Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2007:0304 - Bug Fix Advisory
Issued:
2007-04-28
Updated:
2007-04-28

RHBA-2007:0304 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Updated kernel packages available for Red Hat Enterprise Linux 4 Update 5

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4.

The Linux kernel handles the basic functions of the operating system.

This is the fifth regular update to Red Hat Enterprise Linux 4.

Description

New features introduced in this update include:

  • Xen paravirt kernels for x86/x86_64*
  • CONFIG_SERIAL_8250_NR_UARTS is increased to 64
  • implement diskdump support for sata_nv driver
  • implement diskdump support for ibmvscsi driver
  • add netdump support to 8139cp driver
  • update CIFS to 1.45

Added Platform support:

  • add support to allow disabling of MSI on PHX6700/6702 SHPC
  • add support for Intel ICH9 chipset
  • add PCIe power management quirk
  • add support for H206 processor PowerNow! with new freqency control
  • add support for AMD quad-core systems
  • add support for RDTSCP
  • add MCE Thresholding support for AMD 0x10 family processors
  • add PCI-Express support for Altix
  • add support for eClipz
  • add new ppc host ethernet adapter device driver
  • update SHUB2 hardware support

The following device drivers have been upgraded to new versions:

3w-9xxx: 2.26.04.010 to 2.26.05.007
ahci: 1.2 to 2.0
ata_piix: 1.05 to 2.00ac7
bnx2: 1.4.38 to 1.4.43-rh
bonding: 2.6.3 to 2.6.3-rh
cciss: 2.6.10 to 2.6.14
e1000: 7.0.33-k2-NAPI to 7.2.7-k2-NAPI
ibmvscsic: 1.5.6 to 1.5.7
ipr: 2.0.11.2 to 2.0.11.4
ixgb: 1.0.100-k2-NAPI to 1.0.109-k2-NAPI
libata: 1.20 to 2.00
megaraid_mm: 2.20.2.6 to 2.20.2.6rh
megaraid_sas: 00.00.02.03-RH1 to 00.00.03.05
mptbase: 3.02.62.01rh to 3.02.73rh
pdc_adma: 0.03 to 0.04
qla2100: 8.01.04-d7 to 8.01.04-d8-rh1
qla2200: 8.01.04-d7 to 8.01.04-d8-rh1
qla2300: 8.01.04-d7 to 8.01.04-d8-rh1
qla2322: 8.01.04-d7 to 8.01.04-d8-rh1
qla2400: 8.01.04-d7 to 8.01.04-d8-rh1
qla2xxx: 8.01.04-d7 to 8.01.04-d8-rh1
qla6312: 8.01.04-d7 to 8.01.04-d8-rh1
r8169: 1.2 to 2.2LK-NAPI
sata_mv: 0.6 to 0.7
sata_nv: 0.8 to 3.2
sata_promise: 1.04 to 1.05
sata_qstor: 0.05 to 0.06
sata_sil: 0.9 to 2.0
sata_sis: 0.5 to 0.6
sata_svw: 1.07 to 2.0
sata_sx4: 0.8 to 0.9
sata_uli: 0.5 to 1.0
sata_via: 1.1 to 2.0
sata_vsc: 1.2 to 2.0
sky2: 1.1 to 1.6
stex: 2.9.0.13 to 3.0.0.1
tg3: 3.52-rh to 3.64-rh

Infiniband update from 1.0 to OFED-1.1 code base

There were several bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 143897 - [EMC/Symantec RHEL 4.5 FEAT] NFS can't handle minor number greater than 255
  • BZ - 149620 - megaraid driver always fails to reset adapter
  • BZ - 155929 - Linux NFSv4 client doesn't return a delegation before removing a file
  • BZ - 158363 - Assert panic in fs/jbd/commit.c:790:journal_commit_transaction()
  • BZ - 159733 - Time source instable
  • BZ - 161591 - scsi_cd_put: inverted refcounting
  • BZ - 167398 - connections don't expire when ipvs receives lots of incoming ICMPs
  • BZ - 167715 - ipv6 badness in dst_release at include/net/dst.h:149
  • BZ - 168801 - kernel dm multipath: ioctl support
  • BZ - 172357 - CVE-2005-3257 loadkeys key bindings
  • BZ - 172476 - netpoll: avoid kfree_skb on packets with destructors
  • BZ - 172730 - via epia chipset hangs with longhaul code
  • BZ - 174397 - need driver for ULi M5289
  • BZ - 175869 - kernel "make xconfig" and "make gconfig" will not complete
  • BZ - 176455 - [CM] [RHEL4] IPSec Kernel Bug
  • BZ - 176738 - Unable to handle kernel NULL pointer dereference at 0000000000000020 RIP: <ffffffffa006dfc6>{:jbd:journal_dirty_metadata+71}
  • BZ - 176879 - shost->host_busy count is set to -1
  • BZ - 177429 - kernel memory leak in mousedev_release
  • BZ - 177624 - Rebuild of 2.6.9-27 with CONFIG_ROOT_NFS=y fails
  • BZ - 180980 - tcpdump -i ib0 not working with OpenIB IPoIb
  • BZ - 183211 - Panic on mount with rescue CD
  • BZ - 183665 - sys_mbind sanity checking
  • BZ - 184396 - Error message on plugging out USB mouse or USB keyboard
  • BZ - 184510 - CVE-2006-0557 get_nodes crash
  • BZ - 185316 - VFS: brelse: Trying to free free buffer
  • BZ - 185762 - Problems with EDAC module during first boot
  • BZ - 186074 - Via Epia freezes after a few hours of operation
  • BZ - 186325 - upstream kernel patch for global_flush_tlb missing in Red Hat kernel
  • BZ - 186604 - NFS_ROOT reuses RPC XIDs
  • BZ - 187183 - cifs directory listings wrong
  • BZ - 187295 - CIFS under heavy load crashes system
  • BZ - 187520 - locking issues in audit system
  • BZ - 187731 - Tux panics when using symlinks
  • BZ - 187930 - loop.c: integrate upstream changes
  • BZ - 189238 - Wrong fragment size when using statfs on NFS
  • BZ - 189434 - CVE-2006-1863 cifs chroot issue
  • BZ - 189588 - pstack (gdb) is slow on ia64
  • BZ - 189963 - [PATCH] x86_64: race in the free_iommu fast path leaks entries.
  • BZ - 191332 - kernel panic using sctp provided by red hat AS 4 Update 2
  • BZ - 191552 - [PATCH] x86_64: Fix a race in the free_iommu path.
  • BZ - 191780 - [PATCH] sys32_signal() forgets to initialize ->sa_mask
  • BZ - 191831 - kernel BUG at include/asm/spinlock.h:133!
  • BZ - 191912 - Marvell 88E8055 Gigabit Ethernet adapter does not work
  • BZ - 191933 - Oops with RAID0
  • BZ - 192760 - RHAS4 U3 x86_64 largesmp kernels don't support >8 cores on AMD64
  • BZ - 193185 - support for Sealevel 8 port serial card
  • BZ - 193937 - need acpi_skip_timer_override on 32bit 4u3
  • BZ - 194055 - netdump not working with 3c59x card
  • BZ - 194408 - Intel PRO/1000 w/e1000 fails at 1Gb speed
  • BZ - 196723 - RHEL4 U4 i386 partner beta will not install on Dylan systems
  • BZ - 197158 - mptscsi adds DID_BUS_BUSY host status when scsi status of BUSY is returned
  • BZ - 197797 - RHEL4: xw9400 onboard nvidia NICs don't function
  • BZ - 197949 - amd8111e driver bug message on Celestica A8440
  • BZ - 198657 - RHEL4-U4-B2:Kernel Panic while boot-up during installation on PE6800.
  • BZ - 198749 - Data corruption after IO error on swap
  • BZ - 198847 - QLogic InfiniPath problem with >= 4GB memory, DMA goes to incorrect address
  • BZ - 199167 - Update CIFS to 1.45
  • BZ - 199622 - failed mirror log causes mirror I/O errors
  • BZ - 199977 - Autofs5 requested in RHEL4
  • BZ - 200415 - ipvs: fix connection leak if expire_nodest_conn=1
  • BZ - 201058 - x86_64 need to pass virtual address to smp_read_mpc
  • BZ - 201219 - E1000 module kernel panics during stress test
  • BZ - 201622 - RHEL4 paravirtualized kernel for i686
  • BZ - 201781 - RHEL4 paravirtualized kernel for x86-64
  • BZ - 202130 - Tyan system hangs and keyboard lights blink even when not out of resources
  • BZ - 202412 - CVE-2005-2873 ipt_recent crash (second part)
  • BZ - 202735 - snd-azx sound driver broken in kernel 2.6.9-42.EL on RHEL4
  • BZ - 203894 - 4/4GB split issue in MCE handler
  • BZ - 203897 - Only delete orphaned ext3 inodes if they've got a non-zero nlink
  • BZ - 204063 - Raritan KVM USB dongle needs to be added to the USB HID blacklist
  • BZ - 204281 - rmmod cifs leads to kernel panic
  • BZ - 204791 - full snapshot removal attempt causes a panic
  • BZ - 204940 - RHEL4 Ux: ipmi kthread s/udelay(1)/schedule()/
  • BZ - 205001 - kernel BUG at fs/dquot.c (2.6.9-42.0.2.ELsmp)
  • BZ - 207244 - [RHEL 4] idle load average climbs monotonically until reboot
  • BZ - 207440 - [RHEL4 U4] add_partition() does not initialize read-only policy field
  • BZ - 207668 - Running vm86old on an i686 RHEL4 PV guest causes it to stop
  • BZ - 207669 - RHEL4 PV x86_64 race condition revolving around TLS (probably)
  • BZ - 207672 - RHEL4 PV x86_64 cpu hotplug support
  • BZ - 207673 - RHEL4 PV i686 cpu hotplug support
  • BZ - 208624 - High speed USB HID devices not working
  • BZ - 208648 - Kernel does not support VIA VT8251 Southbridge
  • BZ - 209850 - Out of tree kernel builds fail for Xen guests
  • BZ - 209852 - Out of tree kernel builds fail on ppc64
  • BZ - 210779 - VSYSCALL page has invalid permissions
  • BZ - 210852 - MegaRAID SATA RAID 150-4/6 are not supported 64-bit DMA
  • BZ - 211486 - LTC27431-lcs: device does not recover after disable/enable or link failure
  • BZ - 211920 - Kernel oops when loading ipmi_si module
  • BZ - 212055 - recurring oops in bnx2_poll
  • BZ - 212122 - 2.6.9-42.19.ELsmp kernel deadlock when IPv6 address is configured on an unplugged interface
  • BZ - 212398 - NFS mounts freeze
  • BZ - 214544 - netpoll_send_udp does not compute a UDP checksum
  • BZ - 214778 - fs: error in __generic_file_aio_read
  • BZ - 214996 - acl permissions over nfs
  • BZ - 215931 - kernel dm: fix alloc_dev error path
  • BZ - 215939 - kernel dm: use private biosets to avoid deadlock under memory pressure
  • BZ - 215941 - dm mirror: remove trailing space from table
  • BZ - 215944 - kernel dm snapshot: chunk_size parameter is not required after creation
  • BZ - 215945 - kernel dm snapshot: fix metadata error handling
  • BZ - 215947 - kernel dm snapshot: fix metadata writing when suspending
  • BZ - 216895 - BUG: bringing up balanced-alb mode bond network interface
  • BZ - 217050 - kernel dm: multipath - dereferencing uninitialized pointer in multipath_ctr
  • BZ - 217546 - [RHEL 4.5] qla3xxx panics when eth1 (qla3xxx) is sending pings and when qla4xxx is loaded.
  • BZ - 217581 - device-mapper mirror: Bad sync status change
  • BZ - 217726 - kernel dm: prevent removal of open devices
  • BZ - 217886 - Fix typo in the qla1280 reset
  • BZ - 217932 - [RHEL4] Netdump for 8139cp driver
  • BZ - 218266 - kernel dm crypt: possible data corruption if running over md-raid5
  • BZ - 218664 - [RHEL4] Problem using netdump when multiple routers are involved
  • BZ - 218777 - Kernel BUG at locks:1799
  • BZ - 218946 - kernel dm: application visible I/O errors with dm-multipath and queue_if_no_path when adding new path
  • BZ - 219149 - netfilter: Add some flag combinations to ip contrack to detect valid tcp flag sets
  • BZ - 219152 - [RHEL4 U5] e1000 fix WOL (restore reboot notifier code)
  • BZ - 219615 - device mapper: possible overwriting of extra slot in bi_io_vec
  • BZ - 219616 - device mapper: incorrect suspend error path
  • BZ - 219630 - device mapper multipath: round-robin path order is inverted
  • BZ - 219730 - export iscsi portal ip address as well as current address
  • BZ - 219761 - autofs4 - panic after mount fail (correction)
  • BZ - 220149 - ipvs connections entries not dropped
  • BZ - 220602 - Recent patch to aic79xx driver.
  • BZ - 220850 - 3ware 9650SE not recognized by updated 3w-9xxx module
  • BZ - 221273 - crash on live RHEL4 x86_64 domU fails to start
  • BZ - 221975 - __initdata declaration causes panic in powernow-k8 driver
  • BZ - 222229 - kernel BUG at fs/dquot.c:422!
  • BZ - 222695 - cpqarray module fails to detect arrays
  • BZ - 223280 - [RHEL4.5] SATA driver update
  • BZ - 223865 - Unneeded message sprays to console causing nodes to leave cluster
  • BZ - 227898 - flush icache early when loading module
  • BZ - 228059 - Intel sound cards on 4.5 kernel beta may panic system on boot
  • BZ - 228531 - [RHEL4] wacom: remove bogus le16_to_cpu() from usb_hid_config()
  • BZ - 229780 - kernel panic when attempting to mount nfs4 filesystem twice
  • BZ - 232526 - Urgent: RHEL4u5 beta1/beta2 backport of irq_handler_t breaks all e1000, ixgb compile
  • BZ - 233114 - ipv6 OOPS triggerable by any user
  • BZ - 233170 - Add 0x292c to PCI ID for ICH9

CVEs

  • CVE-2007-1592
  • CVE-2005-2873
  • CVE-2005-3257
  • CVE-2006-0557
  • CVE-2006-1863
  • CVE-2007-3379

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-55.EL.src.rpm SHA-256: bb854ed6067b02732245a5c3a901dfe409e54691720b8487f369ccf4680f07f2
x86_64
kernel-2.6.9-55.EL.x86_64.rpm SHA-256: 2df0bd4ba1e2fb2aa0cf730b495b954f775c881dbc732cbf0065407b75bd9373
kernel-2.6.9-55.EL.x86_64.rpm SHA-256: 2df0bd4ba1e2fb2aa0cf730b495b954f775c881dbc732cbf0065407b75bd9373
kernel-devel-2.6.9-55.EL.x86_64.rpm SHA-256: 7e9712eca31e15d91b64fb49eba8a68bb502cf3e6e5d77966b89eb7ae3057c58
kernel-devel-2.6.9-55.EL.x86_64.rpm SHA-256: 7e9712eca31e15d91b64fb49eba8a68bb502cf3e6e5d77966b89eb7ae3057c58
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-largesmp-2.6.9-55.EL.x86_64.rpm SHA-256: e9f6b34753be48d4231751f1ee36f0dc23547ef730ec0c9251533d3dc470e5c0
kernel-largesmp-2.6.9-55.EL.x86_64.rpm SHA-256: e9f6b34753be48d4231751f1ee36f0dc23547ef730ec0c9251533d3dc470e5c0
kernel-largesmp-devel-2.6.9-55.EL.x86_64.rpm SHA-256: d0c0648a78049c6ad5a010303ce38015ea874125cfc63565b99296618013ccfa
kernel-largesmp-devel-2.6.9-55.EL.x86_64.rpm SHA-256: d0c0648a78049c6ad5a010303ce38015ea874125cfc63565b99296618013ccfa
kernel-smp-2.6.9-55.EL.x86_64.rpm SHA-256: 26ebe84c0b91636c5789b1bc6dba23f538f0a9799b819bcc8170872222ddd276
kernel-smp-2.6.9-55.EL.x86_64.rpm SHA-256: 26ebe84c0b91636c5789b1bc6dba23f538f0a9799b819bcc8170872222ddd276
kernel-smp-devel-2.6.9-55.EL.x86_64.rpm SHA-256: f37679c141522e849edd65575642c7530f00662027893b72d929330f388bfbd4
kernel-smp-devel-2.6.9-55.EL.x86_64.rpm SHA-256: f37679c141522e849edd65575642c7530f00662027893b72d929330f388bfbd4
kernel-xenU-2.6.9-55.EL.x86_64.rpm SHA-256: d59a2d21ee23f8835f52e6c11f38224e16da3f553d5e36e4c99664f242538e79
kernel-xenU-2.6.9-55.EL.x86_64.rpm SHA-256: d59a2d21ee23f8835f52e6c11f38224e16da3f553d5e36e4c99664f242538e79
kernel-xenU-devel-2.6.9-55.EL.x86_64.rpm SHA-256: e02115583f28a53cc324aaad98d6e7b2714ce5273fec2a5e786b3e82752881a7
kernel-xenU-devel-2.6.9-55.EL.x86_64.rpm SHA-256: e02115583f28a53cc324aaad98d6e7b2714ce5273fec2a5e786b3e82752881a7
ia64
kernel-2.6.9-55.EL.ia64.rpm SHA-256: b4f602c0172cff02d95d3d15860067754ed8d4303f5b7882876382396cc7ab37
kernel-2.6.9-55.EL.ia64.rpm SHA-256: b4f602c0172cff02d95d3d15860067754ed8d4303f5b7882876382396cc7ab37
kernel-devel-2.6.9-55.EL.ia64.rpm SHA-256: 6b805643e237021eef3a4ff6ffa7bdb994446a32dd56a071a80e1018e273bf08
kernel-devel-2.6.9-55.EL.ia64.rpm SHA-256: 6b805643e237021eef3a4ff6ffa7bdb994446a32dd56a071a80e1018e273bf08
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-largesmp-2.6.9-55.EL.ia64.rpm SHA-256: d65ff5f676621a935d8f54655f9be808798ec15eb438334b6e6210bfcd629643
kernel-largesmp-2.6.9-55.EL.ia64.rpm SHA-256: d65ff5f676621a935d8f54655f9be808798ec15eb438334b6e6210bfcd629643
kernel-largesmp-devel-2.6.9-55.EL.ia64.rpm SHA-256: 769a667015c9136900781400fbc0fb86713248cb24d7dcf6ca35fe2d0c1ec0ff
kernel-largesmp-devel-2.6.9-55.EL.ia64.rpm SHA-256: 769a667015c9136900781400fbc0fb86713248cb24d7dcf6ca35fe2d0c1ec0ff
i386
kernel-2.6.9-55.EL.i686.rpm SHA-256: 0b6f0a2642ae0b4ca12df2691b4d14257537ab487287e9c3c991f7006e033dc9
kernel-2.6.9-55.EL.i686.rpm SHA-256: 0b6f0a2642ae0b4ca12df2691b4d14257537ab487287e9c3c991f7006e033dc9
kernel-devel-2.6.9-55.EL.i686.rpm SHA-256: 83a00e64c2193c4f6bfc41df4dfb23e9bdb65c5dd91464475cc7a63578d8986f
kernel-devel-2.6.9-55.EL.i686.rpm SHA-256: 83a00e64c2193c4f6bfc41df4dfb23e9bdb65c5dd91464475cc7a63578d8986f
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-hugemem-2.6.9-55.EL.i686.rpm SHA-256: c6f58f7527265dfc42b1672016487b28bec3c73988ed8ba26e8d80e08eb58315
kernel-hugemem-2.6.9-55.EL.i686.rpm SHA-256: c6f58f7527265dfc42b1672016487b28bec3c73988ed8ba26e8d80e08eb58315
kernel-hugemem-devel-2.6.9-55.EL.i686.rpm SHA-256: 977940572c4e139190e1d3fb4665079b536b0e4ec62c4c72ea2f2f09cd585ccc
kernel-hugemem-devel-2.6.9-55.EL.i686.rpm SHA-256: 977940572c4e139190e1d3fb4665079b536b0e4ec62c4c72ea2f2f09cd585ccc
kernel-smp-2.6.9-55.EL.i686.rpm SHA-256: 3ffcb15e0fe867546adf39b1fbceae2a9636e3c5c2e56dfdfe9b045a25911468
kernel-smp-2.6.9-55.EL.i686.rpm SHA-256: 3ffcb15e0fe867546adf39b1fbceae2a9636e3c5c2e56dfdfe9b045a25911468
kernel-smp-devel-2.6.9-55.EL.i686.rpm SHA-256: 8fb2bb98515360bba357b0712b3898e26ba6005ab8b4ecc2468ea7691c6db064
kernel-smp-devel-2.6.9-55.EL.i686.rpm SHA-256: 8fb2bb98515360bba357b0712b3898e26ba6005ab8b4ecc2468ea7691c6db064
kernel-xenU-2.6.9-55.EL.i686.rpm SHA-256: 699a44bc029afa4c739b2eb9fc0acc00276ae55f515c88c950ef4dc570530e88
kernel-xenU-2.6.9-55.EL.i686.rpm SHA-256: 699a44bc029afa4c739b2eb9fc0acc00276ae55f515c88c950ef4dc570530e88
kernel-xenU-devel-2.6.9-55.EL.i686.rpm SHA-256: 576ae2a9e85f8b7fa1b53cc3ee4233f6a49056fd6e8f88fbee61fbe17f76b2a5
kernel-xenU-devel-2.6.9-55.EL.i686.rpm SHA-256: 576ae2a9e85f8b7fa1b53cc3ee4233f6a49056fd6e8f88fbee61fbe17f76b2a5

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-55.EL.src.rpm SHA-256: bb854ed6067b02732245a5c3a901dfe409e54691720b8487f369ccf4680f07f2
x86_64
kernel-2.6.9-55.EL.x86_64.rpm SHA-256: 2df0bd4ba1e2fb2aa0cf730b495b954f775c881dbc732cbf0065407b75bd9373
kernel-devel-2.6.9-55.EL.x86_64.rpm SHA-256: 7e9712eca31e15d91b64fb49eba8a68bb502cf3e6e5d77966b89eb7ae3057c58
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-largesmp-2.6.9-55.EL.x86_64.rpm SHA-256: e9f6b34753be48d4231751f1ee36f0dc23547ef730ec0c9251533d3dc470e5c0
kernel-largesmp-devel-2.6.9-55.EL.x86_64.rpm SHA-256: d0c0648a78049c6ad5a010303ce38015ea874125cfc63565b99296618013ccfa
kernel-smp-2.6.9-55.EL.x86_64.rpm SHA-256: 26ebe84c0b91636c5789b1bc6dba23f538f0a9799b819bcc8170872222ddd276
kernel-smp-devel-2.6.9-55.EL.x86_64.rpm SHA-256: f37679c141522e849edd65575642c7530f00662027893b72d929330f388bfbd4
kernel-xenU-2.6.9-55.EL.x86_64.rpm SHA-256: d59a2d21ee23f8835f52e6c11f38224e16da3f553d5e36e4c99664f242538e79
kernel-xenU-devel-2.6.9-55.EL.x86_64.rpm SHA-256: e02115583f28a53cc324aaad98d6e7b2714ce5273fec2a5e786b3e82752881a7
ia64
kernel-2.6.9-55.EL.ia64.rpm SHA-256: b4f602c0172cff02d95d3d15860067754ed8d4303f5b7882876382396cc7ab37
kernel-devel-2.6.9-55.EL.ia64.rpm SHA-256: 6b805643e237021eef3a4ff6ffa7bdb994446a32dd56a071a80e1018e273bf08
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-largesmp-2.6.9-55.EL.ia64.rpm SHA-256: d65ff5f676621a935d8f54655f9be808798ec15eb438334b6e6210bfcd629643
kernel-largesmp-devel-2.6.9-55.EL.ia64.rpm SHA-256: 769a667015c9136900781400fbc0fb86713248cb24d7dcf6ca35fe2d0c1ec0ff
i386
kernel-2.6.9-55.EL.i686.rpm SHA-256: 0b6f0a2642ae0b4ca12df2691b4d14257537ab487287e9c3c991f7006e033dc9
kernel-devel-2.6.9-55.EL.i686.rpm SHA-256: 83a00e64c2193c4f6bfc41df4dfb23e9bdb65c5dd91464475cc7a63578d8986f
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-hugemem-2.6.9-55.EL.i686.rpm SHA-256: c6f58f7527265dfc42b1672016487b28bec3c73988ed8ba26e8d80e08eb58315
kernel-hugemem-devel-2.6.9-55.EL.i686.rpm SHA-256: 977940572c4e139190e1d3fb4665079b536b0e4ec62c4c72ea2f2f09cd585ccc
kernel-smp-2.6.9-55.EL.i686.rpm SHA-256: 3ffcb15e0fe867546adf39b1fbceae2a9636e3c5c2e56dfdfe9b045a25911468
kernel-smp-devel-2.6.9-55.EL.i686.rpm SHA-256: 8fb2bb98515360bba357b0712b3898e26ba6005ab8b4ecc2468ea7691c6db064
kernel-xenU-2.6.9-55.EL.i686.rpm SHA-256: 699a44bc029afa4c739b2eb9fc0acc00276ae55f515c88c950ef4dc570530e88
kernel-xenU-devel-2.6.9-55.EL.i686.rpm SHA-256: 576ae2a9e85f8b7fa1b53cc3ee4233f6a49056fd6e8f88fbee61fbe17f76b2a5

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-55.EL.src.rpm SHA-256: bb854ed6067b02732245a5c3a901dfe409e54691720b8487f369ccf4680f07f2
x86_64
kernel-2.6.9-55.EL.x86_64.rpm SHA-256: 2df0bd4ba1e2fb2aa0cf730b495b954f775c881dbc732cbf0065407b75bd9373
kernel-devel-2.6.9-55.EL.x86_64.rpm SHA-256: 7e9712eca31e15d91b64fb49eba8a68bb502cf3e6e5d77966b89eb7ae3057c58
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-largesmp-2.6.9-55.EL.x86_64.rpm SHA-256: e9f6b34753be48d4231751f1ee36f0dc23547ef730ec0c9251533d3dc470e5c0
kernel-largesmp-devel-2.6.9-55.EL.x86_64.rpm SHA-256: d0c0648a78049c6ad5a010303ce38015ea874125cfc63565b99296618013ccfa
kernel-smp-2.6.9-55.EL.x86_64.rpm SHA-256: 26ebe84c0b91636c5789b1bc6dba23f538f0a9799b819bcc8170872222ddd276
kernel-smp-devel-2.6.9-55.EL.x86_64.rpm SHA-256: f37679c141522e849edd65575642c7530f00662027893b72d929330f388bfbd4
kernel-xenU-2.6.9-55.EL.x86_64.rpm SHA-256: d59a2d21ee23f8835f52e6c11f38224e16da3f553d5e36e4c99664f242538e79
kernel-xenU-devel-2.6.9-55.EL.x86_64.rpm SHA-256: e02115583f28a53cc324aaad98d6e7b2714ce5273fec2a5e786b3e82752881a7
i386
kernel-2.6.9-55.EL.i686.rpm SHA-256: 0b6f0a2642ae0b4ca12df2691b4d14257537ab487287e9c3c991f7006e033dc9
kernel-devel-2.6.9-55.EL.i686.rpm SHA-256: 83a00e64c2193c4f6bfc41df4dfb23e9bdb65c5dd91464475cc7a63578d8986f
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-hugemem-2.6.9-55.EL.i686.rpm SHA-256: c6f58f7527265dfc42b1672016487b28bec3c73988ed8ba26e8d80e08eb58315
kernel-hugemem-devel-2.6.9-55.EL.i686.rpm SHA-256: 977940572c4e139190e1d3fb4665079b536b0e4ec62c4c72ea2f2f09cd585ccc
kernel-smp-2.6.9-55.EL.i686.rpm SHA-256: 3ffcb15e0fe867546adf39b1fbceae2a9636e3c5c2e56dfdfe9b045a25911468
kernel-smp-devel-2.6.9-55.EL.i686.rpm SHA-256: 8fb2bb98515360bba357b0712b3898e26ba6005ab8b4ecc2468ea7691c6db064
kernel-xenU-2.6.9-55.EL.i686.rpm SHA-256: 699a44bc029afa4c739b2eb9fc0acc00276ae55f515c88c950ef4dc570530e88
kernel-xenU-devel-2.6.9-55.EL.i686.rpm SHA-256: 576ae2a9e85f8b7fa1b53cc3ee4233f6a49056fd6e8f88fbee61fbe17f76b2a5

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-55.EL.src.rpm SHA-256: bb854ed6067b02732245a5c3a901dfe409e54691720b8487f369ccf4680f07f2
s390x
kernel-2.6.9-55.EL.s390x.rpm SHA-256: 58d2ddd42aef1623ecd5ae37f5afa6d9f05bec160391aad656e640f1a21b813a
kernel-devel-2.6.9-55.EL.s390x.rpm SHA-256: 8d78ba4271935b2ae46f16c4a4b5fdc0646d2fcc35ca7ff7196c836ff845edd0
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
s390
kernel-2.6.9-55.EL.s390.rpm SHA-256: 4eec41725bdf3daf90d3a1ceb915cf0f7269682beb891e618aab22437667c28c
kernel-devel-2.6.9-55.EL.s390.rpm SHA-256: f981d1a137f25ca37f0712a1b993492a73bb25cda670f2c6b869211101aaecbe
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-55.EL.src.rpm SHA-256: bb854ed6067b02732245a5c3a901dfe409e54691720b8487f369ccf4680f07f2
ppc
kernel-2.6.9-55.EL.ppc64.rpm SHA-256: f30e40db961f4c78cb7f1b8caa451d4b2e3108e144b807c27909e5a1ad0f5df3
kernel-2.6.9-55.EL.ppc64iseries.rpm SHA-256: a9b3c32def7112c9370cc68ae5859224f56fa5b252c49dc458baf1c7f81efaf2
kernel-devel-2.6.9-55.EL.ppc64.rpm SHA-256: fa9ca1886b07bc8cfc8f2ad0e12b19dd7cecf7725942a1a777f66198f7832198
kernel-devel-2.6.9-55.EL.ppc64iseries.rpm SHA-256: 345640f6622ae7b662a3f4c5dedfcf59029d727f35ad898b7bfc3180e3586d93
kernel-doc-2.6.9-55.EL.noarch.rpm SHA-256: bbcd5b240605e0db6939823aa1fe9b4ac95d9be1c12f981c5016224f508782a8
kernel-largesmp-2.6.9-55.EL.ppc64.rpm SHA-256: ca3383eaad0183a80839c201f0e02482732ee86773be32ae0a6d7379db489e8b
kernel-largesmp-devel-2.6.9-55.EL.ppc64.rpm SHA-256: a5ad6606e55dc9b1a7410a38383f6f4c5660c2fe51fbe21f1e24c5791649c6b2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility