Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:1143 - Security Advisory
Issued:
2014-09-03
Updated:
2014-09-03

RHSA-2014:1143 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • An out-of-bounds memory access flaw was found in the Linux kernel's

system call auditing implementation. On a system with existing audit rules
defined, a local, unprivileged user could use this flaw to leak kernel
memory to user space or, potentially, crash the system. (CVE-2014-3917,
Moderate)

This update also fixes the following bugs:

  • A bug in the journaling code (jbd and jbd2) could, under very heavy

workload of fsync() operations, trigger a BUG_ON and result in a kernel
oops. Also, fdatasync() could fail to immediately write out changes in the
file size only. These problems have been resolved by backporting a series
of patches that fixed these problems in the respective code on Red Hat
Enterprise Linux 6. This update also improves performance of ext3 and ext4
file systems. (BZ#1116027)

  • Due to a bug in the ext4 code, the fdatasync() system call did not force

the inode size change to be written to the disk if it was the only metadata
change in the file. This could result in the wrong inode size and possible
data loss if the system terminated unexpectedly. The code handling inode
updates has been fixed and fdatasync() now writes data to the disk as
expected in this situation. (BZ#1117665)

  • A workaround to a DMA read problem in the tg3 driver was incorrectly

applied to the whole Broadcom 5719 and 5720 chipset family. This workaround
is valid only to the A0 revision of the 5719 chips and for other revisions
and chips causes occasional Tx timeouts. This update correctly applies the
aforementioned workaround only to the A0 revision of the 5719 chips.
(BZ#1121017)

  • Due to a bug in the page writeback code, the system could become

unresponsive when being under memory pressure and heavy NFS load. This
update fixes the code responsible for handling of dirty pages, and dirty
page write outs no longer flood the work queue. (BZ#1125246)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1102571 - CVE-2014-3917 kernel: DoS with syscall auditing

CVEs

  • CVE-2014-3917

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-371.12.1.el5.src.rpm SHA-256: 8ccb4583755c55c6964de8f386ec88b6656642383ef60df654b9d633a27152ab
x86_64
kernel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 1617e73f7d3d1e615f3a7552c0421d1522f4f8dcc725437a5a2e0866bda1e744
kernel-debug-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 054c89125de5de63bd78944842263170be3e7e483cd7fa73fb0550d4d3fba409
kernel-debug-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: eca948e8945063cfb461e0df83bec27ba11763fd144481dae1a900f05dfbb590
kernel-debug-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: f75206513a3259c78b85f5217a8693d6decc0360776523f81f81e1a08ceeeca3
kernel-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: dc294ae6cc7bdf86e35d877ace7ebad3bd23b4243c50dd19e161164da5807a45
kernel-debuginfo-common-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 83406e1a576bebf169cad06787ec191c257e7d2ec6416f1b032b9309b7655b3d
kernel-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 97834f31c3417e5a9eee6408a69093de875760a7d29364b3fde5702fc0b94dff
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: ee036bc3023860026724b68a355d63699581fc3a64ff189b7b86377d71d8d78d
kernel-xen-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 2ceb533a30f3e0e888b0c7012d244252bf2433d2d7d687429173a404ef8c5ab4
kernel-xen-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: d63500e3dc1f7ca9b6d6076cf051aab16f0eccf252db2c6752ac00821ad92d27
kernel-xen-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: ada88d5e30548776394474c1a743f0e07de369bcc98bd0ce147fbce925402451
ia64
kernel-2.6.18-371.12.1.el5.ia64.rpm SHA-256: 622ec62ece73a5215f4b7e03584eeb76ae1c9edaf1214b46e78a69c562dc342f
kernel-debug-2.6.18-371.12.1.el5.ia64.rpm SHA-256: ecd1c0101480263296e45fe87818ef2effd9f22e11c17b95cb9e23a4754d33ad
kernel-debug-debuginfo-2.6.18-371.12.1.el5.ia64.rpm SHA-256: d6bbe7c5a2499bdda2e710cea7738cb12edb5ff289c8dd4f366306a2e9a8058b
kernel-debug-devel-2.6.18-371.12.1.el5.ia64.rpm SHA-256: ad1c018cf17db159251ddfa5edaedb91509bbdb73d00fc651aeb2b1a3d0474b0
kernel-debuginfo-2.6.18-371.12.1.el5.ia64.rpm SHA-256: a5949e3f65b5fcc2547b70e9c57c8f3d0d26aa13a21f9b6e6f13a0473200147e
kernel-debuginfo-common-2.6.18-371.12.1.el5.ia64.rpm SHA-256: d8483532e7fce14b994f71fef5c3ff8193093942c9789031b95a7731b9cb8ea5
kernel-devel-2.6.18-371.12.1.el5.ia64.rpm SHA-256: c7c1a71935d4fe2966a7abe0834d0d481c918c396925f4a3441a716e94d8b99b
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.ia64.rpm SHA-256: 860ab47a3cf8923f33c9473d229c69fe9aeab0b8fd3ee2f5d7fdcf7cfaf6f7b3
kernel-xen-2.6.18-371.12.1.el5.ia64.rpm SHA-256: 28d7a17e3478ce2922e92f1197947f1b993a83dec39ff11e06c58ed3843b033f
kernel-xen-debuginfo-2.6.18-371.12.1.el5.ia64.rpm SHA-256: 350b398f3804b4c09ab5d2f43493ce39b27b0ee94be90857243692cc694f2dd2
kernel-xen-devel-2.6.18-371.12.1.el5.ia64.rpm SHA-256: de2e9bf7d18185cb817670ef48c5b67c97ddaaf1b6727dd272345953bd85dc28
i386
kernel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 3eb812b8f29960630c0e3763fc5be80dd9e86620fd498f4c6c74b4c4318fc203
kernel-PAE-2.6.18-371.12.1.el5.i686.rpm SHA-256: 24f4dee6b23200dc13c33c70df89a2b9281d1d8809db128f01456921902d8d6b
kernel-PAE-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: a1c9e584d857772a7e50d0b9417bd91edc188c9106a21b84fc3bb4d8af3723e9
kernel-PAE-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 87103e442ccd6a421a1c0d780e1632d5845db1325f51b40585e4e7a1faeb20b0
kernel-debug-2.6.18-371.12.1.el5.i686.rpm SHA-256: 204f9e70eae7f8702502fad6f3ff3320199b2efd561a85b1fb3481ad2e97debc
kernel-debug-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: c6a179394adeaab54fa72664689e12739e33691d57006d06e9e49eab6f438de6
kernel-debug-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 2abcecf7d6c8bd60519e7e0b6f82a802924c28b387a463e2187691e93aeb70ca
kernel-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: 8d2eb96239e33844197e52b34f5a8d28496e96058f56090fd5c1b2bd983f63f4
kernel-debuginfo-common-2.6.18-371.12.1.el5.i686.rpm SHA-256: 28e7c6430a9076a717db2db262cfd653726c5c18095073d4db4ebefcce156d39
kernel-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: bb79f8734639a0fd0eb8ba2681ac60c48b6ac7819631b9386b556de43da4b141
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.i386.rpm SHA-256: 5de57cc593fb77c802b58dd42aabf677424f285d5fa78d69e4aa3bfe6e79b97a
kernel-xen-2.6.18-371.12.1.el5.i686.rpm SHA-256: 1cf53ba9536a9963ef5f4fe5205e7b40102f94597582ec88fa06eedcc6dc5d7b
kernel-xen-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: 1ee2b55a958d9bde0d3c5b0b6bb8c0eb53abb92d0cda4714bfa45ce087e58626
kernel-xen-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: b399bed986e42018706c3a1eb50fec72e9501e1bb68fa5999bf9b5b9fd936d46

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-371.12.1.el5.src.rpm SHA-256: 8ccb4583755c55c6964de8f386ec88b6656642383ef60df654b9d633a27152ab
x86_64
kernel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 1617e73f7d3d1e615f3a7552c0421d1522f4f8dcc725437a5a2e0866bda1e744
kernel-debug-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 054c89125de5de63bd78944842263170be3e7e483cd7fa73fb0550d4d3fba409
kernel-debug-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: eca948e8945063cfb461e0df83bec27ba11763fd144481dae1a900f05dfbb590
kernel-debug-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: f75206513a3259c78b85f5217a8693d6decc0360776523f81f81e1a08ceeeca3
kernel-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: dc294ae6cc7bdf86e35d877ace7ebad3bd23b4243c50dd19e161164da5807a45
kernel-debuginfo-common-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 83406e1a576bebf169cad06787ec191c257e7d2ec6416f1b032b9309b7655b3d
kernel-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 97834f31c3417e5a9eee6408a69093de875760a7d29364b3fde5702fc0b94dff
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: ee036bc3023860026724b68a355d63699581fc3a64ff189b7b86377d71d8d78d
kernel-xen-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 2ceb533a30f3e0e888b0c7012d244252bf2433d2d7d687429173a404ef8c5ab4
kernel-xen-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: d63500e3dc1f7ca9b6d6076cf051aab16f0eccf252db2c6752ac00821ad92d27
kernel-xen-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: ada88d5e30548776394474c1a743f0e07de369bcc98bd0ce147fbce925402451
i386
kernel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 3eb812b8f29960630c0e3763fc5be80dd9e86620fd498f4c6c74b4c4318fc203
kernel-PAE-2.6.18-371.12.1.el5.i686.rpm SHA-256: 24f4dee6b23200dc13c33c70df89a2b9281d1d8809db128f01456921902d8d6b
kernel-PAE-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: a1c9e584d857772a7e50d0b9417bd91edc188c9106a21b84fc3bb4d8af3723e9
kernel-PAE-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 87103e442ccd6a421a1c0d780e1632d5845db1325f51b40585e4e7a1faeb20b0
kernel-debug-2.6.18-371.12.1.el5.i686.rpm SHA-256: 204f9e70eae7f8702502fad6f3ff3320199b2efd561a85b1fb3481ad2e97debc
kernel-debug-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: c6a179394adeaab54fa72664689e12739e33691d57006d06e9e49eab6f438de6
kernel-debug-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 2abcecf7d6c8bd60519e7e0b6f82a802924c28b387a463e2187691e93aeb70ca
kernel-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: 8d2eb96239e33844197e52b34f5a8d28496e96058f56090fd5c1b2bd983f63f4
kernel-debuginfo-common-2.6.18-371.12.1.el5.i686.rpm SHA-256: 28e7c6430a9076a717db2db262cfd653726c5c18095073d4db4ebefcce156d39
kernel-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: bb79f8734639a0fd0eb8ba2681ac60c48b6ac7819631b9386b556de43da4b141
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.i386.rpm SHA-256: 5de57cc593fb77c802b58dd42aabf677424f285d5fa78d69e4aa3bfe6e79b97a
kernel-xen-2.6.18-371.12.1.el5.i686.rpm SHA-256: 1cf53ba9536a9963ef5f4fe5205e7b40102f94597582ec88fa06eedcc6dc5d7b
kernel-xen-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: 1ee2b55a958d9bde0d3c5b0b6bb8c0eb53abb92d0cda4714bfa45ce087e58626
kernel-xen-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: b399bed986e42018706c3a1eb50fec72e9501e1bb68fa5999bf9b5b9fd936d46

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-371.12.1.el5.src.rpm SHA-256: 8ccb4583755c55c6964de8f386ec88b6656642383ef60df654b9d633a27152ab
x86_64
kernel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 1617e73f7d3d1e615f3a7552c0421d1522f4f8dcc725437a5a2e0866bda1e744
kernel-debug-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 054c89125de5de63bd78944842263170be3e7e483cd7fa73fb0550d4d3fba409
kernel-debug-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: eca948e8945063cfb461e0df83bec27ba11763fd144481dae1a900f05dfbb590
kernel-debug-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: f75206513a3259c78b85f5217a8693d6decc0360776523f81f81e1a08ceeeca3
kernel-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: dc294ae6cc7bdf86e35d877ace7ebad3bd23b4243c50dd19e161164da5807a45
kernel-debuginfo-common-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 83406e1a576bebf169cad06787ec191c257e7d2ec6416f1b032b9309b7655b3d
kernel-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 97834f31c3417e5a9eee6408a69093de875760a7d29364b3fde5702fc0b94dff
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: ee036bc3023860026724b68a355d63699581fc3a64ff189b7b86377d71d8d78d
kernel-xen-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 2ceb533a30f3e0e888b0c7012d244252bf2433d2d7d687429173a404ef8c5ab4
kernel-xen-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: d63500e3dc1f7ca9b6d6076cf051aab16f0eccf252db2c6752ac00821ad92d27
kernel-xen-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: ada88d5e30548776394474c1a743f0e07de369bcc98bd0ce147fbce925402451
i386
kernel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 3eb812b8f29960630c0e3763fc5be80dd9e86620fd498f4c6c74b4c4318fc203
kernel-PAE-2.6.18-371.12.1.el5.i686.rpm SHA-256: 24f4dee6b23200dc13c33c70df89a2b9281d1d8809db128f01456921902d8d6b
kernel-PAE-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: a1c9e584d857772a7e50d0b9417bd91edc188c9106a21b84fc3bb4d8af3723e9
kernel-PAE-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 87103e442ccd6a421a1c0d780e1632d5845db1325f51b40585e4e7a1faeb20b0
kernel-debug-2.6.18-371.12.1.el5.i686.rpm SHA-256: 204f9e70eae7f8702502fad6f3ff3320199b2efd561a85b1fb3481ad2e97debc
kernel-debug-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: c6a179394adeaab54fa72664689e12739e33691d57006d06e9e49eab6f438de6
kernel-debug-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 2abcecf7d6c8bd60519e7e0b6f82a802924c28b387a463e2187691e93aeb70ca
kernel-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: 8d2eb96239e33844197e52b34f5a8d28496e96058f56090fd5c1b2bd983f63f4
kernel-debuginfo-common-2.6.18-371.12.1.el5.i686.rpm SHA-256: 28e7c6430a9076a717db2db262cfd653726c5c18095073d4db4ebefcce156d39
kernel-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: bb79f8734639a0fd0eb8ba2681ac60c48b6ac7819631b9386b556de43da4b141
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.i386.rpm SHA-256: 5de57cc593fb77c802b58dd42aabf677424f285d5fa78d69e4aa3bfe6e79b97a
kernel-xen-2.6.18-371.12.1.el5.i686.rpm SHA-256: 1cf53ba9536a9963ef5f4fe5205e7b40102f94597582ec88fa06eedcc6dc5d7b
kernel-xen-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: 1ee2b55a958d9bde0d3c5b0b6bb8c0eb53abb92d0cda4714bfa45ce087e58626
kernel-xen-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: b399bed986e42018706c3a1eb50fec72e9501e1bb68fa5999bf9b5b9fd936d46

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-371.12.1.el5.src.rpm SHA-256: 8ccb4583755c55c6964de8f386ec88b6656642383ef60df654b9d633a27152ab
s390x
kernel-2.6.18-371.12.1.el5.s390x.rpm SHA-256: 529dc3052d9516612622be40fc0c7f405743a09aad82159d3c7186424a489420
kernel-debug-2.6.18-371.12.1.el5.s390x.rpm SHA-256: ebbcf17191a7dd8d88cffd52080bf53e9c2aee3086f44b33a491d9282031617d
kernel-debug-debuginfo-2.6.18-371.12.1.el5.s390x.rpm SHA-256: 86cc6aff5b14b563bd890c56ca3b92106fb30a4447dbe1f88631d0bcc0c7c69a
kernel-debug-devel-2.6.18-371.12.1.el5.s390x.rpm SHA-256: 3b3ae02bdbbea0179643f00f8030e118d5ca6a7dc3d9f788abd1eda36db45095
kernel-debuginfo-2.6.18-371.12.1.el5.s390x.rpm SHA-256: f7f5bce7cd459339e7756e17db22281855c8fbc477cb8da69779047e9e383f67
kernel-debuginfo-common-2.6.18-371.12.1.el5.s390x.rpm SHA-256: c9e87d50d96231d499b45453af05d42086275558546859f9d3ddc3f5038e4afe
kernel-devel-2.6.18-371.12.1.el5.s390x.rpm SHA-256: 80bae9df21d178a5fed3c45fef31c47e33123f835ae0a0cceba3056d590c64a9
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.s390x.rpm SHA-256: 14881c7f178c978223baeef2326be928eae966fa08817621607ca5eac58e9ab7
kernel-kdump-2.6.18-371.12.1.el5.s390x.rpm SHA-256: 3c52464298f450f9c85acae6b1e2e811f4baf2b06b7ac7c7bbd19435c9583775
kernel-kdump-debuginfo-2.6.18-371.12.1.el5.s390x.rpm SHA-256: 35552ac1e0020fb87626433630e98321516cbb02d46d1e042b1fcce30f607c64
kernel-kdump-devel-2.6.18-371.12.1.el5.s390x.rpm SHA-256: 768809e1e8d9b59fbabd592ff18debd1e06ebea9b0f909bd5db1218ca308b63f

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-371.12.1.el5.src.rpm SHA-256: 8ccb4583755c55c6964de8f386ec88b6656642383ef60df654b9d633a27152ab
ppc
kernel-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: 89a0ba8c738d38c05501596fbbbe9fdb4000411ea062baf7668215273c677131
kernel-debug-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: e821b6d6eec4dd317a00d27af085826fdb46ce17826acd049aa606b58d6613dc
kernel-debug-debuginfo-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: 9fa4a4c0f9b31d15a1b2d2a7a1326073d803fd27baefc3043ec878a84126092d
kernel-debug-devel-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: f3c8eceac082643c94ddd5de80b03a7fddfe5382637308399795a0dfe242e0a3
kernel-debuginfo-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: d9ee4aa9c371a03b7ffd635a1555c119ed1d24e207e67b1a0dffff98660c3387
kernel-debuginfo-common-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: 6451bbe5edbb65e8912697e0ed7443530002baef7c3d812467e0c8a2d6e05d28
kernel-devel-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: 0437dc8939147f37353ea5703f4202fb9caa43506ed60baf78c6b4247baefd9b
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.ppc.rpm SHA-256: 1e927a7af664df62a12c373026049a9e08d6b14c7288648bc52c4433eba4ea01
kernel-headers-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: 629dd9585b78a315366a8c6cba4b7ce6cdf6c21574f42df7bdc6fc99a2b2b6bd
kernel-kdump-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: 1448d28c34c1c5655e556b0f3e7dd527dce08b844335ec956a18cfec65831e49
kernel-kdump-debuginfo-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: 7c6e813cb1abfae360089319fe1f224d720ebeed04decf057a8831601eee5dd7
kernel-kdump-devel-2.6.18-371.12.1.el5.ppc64.rpm SHA-256: 64cabbe3e11b867f99e95cd30cbd3067f3d1cd464ffc231d60bbf700ffe346d1

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-371.12.1.el5.src.rpm SHA-256: 8ccb4583755c55c6964de8f386ec88b6656642383ef60df654b9d633a27152ab
x86_64
kernel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 1617e73f7d3d1e615f3a7552c0421d1522f4f8dcc725437a5a2e0866bda1e744
kernel-debug-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 054c89125de5de63bd78944842263170be3e7e483cd7fa73fb0550d4d3fba409
kernel-debug-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: eca948e8945063cfb461e0df83bec27ba11763fd144481dae1a900f05dfbb590
kernel-debug-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: f75206513a3259c78b85f5217a8693d6decc0360776523f81f81e1a08ceeeca3
kernel-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: dc294ae6cc7bdf86e35d877ace7ebad3bd23b4243c50dd19e161164da5807a45
kernel-debuginfo-common-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 83406e1a576bebf169cad06787ec191c257e7d2ec6416f1b032b9309b7655b3d
kernel-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 97834f31c3417e5a9eee6408a69093de875760a7d29364b3fde5702fc0b94dff
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: ee036bc3023860026724b68a355d63699581fc3a64ff189b7b86377d71d8d78d
kernel-xen-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: 2ceb533a30f3e0e888b0c7012d244252bf2433d2d7d687429173a404ef8c5ab4
kernel-xen-debuginfo-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: d63500e3dc1f7ca9b6d6076cf051aab16f0eccf252db2c6752ac00821ad92d27
kernel-xen-devel-2.6.18-371.12.1.el5.x86_64.rpm SHA-256: ada88d5e30548776394474c1a743f0e07de369bcc98bd0ce147fbce925402451
i386
kernel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 3eb812b8f29960630c0e3763fc5be80dd9e86620fd498f4c6c74b4c4318fc203
kernel-PAE-2.6.18-371.12.1.el5.i686.rpm SHA-256: 24f4dee6b23200dc13c33c70df89a2b9281d1d8809db128f01456921902d8d6b
kernel-PAE-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: a1c9e584d857772a7e50d0b9417bd91edc188c9106a21b84fc3bb4d8af3723e9
kernel-PAE-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 87103e442ccd6a421a1c0d780e1632d5845db1325f51b40585e4e7a1faeb20b0
kernel-debug-2.6.18-371.12.1.el5.i686.rpm SHA-256: 204f9e70eae7f8702502fad6f3ff3320199b2efd561a85b1fb3481ad2e97debc
kernel-debug-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: c6a179394adeaab54fa72664689e12739e33691d57006d06e9e49eab6f438de6
kernel-debug-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: 2abcecf7d6c8bd60519e7e0b6f82a802924c28b387a463e2187691e93aeb70ca
kernel-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: 8d2eb96239e33844197e52b34f5a8d28496e96058f56090fd5c1b2bd983f63f4
kernel-debuginfo-common-2.6.18-371.12.1.el5.i686.rpm SHA-256: 28e7c6430a9076a717db2db262cfd653726c5c18095073d4db4ebefcce156d39
kernel-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: bb79f8734639a0fd0eb8ba2681ac60c48b6ac7819631b9386b556de43da4b141
kernel-doc-2.6.18-371.12.1.el5.noarch.rpm SHA-256: 6c5aaa0ee198d0b94d37ccc0c21c2dc30c88f19fccc640a159f23f2369779f72
kernel-headers-2.6.18-371.12.1.el5.i386.rpm SHA-256: 5de57cc593fb77c802b58dd42aabf677424f285d5fa78d69e4aa3bfe6e79b97a
kernel-xen-2.6.18-371.12.1.el5.i686.rpm SHA-256: 1cf53ba9536a9963ef5f4fe5205e7b40102f94597582ec88fa06eedcc6dc5d7b
kernel-xen-debuginfo-2.6.18-371.12.1.el5.i686.rpm SHA-256: 1ee2b55a958d9bde0d3c5b0b6bb8c0eb53abb92d0cda4714bfa45ce087e58626
kernel-xen-devel-2.6.18-371.12.1.el5.i686.rpm SHA-256: b399bed986e42018706c3a1eb50fec72e9501e1bb68fa5999bf9b5b9fd936d46

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter