf5b7076e0a0d0f4a6dccfa645446950d6f18aed9724b74
kernel-xen-2.6.18-348.21.1.el5.i686.rpm SHA-256: 020c2176763e57b8841eed62e7a9650a4aace2a063529caa8421902ee2e77ee2
kernel-xen-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 684137122bb93492604519b1dd3ec3b0c14c8c88933ecf14aff45be2d2245c0a
kernel-xen-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 115dab4f0f6a64645b3bebebb755e060bc209ff72791cf39b7338c4ef7b40b50

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
x86_64
kernel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 559dd78988a9c5df73920de0dafcec41a532a42864f98e2415f22cd734ccb70c
kernel-debug-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: f4d646bf7bf9df85eae17c9c9d786b8124ce535c3d9d4fc05e3699d893e1dfec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3174c2cd80f36b4a920b46fe8bfe131261d170b76b9bbee4b974162bd83024b2
kernel-debug-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 957883d9445c168539adf2ce440a6f9f7cb6f3499af9ccbf65a264707e3d889e
kernel-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3a7e4be31bd9b5d439151a46be68ca8e34d4a014ff50357a63550458760be927
kernel-debuginfo-common-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 5cdc4e89bfb74ef7f4c9285015ab40856db83198bb4baf17dea24dd6030bbbfa
kernel-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 74697dc69535dcac877fb4682aa509d2c9155391fdfa6c1217db30dd9b91f7e4
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 54ae8048351684a78d3ab0382076c8bc1126614f3da9eebdc829b72ff67cb5d7
kernel-xen-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: ac73518cb762c8e871415a8cfdc82cc6987c9f8f9dabf2fc41137cf4487c2dd8
kernel-xen-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 9ab6cc41c6b1d4c605fc9ea2e2c6189a7a7d5aa3ad9f3002c1da271bf4b05571
kernel-xen-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 458c5eeec89a52145725affa5897bf693f4d5f74f8a98265bdba8bf12749ece5
i386
kernel-2.6.18-348.21.1.el5.i686.rpm SHA-256: d748530c33b578a4c2b4462c984f36d82667cb4b5ae028382dc022758af7a88f
kernel-PAE-2.6.18-348.21.1.el5.i686.rpm SHA-256: 695632c7f90e3532c33baee75eebd87150d37e3b6872af560911e04b678d7b43
kernel-PAE-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 618da1f071ffa72ef95d0dfa536f2f6d36c3e217c312327a66802869547cbe3f
kernel-PAE-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 8530e7b663aa55fc67e911ec882a419f756a079c63803f4411b83b529f48f78b
kernel-debug-2.6.18-348.21.1.el5.i686.rpm SHA-256: ba4268b5c739dcb0efb6a9b12b3992930a6f3ffe45c399485399836457a809ec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6ef7f137b02b17cca5cc35300f15ec9d5c8a39634453ba27575aec91f95bf099
kernel-debug-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 52edebe7e0217eb7c0da1fab8baf869ed461aeafece5176041816f9f9d95ab38
kernel-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: ee67c4d4d0dd616b626f26f23cdf6edc7f1f3714b9d51eda7c64af35da6194fa
kernel-debuginfo-common-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6e0193215f61e6a9a4c77ead56c5b8353a2b1f949f44d3f67df806ddbdc5c71b
kernel-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 2d9dc5e2e268338d815a9ef467be69c19479b61e24fb6d81c2e58f65b5fb0f7e
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.i386.rpm SHA-256: 8f24c3d5e47065b5ecf5b7076e0a0d0f4a6dccfa645446950d6f18aed9724b74
kernel-xen-2.6.18-348.21.1.el5.i686.rpm SHA-256: 020c2176763e57b8841eed62e7a9650a4aace2a063529caa8421902ee2e77ee2
kernel-xen-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 684137122bb93492604519b1dd3ec3b0c14c8c88933ecf14aff45be2d2245c0a
kernel-xen-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 115dab4f0f6a64645b3bebebb755e060bc209ff72791cf39b7338c4ef7b40b50

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
x86_64
kernel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 559dd78988a9c5df73920de0dafcec41a532a42864f98e2415f22cd734ccb70c
kernel-debug-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: f4d646bf7bf9df85eae17c9c9d786b8124ce535c3d9d4fc05e3699d893e1dfec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3174c2cd80f36b4a920b46fe8bfe131261d170b76b9bbee4b974162bd83024b2
kernel-debug-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 957883d9445c168539adf2ce440a6f9f7cb6f3499af9ccbf65a264707e3d889e
kernel-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 3a7e4be31bd9b5d439151a46be68ca8e34d4a014ff50357a63550458760be927
kernel-debuginfo-common-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 5cdc4e89bfb74ef7f4c9285015ab40856db83198bb4baf17dea24dd6030bbbfa
kernel-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 74697dc69535dcac877fb4682aa509d2c9155391fdfa6c1217db30dd9b91f7e4
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 54ae8048351684a78d3ab0382076c8bc1126614f3da9eebdc829b72ff67cb5d7
kernel-xen-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: ac73518cb762c8e871415a8cfdc82cc6987c9f8f9dabf2fc41137cf4487c2dd8
kernel-xen-debuginfo-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 9ab6cc41c6b1d4c605fc9ea2e2c6189a7a7d5aa3ad9f3002c1da271bf4b05571
kernel-xen-devel-2.6.18-348.21.1.el5.x86_64.rpm SHA-256: 458c5eeec89a52145725affa5897bf693f4d5f74f8a98265bdba8bf12749ece5
ia64
kernel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: b3ee1a6c0c6c00d74e0ad918264d83f9a38720cc30d5e79e4c8c1c041a3db7a8
kernel-debug-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 1fbbe2fe17e7f5996cac8616f436ac41dfff4c9ec9f295a52f772860c08e3ba4
kernel-debug-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 257d417015938781fddbc6036f1912f93bb6426f394322122f4f29040c06d9c4
kernel-debug-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 46847b00d59066378e31a7c0bff3c56f9b6a3b2a8dac303a6e1c35e605cfc544
kernel-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: b1fd487dd22dcd36b684c0dcc2c85d20d5a66834b6699856beb04dc674023961
kernel-debuginfo-common-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 1839ed9d4df4e7fc596495d162d72295942aa977eab5e68bc42676fc01d8da4e
kernel-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 90ab73bbbe4f8629a4aca7c7a8a0649f8c9fde1a260e12d0adf17c73bba5ea68
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.ia64.rpm SHA-256: ab4064c0e9a980a59bf8a4a3168918dc2d2c7251aba90a08f766007d747cf65f
kernel-xen-2.6.18-348.21.1.el5.ia64.rpm SHA-256: 19a18d5635b18f454cf50215c069c4d08831234212f754df16978cba67b48fcd
kernel-xen-debuginfo-2.6.18-348.21.1.el5.ia64.rpm SHA-256: c42f5152a96f6ee04b5d3120e2c4b7a34bf5e7a06bdd7c03880c62c719fa603b
kernel-xen-devel-2.6.18-348.21.1.el5.ia64.rpm SHA-256: e0e7f9b145d33196bec45f95405c7d6050d6a7ae94156af5559ad7d83b8e7cfc
i386
kernel-2.6.18-348.21.1.el5.i686.rpm SHA-256: d748530c33b578a4c2b4462c984f36d82667cb4b5ae028382dc022758af7a88f
kernel-PAE-2.6.18-348.21.1.el5.i686.rpm SHA-256: 695632c7f90e3532c33baee75eebd87150d37e3b6872af560911e04b678d7b43
kernel-PAE-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 618da1f071ffa72ef95d0dfa536f2f6d36c3e217c312327a66802869547cbe3f
kernel-PAE-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 8530e7b663aa55fc67e911ec882a419f756a079c63803f4411b83b529f48f78b
kernel-debug-2.6.18-348.21.1.el5.i686.rpm SHA-256: ba4268b5c739dcb0efb6a9b12b3992930a6f3ffe45c399485399836457a809ec
kernel-debug-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6ef7f137b02b17cca5cc35300f15ec9d5c8a39634453ba27575aec91f95bf099
kernel-debug-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 52edebe7e0217eb7c0da1fab8baf869ed461aeafece5176041816f9f9d95ab38
kernel-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: ee67c4d4d0dd616b626f26f23cdf6edc7f1f3714b9d51eda7c64af35da6194fa
kernel-debuginfo-common-2.6.18-348.21.1.el5.i686.rpm SHA-256: 6e0193215f61e6a9a4c77ead56c5b8353a2b1f949f44d3f67df806ddbdc5c71b
kernel-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 2d9dc5e2e268338d815a9ef467be69c19479b61e24fb6d81c2e58f65b5fb0f7e
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.i386.rpm SHA-256: 8f24c3d5e47065b5ecf5b7076e0a0d0f4a6dccfa645446950d6f18aed9724b74
kernel-xen-2.6.18-348.21.1.el5.i686.rpm SHA-256: 020c2176763e57b8841eed62e7a9650a4aace2a063529caa8421902ee2e77ee2
kernel-xen-debuginfo-2.6.18-348.21.1.el5.i686.rpm SHA-256: 684137122bb93492604519b1dd3ec3b0c14c8c88933ecf14aff45be2d2245c0a
kernel-xen-devel-2.6.18-348.21.1.el5.i686.rpm SHA-256: 115dab4f0f6a64645b3bebebb755e060bc209ff72791cf39b7338c4ef7b40b50

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
s390x
kernel-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 710f3592d884e2c20677f599305a747a3105882fd2e76700b1872ac9b951dfb2
kernel-debug-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 90e0f74296382800a3861cc1a2e49f25afa95210d6da458df2d192fe3c6f7408
kernel-debug-debuginfo-2.6.18-348.21.1.el5.s390x.rpm SHA-256: ecab222106409fa1545d8fccd921971a17b3b4bc228f0924b48f7d787179a290
kernel-debug-devel-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 641c7a1afb63d0639a026f57096604d6cbe3cb0ad8455cd1ddf3c284c2f7cfbe
kernel-debuginfo-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 8b8ae2ee5d7aa41362e19a1107f9dd792d0984d968ccea7939e5d0194a7eaf05
kernel-debuginfo-common-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 2114deb3652382f025cc41e45f48224f42537355409bfe9eb7e49a39821c2880
kernel-devel-2.6.18-348.21.1.el5.s390x.rpm SHA-256: b3a20b0674e99dc2fbf8eafd0157f45bfc893572c0e88a3a424b755e76432922
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 80935987e0cc6b9f7724a3a448a9e4ae5fc20c87998e45e348609ede2c2712ce
kernel-kdump-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 145c43dce868c07061cd6da48796cc1ec8d19470678c0dd5fb522107f621acc3
kernel-kdump-debuginfo-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 3a39904530282a9e52525327031c43e65a61a7c456a60aaf650d510e548d7d77
kernel-kdump-devel-2.6.18-348.21.1.el5.s390x.rpm SHA-256: 4ecd94933762e57e51711927c42140241b19cb12a16ffa843158b85f62694d25

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.21.1.el5.src.rpm SHA-256: 950aad9ea8778d9c1ab6359fae65fe14542d0b9977876b1969c564a93933fff0
ppc
kernel-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 8b996e4c100f7c2fdb615d5532324e0bf2705ba06ba6c9b97ab03942a3a0f524
kernel-debug-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 27b433f6ee205e6d9f08248a73cc42835953d724d995a091de54c73998a384e1
kernel-debug-debuginfo-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: adb065dffc3c23a920b51531589dda9707d8506bff31693174f97578b64d6af5
kernel-debug-devel-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: ab6b72e27159a57eeb86b2e7329c9d0ddda93d24f4a13053749f80bcb9046840
kernel-debuginfo-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 1535e73349500be94db30d02a00872c91ce2e2a5b6408cd27fdccf68dba64382
kernel-debuginfo-common-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 5064ae7425a415ce804340f0acfdf3788f5d90f3646d344f6e12e7286d0bbb75
kernel-devel-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 9c28d47272142692095ae8717ae69f6f7662a6a7ac396d3d775a5d3b4f39b716
kernel-doc-2.6.18-348.21.1.el5.noarch.rpm SHA-256: 677f76292fecd5413949e6c104d7a513d54b31384a73eea7d8d6b9d11dbc25c8
kernel-headers-2.6.18-348.21.1.el5.ppc.rpm SHA-256: f8a7b32dfa35464f0ee8ad12f1cdba273d69b3d74ea0bf9bbdeb335cc584a642
kernel-headers-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 6469c99dd8cb5c63fbb594e96ee5bdb597d4db5cc30394be47a92b900e2a667d
kernel-kdump-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 0dd67124c7b399496c4744cd035ea90137621e9682d6bdeaa56009159f459a17
kernel-kdump-debuginfo-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 5cdfc5217b405be5f09b04e88d28ddb85928bfd9616956f8e6e040a0ccbb4057
kernel-kdump-devel-2.6.18-348.21.1.el5.ppc64.rpm SHA-256: 4f6de1005ba694c5bc9eeba6be9ff1b89ad55c7f0031de912ea77efab0d02f35

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2021 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook