Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2014:0433 - Security Advisory
Issued:
2014-04-24
Updated:
2014-04-24

RHSA-2014:0433 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues, three bugs, and add
one enhancement are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A flaw was found in the way the Linux kernel's TCP/IP protocol suite

implementation handled TCP packets with both the SYN and FIN flags set.
A remote attacker could use this flaw to consume an excessive amount of
resources on the target system, potentially resulting in a denial of
service. (CVE-2012-6638, Moderate)

  • A flaw was found in the way the Linux kernel handled HID (Human Interface

Device) reports with an out-of-bounds Report ID. An attacker with physical
access to the system could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2013-2888,
Moderate)

This update also fixes the following bugs:

  • A previous change to the sunrpc code introduced a race condition between

the rpc_wake_up_task() and rpc_wake_up_status() functions. A race between
threads operating on these functions could result in a deadlock situation,
subsequently triggering a "soft lockup" event and rendering the system
unresponsive. This problem has been fixed by re-ordering tasks in the RPC
wait queue. (BZ#1073731)

  • Running a process in the background on a GFS2 file system could

sometimes trigger a glock recursion error that resulted in a kernel panic.
This happened when a readpage operation attempted to take a glock that had
already been held by another function. To prevent this error, GFS2 now
verifies whether the glock is already held when performing the readpage
operation. (BZ#1073953)

  • A previous patch backport to the IUCV (Inter User Communication Vehicle)

code was incomplete. Consequently, when establishing an IUCV connection,
the kernel could, under certain circumstances, dereference a NULL pointer,
resulting in a kernel panic. A patch has been applied to correct this
problem by calling the proper function when removing IUCV paths.
(BZ#1077045)

In addition, this update adds the following enhancement:

  • The lpfc driver had a fixed timeout of 60 seconds for SCSI task

management commands. With this update, the lpfc driver enables the user to
set this timeout within the range from 5 to 180 seconds. The timeout can
be changed by modifying the "lpfc_task_mgmt_tmo" parameter for the lpfc
driver. (BZ#1073123)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1000451 - CVE-2013-2888 Kernel: HID: memory corruption flaw
  • BZ - 1066055 - CVE-2012-6638 Kernel: net: tcp: potential DoS via SYN+FIN messages

CVEs

  • CVE-2013-2888
  • CVE-2012-6638

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-371.8.1.el5.src.rpm SHA-256: 040a59ef7165597a27a2c6f2e4b010b0b2b82a69ea710bb3f1f00a3026ff55a0
x86_64
kernel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 4c52e28230fe95b4c5068c73e100fb3bf6b3b94e973cec7293f30e21977b62fa
kernel-debug-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 6451bffa4a7e620da53aca3d54fa7067373352534a83f6e6fefcae9fb3f71738
kernel-debug-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 736a4c9e96ccb31e2f7d5a05e49cf834c4881809feb37fafc1b0c162698492aa
kernel-debug-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 2a000c0496265713e38326d29b539ba96265c7b942031baec1fe5082fbc7a922
kernel-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 8952542a5248fe5737df9720bb8fd97ca0da6978fd768cd7fb50b9d3185f9084
kernel-debuginfo-common-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: a67a716c2638656632bccc939191253139867b9f1297df4ef5dcd9dbe22cecfe
kernel-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 400b82d77675621a6a4529d2b0d730a03b8d0a17bec334720b217b3aedbfc953
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: c703cea32d55384b6b59934f0bcbafdbd818b342a794430d87cd6fe880770f8c
kernel-xen-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 2e26382c460183fb5136252656bb4d04604d688e54ecacf2ae9d8047ec75b82f
kernel-xen-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: e1e1eee3ca7d3a1c38e11e733873c66fb801b0d9241e939f0ad9fe5b1db760dd
kernel-xen-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: ee00c4fba64aeaf5079eb3ba444e1e4d42844a5ecc831ba6e14a983613a64aa6
ia64
kernel-2.6.18-371.8.1.el5.ia64.rpm SHA-256: e25f8ff3e84a7a9030e926b1687a8b05942ba4cd45eb9111efa28aadf8762c81
kernel-debug-2.6.18-371.8.1.el5.ia64.rpm SHA-256: f6361a7f9c2ee1d57a811684014b937e9c354f6128d1a590a35544b4c7a3f63d
kernel-debug-debuginfo-2.6.18-371.8.1.el5.ia64.rpm SHA-256: 18c456a233e61dff81d3471387fc54baf5d11aa6bbe8f0ac14429308ab615354
kernel-debug-devel-2.6.18-371.8.1.el5.ia64.rpm SHA-256: 9892a4bc0fc1c2c0f3876ec9a9cbe54badb99ffb98a3d6385d424ea0bd289120
kernel-debuginfo-2.6.18-371.8.1.el5.ia64.rpm SHA-256: 1566b80ddb4a079605ac13d9be3092056a60e30fdc1f9f1af82aef72271af9d2
kernel-debuginfo-common-2.6.18-371.8.1.el5.ia64.rpm SHA-256: 7500d6758770d914761c8f365021cd5c1c798df604f8a961c59c60d640128429
kernel-devel-2.6.18-371.8.1.el5.ia64.rpm SHA-256: 91e4be15075dfc7a435757696b0b8984b3b383e49f7d2191aeccec9dca9849aa
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.ia64.rpm SHA-256: 923bc41f7aa04c2dcb6e7f267c86c6556fc63339377e82dadac2b2c8c7873539
kernel-xen-2.6.18-371.8.1.el5.ia64.rpm SHA-256: 260baa49aaacd55385588c7062d14dcfabe49c6b8e392340c56cc13662888048
kernel-xen-debuginfo-2.6.18-371.8.1.el5.ia64.rpm SHA-256: 4968b009dfe0bf60df435a8888b910a1cf23416785da8f833f0e07c1ea03d617
kernel-xen-devel-2.6.18-371.8.1.el5.ia64.rpm SHA-256: f081438ab0ce66488e524f0b456730341f4bc022cee2c6162082cb7c66f609ed
i386
kernel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 894693418264150b6beddbfe78c3aec263a02e71a93280b33eeb771afd463486
kernel-PAE-2.6.18-371.8.1.el5.i686.rpm SHA-256: b3359eb2abbd5f1cd92b31b5ee4b117e596a0ab906e6bf6770a0e63c47163491
kernel-PAE-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: b9f6115d9fe94461a1a55e1f762018d93ef7422e7c7cc8244abedfdcbedee59b
kernel-PAE-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 01d5a92af18a492b2688dddcb5b61846d8a7a2a61c718096c0ec90f37a7c4c3b
kernel-debug-2.6.18-371.8.1.el5.i686.rpm SHA-256: f1ebbc654b02cf7af60424d9f21f75564af7c66e9b21e82e0bd38bdb28a7c075
kernel-debug-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: 4ac30b760690fdf4a68b48a9657922e2c7af0a7a54066228aadfcae33701b756
kernel-debug-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 40c2ffd9154729cade55cd6e7d100a1391c93122a8758cb0331a87ce52c5b1b4
kernel-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: 9e53bcb11df871babdbb808e4766e818e1ac379bfc53c35ca929eff36131ddb0
kernel-debuginfo-common-2.6.18-371.8.1.el5.i686.rpm SHA-256: 726220ec91a40a1a952bc946c3591f71078c56f49249a62b81e1b8acbb9e948d
kernel-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: a011dee805cd83d9b2a3cb9bb376561ac70f5d9c1d998c09fae13d4a189112d0
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.i386.rpm SHA-256: 70cf155f56768146397188249f60938445925902574e5a0d438df218b01837e5
kernel-xen-2.6.18-371.8.1.el5.i686.rpm SHA-256: 750004dd6b127c422a6f54db01272ee2b72e8f90d306a78e6740603fe1188059
kernel-xen-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: f4caeeb1e2be5e37200b653c07c120aedf5a553f6ba6cfe902c0f771fd6affe3
kernel-xen-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 4c8b60e69ab49166e50b091fdb026ab96d7399dcddca0a921b52cbf7edaa1483

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-371.8.1.el5.src.rpm SHA-256: 040a59ef7165597a27a2c6f2e4b010b0b2b82a69ea710bb3f1f00a3026ff55a0
x86_64
kernel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 4c52e28230fe95b4c5068c73e100fb3bf6b3b94e973cec7293f30e21977b62fa
kernel-debug-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 6451bffa4a7e620da53aca3d54fa7067373352534a83f6e6fefcae9fb3f71738
kernel-debug-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 736a4c9e96ccb31e2f7d5a05e49cf834c4881809feb37fafc1b0c162698492aa
kernel-debug-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 2a000c0496265713e38326d29b539ba96265c7b942031baec1fe5082fbc7a922
kernel-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 8952542a5248fe5737df9720bb8fd97ca0da6978fd768cd7fb50b9d3185f9084
kernel-debuginfo-common-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: a67a716c2638656632bccc939191253139867b9f1297df4ef5dcd9dbe22cecfe
kernel-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 400b82d77675621a6a4529d2b0d730a03b8d0a17bec334720b217b3aedbfc953
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: c703cea32d55384b6b59934f0bcbafdbd818b342a794430d87cd6fe880770f8c
kernel-xen-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 2e26382c460183fb5136252656bb4d04604d688e54ecacf2ae9d8047ec75b82f
kernel-xen-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: e1e1eee3ca7d3a1c38e11e733873c66fb801b0d9241e939f0ad9fe5b1db760dd
kernel-xen-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: ee00c4fba64aeaf5079eb3ba444e1e4d42844a5ecc831ba6e14a983613a64aa6
i386
kernel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 894693418264150b6beddbfe78c3aec263a02e71a93280b33eeb771afd463486
kernel-PAE-2.6.18-371.8.1.el5.i686.rpm SHA-256: b3359eb2abbd5f1cd92b31b5ee4b117e596a0ab906e6bf6770a0e63c47163491
kernel-PAE-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: b9f6115d9fe94461a1a55e1f762018d93ef7422e7c7cc8244abedfdcbedee59b
kernel-PAE-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 01d5a92af18a492b2688dddcb5b61846d8a7a2a61c718096c0ec90f37a7c4c3b
kernel-debug-2.6.18-371.8.1.el5.i686.rpm SHA-256: f1ebbc654b02cf7af60424d9f21f75564af7c66e9b21e82e0bd38bdb28a7c075
kernel-debug-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: 4ac30b760690fdf4a68b48a9657922e2c7af0a7a54066228aadfcae33701b756
kernel-debug-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 40c2ffd9154729cade55cd6e7d100a1391c93122a8758cb0331a87ce52c5b1b4
kernel-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: 9e53bcb11df871babdbb808e4766e818e1ac379bfc53c35ca929eff36131ddb0
kernel-debuginfo-common-2.6.18-371.8.1.el5.i686.rpm SHA-256: 726220ec91a40a1a952bc946c3591f71078c56f49249a62b81e1b8acbb9e948d
kernel-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: a011dee805cd83d9b2a3cb9bb376561ac70f5d9c1d998c09fae13d4a189112d0
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.i386.rpm SHA-256: 70cf155f56768146397188249f60938445925902574e5a0d438df218b01837e5
kernel-xen-2.6.18-371.8.1.el5.i686.rpm SHA-256: 750004dd6b127c422a6f54db01272ee2b72e8f90d306a78e6740603fe1188059
kernel-xen-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: f4caeeb1e2be5e37200b653c07c120aedf5a553f6ba6cfe902c0f771fd6affe3
kernel-xen-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 4c8b60e69ab49166e50b091fdb026ab96d7399dcddca0a921b52cbf7edaa1483

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-371.8.1.el5.src.rpm SHA-256: 040a59ef7165597a27a2c6f2e4b010b0b2b82a69ea710bb3f1f00a3026ff55a0
x86_64
kernel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 4c52e28230fe95b4c5068c73e100fb3bf6b3b94e973cec7293f30e21977b62fa
kernel-debug-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 6451bffa4a7e620da53aca3d54fa7067373352534a83f6e6fefcae9fb3f71738
kernel-debug-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 736a4c9e96ccb31e2f7d5a05e49cf834c4881809feb37fafc1b0c162698492aa
kernel-debug-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 2a000c0496265713e38326d29b539ba96265c7b942031baec1fe5082fbc7a922
kernel-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 8952542a5248fe5737df9720bb8fd97ca0da6978fd768cd7fb50b9d3185f9084
kernel-debuginfo-common-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: a67a716c2638656632bccc939191253139867b9f1297df4ef5dcd9dbe22cecfe
kernel-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 400b82d77675621a6a4529d2b0d730a03b8d0a17bec334720b217b3aedbfc953
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: c703cea32d55384b6b59934f0bcbafdbd818b342a794430d87cd6fe880770f8c
kernel-xen-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 2e26382c460183fb5136252656bb4d04604d688e54ecacf2ae9d8047ec75b82f
kernel-xen-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: e1e1eee3ca7d3a1c38e11e733873c66fb801b0d9241e939f0ad9fe5b1db760dd
kernel-xen-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: ee00c4fba64aeaf5079eb3ba444e1e4d42844a5ecc831ba6e14a983613a64aa6
i386
kernel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 894693418264150b6beddbfe78c3aec263a02e71a93280b33eeb771afd463486
kernel-PAE-2.6.18-371.8.1.el5.i686.rpm SHA-256: b3359eb2abbd5f1cd92b31b5ee4b117e596a0ab906e6bf6770a0e63c47163491
kernel-PAE-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: b9f6115d9fe94461a1a55e1f762018d93ef7422e7c7cc8244abedfdcbedee59b
kernel-PAE-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 01d5a92af18a492b2688dddcb5b61846d8a7a2a61c718096c0ec90f37a7c4c3b
kernel-debug-2.6.18-371.8.1.el5.i686.rpm SHA-256: f1ebbc654b02cf7af60424d9f21f75564af7c66e9b21e82e0bd38bdb28a7c075
kernel-debug-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: 4ac30b760690fdf4a68b48a9657922e2c7af0a7a54066228aadfcae33701b756
kernel-debug-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 40c2ffd9154729cade55cd6e7d100a1391c93122a8758cb0331a87ce52c5b1b4
kernel-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: 9e53bcb11df871babdbb808e4766e818e1ac379bfc53c35ca929eff36131ddb0
kernel-debuginfo-common-2.6.18-371.8.1.el5.i686.rpm SHA-256: 726220ec91a40a1a952bc946c3591f71078c56f49249a62b81e1b8acbb9e948d
kernel-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: a011dee805cd83d9b2a3cb9bb376561ac70f5d9c1d998c09fae13d4a189112d0
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.i386.rpm SHA-256: 70cf155f56768146397188249f60938445925902574e5a0d438df218b01837e5
kernel-xen-2.6.18-371.8.1.el5.i686.rpm SHA-256: 750004dd6b127c422a6f54db01272ee2b72e8f90d306a78e6740603fe1188059
kernel-xen-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: f4caeeb1e2be5e37200b653c07c120aedf5a553f6ba6cfe902c0f771fd6affe3
kernel-xen-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 4c8b60e69ab49166e50b091fdb026ab96d7399dcddca0a921b52cbf7edaa1483

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-371.8.1.el5.src.rpm SHA-256: 040a59ef7165597a27a2c6f2e4b010b0b2b82a69ea710bb3f1f00a3026ff55a0
s390x
kernel-2.6.18-371.8.1.el5.s390x.rpm SHA-256: c96d461102456e78b9a487789119bfaa5d0a424d3c40c8d7538400e8b1974b7a
kernel-debug-2.6.18-371.8.1.el5.s390x.rpm SHA-256: 9b1e256e1f82207ca458d3fcbc57e874f9dfb29aeb17c8c42bc9b8de954ea9b4
kernel-debug-debuginfo-2.6.18-371.8.1.el5.s390x.rpm SHA-256: 2baa4b8868b88b911a13d33dbaeda33369ad7ce60d599286e4008685bb74cc80
kernel-debug-devel-2.6.18-371.8.1.el5.s390x.rpm SHA-256: 411789ac745397524e6f9706d3393d0cb538533c84ef6764ad5eb5488db13565
kernel-debuginfo-2.6.18-371.8.1.el5.s390x.rpm SHA-256: b558d4407c6b4a74e69f7b02767d8c304c942019ab2dde5db5a7442c53b62adf
kernel-debuginfo-common-2.6.18-371.8.1.el5.s390x.rpm SHA-256: 5ad37a99504b48f90eb9bc4cb06f5e3b423931d87ed853a3f24709c26bc60282
kernel-devel-2.6.18-371.8.1.el5.s390x.rpm SHA-256: 172e6a3bc987eda73fc209de8e45c5a19f54143685eb27a334074b3d0d7646df
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.s390x.rpm SHA-256: ae7c00d4a2bf832895114e966f6e54ef00e8ace75cf67525d125d55b9abe8fb4
kernel-kdump-2.6.18-371.8.1.el5.s390x.rpm SHA-256: ffa853cb311821d0193027b76e2e81b266f7d8263cc86980ca54b917259f0ab6
kernel-kdump-debuginfo-2.6.18-371.8.1.el5.s390x.rpm SHA-256: 686ce97d254d8c90d99f471c2c76e3ac3422fbe2377ce7e9b4a35b877543976a
kernel-kdump-devel-2.6.18-371.8.1.el5.s390x.rpm SHA-256: 102eaa9340d39b9ab4dd22f752eef14858c35655fe7131f64efce219760619f4

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-371.8.1.el5.src.rpm SHA-256: 040a59ef7165597a27a2c6f2e4b010b0b2b82a69ea710bb3f1f00a3026ff55a0
ppc
kernel-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: cec3d8a40f4e98919e63792363b3d879089d8081f4993bbc428a741fa68153d4
kernel-debug-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: 60e8ee3fafc49915a3165f5c8cf158457c39915af653b09f247689fa40e9a266
kernel-debug-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: 35ce35ad6e9f9a7c2e4cde71521d20ab75321f375c91141753040d9ba53cdb07
kernel-debug-devel-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: 24faad0bfb6ba3bffedb69f080949ce60fd18c1f58091ebe8b6c5754dcb24a90
kernel-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: 0edfd398ce09cb1a1f12ee97c1693f714d21e85ade593c303876912c7b5b66bc
kernel-debuginfo-common-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: f8f55d4b1f131469fcdf3906d0a0a5dcc45d33120b4a620779d363b6f80c8c47
kernel-devel-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: 579387f05c3b79b828118aa950bee806616abdf64013f2e66f57c8647b73f73b
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.ppc.rpm SHA-256: 00f09fe32198261cf1467c83ea09b01fed53dc1e1eeb5cfea83933c423cf137c
kernel-headers-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: 9afdbdfc20ccc3dc9df3657dc09779d2c6945bc5070fffd54327e55925e09f23
kernel-kdump-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: cc3a5f3895955a76244bb4f99d59cbb1f1169d99fc6445db39c84390a8ef5d29
kernel-kdump-debuginfo-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: 7295a4e4abf725f46b1365426182b12e2b3947a328c4aa50f35fe07323da0eeb
kernel-kdump-devel-2.6.18-371.8.1.el5.ppc64.rpm SHA-256: e0257ea1c2b765fef536c200a911f3b54752b6d947cadb369df72604c2f0ee97

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-371.8.1.el5.src.rpm SHA-256: 040a59ef7165597a27a2c6f2e4b010b0b2b82a69ea710bb3f1f00a3026ff55a0
x86_64
kernel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 4c52e28230fe95b4c5068c73e100fb3bf6b3b94e973cec7293f30e21977b62fa
kernel-debug-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 6451bffa4a7e620da53aca3d54fa7067373352534a83f6e6fefcae9fb3f71738
kernel-debug-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 736a4c9e96ccb31e2f7d5a05e49cf834c4881809feb37fafc1b0c162698492aa
kernel-debug-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 2a000c0496265713e38326d29b539ba96265c7b942031baec1fe5082fbc7a922
kernel-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 8952542a5248fe5737df9720bb8fd97ca0da6978fd768cd7fb50b9d3185f9084
kernel-debuginfo-common-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: a67a716c2638656632bccc939191253139867b9f1297df4ef5dcd9dbe22cecfe
kernel-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 400b82d77675621a6a4529d2b0d730a03b8d0a17bec334720b217b3aedbfc953
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: c703cea32d55384b6b59934f0bcbafdbd818b342a794430d87cd6fe880770f8c
kernel-xen-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: 2e26382c460183fb5136252656bb4d04604d688e54ecacf2ae9d8047ec75b82f
kernel-xen-debuginfo-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: e1e1eee3ca7d3a1c38e11e733873c66fb801b0d9241e939f0ad9fe5b1db760dd
kernel-xen-devel-2.6.18-371.8.1.el5.x86_64.rpm SHA-256: ee00c4fba64aeaf5079eb3ba444e1e4d42844a5ecc831ba6e14a983613a64aa6
i386
kernel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 894693418264150b6beddbfe78c3aec263a02e71a93280b33eeb771afd463486
kernel-PAE-2.6.18-371.8.1.el5.i686.rpm SHA-256: b3359eb2abbd5f1cd92b31b5ee4b117e596a0ab906e6bf6770a0e63c47163491
kernel-PAE-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: b9f6115d9fe94461a1a55e1f762018d93ef7422e7c7cc8244abedfdcbedee59b
kernel-PAE-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 01d5a92af18a492b2688dddcb5b61846d8a7a2a61c718096c0ec90f37a7c4c3b
kernel-debug-2.6.18-371.8.1.el5.i686.rpm SHA-256: f1ebbc654b02cf7af60424d9f21f75564af7c66e9b21e82e0bd38bdb28a7c075
kernel-debug-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: 4ac30b760690fdf4a68b48a9657922e2c7af0a7a54066228aadfcae33701b756
kernel-debug-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 40c2ffd9154729cade55cd6e7d100a1391c93122a8758cb0331a87ce52c5b1b4
kernel-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: 9e53bcb11df871babdbb808e4766e818e1ac379bfc53c35ca929eff36131ddb0
kernel-debuginfo-common-2.6.18-371.8.1.el5.i686.rpm SHA-256: 726220ec91a40a1a952bc946c3591f71078c56f49249a62b81e1b8acbb9e948d
kernel-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: a011dee805cd83d9b2a3cb9bb376561ac70f5d9c1d998c09fae13d4a189112d0
kernel-doc-2.6.18-371.8.1.el5.noarch.rpm SHA-256: bac77484ebaaf6cc9cb54575c09a3bdf25124fbd52850843620a3b1f4d1e363e
kernel-headers-2.6.18-371.8.1.el5.i386.rpm SHA-256: 70cf155f56768146397188249f60938445925902574e5a0d438df218b01837e5
kernel-xen-2.6.18-371.8.1.el5.i686.rpm SHA-256: 750004dd6b127c422a6f54db01272ee2b72e8f90d306a78e6740603fe1188059
kernel-xen-debuginfo-2.6.18-371.8.1.el5.i686.rpm SHA-256: f4caeeb1e2be5e37200b653c07c120aedf5a553f6ba6cfe902c0f771fd6affe3
kernel-xen-devel-2.6.18-371.8.1.el5.i686.rpm SHA-256: 4c8b60e69ab49166e50b091fdb026ab96d7399dcddca0a921b52cbf7edaa1483

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility