Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:0772 - Security Advisory
Issued:
2014-06-19
Updated:
2014-06-19

RHSA-2014:0772 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix three security issues and two bugs are now
available for Red Hat Enterprise Linux 5.9 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A flaw was found in the way the Linux kernel's floppy driver handled user

space provided data in certain error code paths while processing FDRAWCMD
IOCTL commands. A local user with write access to /dev/fdX could use this
flaw to free (using the kfree() function) arbitrary kernel memory.
(CVE-2014-1737, Important)

  • It was found that the Linux kernel's floppy driver leaked internal kernel

memory addresses to user space during the processing of the FDRAWCMD IOCTL
command. A local user with write access to /dev/fdX could use this flaw to
obtain information about the kernel heap arrangement. (CVE-2014-1738, Low)

Note: A local user with write access to /dev/fdX could use these two flaws
(CVE-2014-1737 in combination with CVE-2014-1738) to escalate their
privileges on the system.

  • A flaw was found in the way the Linux kernel's TCP/IP protocol suite

implementation handled TCP packets with both the SYN and FIN flags set.
A remote attacker could use this flaw to consume an excessive amount of
resources on the target system, potentially resulting in a denial of
service. (CVE-2012-6638, Moderate)

Red Hat would like to thank Matthew Daley for reporting CVE-2014-1737 and
CVE-2014-1738.

This update also fixes the following bugs:

  • While under heavy load, some Fibre Channel storage devices, such as

Hitachi and HP Open-V series, can send a logout (LOGO) message to the host
system. However, due to a bug in the lpfc driver, this could result in a
loss of active paths to the storage and the paths could not be recovered
without manual intervention. This update corrects the lpfc driver to ensure
automatic recovery of the lost paths to the storage in this scenario.
(BZ#1096060)

  • A bug in the futex system call could result in an overflow when passing a

very large positive timeout. As a consequence, the FUTEX_WAIT operation did
not work as intended and the system call was timing out immediately.
A backported patch fixes this bug by limiting very large positive timeouts
to the maximal supported value. (BZ#1091831)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 i386

Fixes

  • BZ - 1066055 - CVE-2012-6638 Kernel: net: tcp: potential DoS via SYN+FIN messages
  • BZ - 1094299 - CVE-2014-1737 CVE-2014-1738 kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command

CVEs

  • CVE-2012-6638
  • CVE-2014-1737
  • CVE-2014-1738

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.27.1.el5.src.rpm SHA-256: 52f7c078bd5f2f6d26b965b67eb8342db084bd2348f28438b6f0b17971709993
x86_64
kernel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 5ffbe7a5ccd58a403035d74e24f532f89219d9811a33ff01ce3021570b5299c8
kernel-debug-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 77cd1c80d21859b221b9fb42c272ffb9c6944a32bf58bf2d00a1d1f3c8cea4fa
kernel-debug-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: f4d11f444c95fa4535ab5264d1bcef8ace396de4118ae95030589cbabce04405
kernel-debug-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 2aedf4025ac8b687b3d2f4d536e7ad6fdf27cebda82d4913575a77f812ee97f1
kernel-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 45fa9e7cfa876d3b6a3bc1b17cdd89b341897d86e353d78affcbb22b66dc2f42
kernel-debuginfo-common-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 38f7250c845cef060ec00ebf4c05d67ae1293ef7c87be21a4f6e5dc83e3f3ab6
kernel-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 14d2dd171287cc066ce17a036fd8b3158ce2ec088965520e31d284bb7153041c
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 53f135cc26fe1bb9352234e35436c8ed5466ef36a1607aaa7f11a3609e0f26aa
kernel-xen-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 85735ab4e717b0d280c9f7804c2f024afccc3f54a25a2a21f7d7f173d6f88c3f
kernel-xen-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: aec699c019720c2ccf45da36cf86f0ed77a4cf3e96e6ba0ac3ebdda03dc18b92
kernel-xen-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 57d6d03269ad4ee9b92fc748b3cd19ee9975f3fe9839c8426618f6807f4f71b8
ia64
kernel-2.6.18-348.27.1.el5.ia64.rpm SHA-256: f4ce933c7700c01d664f0ca105c30324f85219ef5fc7bd7d3c0b4e711dcbf91f
kernel-debug-2.6.18-348.27.1.el5.ia64.rpm SHA-256: b60c238fa6648ebca91e1f56157dc494beeaae187a04a0ad2e779bfafbbea9d8
kernel-debug-debuginfo-2.6.18-348.27.1.el5.ia64.rpm SHA-256: e9cb21c623004b178ee2ca07e37eb1b001a9d682714a8d956668a2fc08aa0fbc
kernel-debug-devel-2.6.18-348.27.1.el5.ia64.rpm SHA-256: bdae2fee618d7dea7b75c3d3c10b55f222aacd4a418fb1e3daa7a6853af313ae
kernel-debuginfo-2.6.18-348.27.1.el5.ia64.rpm SHA-256: 0d4697c8aa5e66e7f796757958acc043a50eada582d82d99b70396e9d47dc9b9
kernel-debuginfo-common-2.6.18-348.27.1.el5.ia64.rpm SHA-256: 337ed1b03227c38994dafb15fbb6cd07923a3a8832b0d71e9b41dae2f95b8c0c
kernel-devel-2.6.18-348.27.1.el5.ia64.rpm SHA-256: f34fa397b6ac73bb5abddbd00e84eb2dfa9e993d557cae84baeebd7451d10bdc
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.ia64.rpm SHA-256: 70e1ec90ae9d09a1e319bf5ebb36223ad407fc68f2ffd9793d71a2d3c9c1d71d
kernel-xen-2.6.18-348.27.1.el5.ia64.rpm SHA-256: ebb2d49aaf7e949e638dc68735bb8998d2b5773fdab454647e6a8c428ee0cce7
kernel-xen-debuginfo-2.6.18-348.27.1.el5.ia64.rpm SHA-256: 38f369b65df134cc97471ed82f6dd5f728f217354778f9b82e13d2e8e34323ce
kernel-xen-devel-2.6.18-348.27.1.el5.ia64.rpm SHA-256: ab2ecc474461aebd8905ace2fe473e3d008f8cf083589adef579545fef7dca0a
i386
kernel-2.6.18-348.27.1.el5.i686.rpm SHA-256: c037cb03ffafbe5806adbae6f65736ac0ccb3e12eb1b4abf22051f175cffb93a
kernel-PAE-2.6.18-348.27.1.el5.i686.rpm SHA-256: 4afe5f86194722aaac9542c7bfde28578c9e57d85e5507bbbf1f846cbf56e058
kernel-PAE-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 054c9e61c783c5c5ab27a34b8685d05e3ea4ab3b63701a5e9f6366fcc58a6968
kernel-PAE-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: be52d5d09c82f6fbec770b3e53c2be01373b3982776b3bd8292b18baf43aa4f9
kernel-debug-2.6.18-348.27.1.el5.i686.rpm SHA-256: 0362d00e6aa3580ebdfb5636c624f9f6142ae247aaf6a4d8bfedb018d97d2219
kernel-debug-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 2eb3893ca2180630b14285438d407329069f96c2c20a36a5a71f369cbd311a6e
kernel-debug-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 9463b53bbb11ab41d55812d202ebac5e0b322a52ac6b197d6a1bc35f1a23f7e9
kernel-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 3c702ade555870326567d495bbd7f818837d6f33d3aec49b3a56d104d57e0887
kernel-debuginfo-common-2.6.18-348.27.1.el5.i686.rpm SHA-256: 8d05cc8c504d83b0746645101c1458b83d0eb1fdec5def11c3b7616dc9806292
kernel-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 7b4db69ac615a37e487eccb4ec686e4fb76ac876418ae6e50b08d17ef13f61ca
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.i386.rpm SHA-256: 42cd6d798a12a7acd1b803cf262b7c88da08a92af28dc076868adf4ea9dea950
kernel-xen-2.6.18-348.27.1.el5.i686.rpm SHA-256: d255c3895b14a6d88fadd9f610ae1adcee1105377255b2bf28b6dc836d11b8c7
kernel-xen-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 3e1269e024e0029b4b0a59393e516b4a56e6ae594ab20ba2419066be66be889e
kernel-xen-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 41cca215ccddda57a3696f7efd8b437b5439c3faf0dfa55f0d94066da7757b35

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
kernel-2.6.18-348.27.1.el5.src.rpm SHA-256: 52f7c078bd5f2f6d26b965b67eb8342db084bd2348f28438b6f0b17971709993
ia64
kernel-2.6.18-348.27.1.el5.ia64.rpm SHA-256: f4ce933c7700c01d664f0ca105c30324f85219ef5fc7bd7d3c0b4e711dcbf91f
kernel-debug-2.6.18-348.27.1.el5.ia64.rpm SHA-256: b60c238fa6648ebca91e1f56157dc494beeaae187a04a0ad2e779bfafbbea9d8
kernel-debug-debuginfo-2.6.18-348.27.1.el5.ia64.rpm SHA-256: e9cb21c623004b178ee2ca07e37eb1b001a9d682714a8d956668a2fc08aa0fbc
kernel-debug-devel-2.6.18-348.27.1.el5.ia64.rpm SHA-256: bdae2fee618d7dea7b75c3d3c10b55f222aacd4a418fb1e3daa7a6853af313ae
kernel-debuginfo-2.6.18-348.27.1.el5.ia64.rpm SHA-256: 0d4697c8aa5e66e7f796757958acc043a50eada582d82d99b70396e9d47dc9b9
kernel-debuginfo-common-2.6.18-348.27.1.el5.ia64.rpm SHA-256: 337ed1b03227c38994dafb15fbb6cd07923a3a8832b0d71e9b41dae2f95b8c0c
kernel-devel-2.6.18-348.27.1.el5.ia64.rpm SHA-256: f34fa397b6ac73bb5abddbd00e84eb2dfa9e993d557cae84baeebd7451d10bdc
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.ia64.rpm SHA-256: 70e1ec90ae9d09a1e319bf5ebb36223ad407fc68f2ffd9793d71a2d3c9c1d71d
kernel-xen-2.6.18-348.27.1.el5.ia64.rpm SHA-256: ebb2d49aaf7e949e638dc68735bb8998d2b5773fdab454647e6a8c428ee0cce7
kernel-xen-debuginfo-2.6.18-348.27.1.el5.ia64.rpm SHA-256: 38f369b65df134cc97471ed82f6dd5f728f217354778f9b82e13d2e8e34323ce
kernel-xen-devel-2.6.18-348.27.1.el5.ia64.rpm SHA-256: ab2ecc474461aebd8905ace2fe473e3d008f8cf083589adef579545fef7dca0a
i386
kernel-2.6.18-348.27.1.el5.i686.rpm SHA-256: c037cb03ffafbe5806adbae6f65736ac0ccb3e12eb1b4abf22051f175cffb93a
kernel-PAE-2.6.18-348.27.1.el5.i686.rpm SHA-256: 4afe5f86194722aaac9542c7bfde28578c9e57d85e5507bbbf1f846cbf56e058
kernel-PAE-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 054c9e61c783c5c5ab27a34b8685d05e3ea4ab3b63701a5e9f6366fcc58a6968
kernel-PAE-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: be52d5d09c82f6fbec770b3e53c2be01373b3982776b3bd8292b18baf43aa4f9
kernel-debug-2.6.18-348.27.1.el5.i686.rpm SHA-256: 0362d00e6aa3580ebdfb5636c624f9f6142ae247aaf6a4d8bfedb018d97d2219
kernel-debug-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 2eb3893ca2180630b14285438d407329069f96c2c20a36a5a71f369cbd311a6e
kernel-debug-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 9463b53bbb11ab41d55812d202ebac5e0b322a52ac6b197d6a1bc35f1a23f7e9
kernel-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 3c702ade555870326567d495bbd7f818837d6f33d3aec49b3a56d104d57e0887
kernel-debuginfo-common-2.6.18-348.27.1.el5.i686.rpm SHA-256: 8d05cc8c504d83b0746645101c1458b83d0eb1fdec5def11c3b7616dc9806292
kernel-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 7b4db69ac615a37e487eccb4ec686e4fb76ac876418ae6e50b08d17ef13f61ca
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.i386.rpm SHA-256: 42cd6d798a12a7acd1b803cf262b7c88da08a92af28dc076868adf4ea9dea950
kernel-xen-2.6.18-348.27.1.el5.i686.rpm SHA-256: d255c3895b14a6d88fadd9f610ae1adcee1105377255b2bf28b6dc836d11b8c7
kernel-xen-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 3e1269e024e0029b4b0a59393e516b4a56e6ae594ab20ba2419066be66be889e
kernel-xen-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 41cca215ccddda57a3696f7efd8b437b5439c3faf0dfa55f0d94066da7757b35
x86_64
kernel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 5ffbe7a5ccd58a403035d74e24f532f89219d9811a33ff01ce3021570b5299c8
kernel-debug-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 77cd1c80d21859b221b9fb42c272ffb9c6944a32bf58bf2d00a1d1f3c8cea4fa
kernel-debug-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: f4d11f444c95fa4535ab5264d1bcef8ace396de4118ae95030589cbabce04405
kernel-debug-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 2aedf4025ac8b687b3d2f4d536e7ad6fdf27cebda82d4913575a77f812ee97f1
kernel-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 45fa9e7cfa876d3b6a3bc1b17cdd89b341897d86e353d78affcbb22b66dc2f42
kernel-debuginfo-common-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 38f7250c845cef060ec00ebf4c05d67ae1293ef7c87be21a4f6e5dc83e3f3ab6
kernel-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 14d2dd171287cc066ce17a036fd8b3158ce2ec088965520e31d284bb7153041c
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 53f135cc26fe1bb9352234e35436c8ed5466ef36a1607aaa7f11a3609e0f26aa
kernel-xen-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 85735ab4e717b0d280c9f7804c2f024afccc3f54a25a2a21f7d7f173d6f88c3f
kernel-xen-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: aec699c019720c2ccf45da36cf86f0ed77a4cf3e96e6ba0ac3ebdda03dc18b92
kernel-xen-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 57d6d03269ad4ee9b92fc748b3cd19ee9975f3fe9839c8426618f6807f4f71b8

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.27.1.el5.src.rpm SHA-256: 52f7c078bd5f2f6d26b965b67eb8342db084bd2348f28438b6f0b17971709993
s390x
kernel-2.6.18-348.27.1.el5.s390x.rpm SHA-256: 679e5a4dbae6e08546ebd3fcbbe4ae955044df1683061692763042315dac36cd
kernel-debug-2.6.18-348.27.1.el5.s390x.rpm SHA-256: 130cbbdc6bbfb78217c06875532480a91638706a90bc32e0f2d4e08e55560a8a
kernel-debug-debuginfo-2.6.18-348.27.1.el5.s390x.rpm SHA-256: b7e27dec5d3ada32074fd11f2935406b2b0ff244a5036a668e09932f22019f1d
kernel-debug-devel-2.6.18-348.27.1.el5.s390x.rpm SHA-256: 0e3c369956eb5e735029b140e12ae67d2bdda58cdee586cd53438c9fc6c705a0
kernel-debuginfo-2.6.18-348.27.1.el5.s390x.rpm SHA-256: 4caf31b2248f656976204df3b95f64d9423aecdb75adce4368caa3eae53ac085
kernel-debuginfo-common-2.6.18-348.27.1.el5.s390x.rpm SHA-256: b6dc759a5d963b0db405385e87e33ff466d6714b84e845bd74b801065f6b3a64
kernel-devel-2.6.18-348.27.1.el5.s390x.rpm SHA-256: dfafa383f42d727037d4aa64a79fd97c89b7bf097b9d0c678ec4e6f0af10db19
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.s390x.rpm SHA-256: 043d8afac73a854adcaf3c9893542f0151fbbb5df39e12b19afde289aec1d1f9
kernel-kdump-2.6.18-348.27.1.el5.s390x.rpm SHA-256: 29d70c2df3575fafa85c1fec6ed347fe0cd8f2387a7e3d6b3c3bac887fdf56f5
kernel-kdump-debuginfo-2.6.18-348.27.1.el5.s390x.rpm SHA-256: d3ebce124c006f57b7458b1467a359556d6503d939ea4842b3e0256545b16669
kernel-kdump-devel-2.6.18-348.27.1.el5.s390x.rpm SHA-256: f4a8a4f3715e635ddd4fb617b1f856f680d1ea72efc394aeb8824e4aa5216b8d

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
kernel-2.6.18-348.27.1.el5.src.rpm SHA-256: 52f7c078bd5f2f6d26b965b67eb8342db084bd2348f28438b6f0b17971709993
ppc
kernel-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 24ec1aface472554eb6112539de032cd3ca8a2cc16e64fe23359bc7cb0e22f65
kernel-debug-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 0de094568ce1b90e4feba397d0d5d6cfa69105a3cd92b513a8be958b137214eb
kernel-debug-debuginfo-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: c9869b72cb8024acab5331b186051044dd6f1c4963a705da44fc0194d7e2a6cc
kernel-debug-devel-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 1055e7c33c1669fb2017962a0c1326ece2a5cc5c57f79f7b111f36b4fa924603
kernel-debuginfo-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 2a4c75ec35a353317252cff9abec8a3952aaa2a022cd046f8a3356bcbc589c45
kernel-debuginfo-common-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 9d005ff7ac3640b39d8f5cdd03bdb2472ce9aeaf2677beba900991de7b8f7712
kernel-devel-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: b324e00cd6fbc66416e985ebb44fbe3d401f212bde574326884cb8fc03ec42a8
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.ppc.rpm SHA-256: c41669aabc4c272553996fcf3d402c0445818f2b7497b913855886fa7b42617e
kernel-headers-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 0aa61ee33574bc56b41cc431e8ee043e976dcd13bd623f2bd3a3a1a64a230862
kernel-kdump-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 456e46429e48598174c4180a91c57387705b112a01e027405abc9d0b063357c0
kernel-kdump-debuginfo-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 3d5934e91d5d0921707d7d96f1ab4664fa71136de8152b3d857f110f96ce0613
kernel-kdump-devel-2.6.18-348.27.1.el5.ppc64.rpm SHA-256: 3d8f5a8592fce3a4665a35e1490d01bd8c10b6169e9aa389e0eff64099c3b780

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
kernel-2.6.18-348.27.1.el5.src.rpm SHA-256: 52f7c078bd5f2f6d26b965b67eb8342db084bd2348f28438b6f0b17971709993
x86_64
kernel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 5ffbe7a5ccd58a403035d74e24f532f89219d9811a33ff01ce3021570b5299c8
kernel-debug-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 77cd1c80d21859b221b9fb42c272ffb9c6944a32bf58bf2d00a1d1f3c8cea4fa
kernel-debug-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: f4d11f444c95fa4535ab5264d1bcef8ace396de4118ae95030589cbabce04405
kernel-debug-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 2aedf4025ac8b687b3d2f4d536e7ad6fdf27cebda82d4913575a77f812ee97f1
kernel-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 45fa9e7cfa876d3b6a3bc1b17cdd89b341897d86e353d78affcbb22b66dc2f42
kernel-debuginfo-common-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 38f7250c845cef060ec00ebf4c05d67ae1293ef7c87be21a4f6e5dc83e3f3ab6
kernel-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 14d2dd171287cc066ce17a036fd8b3158ce2ec088965520e31d284bb7153041c
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 53f135cc26fe1bb9352234e35436c8ed5466ef36a1607aaa7f11a3609e0f26aa
kernel-xen-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 85735ab4e717b0d280c9f7804c2f024afccc3f54a25a2a21f7d7f173d6f88c3f
kernel-xen-debuginfo-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: aec699c019720c2ccf45da36cf86f0ed77a4cf3e96e6ba0ac3ebdda03dc18b92
kernel-xen-devel-2.6.18-348.27.1.el5.x86_64.rpm SHA-256: 57d6d03269ad4ee9b92fc748b3cd19ee9975f3fe9839c8426618f6807f4f71b8
i386
kernel-2.6.18-348.27.1.el5.i686.rpm SHA-256: c037cb03ffafbe5806adbae6f65736ac0ccb3e12eb1b4abf22051f175cffb93a
kernel-PAE-2.6.18-348.27.1.el5.i686.rpm SHA-256: 4afe5f86194722aaac9542c7bfde28578c9e57d85e5507bbbf1f846cbf56e058
kernel-PAE-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 054c9e61c783c5c5ab27a34b8685d05e3ea4ab3b63701a5e9f6366fcc58a6968
kernel-PAE-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: be52d5d09c82f6fbec770b3e53c2be01373b3982776b3bd8292b18baf43aa4f9
kernel-debug-2.6.18-348.27.1.el5.i686.rpm SHA-256: 0362d00e6aa3580ebdfb5636c624f9f6142ae247aaf6a4d8bfedb018d97d2219
kernel-debug-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 2eb3893ca2180630b14285438d407329069f96c2c20a36a5a71f369cbd311a6e
kernel-debug-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 9463b53bbb11ab41d55812d202ebac5e0b322a52ac6b197d6a1bc35f1a23f7e9
kernel-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 3c702ade555870326567d495bbd7f818837d6f33d3aec49b3a56d104d57e0887
kernel-debuginfo-common-2.6.18-348.27.1.el5.i686.rpm SHA-256: 8d05cc8c504d83b0746645101c1458b83d0eb1fdec5def11c3b7616dc9806292
kernel-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 7b4db69ac615a37e487eccb4ec686e4fb76ac876418ae6e50b08d17ef13f61ca
kernel-doc-2.6.18-348.27.1.el5.noarch.rpm SHA-256: b307fdd0f71f6a327db43a286f00ca92ef732cc550c729a55da386a958d2420d
kernel-headers-2.6.18-348.27.1.el5.i386.rpm SHA-256: 42cd6d798a12a7acd1b803cf262b7c88da08a92af28dc076868adf4ea9dea950
kernel-xen-2.6.18-348.27.1.el5.i686.rpm SHA-256: d255c3895b14a6d88fadd9f610ae1adcee1105377255b2bf28b6dc836d11b8c7
kernel-xen-debuginfo-2.6.18-348.27.1.el5.i686.rpm SHA-256: 3e1269e024e0029b4b0a59393e516b4a56e6ae594ab20ba2419066be66be889e
kernel-xen-devel-2.6.18-348.27.1.el5.i686.rpm SHA-256: 41cca215ccddda57a3696f7efd8b437b5439c3faf0dfa55f0d94066da7757b35

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter