Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:0285 - Security Advisory
Issued:
2014-03-12
Updated:
2014-03-12

RHSA-2014:0285 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues, several bugs,
and add one enhancement are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A buffer overflow flaw was found in the way the qeth_snmp_command()

function in the Linux kernel's QETH network device driver implementation
handled SNMP IOCTL requests with an out-of-bounds length. A local,
unprivileged user could use this flaw to crash the system or, potentially,
escalate their privileges on the system. (CVE-2013-6381, Important)

  • A flaw was found in the way the ipc_rcu_putref() function in the Linux

kernel's IPC implementation handled reference counter decrementing.
A local, unprivileged user could use this flaw to trigger an Out of Memory
(OOM) condition and, potentially, crash the system. (CVE-2013-4483,
Moderate)

  • It was found that the Xen hypervisor implementation did not correctly

check privileges of hypercall attempts made by HVM guests, allowing
hypercalls to be invoked from protection rings 1 and 2 in addition to ring
0. A local attacker in an HVM guest able to execute code on privilege
levels 1 and 2 could potentially use this flaw to further escalate their
privileges in that guest. Note: Xen HVM guests running unmodified versions
of Red Hat Enterprise Linux and Microsoft Windows are not affected by this
issue because they are known to only use protection rings 0 (kernel) and 3
(userspace). (CVE-2013-4554, Moderate)

  • A flaw was found in the way the Linux kernel's Adaptec RAID controller

(aacraid) checked permissions of compat IOCTLs. A local attacker could use
this flaw to bypass intended security restrictions. (CVE-2013-6383,
Moderate)

  • It was found that, under specific circumstances, a combination of write

operations to write-combined memory and locked CPU instructions may cause a
core hang on certain AMD CPUs (for more information, refer to AMD CPU
erratum 793 linked in the References section). A privileged user in a guest
running under the Xen hypervisor could use this flaw to cause a denial of
service on the host system. This update adds a workaround to the Xen
hypervisor implementation, which mitigates the AMD CPU issue. Note: this
issue only affects AMD Family 16h Models 00h-0Fh Processors. Non-AMD CPUs
are not vulnerable. (CVE-2013-6885, Moderate)

  • It was found that certain protocol handlers in the Linux kernel's

networking implementation could set the addr_len value without initializing
the associated data structure. A local, unprivileged user could use this
flaw to leak kernel stack memory to user space using the recvmsg, recvfrom,
and recvmmsg system calls. (CVE-2013-7263, Low)

  • A flaw was found in the way the get_dumpable() function return value was

interpreted in the ptrace subsystem of the Linux kernel. When
'fs.suid_dumpable' was set to 2, a local, unprivileged local user could
use this flaw to bypass intended ptrace restrictions and obtain
potentially sensitive information. (CVE-2013-2929, Low)

Red Hat would like to thank Vladimir Davydov of Parallels for reporting
CVE-2013-4483 and the Xen project for reporting CVE-2013-4554 and
CVE-2013-6885. Upstream acknowledges Jan Beulich as the original reporter
of CVE-2013-4554 and CVE-2013-6885.

This update also fixes several bugs and adds one enhancement.
Documentation for these changes will be available shortly from the
Technical Notes document linked to in the References section.

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1024854 - CVE-2013-4483 kernel: ipc: ipc_rcu_putref refcount races
  • BZ - 1028148 - CVE-2013-2929 kernel: exec/ptrace: get_dumpable() incorrect tests
  • BZ - 1029111 - CVE-2013-4554 kernel: xen: hypercalls exposed to privilege rings 1 and 2 of HVM guests
  • BZ - 1033530 - CVE-2013-6383 Kernel: AACRAID Driver compat IOCTL missing capability check
  • BZ - 1033600 - CVE-2013-6381 Kernel: qeth: buffer overflow in snmp ioctl
  • BZ - 1035823 - CVE-2013-6885 hw: AMD CPU erratum may cause core hang
  • BZ - 1035875 - CVE-2013-7263 CVE-2013-7265 Kernel: net: leakage of uninitialized memory to user-space via recv syscalls

CVEs

  • CVE-2013-6383
  • CVE-2013-2929
  • CVE-2013-6381
  • CVE-2013-7263
  • CVE-2013-4554
  • CVE-2013-6885
  • CVE-2013-4483

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf
  • https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/5/html/5.10_Technical_Notes/kernel.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-371.6.1.el5.src.rpm SHA-256: 3004e37bc577a0ae41f06d68bf2dd4880ebe882b978ecccf4a90606ffd6fa488
x86_64
kernel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 8abced78086858583fbff0df918a2b3146c5adb84e9d567a378e5f76c35432d9
kernel-debug-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 8695fdd570d9b9ce0caca9846cad20d7dbf77c134a89def072762fcecf851b89
kernel-debug-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 9032a2df75a5ebf944696359f85b9bcd0754fecfc1f3b72893c8f01ed98692eb
kernel-debug-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 3e6727d06c5205a8730fb81dc1b305da705e4d67fc756ccec791ed148ee449db
kernel-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: d4c92ebf0ab5abea0a2af35868ddf53c02c386e1a006aad28984a01c7dade744
kernel-debuginfo-common-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: f76343d082219306011bb4335b2e2284365ecba4215689e856e9052f24d40b66
kernel-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 6f3cee072c34fb3666367a78396ab9894ba8c6b3289c6ab5422edd2258030495
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 343fbbcfe4908f12f6127072fafebfd5f56fa2f7eb5aa965a16b016b9b2e9147
kernel-xen-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 3c2f9e5bf45653ec91ee0f31c1ba37d1b9aec80c4dcdf41e70a3f4b3faf8bedb
kernel-xen-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: e5741c5c9046301b10e17968bd80cafa0275bdc21928b9f0460afc6aae1a8ad7
kernel-xen-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 5b43584ea5140d197bbc1ad77d5e8a48e7843f026483400827cf32dbe9430e96
ia64
kernel-2.6.18-371.6.1.el5.ia64.rpm SHA-256: 4cfb95909ce84370e65c74dc5d73b708947b8a24db04aa55d50f8a1e601786fb
kernel-debug-2.6.18-371.6.1.el5.ia64.rpm SHA-256: c45bfe9df42df983c356fdff9c788aa9a5d3a9fb024672450e3d3162a40a2903
kernel-debug-debuginfo-2.6.18-371.6.1.el5.ia64.rpm SHA-256: 98e26295086b3e7a2c6eb2fb421b1e41018fcfeee5afa2575b7d2c2b34b36dd0
kernel-debug-devel-2.6.18-371.6.1.el5.ia64.rpm SHA-256: 47ee6f4c121d5f42da2070c4cba8fb614e4fcf9a667770a8300f86d0085e6432
kernel-debuginfo-2.6.18-371.6.1.el5.ia64.rpm SHA-256: 172be3a9631941129d164dcbd2cc32d9cd8738d1eaba90cafe1f2f00760e62a6
kernel-debuginfo-common-2.6.18-371.6.1.el5.ia64.rpm SHA-256: 4ba6c84db21cbbac7781fa8283802e2b8debdedbf3a6bc710d1760be51bdcda7
kernel-devel-2.6.18-371.6.1.el5.ia64.rpm SHA-256: de2d15d8d79203b9f52d10eae9619be61c173944f3e9cabefa872f24b9607ca0
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.ia64.rpm SHA-256: 4a5f828c2b785a63a020dbdeb79d8cbbdc3544bde7010bf2157f9bdf96d0a9d8
kernel-xen-2.6.18-371.6.1.el5.ia64.rpm SHA-256: c5054cd40b1cee14112f5a31d50e2f085e25dd5584bfa906601d69014170e89c
kernel-xen-debuginfo-2.6.18-371.6.1.el5.ia64.rpm SHA-256: c5213ed772bd3727876fe5a8185047ed372e66933579a57bb930c86faab3c676
kernel-xen-devel-2.6.18-371.6.1.el5.ia64.rpm SHA-256: 9c9d575026c10d23023f3810028abbe9a0013ae162415e8d8ebac2a6c3c031b2
i386
kernel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 67b8314af1d81bd9cea2fe8cef28ea6e4b4c1928d9922727c224a99a3271824a
kernel-PAE-2.6.18-371.6.1.el5.i686.rpm SHA-256: 79b818dc86679f86db3455af2badc34244b54dcfbbda988d389caf3c51c71dbe
kernel-PAE-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: 3a13fc06e58993a141585ef2ddd4db0356980a175ba3bca71b4b52ae377b2ce2
kernel-PAE-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: a55cdb4a67277cf8ac90306f35fb76182a65f2576ce87560b8fa5e214c6d7518
kernel-debug-2.6.18-371.6.1.el5.i686.rpm SHA-256: 4f493f657b008ea2a5b8e2303923c998946a173917deb88ef632ae2499b6acee
kernel-debug-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: e7890a833eff73f93d5881db9c4b8dd64bc55536374a4f4ceb26e76cdd2e72c1
kernel-debug-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 5717de0b7b4666ccdb1e8ac8aec8cd67d79c3cb84f25836ca3368ae85cbd8e8c
kernel-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: c2af964546c0d6a2787685f62a38481332590461ba52003bbdb49e948f44f7dd
kernel-debuginfo-common-2.6.18-371.6.1.el5.i686.rpm SHA-256: 9076b8ca51b58b31936a9d9fe461693930bad340704ab054c061ed34a5d06f6c
kernel-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: bc38ca7d48dda51700e8efcbe61cf30c6ebb0b72bd9378c4c4506a6f77f9aaeb
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.i386.rpm SHA-256: e1de7d5aeb66cbb8c9c8cd073ab0c2fb1398e8baef0bdc464ff897e0fc0b0667
kernel-xen-2.6.18-371.6.1.el5.i686.rpm SHA-256: 8454af639b9756d28fc0b2bca566813cff413442a6f64e94b84a26082fbb50a4
kernel-xen-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: f4d53f7c209dcccdfd411d2756078869a7cb9b3742b24a8d00dbacbbe4001571
kernel-xen-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 6a3d8a00571a67f2e41969a9f1ff8d42fcb80d926593cc80e7e62342447ccbe3

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-371.6.1.el5.src.rpm SHA-256: 3004e37bc577a0ae41f06d68bf2dd4880ebe882b978ecccf4a90606ffd6fa488
x86_64
kernel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 8abced78086858583fbff0df918a2b3146c5adb84e9d567a378e5f76c35432d9
kernel-debug-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 8695fdd570d9b9ce0caca9846cad20d7dbf77c134a89def072762fcecf851b89
kernel-debug-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 9032a2df75a5ebf944696359f85b9bcd0754fecfc1f3b72893c8f01ed98692eb
kernel-debug-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 3e6727d06c5205a8730fb81dc1b305da705e4d67fc756ccec791ed148ee449db
kernel-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: d4c92ebf0ab5abea0a2af35868ddf53c02c386e1a006aad28984a01c7dade744
kernel-debuginfo-common-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: f76343d082219306011bb4335b2e2284365ecba4215689e856e9052f24d40b66
kernel-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 6f3cee072c34fb3666367a78396ab9894ba8c6b3289c6ab5422edd2258030495
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 343fbbcfe4908f12f6127072fafebfd5f56fa2f7eb5aa965a16b016b9b2e9147
kernel-xen-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 3c2f9e5bf45653ec91ee0f31c1ba37d1b9aec80c4dcdf41e70a3f4b3faf8bedb
kernel-xen-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: e5741c5c9046301b10e17968bd80cafa0275bdc21928b9f0460afc6aae1a8ad7
kernel-xen-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 5b43584ea5140d197bbc1ad77d5e8a48e7843f026483400827cf32dbe9430e96
i386
kernel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 67b8314af1d81bd9cea2fe8cef28ea6e4b4c1928d9922727c224a99a3271824a
kernel-PAE-2.6.18-371.6.1.el5.i686.rpm SHA-256: 79b818dc86679f86db3455af2badc34244b54dcfbbda988d389caf3c51c71dbe
kernel-PAE-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: 3a13fc06e58993a141585ef2ddd4db0356980a175ba3bca71b4b52ae377b2ce2
kernel-PAE-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: a55cdb4a67277cf8ac90306f35fb76182a65f2576ce87560b8fa5e214c6d7518
kernel-debug-2.6.18-371.6.1.el5.i686.rpm SHA-256: 4f493f657b008ea2a5b8e2303923c998946a173917deb88ef632ae2499b6acee
kernel-debug-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: e7890a833eff73f93d5881db9c4b8dd64bc55536374a4f4ceb26e76cdd2e72c1
kernel-debug-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 5717de0b7b4666ccdb1e8ac8aec8cd67d79c3cb84f25836ca3368ae85cbd8e8c
kernel-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: c2af964546c0d6a2787685f62a38481332590461ba52003bbdb49e948f44f7dd
kernel-debuginfo-common-2.6.18-371.6.1.el5.i686.rpm SHA-256: 9076b8ca51b58b31936a9d9fe461693930bad340704ab054c061ed34a5d06f6c
kernel-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: bc38ca7d48dda51700e8efcbe61cf30c6ebb0b72bd9378c4c4506a6f77f9aaeb
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.i386.rpm SHA-256: e1de7d5aeb66cbb8c9c8cd073ab0c2fb1398e8baef0bdc464ff897e0fc0b0667
kernel-xen-2.6.18-371.6.1.el5.i686.rpm SHA-256: 8454af639b9756d28fc0b2bca566813cff413442a6f64e94b84a26082fbb50a4
kernel-xen-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: f4d53f7c209dcccdfd411d2756078869a7cb9b3742b24a8d00dbacbbe4001571
kernel-xen-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 6a3d8a00571a67f2e41969a9f1ff8d42fcb80d926593cc80e7e62342447ccbe3

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-371.6.1.el5.src.rpm SHA-256: 3004e37bc577a0ae41f06d68bf2dd4880ebe882b978ecccf4a90606ffd6fa488
x86_64
kernel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 8abced78086858583fbff0df918a2b3146c5adb84e9d567a378e5f76c35432d9
kernel-debug-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 8695fdd570d9b9ce0caca9846cad20d7dbf77c134a89def072762fcecf851b89
kernel-debug-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 9032a2df75a5ebf944696359f85b9bcd0754fecfc1f3b72893c8f01ed98692eb
kernel-debug-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 3e6727d06c5205a8730fb81dc1b305da705e4d67fc756ccec791ed148ee449db
kernel-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: d4c92ebf0ab5abea0a2af35868ddf53c02c386e1a006aad28984a01c7dade744
kernel-debuginfo-common-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: f76343d082219306011bb4335b2e2284365ecba4215689e856e9052f24d40b66
kernel-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 6f3cee072c34fb3666367a78396ab9894ba8c6b3289c6ab5422edd2258030495
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 343fbbcfe4908f12f6127072fafebfd5f56fa2f7eb5aa965a16b016b9b2e9147
kernel-xen-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 3c2f9e5bf45653ec91ee0f31c1ba37d1b9aec80c4dcdf41e70a3f4b3faf8bedb
kernel-xen-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: e5741c5c9046301b10e17968bd80cafa0275bdc21928b9f0460afc6aae1a8ad7
kernel-xen-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 5b43584ea5140d197bbc1ad77d5e8a48e7843f026483400827cf32dbe9430e96
i386
kernel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 67b8314af1d81bd9cea2fe8cef28ea6e4b4c1928d9922727c224a99a3271824a
kernel-PAE-2.6.18-371.6.1.el5.i686.rpm SHA-256: 79b818dc86679f86db3455af2badc34244b54dcfbbda988d389caf3c51c71dbe
kernel-PAE-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: 3a13fc06e58993a141585ef2ddd4db0356980a175ba3bca71b4b52ae377b2ce2
kernel-PAE-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: a55cdb4a67277cf8ac90306f35fb76182a65f2576ce87560b8fa5e214c6d7518
kernel-debug-2.6.18-371.6.1.el5.i686.rpm SHA-256: 4f493f657b008ea2a5b8e2303923c998946a173917deb88ef632ae2499b6acee
kernel-debug-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: e7890a833eff73f93d5881db9c4b8dd64bc55536374a4f4ceb26e76cdd2e72c1
kernel-debug-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 5717de0b7b4666ccdb1e8ac8aec8cd67d79c3cb84f25836ca3368ae85cbd8e8c
kernel-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: c2af964546c0d6a2787685f62a38481332590461ba52003bbdb49e948f44f7dd
kernel-debuginfo-common-2.6.18-371.6.1.el5.i686.rpm SHA-256: 9076b8ca51b58b31936a9d9fe461693930bad340704ab054c061ed34a5d06f6c
kernel-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: bc38ca7d48dda51700e8efcbe61cf30c6ebb0b72bd9378c4c4506a6f77f9aaeb
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.i386.rpm SHA-256: e1de7d5aeb66cbb8c9c8cd073ab0c2fb1398e8baef0bdc464ff897e0fc0b0667
kernel-xen-2.6.18-371.6.1.el5.i686.rpm SHA-256: 8454af639b9756d28fc0b2bca566813cff413442a6f64e94b84a26082fbb50a4
kernel-xen-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: f4d53f7c209dcccdfd411d2756078869a7cb9b3742b24a8d00dbacbbe4001571
kernel-xen-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 6a3d8a00571a67f2e41969a9f1ff8d42fcb80d926593cc80e7e62342447ccbe3

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-371.6.1.el5.src.rpm SHA-256: 3004e37bc577a0ae41f06d68bf2dd4880ebe882b978ecccf4a90606ffd6fa488
s390x
kernel-2.6.18-371.6.1.el5.s390x.rpm SHA-256: c95531dbe9d1ed0ae1d4cc6b5e2a169b469e6d46d3ae25f2c304a8221fdf4140
kernel-debug-2.6.18-371.6.1.el5.s390x.rpm SHA-256: 80d939d7934e9c87824d1fb353c62ba8c10774d555bf65c68fd129b654489d5e
kernel-debug-debuginfo-2.6.18-371.6.1.el5.s390x.rpm SHA-256: d57b4f891ff55eb855a8d3751df7e9af9556932e55fa5b3129342bb8f87118f9
kernel-debug-devel-2.6.18-371.6.1.el5.s390x.rpm SHA-256: c6087ed99791750284d00006ee0fcaf9d4e147e7284a5f9d3cb53eec54bc8610
kernel-debuginfo-2.6.18-371.6.1.el5.s390x.rpm SHA-256: fa8d0c827ac94fc6355904400e413345303b8865131f83d3d2b91c431f7158a0
kernel-debuginfo-common-2.6.18-371.6.1.el5.s390x.rpm SHA-256: f4a584e6c1e23e1ee331b8cc1a8d0db16f1ee5c5f54440333b1af8090389b11c
kernel-devel-2.6.18-371.6.1.el5.s390x.rpm SHA-256: 67f79132746c79deb6428b2b7b2a7ab2e8e56ac1282ea895b28ccb7c0b428b2c
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.s390x.rpm SHA-256: 86bcd0db7d887c94c5efa7e7c61c829dba3a1b55d3c28c31f2c526d95d35e1a6
kernel-kdump-2.6.18-371.6.1.el5.s390x.rpm SHA-256: 214a7bc508d16e868de6d125012c10993c370d0513dd0d0a42b123c7df7e2d9a
kernel-kdump-debuginfo-2.6.18-371.6.1.el5.s390x.rpm SHA-256: 99a1589250d2f21750866e0eea8825d590c1b1527dfd7952d8f54b101c111d51
kernel-kdump-devel-2.6.18-371.6.1.el5.s390x.rpm SHA-256: 05f9cd4a56183c07f292d3eb2575ec7f1e2bb01d5811a98bb6eb06d1bb7d1a34

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-371.6.1.el5.src.rpm SHA-256: 3004e37bc577a0ae41f06d68bf2dd4880ebe882b978ecccf4a90606ffd6fa488
ppc
kernel-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: 72b20b7028ea94fc836f0ed048e78c152778e080705ef4f1a07d00b533b8ce22
kernel-debug-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: 5778bde527d0c6bc9902ba2c53c16fa3ef1bf5f609ed00ecfe46da3b75e79917
kernel-debug-debuginfo-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: 93d6a33fc7b82d354b67d883818dbf048f49c3338b06dc7ec31cfd40868622a8
kernel-debug-devel-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: 928cc543e2b48b6e39f56b073aebb33cdcd7e0c04f807e8d93af63a65f59ba7f
kernel-debuginfo-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: 28450364f8b66ecbc04cb749224fb9d3c3fe0a850453ff12357e9839ce6c5be4
kernel-debuginfo-common-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: e485fed2e8b5e3430e85d1742a8d9162d2ecf95028342f9773c7a91bdfe4881b
kernel-devel-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: 041f5c9410003a29849fb292ce95c28e717b0dc33a72e2af88a4c97983a1919d
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.ppc.rpm SHA-256: 806426656f29216ca2a23646b336ebb74950a8f76ea1424add26c57a4b62d0ec
kernel-headers-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: d9e296b2c31a311e1ee9ab00865636b2c9e877d826de80a7765c8fecf9bffc2e
kernel-kdump-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: b50d46fa744ed9c61999996c9aac96565b88d313f5018d168ca8fe20b186a1d0
kernel-kdump-debuginfo-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: 01ace33961d0e4ecb7c583d1f78843716197750be15c002751b00b1ea653b301
kernel-kdump-devel-2.6.18-371.6.1.el5.ppc64.rpm SHA-256: d7c7a75bcf2921f497aa52d8f7d0294a44f8eadf5f4d52821d6123b776ee00c4

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-371.6.1.el5.src.rpm SHA-256: 3004e37bc577a0ae41f06d68bf2dd4880ebe882b978ecccf4a90606ffd6fa488
x86_64
kernel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 8abced78086858583fbff0df918a2b3146c5adb84e9d567a378e5f76c35432d9
kernel-debug-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 8695fdd570d9b9ce0caca9846cad20d7dbf77c134a89def072762fcecf851b89
kernel-debug-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 9032a2df75a5ebf944696359f85b9bcd0754fecfc1f3b72893c8f01ed98692eb
kernel-debug-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 3e6727d06c5205a8730fb81dc1b305da705e4d67fc756ccec791ed148ee449db
kernel-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: d4c92ebf0ab5abea0a2af35868ddf53c02c386e1a006aad28984a01c7dade744
kernel-debuginfo-common-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: f76343d082219306011bb4335b2e2284365ecba4215689e856e9052f24d40b66
kernel-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 6f3cee072c34fb3666367a78396ab9894ba8c6b3289c6ab5422edd2258030495
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 343fbbcfe4908f12f6127072fafebfd5f56fa2f7eb5aa965a16b016b9b2e9147
kernel-xen-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 3c2f9e5bf45653ec91ee0f31c1ba37d1b9aec80c4dcdf41e70a3f4b3faf8bedb
kernel-xen-debuginfo-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: e5741c5c9046301b10e17968bd80cafa0275bdc21928b9f0460afc6aae1a8ad7
kernel-xen-devel-2.6.18-371.6.1.el5.x86_64.rpm SHA-256: 5b43584ea5140d197bbc1ad77d5e8a48e7843f026483400827cf32dbe9430e96
i386
kernel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 67b8314af1d81bd9cea2fe8cef28ea6e4b4c1928d9922727c224a99a3271824a
kernel-PAE-2.6.18-371.6.1.el5.i686.rpm SHA-256: 79b818dc86679f86db3455af2badc34244b54dcfbbda988d389caf3c51c71dbe
kernel-PAE-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: 3a13fc06e58993a141585ef2ddd4db0356980a175ba3bca71b4b52ae377b2ce2
kernel-PAE-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: a55cdb4a67277cf8ac90306f35fb76182a65f2576ce87560b8fa5e214c6d7518
kernel-debug-2.6.18-371.6.1.el5.i686.rpm SHA-256: 4f493f657b008ea2a5b8e2303923c998946a173917deb88ef632ae2499b6acee
kernel-debug-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: e7890a833eff73f93d5881db9c4b8dd64bc55536374a4f4ceb26e76cdd2e72c1
kernel-debug-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 5717de0b7b4666ccdb1e8ac8aec8cd67d79c3cb84f25836ca3368ae85cbd8e8c
kernel-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: c2af964546c0d6a2787685f62a38481332590461ba52003bbdb49e948f44f7dd
kernel-debuginfo-common-2.6.18-371.6.1.el5.i686.rpm SHA-256: 9076b8ca51b58b31936a9d9fe461693930bad340704ab054c061ed34a5d06f6c
kernel-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: bc38ca7d48dda51700e8efcbe61cf30c6ebb0b72bd9378c4c4506a6f77f9aaeb
kernel-doc-2.6.18-371.6.1.el5.noarch.rpm SHA-256: f64ccf0bd6983e9e229731e96b282dcb2f15decbaed8d28a391ac544de4895f6
kernel-headers-2.6.18-371.6.1.el5.i386.rpm SHA-256: e1de7d5aeb66cbb8c9c8cd073ab0c2fb1398e8baef0bdc464ff897e0fc0b0667
kernel-xen-2.6.18-371.6.1.el5.i686.rpm SHA-256: 8454af639b9756d28fc0b2bca566813cff413442a6f64e94b84a26082fbb50a4
kernel-xen-debuginfo-2.6.18-371.6.1.el5.i686.rpm SHA-256: f4d53f7c209dcccdfd411d2756078869a7cb9b3742b24a8d00dbacbbe4001571
kernel-xen-devel-2.6.18-371.6.1.el5.i686.rpm SHA-256: 6a3d8a00571a67f2e41969a9f1ff8d42fcb80d926593cc80e7e62342447ccbe3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter