Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:0476 - Security Advisory
Issued:
2014-05-07
Updated:
2014-05-07

RHSA-2014:0476 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 5.9 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A buffer overflow flaw was found in the way the qeth_snmp_command()

function in the Linux kernel's QETH network device driver implementation
handled SNMP IOCTL requests with an out-of-bounds length. A local,
unprivileged user could use this flaw to crash the system or, potentially,
escalate their privileges on the system. (CVE-2013-6381, Important)

  • A flaw was found in the way the Linux kernel's Adaptec RAID controller

(aacraid) checked permissions of compat IOCTLs. A local attacker could use
this flaw to bypass intended security restrictions. (CVE-2013-6383,
Moderate)

This update also fixes the following bug:

  • Running a process in the background on a GFS2 file system could sometimes

trigger a glock recursion error that resulted in a kernel panic. This
happened when a readpage operation attempted to take a glock that had
already been held by another function. To prevent this error, GFS2 now
verifies whether the glock is already held when performing the readpage
operation. (BZ#1077789)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 i386

Fixes

  • BZ - 1033530 - CVE-2013-6383 Kernel: AACRAID Driver compat IOCTL missing capability check
  • BZ - 1033600 - CVE-2013-6381 Kernel: qeth: buffer overflow in snmp ioctl

CVEs

  • CVE-2013-6383
  • CVE-2013-6381

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.25.1.el5.src.rpm SHA-256: d02915088acddad9189cf89a7916bc3997362aa745da652f23319c5443b2a720
x86_64
kernel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 1d605480ea5076b18bbb5f8b1067e8241a9fb054db6d8fe0e545be204744b384
kernel-debug-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 2a9d043281ab53045373f7fd37bde99f99abc6df7cef514a1202b59f1ace2d3e
kernel-debug-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 8d50e0014aef3b1b2d70a9421b304168ea2c47c9ad339ee4c1bb487f028296d4
kernel-debug-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 1f3847a33b077530fef6f692fab13b41fdd84d8df84abf6ac15f540cf2da5e27
kernel-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: a2e6e76641729be93e74222fa64405f484c123aec183a039f531f827668f70b7
kernel-debuginfo-common-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: ec9f18a559d187a3ec6db366a0dc0460acbfeb66875f64419647d7f0cd142b77
kernel-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 5a5548f0793ff15662adec7d494d8e1c397608a3edcfc40f4f1091e7e379e679
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 170e2676a7764f0ce61c8b77727d60159e37482410239786e4d002e03b86a4e9
kernel-xen-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 701cec32b4089d1362e01ad0e0c16d2ccc082d789b081ba4b0f14627951a588d
kernel-xen-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 6a8f3e1886e975c97506beab9c3bd049052ef0fc3261e7ad588b0a134764836e
kernel-xen-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 3f7a1c17467cffa0cf5ff31265ed77fb89dec501625809f878db1c44a415891b
ia64
kernel-2.6.18-348.25.1.el5.ia64.rpm SHA-256: c759b4d376ed26d14a5c002c85c9a6d87f4abede588daba09678a369fea92248
kernel-debug-2.6.18-348.25.1.el5.ia64.rpm SHA-256: a4c20828a81c7724f569d1338646a9a6f07472a0b1b9d3c147d76e141d529a12
kernel-debug-debuginfo-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 0bf1b592caf310f2fc3b35cb6956e697efe5ba4b6fd9b32812d480b666b7c9d6
kernel-debug-devel-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 99dd433753dd610033a3d2f3a6240ada3f6501d180e33142a411ab54a4a60a5f
kernel-debuginfo-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 4b85a365f4721c43d097d7f0e24d02b279d6456b42bd8d8b4c1f513ae980a218
kernel-debuginfo-common-2.6.18-348.25.1.el5.ia64.rpm SHA-256: ed7e95d0e134a08d2c2aa2a14bf85c439621a351bb76cda360f095b7699a4867
kernel-devel-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 8ab53f8e904d7691223c37813b94d2a6ed8b3406a5b5192afe846e4d5defb9ba
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.ia64.rpm SHA-256: b87466de8010ca0a864170bd14bc03224dfd15c0814f801571255655580606e6
kernel-xen-2.6.18-348.25.1.el5.ia64.rpm SHA-256: f817a69ffe9bbe164abf9f6a48619e674e0d7134bb4070a36455055943745917
kernel-xen-debuginfo-2.6.18-348.25.1.el5.ia64.rpm SHA-256: b68070fe768ea589ee17b95972e95e52352b82a49e5f1a98d9a563bd8d9224de
kernel-xen-devel-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 3da5a552add56939e072793693054d5113a5bd8da0b85ccfe31a9fa9a3804d23
i386
kernel-2.6.18-348.25.1.el5.i686.rpm SHA-256: 5ba83034f67adb8b4782a98072e8467e6861d8a82c45205c4fb0979acc533537
kernel-PAE-2.6.18-348.25.1.el5.i686.rpm SHA-256: caaa61fd7fe4a616aea3ff3e448c0fa0c0b24dd1a31d94120df754ac0ec41f00
kernel-PAE-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: 52ec4da66fb85360393bb6cacca8a22c5289622414a731f4ae346e35d880f53b
kernel-PAE-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: d4994a2ea2d5d5c7ebc6564294b28ea44d70eb33855993e728ed181d1ec68888
kernel-debug-2.6.18-348.25.1.el5.i686.rpm SHA-256: 5e0294fa207eae46c57f4baaba05816b01887624b61406b9abcc7016f40d70ed
kernel-debug-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: b763584607ff8ca19089513e4f5f1e9faa3173ad9b6c94e9b0ff2eaa552daa5d
kernel-debug-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: bdf76137cd5a847f71b8c97552a8b16a0cfa6ceb8dfd0539ac2013e08417bb69
kernel-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: d748ea731b4f8ed28147ed56446c0cbf0769f0309c0c91a7c92f7ebd405a3e84
kernel-debuginfo-common-2.6.18-348.25.1.el5.i686.rpm SHA-256: 27a6f719caa3657eab37941e19dec73bb9f5463f8a1fc3ea265e084ee3890b25
kernel-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: 1b7231aa1f9267905784b053d01e2a3866c13e838eb44e577e119f9a69e3f6e8
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.i386.rpm SHA-256: 002d0a4ebfb2dd923c71b2894adc04661e7975f8d72f6aaa2257fb1b4ef1e0cd
kernel-xen-2.6.18-348.25.1.el5.i686.rpm SHA-256: e2388936a6b3b3bbeaecdd24b08cb55861f4eabca15c7cd0df5c78eeb4ed0250
kernel-xen-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: 8c7d51a4f1b8ca79c0819646f11b119f3f8d6d999664f4d1b9841037ecf5f608
kernel-xen-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: d64f0b4b2cd0a9d285ad77af01c74fdea963d4743255512c8a6494e14ba84884

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
kernel-2.6.18-348.25.1.el5.src.rpm SHA-256: d02915088acddad9189cf89a7916bc3997362aa745da652f23319c5443b2a720
x86_64
kernel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 1d605480ea5076b18bbb5f8b1067e8241a9fb054db6d8fe0e545be204744b384
kernel-debug-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 2a9d043281ab53045373f7fd37bde99f99abc6df7cef514a1202b59f1ace2d3e
kernel-debug-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 8d50e0014aef3b1b2d70a9421b304168ea2c47c9ad339ee4c1bb487f028296d4
kernel-debug-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 1f3847a33b077530fef6f692fab13b41fdd84d8df84abf6ac15f540cf2da5e27
kernel-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: a2e6e76641729be93e74222fa64405f484c123aec183a039f531f827668f70b7
kernel-debuginfo-common-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: ec9f18a559d187a3ec6db366a0dc0460acbfeb66875f64419647d7f0cd142b77
kernel-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 5a5548f0793ff15662adec7d494d8e1c397608a3edcfc40f4f1091e7e379e679
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 170e2676a7764f0ce61c8b77727d60159e37482410239786e4d002e03b86a4e9
kernel-xen-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 701cec32b4089d1362e01ad0e0c16d2ccc082d789b081ba4b0f14627951a588d
kernel-xen-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 6a8f3e1886e975c97506beab9c3bd049052ef0fc3261e7ad588b0a134764836e
kernel-xen-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 3f7a1c17467cffa0cf5ff31265ed77fb89dec501625809f878db1c44a415891b
i386
kernel-2.6.18-348.25.1.el5.i686.rpm SHA-256: 5ba83034f67adb8b4782a98072e8467e6861d8a82c45205c4fb0979acc533537
kernel-PAE-2.6.18-348.25.1.el5.i686.rpm SHA-256: caaa61fd7fe4a616aea3ff3e448c0fa0c0b24dd1a31d94120df754ac0ec41f00
kernel-PAE-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: 52ec4da66fb85360393bb6cacca8a22c5289622414a731f4ae346e35d880f53b
kernel-PAE-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: d4994a2ea2d5d5c7ebc6564294b28ea44d70eb33855993e728ed181d1ec68888
kernel-debug-2.6.18-348.25.1.el5.i686.rpm SHA-256: 5e0294fa207eae46c57f4baaba05816b01887624b61406b9abcc7016f40d70ed
kernel-debug-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: b763584607ff8ca19089513e4f5f1e9faa3173ad9b6c94e9b0ff2eaa552daa5d
kernel-debug-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: bdf76137cd5a847f71b8c97552a8b16a0cfa6ceb8dfd0539ac2013e08417bb69
kernel-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: d748ea731b4f8ed28147ed56446c0cbf0769f0309c0c91a7c92f7ebd405a3e84
kernel-debuginfo-common-2.6.18-348.25.1.el5.i686.rpm SHA-256: 27a6f719caa3657eab37941e19dec73bb9f5463f8a1fc3ea265e084ee3890b25
kernel-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: 1b7231aa1f9267905784b053d01e2a3866c13e838eb44e577e119f9a69e3f6e8
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.i386.rpm SHA-256: 002d0a4ebfb2dd923c71b2894adc04661e7975f8d72f6aaa2257fb1b4ef1e0cd
kernel-xen-2.6.18-348.25.1.el5.i686.rpm SHA-256: e2388936a6b3b3bbeaecdd24b08cb55861f4eabca15c7cd0df5c78eeb4ed0250
kernel-xen-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: 8c7d51a4f1b8ca79c0819646f11b119f3f8d6d999664f4d1b9841037ecf5f608
kernel-xen-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: d64f0b4b2cd0a9d285ad77af01c74fdea963d4743255512c8a6494e14ba84884

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
kernel-2.6.18-348.25.1.el5.src.rpm SHA-256: d02915088acddad9189cf89a7916bc3997362aa745da652f23319c5443b2a720
x86_64
kernel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 1d605480ea5076b18bbb5f8b1067e8241a9fb054db6d8fe0e545be204744b384
kernel-debug-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 2a9d043281ab53045373f7fd37bde99f99abc6df7cef514a1202b59f1ace2d3e
kernel-debug-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 8d50e0014aef3b1b2d70a9421b304168ea2c47c9ad339ee4c1bb487f028296d4
kernel-debug-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 1f3847a33b077530fef6f692fab13b41fdd84d8df84abf6ac15f540cf2da5e27
kernel-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: a2e6e76641729be93e74222fa64405f484c123aec183a039f531f827668f70b7
kernel-debuginfo-common-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: ec9f18a559d187a3ec6db366a0dc0460acbfeb66875f64419647d7f0cd142b77
kernel-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 5a5548f0793ff15662adec7d494d8e1c397608a3edcfc40f4f1091e7e379e679
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 170e2676a7764f0ce61c8b77727d60159e37482410239786e4d002e03b86a4e9
kernel-xen-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 701cec32b4089d1362e01ad0e0c16d2ccc082d789b081ba4b0f14627951a588d
kernel-xen-debuginfo-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 6a8f3e1886e975c97506beab9c3bd049052ef0fc3261e7ad588b0a134764836e
kernel-xen-devel-2.6.18-348.25.1.el5.x86_64.rpm SHA-256: 3f7a1c17467cffa0cf5ff31265ed77fb89dec501625809f878db1c44a415891b
ia64
kernel-2.6.18-348.25.1.el5.ia64.rpm SHA-256: c759b4d376ed26d14a5c002c85c9a6d87f4abede588daba09678a369fea92248
kernel-debug-2.6.18-348.25.1.el5.ia64.rpm SHA-256: a4c20828a81c7724f569d1338646a9a6f07472a0b1b9d3c147d76e141d529a12
kernel-debug-debuginfo-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 0bf1b592caf310f2fc3b35cb6956e697efe5ba4b6fd9b32812d480b666b7c9d6
kernel-debug-devel-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 99dd433753dd610033a3d2f3a6240ada3f6501d180e33142a411ab54a4a60a5f
kernel-debuginfo-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 4b85a365f4721c43d097d7f0e24d02b279d6456b42bd8d8b4c1f513ae980a218
kernel-debuginfo-common-2.6.18-348.25.1.el5.ia64.rpm SHA-256: ed7e95d0e134a08d2c2aa2a14bf85c439621a351bb76cda360f095b7699a4867
kernel-devel-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 8ab53f8e904d7691223c37813b94d2a6ed8b3406a5b5192afe846e4d5defb9ba
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.ia64.rpm SHA-256: b87466de8010ca0a864170bd14bc03224dfd15c0814f801571255655580606e6
kernel-xen-2.6.18-348.25.1.el5.ia64.rpm SHA-256: f817a69ffe9bbe164abf9f6a48619e674e0d7134bb4070a36455055943745917
kernel-xen-debuginfo-2.6.18-348.25.1.el5.ia64.rpm SHA-256: b68070fe768ea589ee17b95972e95e52352b82a49e5f1a98d9a563bd8d9224de
kernel-xen-devel-2.6.18-348.25.1.el5.ia64.rpm SHA-256: 3da5a552add56939e072793693054d5113a5bd8da0b85ccfe31a9fa9a3804d23
i386
kernel-2.6.18-348.25.1.el5.i686.rpm SHA-256: 5ba83034f67adb8b4782a98072e8467e6861d8a82c45205c4fb0979acc533537
kernel-PAE-2.6.18-348.25.1.el5.i686.rpm SHA-256: caaa61fd7fe4a616aea3ff3e448c0fa0c0b24dd1a31d94120df754ac0ec41f00
kernel-PAE-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: 52ec4da66fb85360393bb6cacca8a22c5289622414a731f4ae346e35d880f53b
kernel-PAE-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: d4994a2ea2d5d5c7ebc6564294b28ea44d70eb33855993e728ed181d1ec68888
kernel-debug-2.6.18-348.25.1.el5.i686.rpm SHA-256: 5e0294fa207eae46c57f4baaba05816b01887624b61406b9abcc7016f40d70ed
kernel-debug-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: b763584607ff8ca19089513e4f5f1e9faa3173ad9b6c94e9b0ff2eaa552daa5d
kernel-debug-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: bdf76137cd5a847f71b8c97552a8b16a0cfa6ceb8dfd0539ac2013e08417bb69
kernel-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: d748ea731b4f8ed28147ed56446c0cbf0769f0309c0c91a7c92f7ebd405a3e84
kernel-debuginfo-common-2.6.18-348.25.1.el5.i686.rpm SHA-256: 27a6f719caa3657eab37941e19dec73bb9f5463f8a1fc3ea265e084ee3890b25
kernel-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: 1b7231aa1f9267905784b053d01e2a3866c13e838eb44e577e119f9a69e3f6e8
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.i386.rpm SHA-256: 002d0a4ebfb2dd923c71b2894adc04661e7975f8d72f6aaa2257fb1b4ef1e0cd
kernel-xen-2.6.18-348.25.1.el5.i686.rpm SHA-256: e2388936a6b3b3bbeaecdd24b08cb55861f4eabca15c7cd0df5c78eeb4ed0250
kernel-xen-debuginfo-2.6.18-348.25.1.el5.i686.rpm SHA-256: 8c7d51a4f1b8ca79c0819646f11b119f3f8d6d999664f4d1b9841037ecf5f608
kernel-xen-devel-2.6.18-348.25.1.el5.i686.rpm SHA-256: d64f0b4b2cd0a9d285ad77af01c74fdea963d4743255512c8a6494e14ba84884

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.25.1.el5.src.rpm SHA-256: d02915088acddad9189cf89a7916bc3997362aa745da652f23319c5443b2a720
s390x
kernel-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 150c9df49401a179aeba531e71bc4927ac485b1d5a847d1ae8397ade0b6280a1
kernel-debug-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 070614da6b29b763659666864e14164eb793a0c34107e8d31179873f396e53f5
kernel-debug-debuginfo-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 8b388586ef857869a72e08f11a942eb83f84c62b633dabe70f848e26e12fb1ba
kernel-debug-devel-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 9794ea14d202bb868d66ad516f6e36b18fe744d83e8769efe0248af4b4c91244
kernel-debuginfo-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 78b05ac094bfd69a506a329a92c896ef6fd16469f2e0308eccbb168548558c9c
kernel-debuginfo-common-2.6.18-348.25.1.el5.s390x.rpm SHA-256: fa36ae3eeb87b29a0ce10724a25690322f16b9564ea599b3948438155c6ad357
kernel-devel-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 1eb870d4232fb3d54aa8d3a544ee3c8720c48c215e090ecbeba0d46f3e287abc
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 1dd6554964e6e824339748e46a70a76de4407b7b4a769412bacb2478f0c57f86
kernel-kdump-2.6.18-348.25.1.el5.s390x.rpm SHA-256: ac2806a28433e754c79fe63ad0bbd7ec7195bd70648373467ef5c6032b4f4992
kernel-kdump-debuginfo-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 857cc3a818eb390176fb7b026b8f4094d1c5edc96d8f399eabeab8468da5bfc6
kernel-kdump-devel-2.6.18-348.25.1.el5.s390x.rpm SHA-256: 7f4b7c56397ce8d0f6033c554f9564471560035947c9513cc7f508a674b3eff5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.25.1.el5.src.rpm SHA-256: d02915088acddad9189cf89a7916bc3997362aa745da652f23319c5443b2a720
ppc
kernel-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: 17a56424bdfaebc41319a26bf30acee900d5cd8ae1d2adc0ce27c97c01185cca
kernel-debug-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: 47669bae16e846657ede241e891aababb8c9e52127ba1a7334243711eae6c8e2
kernel-debug-debuginfo-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: dde9deaad194412a3e601f512b9b6d89d0611f7d8a48b7e6a000b13fb70abab1
kernel-debug-devel-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: e6c1781219e5a3d302d4e28dc629557c948f69afab28967e0c73a52ddb0568c8
kernel-debuginfo-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: dabda12057010a5832ddf0e04cd4ddb994319fcf82e9e182d0bf0f6b2b6853ff
kernel-debuginfo-common-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: 937c67abe677ea3cbf65b4a5851c68b255a3bb1a1a960eb637624f30f1c91d2d
kernel-devel-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: 3a7bc1f7252c91dc6ffeb2839c8f09ebcc422202aff5b4a868de0931e79ad547
kernel-doc-2.6.18-348.25.1.el5.noarch.rpm SHA-256: 47674b525a48ad124ff60e8a72e8a9a827d4049e0aa35a086d7330652c421242
kernel-headers-2.6.18-348.25.1.el5.ppc.rpm SHA-256: 7415841dde495790bacb74271d0deb97b5338f60bdaf6562493df2137b6a87f0
kernel-headers-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: 4ab1c5898960bc0d113ef0f40c5a4603cd2101539a748c4a090af7a83386a76f
kernel-kdump-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: 8f5a9379d7f2c6e32372631da28cdcc636f8dfa4463de6bd5f48438f23cf7cc9
kernel-kdump-debuginfo-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: 1c206f17b9b031e3993228bbc5e7f1c110097b05cbdd6dda304b4ef25a1a7be0
kernel-kdump-devel-2.6.18-348.25.1.el5.ppc64.rpm SHA-256: 328cbe9acbcd7732b4348800ad3f27a884b63e4db9c4d81f72448dd2e364b0e1

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter