Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:0108 - Security Advisory
Issued:
2014-01-29
Updated:
2014-01-29

RHSA-2014:0108 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and three bugs are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • It was found that the Xen hypervisor did not always lock

'page_alloc_lock' and 'grant_table.lock' in the same order. This could
potentially lead to a deadlock. A malicious guest administrator could use
this flaw to cause a denial of service on the host. (CVE-2013-4494,
Moderate)

Red Hat would like to thank the Xen project for reporting this issue.

This update also fixes the following bugs:

  • A recent patch to the CIFS code that introduced the NTLMSSP

(NT LAN Manager Security Support Provider) authentication mechanism caused
a regression in CIFS behavior. As a result of the regression, an encryption
key that is returned during the SMB negotiation protocol response was only
used for the first session that was created on the SMB client. Any
subsequent mounts to the same server did not use the encryption key
returned by the initial negotiation with the server. As a consequence, it
was impossible to mount multiple SMB shares with different credentials to
the same server. A patch has been applied to correct this problem so that
an encryption key or a server challenge is now provided for every SMB
session during the SMB negotiation protocol response. (BZ#1029865)

  • The igb driver previously used a 16-bit mask when writing values of the

flow control high-water mark to hardware registers on a network device.
Consequently, the values were truncated on some network devices, disrupting
the flow control. A patch has been applied to the igb driver so that it now
uses a 32-bit mask as expected. (BZ#1041694)

  • The IPMI driver did not properly handle kernel panic messages.

Consequently, when a kernel panic occurred on a system that was utilizing
IPMI without Kdump being set up, a second kernel panic could be triggered.
A patch has been applied to the IPMI driver to fix this problem, and a
message handler now properly waits for a response to panic event messages.
(BZ#1049731)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1026243 - CVE-2013-4494 kernel: xen: Lock order reversal between page allocation and grant table locks

CVEs

  • CVE-2013-4494

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-371.4.1.el5.src.rpm SHA-256: 95bf5e287e0a260388ad9b49bbcae0cfe08e5774bd432620204e60f86c589bc2
x86_64
kernel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: b6095e312965ac084aa7b823c0c53a4a793aae4bc6c5d402c5ed9fd8ad71cd6d
kernel-debug-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: d986975d593206ba19c006e3233da417d69b2b074d8e6158f71b4aa8081dbf61
kernel-debug-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 4d7b06bee65ff2a4342e7248e2a3ab1ae9775e295220d4aabcfcbc06b26de96e
kernel-debug-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 84bf53c50c6d320666c3587fbf1cd85606460faca66345604e869ac9339e720a
kernel-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: eb2d24c46628771b35f2be1eee42185b960bb267d30e9c9ca7e00c5dc7816581
kernel-debuginfo-common-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 301a3f90965049ef7bad55e93c06a11f82423d3a9ca755a3664f19ca4ef86012
kernel-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 267aa2d6405debedca3b966d2836d0bf32acaa38db60c66af6187287dcfd7201
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 7e315328595cc458eae876d470d9572ef3dad413d239b3d8cafcdc3322cf53ca
kernel-xen-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: bab9adf467f304f79a37ca0752a5fcdf64d44a057092a5168ce43a635efd189f
kernel-xen-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 66df423e31ddcd55ab85b591f312cec38a61f3484c97c0039d3989a212f9961a
kernel-xen-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 4f7fc880f1b91d45442e4a9756d589070f03c20bcf7be6a0c59f07b26e3b4bd4
ia64
kernel-2.6.18-371.4.1.el5.ia64.rpm SHA-256: a182c3cfee1bcc1f545b9d4c70a5bbad3890028ef2b8445bc601f229998e782e
kernel-debug-2.6.18-371.4.1.el5.ia64.rpm SHA-256: 29578889cf2f6d87f768e234d8d0996e4735ad68c350dfbcb7397d9d1373d002
kernel-debug-debuginfo-2.6.18-371.4.1.el5.ia64.rpm SHA-256: 96607f0373e9af4687c963ee5441c333e934979de71d5a7c1a5819a90a4b386e
kernel-debug-devel-2.6.18-371.4.1.el5.ia64.rpm SHA-256: 8e9ad99841be6c4b6568cf939b1a174b30eb6fa29863f1b5ce652174bbabc42d
kernel-debuginfo-2.6.18-371.4.1.el5.ia64.rpm SHA-256: bdffdcc891e8301f849d03aa0d5c96a9309e03a609b8388e305b6032e1a9b48a
kernel-debuginfo-common-2.6.18-371.4.1.el5.ia64.rpm SHA-256: dd902bf3f385534b49231a3430dc93f88663bd53d4c517e8f44dd02fc82ff98a
kernel-devel-2.6.18-371.4.1.el5.ia64.rpm SHA-256: 6ed18b01134cff9ee35f3a1795495ec33e739e65177fd073f8caa4fb9425d50f
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.ia64.rpm SHA-256: 78b334dc2177ffe34afc14c0d75dbaa401fc90e59aed0f2a5d2f5bccf94f1fd5
kernel-xen-2.6.18-371.4.1.el5.ia64.rpm SHA-256: 4ba08e815243d525c2f23088154021fb3ff37c9bff347b37d3952c6513ef75d3
kernel-xen-debuginfo-2.6.18-371.4.1.el5.ia64.rpm SHA-256: b375c7597cb3e7b9e03855084ecb345b69681d50064b4948564ae796097c5c11
kernel-xen-devel-2.6.18-371.4.1.el5.ia64.rpm SHA-256: d79fdd3140709048b31e16faf29a1865ae7a8a1c00dfded6b8c51e7987f1c65a
i386
kernel-2.6.18-371.4.1.el5.i686.rpm SHA-256: e09cfc8e8abe7f6c0ffa3e08eb2b5dc8fd46fabb824f17e4f737aff79378b2c2
kernel-PAE-2.6.18-371.4.1.el5.i686.rpm SHA-256: 0000d84d55dbdc42792ea9263f395da25d4599921fc61b551600040336854665
kernel-PAE-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: 1bbc40c3940e403555abbe29a62d4458f4d0d177190a0c2ccb2450a12664543d
kernel-PAE-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: fbf35bba8ad404f5f28c9dc66036d1111c91fd07007c1cc12926375f885f5ca4
kernel-debug-2.6.18-371.4.1.el5.i686.rpm SHA-256: e40eb2c5757f267df7dfd00f77c287493e8245f118212cb9195e72d6fc1f5c91
kernel-debug-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: fe968f9e2a69eb13325087fd6e778f2cf9ce061a9b9bd23b047d25ca1e17fbcc
kernel-debug-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: 583e9104fb027dc7d06bca3c879c2b70ee4102561af227228f9b57304481d1da
kernel-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: 1ccb53f6ebbf7c72d4f2e9a8f7d269957431e7d46d820283b32e7a857d2b4a5a
kernel-debuginfo-common-2.6.18-371.4.1.el5.i686.rpm SHA-256: e5673d2754084e9884ffbab6711bd0fda5aa9dd42d4d3360b73450fca49f6a14
kernel-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: 51fe811e3f9a2af38705ac46f56c03d8370574d0985ad2c8a54e4159f94ffdcc
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.i386.rpm SHA-256: db030a696a793800f85bd27ccf42539ec16d0371c29c9eea5c801716ac989a83
kernel-xen-2.6.18-371.4.1.el5.i686.rpm SHA-256: a358f8830994c6447f048a845b2c7ee51547b34df098762e5da0fee7dea32174
kernel-xen-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: c16f46f109bec954fc506f39015faf18546971d07e33fd887dc79507438627a3
kernel-xen-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: f8dae790c4f7689871dcf40e1d2167ad4c03455cbf2add5315ba8d05486825bd

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-371.4.1.el5.src.rpm SHA-256: 95bf5e287e0a260388ad9b49bbcae0cfe08e5774bd432620204e60f86c589bc2
x86_64
kernel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: b6095e312965ac084aa7b823c0c53a4a793aae4bc6c5d402c5ed9fd8ad71cd6d
kernel-debug-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: d986975d593206ba19c006e3233da417d69b2b074d8e6158f71b4aa8081dbf61
kernel-debug-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 4d7b06bee65ff2a4342e7248e2a3ab1ae9775e295220d4aabcfcbc06b26de96e
kernel-debug-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 84bf53c50c6d320666c3587fbf1cd85606460faca66345604e869ac9339e720a
kernel-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: eb2d24c46628771b35f2be1eee42185b960bb267d30e9c9ca7e00c5dc7816581
kernel-debuginfo-common-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 301a3f90965049ef7bad55e93c06a11f82423d3a9ca755a3664f19ca4ef86012
kernel-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 267aa2d6405debedca3b966d2836d0bf32acaa38db60c66af6187287dcfd7201
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 7e315328595cc458eae876d470d9572ef3dad413d239b3d8cafcdc3322cf53ca
kernel-xen-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: bab9adf467f304f79a37ca0752a5fcdf64d44a057092a5168ce43a635efd189f
kernel-xen-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 66df423e31ddcd55ab85b591f312cec38a61f3484c97c0039d3989a212f9961a
kernel-xen-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 4f7fc880f1b91d45442e4a9756d589070f03c20bcf7be6a0c59f07b26e3b4bd4
i386
kernel-2.6.18-371.4.1.el5.i686.rpm SHA-256: e09cfc8e8abe7f6c0ffa3e08eb2b5dc8fd46fabb824f17e4f737aff79378b2c2
kernel-PAE-2.6.18-371.4.1.el5.i686.rpm SHA-256: 0000d84d55dbdc42792ea9263f395da25d4599921fc61b551600040336854665
kernel-PAE-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: 1bbc40c3940e403555abbe29a62d4458f4d0d177190a0c2ccb2450a12664543d
kernel-PAE-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: fbf35bba8ad404f5f28c9dc66036d1111c91fd07007c1cc12926375f885f5ca4
kernel-debug-2.6.18-371.4.1.el5.i686.rpm SHA-256: e40eb2c5757f267df7dfd00f77c287493e8245f118212cb9195e72d6fc1f5c91
kernel-debug-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: fe968f9e2a69eb13325087fd6e778f2cf9ce061a9b9bd23b047d25ca1e17fbcc
kernel-debug-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: 583e9104fb027dc7d06bca3c879c2b70ee4102561af227228f9b57304481d1da
kernel-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: 1ccb53f6ebbf7c72d4f2e9a8f7d269957431e7d46d820283b32e7a857d2b4a5a
kernel-debuginfo-common-2.6.18-371.4.1.el5.i686.rpm SHA-256: e5673d2754084e9884ffbab6711bd0fda5aa9dd42d4d3360b73450fca49f6a14
kernel-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: 51fe811e3f9a2af38705ac46f56c03d8370574d0985ad2c8a54e4159f94ffdcc
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.i386.rpm SHA-256: db030a696a793800f85bd27ccf42539ec16d0371c29c9eea5c801716ac989a83
kernel-xen-2.6.18-371.4.1.el5.i686.rpm SHA-256: a358f8830994c6447f048a845b2c7ee51547b34df098762e5da0fee7dea32174
kernel-xen-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: c16f46f109bec954fc506f39015faf18546971d07e33fd887dc79507438627a3
kernel-xen-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: f8dae790c4f7689871dcf40e1d2167ad4c03455cbf2add5315ba8d05486825bd

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-371.4.1.el5.src.rpm SHA-256: 95bf5e287e0a260388ad9b49bbcae0cfe08e5774bd432620204e60f86c589bc2
x86_64
kernel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: b6095e312965ac084aa7b823c0c53a4a793aae4bc6c5d402c5ed9fd8ad71cd6d
kernel-debug-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: d986975d593206ba19c006e3233da417d69b2b074d8e6158f71b4aa8081dbf61
kernel-debug-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 4d7b06bee65ff2a4342e7248e2a3ab1ae9775e295220d4aabcfcbc06b26de96e
kernel-debug-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 84bf53c50c6d320666c3587fbf1cd85606460faca66345604e869ac9339e720a
kernel-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: eb2d24c46628771b35f2be1eee42185b960bb267d30e9c9ca7e00c5dc7816581
kernel-debuginfo-common-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 301a3f90965049ef7bad55e93c06a11f82423d3a9ca755a3664f19ca4ef86012
kernel-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 267aa2d6405debedca3b966d2836d0bf32acaa38db60c66af6187287dcfd7201
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 7e315328595cc458eae876d470d9572ef3dad413d239b3d8cafcdc3322cf53ca
kernel-xen-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: bab9adf467f304f79a37ca0752a5fcdf64d44a057092a5168ce43a635efd189f
kernel-xen-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 66df423e31ddcd55ab85b591f312cec38a61f3484c97c0039d3989a212f9961a
kernel-xen-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 4f7fc880f1b91d45442e4a9756d589070f03c20bcf7be6a0c59f07b26e3b4bd4
i386
kernel-2.6.18-371.4.1.el5.i686.rpm SHA-256: e09cfc8e8abe7f6c0ffa3e08eb2b5dc8fd46fabb824f17e4f737aff79378b2c2
kernel-PAE-2.6.18-371.4.1.el5.i686.rpm SHA-256: 0000d84d55dbdc42792ea9263f395da25d4599921fc61b551600040336854665
kernel-PAE-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: 1bbc40c3940e403555abbe29a62d4458f4d0d177190a0c2ccb2450a12664543d
kernel-PAE-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: fbf35bba8ad404f5f28c9dc66036d1111c91fd07007c1cc12926375f885f5ca4
kernel-debug-2.6.18-371.4.1.el5.i686.rpm SHA-256: e40eb2c5757f267df7dfd00f77c287493e8245f118212cb9195e72d6fc1f5c91
kernel-debug-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: fe968f9e2a69eb13325087fd6e778f2cf9ce061a9b9bd23b047d25ca1e17fbcc
kernel-debug-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: 583e9104fb027dc7d06bca3c879c2b70ee4102561af227228f9b57304481d1da
kernel-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: 1ccb53f6ebbf7c72d4f2e9a8f7d269957431e7d46d820283b32e7a857d2b4a5a
kernel-debuginfo-common-2.6.18-371.4.1.el5.i686.rpm SHA-256: e5673d2754084e9884ffbab6711bd0fda5aa9dd42d4d3360b73450fca49f6a14
kernel-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: 51fe811e3f9a2af38705ac46f56c03d8370574d0985ad2c8a54e4159f94ffdcc
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.i386.rpm SHA-256: db030a696a793800f85bd27ccf42539ec16d0371c29c9eea5c801716ac989a83
kernel-xen-2.6.18-371.4.1.el5.i686.rpm SHA-256: a358f8830994c6447f048a845b2c7ee51547b34df098762e5da0fee7dea32174
kernel-xen-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: c16f46f109bec954fc506f39015faf18546971d07e33fd887dc79507438627a3
kernel-xen-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: f8dae790c4f7689871dcf40e1d2167ad4c03455cbf2add5315ba8d05486825bd

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-371.4.1.el5.src.rpm SHA-256: 95bf5e287e0a260388ad9b49bbcae0cfe08e5774bd432620204e60f86c589bc2
s390x
kernel-2.6.18-371.4.1.el5.s390x.rpm SHA-256: 6ea23a5c46d7e3ab33ff3482631d60ef335da4a12c0eab9b6fa3a18afcfe9237
kernel-debug-2.6.18-371.4.1.el5.s390x.rpm SHA-256: f36402ceb37a47e3af8ea74ef23a82e1f028edb1320b5d6a8ab1c5f27967511e
kernel-debug-debuginfo-2.6.18-371.4.1.el5.s390x.rpm SHA-256: 07813c8b4830da4ff6b24a7c0c3bb89fc3f8e120c878e5f18a73fdfd2c69e3fb
kernel-debug-devel-2.6.18-371.4.1.el5.s390x.rpm SHA-256: f2c86a87877590c31fa41ddddd416b95c4a3f31303425a7bd52dd917aa6e95e0
kernel-debuginfo-2.6.18-371.4.1.el5.s390x.rpm SHA-256: 57b117960b7524556bf5ac2914500282895756d5bdf2e6dd4060f42e55513843
kernel-debuginfo-common-2.6.18-371.4.1.el5.s390x.rpm SHA-256: ae199dce394a3ed6f76799983cb382ac119efbdf519f45d740a4a6aa585ee677
kernel-devel-2.6.18-371.4.1.el5.s390x.rpm SHA-256: 1ecd65baedef734add9ea3e073f850a65860b80b4ad5e9e1d8baddd7ba590708
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.s390x.rpm SHA-256: a114253145b2937beef9136f1a7f76adc85a25c3d11824e0270b3a99b7b46f44
kernel-kdump-2.6.18-371.4.1.el5.s390x.rpm SHA-256: 5a90b799a5506b05b6f1a24fd37685077771b2be6dd1f2cd22de9873cbbceea8
kernel-kdump-debuginfo-2.6.18-371.4.1.el5.s390x.rpm SHA-256: dbc898435b32affe42b7325a77a03842649a75300943ada20f8926d9a3ebec4a
kernel-kdump-devel-2.6.18-371.4.1.el5.s390x.rpm SHA-256: 40a0b37e12f1577d7fb89721383715b19aa1fa53fbf99867f6a523eaac438f82

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-371.4.1.el5.src.rpm SHA-256: 95bf5e287e0a260388ad9b49bbcae0cfe08e5774bd432620204e60f86c589bc2
ppc
kernel-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 4aed4d8ace784c740389e912579213b3b2f17d717e0eb08e7a46d6d9dd2cf51f
kernel-debug-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 0fefbf681e1d6536e15c0a15ec24836e7dc95155b694ef90e574b7fae690a14a
kernel-debug-debuginfo-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 696a55457e3d41c8197c5b059df9c97654839e20ae400b55e20f33dd0d441f1e
kernel-debug-devel-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: ba08f91dc3ea9feea939e06e6b0b8a6b86f0ee7b4be7553b689838360c8dcef0
kernel-debuginfo-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 4b1b5d59700ae7cafcb7fe82a796b5feb15f1210d3acd9c4fc9a55a5e79bf9d5
kernel-debuginfo-common-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 7339c13f1d4a9f2a5c654ac2c062c54b6ca57bbac32b543acd999a2100ba4635
kernel-devel-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 0b0b0633abea856ff64e3419a804b815934a50455992c2e0a03107a0c52c023f
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.ppc.rpm SHA-256: e07e9aa1351fcd0fa055107b23217804c66f7aa363d70e23b0bc7c3a5acfa0a8
kernel-headers-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 9c94d8558b9630d7d9cdcba97cac1945c64795f70269e5043f0dc967c3c557ef
kernel-kdump-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: c80ac952362f995ac07c19a6979c65ad60245d2c556e5f07268bf8eb9ac9827a
kernel-kdump-debuginfo-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 5686978a5dab1985d33c5c4418d0ae4c27bf4bb6ade06367c439a38cc023a237
kernel-kdump-devel-2.6.18-371.4.1.el5.ppc64.rpm SHA-256: 69419e9fa638fd080eb8d33d2c9da16dc604ebe9ebf783bf52721ff970fb5d17

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-371.4.1.el5.src.rpm SHA-256: 95bf5e287e0a260388ad9b49bbcae0cfe08e5774bd432620204e60f86c589bc2
x86_64
kernel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: b6095e312965ac084aa7b823c0c53a4a793aae4bc6c5d402c5ed9fd8ad71cd6d
kernel-debug-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: d986975d593206ba19c006e3233da417d69b2b074d8e6158f71b4aa8081dbf61
kernel-debug-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 4d7b06bee65ff2a4342e7248e2a3ab1ae9775e295220d4aabcfcbc06b26de96e
kernel-debug-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 84bf53c50c6d320666c3587fbf1cd85606460faca66345604e869ac9339e720a
kernel-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: eb2d24c46628771b35f2be1eee42185b960bb267d30e9c9ca7e00c5dc7816581
kernel-debuginfo-common-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 301a3f90965049ef7bad55e93c06a11f82423d3a9ca755a3664f19ca4ef86012
kernel-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 267aa2d6405debedca3b966d2836d0bf32acaa38db60c66af6187287dcfd7201
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 7e315328595cc458eae876d470d9572ef3dad413d239b3d8cafcdc3322cf53ca
kernel-xen-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: bab9adf467f304f79a37ca0752a5fcdf64d44a057092a5168ce43a635efd189f
kernel-xen-debuginfo-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 66df423e31ddcd55ab85b591f312cec38a61f3484c97c0039d3989a212f9961a
kernel-xen-devel-2.6.18-371.4.1.el5.x86_64.rpm SHA-256: 4f7fc880f1b91d45442e4a9756d589070f03c20bcf7be6a0c59f07b26e3b4bd4
i386
kernel-2.6.18-371.4.1.el5.i686.rpm SHA-256: e09cfc8e8abe7f6c0ffa3e08eb2b5dc8fd46fabb824f17e4f737aff79378b2c2
kernel-PAE-2.6.18-371.4.1.el5.i686.rpm SHA-256: 0000d84d55dbdc42792ea9263f395da25d4599921fc61b551600040336854665
kernel-PAE-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: 1bbc40c3940e403555abbe29a62d4458f4d0d177190a0c2ccb2450a12664543d
kernel-PAE-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: fbf35bba8ad404f5f28c9dc66036d1111c91fd07007c1cc12926375f885f5ca4
kernel-debug-2.6.18-371.4.1.el5.i686.rpm SHA-256: e40eb2c5757f267df7dfd00f77c287493e8245f118212cb9195e72d6fc1f5c91
kernel-debug-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: fe968f9e2a69eb13325087fd6e778f2cf9ce061a9b9bd23b047d25ca1e17fbcc
kernel-debug-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: 583e9104fb027dc7d06bca3c879c2b70ee4102561af227228f9b57304481d1da
kernel-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: 1ccb53f6ebbf7c72d4f2e9a8f7d269957431e7d46d820283b32e7a857d2b4a5a
kernel-debuginfo-common-2.6.18-371.4.1.el5.i686.rpm SHA-256: e5673d2754084e9884ffbab6711bd0fda5aa9dd42d4d3360b73450fca49f6a14
kernel-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: 51fe811e3f9a2af38705ac46f56c03d8370574d0985ad2c8a54e4159f94ffdcc
kernel-doc-2.6.18-371.4.1.el5.noarch.rpm SHA-256: e510f2b829a0018de2ce7475ebfcd603dcd3c177b3fdcc441542b795a4f653b0
kernel-headers-2.6.18-371.4.1.el5.i386.rpm SHA-256: db030a696a793800f85bd27ccf42539ec16d0371c29c9eea5c801716ac989a83
kernel-xen-2.6.18-371.4.1.el5.i686.rpm SHA-256: a358f8830994c6447f048a845b2c7ee51547b34df098762e5da0fee7dea32174
kernel-xen-debuginfo-2.6.18-371.4.1.el5.i686.rpm SHA-256: c16f46f109bec954fc506f39015faf18546971d07e33fd887dc79507438627a3
kernel-xen-devel-2.6.18-371.4.1.el5.i686.rpm SHA-256: f8dae790c4f7689871dcf40e1d2167ad4c03455cbf2add5315ba8d05486825bd

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter