Now, distribution vendors, including us, have released kernel updates that customers/users can download and install but as always a regular kernel upgrade requires a reboot. We have had ksplice as a service for Oracle Linux support customers for quite a few years now and we also support Ubuntu and Fedora for free for anyone (see here).
One thing that is not often talked about but, I believe is very powerful and I wanted to point out here, is the following:
Typically the distribution vendors (including us) will release an update kernel that's the 'latest' version with these CVEs fixed, but many customers run older versions of both the distribution and kernels. We now see some other vendors trying to provide the basics for some online patching but by and far it's based on one-offs and for specific kernels. A big part of the ksplice service is the backend infrastructure to easily build updates for literally a few 1000 kernels. This gives customers great flexibility. You can be on one of many dot-releases of the OS and you can use ksplice. Here is a list of example kernel versions for Oracle Linux that you could be running today and we provide updates for with ksplice,for ,for instance, this DCCP bug. That's a big difference with what other folks have been trying to mimic now that online patching has become more and more important for availability.
Here is an example kernel 2.6.32-573.7.1.el6.x86_64 #1 SMP Tue Sep 22 08:34:17 PDT 2015 So that's a kernel built back in September of 2015, a random 'dot release' I run on one of my machines, and there's a ksplice patch available for these recent CVEs. I don't have to worry about having to install the 'latest' kernel, nor doing a reboot.
# uptrack-upgrade The following steps will be taken: Install [f4muxalm] CVE-2017-6074: Denial-of-service when using IPV6_RECVPKTINFO socket option. Install [5ncctcgz] CVE-2016-9555: Remote denial-of-service due to SCTP state machine memory corruption. Go ahead [y/N]? y Installing [f4muxalm] CVE-2017-6074: Denial-of-service when using IPV6_RECVPKTINFO socket option. Installing [5ncctcgz] CVE-2016-9555: Remote denial-of-service due to SCTP state machine memory corruption. Your kernel is fully up to date. Effective kernel version is 2.6.32-642.15.1.el6
and done. That easy. My old 2.6.32-573.7.1 kernel looks like 2.6.32-642.15.1 in terms of critical fixes and CVEs.
# uptrack-show Installed updates: [cct5dnbf] Clear garbage data on the kernel stack when handling signals. [ektd95cj] Reduce usage of reserved percpu memory. [uuhgbl3e] Remote denial-of-service in Brocade Ethernet driver. [kg3f16ii] CVE-2015-7872: Denial-of-service when garbage collecting uninstantiated keyring. [36ng2h1l] CVE-2015-7613: Privilege escalation in IPC object initialization. [33jwvtbb] CVE-2015-5307: KVM host denial-of-service in alignment check. [38gzh9gl] CVE-2015-8104: KVM host denial-of-service in debug exception. [6wvrdj93] CVE-2015-2925: Privilege escalation in bind mounts inside namespaces. [1l4i9dfh] CVE-2016-0774: Information leak in the pipe system call on failed atomic read. [xu4auj49] CVE-2015-5157: Disable modification of LDT by userspace processes. [554ck5nl] CVE-2015-8767: Denial-of-service in SCTP heartbeat timeout. [adgeye5p] CVE-2015-8543: Denial-of-service on out of range protocol for raw sockets. [5ojkw9lv] CVE-2015-7550: Denial-of-service when reading and revoking a key concurrently. [gfr93o7j] CVE-2015-8324: NULL pointer dereference in ext4 on mount error. [ft01zrkg] CVE-2013-2015, CVE-2015-7509: Possible privilege escalation when mounting an non-journaled ext4 filesystem. [87lw5yyy] CVE-2015-8215: Remote denial-of-service of network traffic when changing the MTU. [2bby9cuy] CVE-2010-5313, CVE-2014-7842: Denial of service in KVM L1 guest from L2 guest. [orjsp65y] CVE-2015-5156: Denial-of-service in Virtio network device. [5j4hp0ot] Device Mapper logic error when reloading the block multi-queue. [a1e5kxp6] CVE-2016-4565: Privilege escalation in Infiniband ioctl. [gfpg64bh] CVE-2016-5696: Session hijacking in TCP connections. [b4ljcwin] Message corruption in pseudo terminal output. [prijjgt5] CVE-2016-4470: Denial-of-service in the keyring subsystem. [4y2f30ch] CVE-2016-5829: Memory corruption in unknown USB HID devices. [j1mivn4f] Denial-of-service when resetting a Fibre Channel over Ethernet interface. [nawv8jdu] CVE-2016-5195: Privilege escalation when handling private mapping copy-on-write. [97fe0h7s] CVE-2016-1583: Privilege escalation in eCryptfs. [fdztfgcv] Denial-of-service when sending a TCP reset from the netfilter. [gm4ldjjf] CVE-2016-6828: Use after free during TCP transmission. [s8pymcf8] CVE-2016-7117: Denial-of-service in recvmmsg() error handling. [1ktf7029] CVE-2016-4997, CVE-2016-4998: Privilege escalation in the Netfilter driver. [f4muxalm] CVE-2017-6074: Denial-of-service when using IPV6_RECVPKTINFO socket option. [5ncctcgz] CVE-2016-9555: Remote denial-of-service due to SCTP state machine memory corruption. Effective kernel version is 2.6.32-642.15.1.el6
Here is the list of kernels we build modules for as part of Oracle Linux customers kernel choices:
oracle-2.6.18-238.0.0.0.1.el5 oracle-2.6.18-238.1.1.0.1.el5 oracle-2.6.18-238.5.1.0.1.el5 oracle-2.6.18-238.9.1.0.1.el5 oracle-2.6.18-238.12.1.0.1.el5 oracle-2.6.18-238.19.1.0.1.el5 oracle-2.6.18-274.0.0.0.1.el5 oracle-2.6.18-274.3.1.0.1.el5 oracle-2.6.18-274.7.1.0.1.el5 oracle-2.6.18-274.12.1.0.1.el5 oracle-2.6.18-274.17.1.0.1.el5 oracle-2.6.18-274.18.1.0.1.el5 oracle-2.6.18-308.0.0.0.1.el5 oracle-2.6.18-308.1.1.0.1.el5 oracle-2.6.18-308.4.1.0.1.el5 oracle-2.6.18-308.8.1.0.1.el5 oracle-2.6.18-308.8.2.0.1.el5 oracle-2.6.18-308.11.1.0.1.el5 oracle-2.6.18-308.13.1.0.1.el5 oracle-2.6.18-308.16.1.0.1.el5 oracle-2.6.18-308.20.1.0.1.el5 oracle-2.6.18-308.24.1.0.1.el5 oracle-2.6.18-348.0.0.0.1.el5 oracle-2.6.18-348.1.1.0.1.el5 oracle-2.6.18-348.2.1.0.1.el5 oracle-2.6.18-348.3.1.0.1.el5 oracle-2.6.18-348.4.1.0.1.el5 oracle-2.6.18-348.6.1.0.1.el5 oracle-2.6.18-348.12.1.0.1.el5 oracle-2.6.18-348.16.1.0.1.el5 oracle-2.6.18-348.18.1.0.1.el5 oracle-2.6.18-371.0.0.0.1.el5 oracle-2.6.18-371.1.2.0.1.el5 oracle-2.6.18-371.3.1.0.1.el5 oracle-2.6.18-371.4.1.0.1.el5 oracle-2.6.18-371.6.1.0.1.el5 oracle-2.6.18-371.8.1.0.1.el5 oracle-2.6.18-371.9.1.0.1.el5 oracle-2.6.18-371.11.1.0.1.el5 oracle-2.6.18-371.12.1.0.1.el5 oracle-2.6.18-398.0.0.0.1.el5 oracle-2.6.18-400.0.0.0.1.el5 oracle-2.6.18-400.1.1.0.1.el5 oracle-2.6.18-402.0.0.0.1.el5 oracle-2.6.18-404.0.0.0.1.el5 oracle-2.6.18-406.0.0.0.1.el5 oracle-2.6.18-407.0.0.0.1.el5 oracle-2.6.18-408.0.0.0.1.el5 oracle-2.6.18-409.0.0.0.1.el5 oracle-2.6.18-410.0.0.0.1.el5 oracle-2.6.18-411.0.0.0.1.el5 oracle-2.6.18-412.0.0.0.1.el5 oracle-2.6.18-416.0.0.0.1.el5 oracle-2.6.18-417.0.0.0.1.el5 oracle-2.6.18-418.0.0.0.1.el5 oracle-2.6.32-642.0.0.0.1.el6 oracle-3.10.0-514.6.1.0.1.el7 oracle-3.10.0-514.6.2.0.1.el7 oracle-uek-2.6.39-100.5.1 oracle-uek-2.6.39-100.6.1 oracle-uek-2.6.39-100.7.1 oracle-uek-2.6.39-100.10.1 oracle-uek-2.6.39-200.24.1 oracle-uek-2.6.39-200.29.1 oracle-uek-2.6.39-200.29.2 oracle-uek-2.6.39-200.29.3 oracle-uek-2.6.39-200.31.1 oracle-uek-2.6.39-200.32.1 oracle-uek-2.6.39-200.33.1 oracle-uek-2.6.39-200.34.1 oracle-uek-2.6.39-300.17.1 oracle-uek-2.6.39-300.17.2 oracle-uek-2.6.39-300.17.3 oracle-uek-2.6.39-300.26.1 oracle-uek-2.6.39-300.28.1 oracle-uek-2.6.39-300.32.4 oracle-uek-2.6.39-400.17.1 oracle-uek-2.6.39-400.17.2 oracle-uek-2.6.39-400.21.1 oracle-uek-2.6.39-400.21.2 oracle-uek-2.6.39-400.23.1 oracle-uek-2.6.39-400.24.1 oracle-uek-2.6.39-400.109.1 oracle-uek-2.6.39-400.109.3 oracle-uek-2.6.39-400.109.4 oracle-uek-2.6.39-400.109.5 oracle-uek-2.6.39-400.109.6 oracle-uek-2.6.39-400.209.1 oracle-uek-2.6.39-400.209.2 oracle-uek-2.6.39-400.210.2 oracle-uek-2.6.39-400.211.1 oracle-uek-2.6.39-400.211.2 oracle-uek-2.6.39-400.211.3 oracle-uek-2.6.39-400.212.1 oracle-uek-2.6.39-400.214.1 oracle-uek-2.6.39-400.214.3 oracle-uek-2.6.39-400.214.4 oracle-uek-2.6.39-400.214.5 oracle-uek-2.6.39-400.214.6 oracle-uek-2.6.39-400.215.1 oracle-uek-2.6.39-400.215.2 oracle-uek-2.6.39-400.215.3 oracle-uek-2.6.39-400.215.4 oracle-uek-2.6.39-400.215.6 oracle-uek-2.6.39-400.215.7 oracle-uek-2.6.39-400.215.10 oracle-uek-2.6.39-400.215.11 oracle-uek-2.6.39-400.215.12 oracle-uek-2.6.39-400.215.13 oracle-uek-2.6.39-400.215.14 oracle-uek-2.6.39-400.215.15 oracle-uek-2.6.39-400.243.1 oracle-uek-2.6.39-400.245.1 oracle-uek-2.6.39-400.246.2 oracle-uek-2.6.39-400.247.1 oracle-uek-2.6.39-400.248.3 oracle-uek-2.6.39-400.249.1 oracle-uek-2.6.39-400.249.3 oracle-uek-2.6.39-400.249.4 oracle-uek-2.6.39-400.250.2 oracle-uek-2.6.39-400.250.4 oracle-uek-2.6.39-400.250.5 oracle-uek-2.6.39-400.250.6 oracle-uek-2.6.39-400.250.7 oracle-uek-2.6.39-400.250.9 oracle-uek-2.6.39-400.250.10 oracle-uek-2.6.39-400.250.11 oracle-uek-2.6.39-400.264.1 oracle-uek-2.6.39-400.264.4 oracle-uek-2.6.39-400.264.5 oracle-uek-2.6.39-400.264.6 oracle-uek-2.6.39-400.264.13 oracle-uek-2.6.39-400.276.1 oracle-uek-2.6.39-400.277.1 oracle-uek-2.6.39-400.278.1 oracle-uek-2.6.39-400.278.2 oracle-uek-2.6.39-400.278.3 oracle-uek-2.6.39-400.280.1 oracle-uek-2.6.39-400.281.1 oracle-uek-2.6.39-400.282.1 oracle-uek-2.6.39-400.283.1 oracle-uek-2.6.39-400.283.2 oracle-uek-2.6.39-400.284.1 oracle-uek-2.6.39-400.284.2 oracle-uek-2.6.39-400.286.2 oracle-uek-2.6.39-400.286.3 oracle-uek-2.6.39-400.290.1 oracle-uek-2.6.39-400.290.2 oracle-uek-2.6.39-400.293.1 oracle-uek-2.6.39-400.293.2 oracle-uek-2.6.39-400.294.1 oracle-uek-2.6.39-400.294.2 oracle-uek-2.6.39-400.128.21 oracle-uek-3.8.13-16 oracle-uek-3.8.13-16.1.1 oracle-uek-3.8.13-16.2.1 oracle-uek-3.8.13-16.2.2 oracle-uek-3.8.13-16.2.3 oracle-uek-3.8.13-16.3.1 oracle-uek-3.8.13-26 oracle-uek-3.8.13-26.1.1 oracle-uek-3.8.13-26.2.1 oracle-uek-3.8.13-26.2.2 oracle-uek-3.8.13-26.2.3 oracle-uek-3.8.13-26.2.4 oracle-uek-3.8.13-35 oracle-uek-3.8.13-35.1.1 oracle-uek-3.8.13-35.1.2 oracle-uek-3.8.13-35.1.3 oracle-uek-3.8.13-35.3.1 oracle-uek-3.8.13-35.3.2 oracle-uek-3.8.13-35.3.3 oracle-uek-3.8.13-35.3.4 oracle-uek-3.8.13-35.3.5 oracle-uek-3.8.13-44 oracle-uek-3.8.13-44.1.1 oracle-uek-3.8.13-44.1.3 oracle-uek-3.8.13-44.1.4 oracle-uek-3.8.13-44.1.5 oracle-uek-3.8.13-55 oracle-uek-3.8.13-55.1.1 oracle-uek-3.8.13-55.1.2 oracle-uek-3.8.13-55.1.5 oracle-uek-3.8.13-55.1.6 oracle-uek-3.8.13-55.1.8 oracle-uek-3.8.13-55.2.1 oracle-uek-3.8.13-68 oracle-uek-3.8.13-68.1.2 oracle-uek-3.8.13-68.1.3 oracle-uek-3.8.13-68.2.2 oracle-uek-3.8.13-68.2.2.1 oracle-uek-3.8.13-68.2.2.2 oracle-uek-3.8.13-68.3.1 oracle-uek-3.8.13-68.3.2 oracle-uek-3.8.13-68.3.3 oracle-uek-3.8.13-68.3.4 oracle-uek-3.8.13-68.3.5 oracle-uek-3.8.13-98 oracle-uek-3.8.13-98.1.1 oracle-uek-3.8.13-98.1.2 oracle-uek-3.8.13-98.2.1 oracle-uek-3.8.13-98.2.2 oracle-uek-3.8.13-98.4.1 oracle-uek-3.8.13-98.5.2 oracle-uek-3.8.13-98.6.1 oracle-uek-3.8.13-98.7.1 oracle-uek-3.8.13-98.8.1 oracle-uek-3.8.13-118 oracle-uek-3.8.13-118.2.1 oracle-uek-3.8.13-118.2.2 oracle-uek-3.8.13-118.2.4 oracle-uek-3.8.13-118.2.5 oracle-uek-3.8.13-118.3.1 oracle-uek-3.8.13-118.3.2 oracle-uek-3.8.13-118.4.1 oracle-uek-3.8.13-118.4.2 oracle-uek-3.8.13-118.6.1 oracle-uek-3.8.13-118.6.2 oracle-uek-3.8.13-118.7.1 oracle-uek-3.8.13-118.8.1 oracle-uek-3.8.13-118.9.1 oracle-uek-3.8.13-118.9.2 oracle-uek-3.8.13-118.10.2 oracle-uek-3.8.13-118.11.2 oracle-uek-3.8.13-118.13.2 oracle-uek-3.8.13-118.13.3 oracle-uek-3.8.13-118.14.1 oracle-uek-3.8.13-118.14.2 oracle-uek-3.8.13-118.15.1 oracle-uek-3.8.13-118.15.2 oracle-uek-3.8.13-118.15.3 oracle-uek-3.8.13-118.16.2 oracle-uek-3.8.13-118.16.3 oracle-uek-4.1.12-32 oracle-uek-4.1.12-32.1.2 oracle-uek-4.1.12-32.1.3 oracle-uek-4.1.12-32.2.1 oracle-uek-4.1.12-32.2.3 oracle-uek-4.1.12-37.2.1 oracle-uek-4.1.12-37.2.2 oracle-uek-4.1.12-37.3.1 oracle-uek-4.1.12-37.4.1 oracle-uek-4.1.12-37.5.1 oracle-uek-4.1.12-37.6.1 oracle-uek-4.1.12-37.6.2 oracle-uek-4.1.12-37.6.3 oracle-uek-4.1.12-61.1.6 oracle-uek-4.1.12-61.1.9 oracle-uek-4.1.12-61.1.10 oracle-uek-4.1.12-61.1.13 oracle-uek-4.1.12-61.1.14 oracle-uek-4.1.12-61.1.16 oracle-uek-4.1.12-61.1.17 oracle-uek-4.1.12-61.1.18 oracle-uek-4.1.12-61.1.19 oracle-uek-4.1.12-61.1.21 oracle-uek-4.1.12-61.1.22 oracle-uek-4.1.12-61.1.23 oracle-uek-4.1.12-61.1.24 oracle-uek-4.1.12-61.1.25 oracle-uek-4.1.12-61.1.27 rhel-2.6.32-71.el6 rhel-2.6.32-71.7.1.el6 rhel-2.6.32-71.14.1.el6 rhel-2.6.32-71.18.1.el6 rhel-2.6.32-71.18.2.el6 rhel-2.6.32-71.24.1.el6 rhel-2.6.32-71.29.1.el6 rhel-2.6.32-131.0.15.el6 rhel-2.6.32-131.2.1.el6 rhel-2.6.32-131.4.1.el6 rhel-2.6.32-131.6.1.el6 rhel-2.6.32-131.12.1.el6 rhel-2.6.32-131.17.1.el6 rhel-2.6.32-131.21.1.el6 rhel-2.6.32-220.el6 rhel-2.6.32-220.2.1.el6 rhel-2.6.32-220.4.1.el6 rhel-2.6.32-220.4.2.el6 rhel-2.6.32-220.7.1.el6 rhel-2.6.32-220.13.1.el6 rhel-2.6.32-220.17.1.el6 rhel-2.6.32-220.23.1.el6 rhel-2.6.32-279.el6 rhel-2.6.32-279.1.1.el6 rhel-2.6.32-279.2.1.el6 rhel-2.6.32-279.5.1.el6 rhel-2.6.32-279.5.2.el6 rhel-2.6.32-279.9.1.el6 rhel-2.6.32-279.11.1.el6 rhel-2.6.32-279.14.1.el6 rhel-2.6.32-279.19.1.el6 rhel-2.6.32-279.22.1.el6 rhel-2.6.32-358.el6 rhel-2.6.32-358.0.1.el6 rhel-2.6.32-358.2.1.el6 rhel-2.6.32-358.6.1.el6 rhel-2.6.32-358.6.2.el6 rhel-2.6.32-358.6.2.el6.x86_64.crt1 rhel-2.6.32-358.11.1.el6 rhel-2.6.32-358.14.1.el6 rhel-2.6.32-358.18.1.el6 rhel-2.6.32-358.23.2.el6 rhel-2.6.32-431.el6 rhel-2.6.32-431.1.2.el6 rhel-2.6.32-431.3.1.el6 rhel-2.6.32-431.5.1.el6 rhel-2.6.32-431.11.2.el6 rhel-2.6.32-431.17.1.el6 rhel-2.6.32-431.20.3.el6 rhel-2.6.32-431.20.5.el6 rhel-2.6.32-431.23.3.el6 rhel-2.6.32-431.29.2.el6 rhel-2.6.32-504.el6 rhel-2.6.32-504.1.3.el6 rhel-2.6.32-504.3.3.el6 rhel-2.6.32-504.8.1.el6 rhel-2.6.32-504.12.2.el6 rhel-2.6.32-504.16.2.el6 rhel-2.6.32-504.23.4.el6 rhel-2.6.32-504.30.3.el6 rhel-2.6.32-573.el6 rhel-2.6.32-573.1.1.el6 rhel-2.6.32-573.3.1.el6 rhel-2.6.32-573.7.1.el6 rhel-2.6.32-573.8.1.el6 rhel-2.6.32-573.12.1.el6 rhel-2.6.32-573.18.1.el6 rhel-2.6.32-573.22.1.el6 rhel-2.6.32-573.26.1.el6 rhel-2.6.32-642.el6 rhel-2.6.32-642.1.1.el6 rhel-2.6.32-642.3.1.el6 rhel-2.6.32-642.4.2.el6 rhel-2.6.32-642.6.1.el6 rhel-2.6.32-642.6.2.el6 rhel-2.6.32-642.11.1.el6 rhel-2.6.32-642.13.1.el6 rhel-2.6.32-642.13.2.el6 rhel-3.10.0-123.el7 rhel-3.10.0-123.1.2.el7 rhel-3.10.0-123.4.2.el7 rhel-3.10.0-123.4.4.el7 rhel-3.10.0-123.6.3.el7 rhel-3.10.0-123.8.1.el7 rhel-3.10.0-123.9.2.el7 rhel-3.10.0-123.9.3.el7 rhel-3.10.0-123.13.1.el7 rhel-3.10.0-123.13.2.el7 rhel-3.10.0-123.20.1.el7 rhel-3.10.0-229.el7 rhel-3.10.0-229.1.2.el7 rhel-3.10.0-229.4.2.el7 rhel-3.10.0-229.7.2.el7 rhel-3.10.0-229.11.1.el7 rhel-3.10.0-229.14.1.el7 rhel-3.10.0-229.20.1.el6.x86_64.knl2 rhel-3.10.0-229.20.1.el7 rhel-3.10.0-327.el7 rhel-3.10.0-327.3.1.el7 rhel-3.10.0-327.4.4.el7 rhel-3.10.0-327.4.5.el7 rhel-3.10.0-327.10.1.el7 rhel-3.10.0-327.13.1.el7 rhel-3.10.0-327.18.2.el7 rhel-3.10.0-327.22.2.el7 rhel-3.10.0-327.28.2.el7 rhel-3.10.0-327.28.3.el7 rhel-3.10.0-327.36.1.el7 rhel-3.10.0-327.36.2.el7 rhel-3.10.0-327.36.3.el7 rhel-3.10.0-514.el7 rhel-3.10.0-514.2.2.el7 rhel-3.10.0-514.6.1.el7 rhel-3.10.0-514.6.2.el7 rhel-2.6.18-92.1.10.el5 rhel-2.6.18-92.1.13.el5 rhel-2.6.18-92.1.17.el5 rhel-2.6.18-92.1.18.el5 rhel-2.6.18-92.1.22.el5 rhel-2.6.18-128.el5 rhel-2.6.18-128.1.1.el5 rhel-2.6.18-128.1.6.el5 rhel-2.6.18-128.1.10.el5 rhel-2.6.18-128.1.14.el5 rhel-2.6.18-128.1.16.el5 rhel-2.6.18-128.2.1.el5 rhel-2.6.18-128.4.1.el5 rhel-2.6.18-128.7.1.el5 rhel-2.6.18-149.el5 rhel-2.6.18-164.el5 rhel-2.6.18-164.2.1.el5 rhel-2.6.18-164.6.1.el5 rhel-2.6.18-164.9.1.el5 rhel-2.6.18-164.10.1.el5 rhel-2.6.18-164.11.1.el5 rhel-2.6.18-164.15.1.el5 rhel-2.6.18-194.el5 rhel-2.6.18-194.3.1.el5 rhel-2.6.18-194.8.1.el5 rhel-2.6.18-194.11.1.el5 rhel-2.6.18-194.11.3.el5 rhel-2.6.18-194.11.4.el5 rhel-2.6.18-194.17.1.el5 rhel-2.6.18-194.17.4.el5 rhel-2.6.18-194.26.1.el5 rhel-2.6.18-194.32.1.el5 rhel-2.6.18-238.el5 rhel-2.6.18-238.1.1.el5 rhel-2.6.18-238.5.1.el5 rhel-2.6.18-238.9.1.el5 rhel-2.6.18-238.12.1.el5 rhel-2.6.18-238.19.1.el5 rhel-2.6.18-274.el5 rhel-2.6.18-274.3.1.el5 rhel-2.6.18-274.7.1.el5 rhel-2.6.18-274.12.1.el5 rhel-2.6.18-274.17.1.el5 rhel-2.6.18-274.18.1.el5 rhel-2.6.18-308.el5 rhel-2.6.18-308.1.1.el5 rhel-2.6.18-308.4.1.el5 rhel-2.6.18-308.8.1.el5 rhel-2.6.18-308.8.2.el5 rhel-2.6.18-308.11.1.el5 rhel-2.6.18-308.13.1.el5 rhel-2.6.18-308.16.1.el5 rhel-2.6.18-308.20.1.el5 rhel-2.6.18-308.24.1.el5 rhel-2.6.18-348.el5 rhel-2.6.18-348.1.1.el5 rhel-2.6.18-348.2.1.el5 rhel-2.6.18-348.3.1.el5 rhel-2.6.18-348.4.1.el5 rhel-2.6.18-348.6.1.el5 rhel-2.6.18-348.12.1.el5 rhel-2.6.18-348.16.1.el5 rhel-2.6.18-348.18.1.el5 rhel-2.6.18-371.el5 rhel-2.6.18-371.1.2.el5 rhel-2.6.18-371.3.1.el5 rhel-2.6.18-371.4.1.el5 rhel-2.6.18-371.6.1.el5 rhel-2.6.18-371.8.1.el5 rhel-2.6.18-371.9.1.el5 rhel-2.6.18-371.11.1.el5 rhel-2.6.18-371.12.1.el5 rhel-2.6.18-398.el5 rhel-2.6.18-400.el5 rhel-2.6.18-400.1.1.el5 rhel-2.6.18-402.el5 rhel-2.6.18-404.el5 rhel-2.6.18-406.el5 rhel-2.6.18-407.el5 rhel-2.6.18-408.el5 rhel-2.6.18-409.el5 rhel-2.6.18-410.el5 rhel-2.6.18-411.el5 rhel-2.6.18-412.el5 rhel-2.6.18-416.el5 rhel-2.6.18-417.el5 rhel-2.6.18-418.el5
compare that to kpatch or kgraft or so.