Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHBA-2007:0791 - Bug Fix Advisory
Issued:
2007-11-15
Updated:
2007-11-15

RHBA-2007:0791 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Updated kernel packages available for Red Hat Enterprise Linux 4 Update 6

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4. This is the sixth
regular update to Red Hat Enterprise Linux 4.

Description

The Linux kernel handles the basic functions of the operating system.

New features introduced in this update include:

  • The getcpu system call is now supported.
  • /proc NUMA maps are now supported.
  • Upgraded openib and openmpi to OFED 1.2 to provide InfiniBand support.
  • madvise() now supports DONTFORK and DOFORK.
  • Added /proc/sys/vm/drop_caches to clear pagecache and slabcache on demand.
  • Removed upper value limit on /proc/sys/vm/max_queue_depth.
  • The out of memory killer is designed to kill processes to recover memory

under very severe out of memory conditions. The out of memory killer can
now be disabled; as such, when an out of memory condition occurs, a kernel
panic will occur. To disable the out of memory killer, use the command echo
1 > /proc/sys/vm/panic_on_oom. Note that the out of memory killer is still
enabled by default.

  • smaps functionality is now supported.
  • Fixed an NFSv4 link bug that prevented i_nlink counts from updating properly.
  • Updated CIFS client to version 1.48aRH.
  • CONFIG_KPROBES is now enabled to provide Systemtap support.

Added drivers:

  • cxgb3: 1.0-ko
  • arcmsr: 1.20.00.13
  • netxen: 3.4.2
  • pata_jmicron: 0.1.5
  • pata_pdc2027x: 0.74-ac5

Added Platform support:

  • cpuid emulation added for AMD processors.
  • acpi: PCI Root Bridge detection is now supported on HP rx5500 and HP

rx3600 platforms.

  • Fixed a bug that prevented CPU frequency from scaling correctly on Conroe

and Broadwater chipsets.

  • k8_edac driver now supports revision F processors.
  • Kernel source now contains SMBus Device IDs for AMD and ATI SB600.
  • MMCONFIG is now disabled by default on Intel Core 2 Duo platform.
  • Oprofile now supports new Greyhound performance counter events.
  • Packed stack layouts are now enabled on s390.
  • 3592 tape encryption is now supported on s390.
  • hypfs functionality is now supported on z/VM.
  • Backported sysfs support on edac_mc.
  • Added Hitachi HDS7250SASUN500G 0621KTAWSD to ncq blacklist.
  • Added device IDs for ATI SB700.
  • Intel 6300ESB Watchdog timer is now supported.
  • Added eHCA driver for ppc.
  • Added OProfile kernel support for POWER6 and 970MP.

The following device drivers were also upgraded to new versions:

  • cciss: 2.6.14 to 2.6.16
  • dell_rbu: 0.7 to 0.8
  • mptfusion: 3.02.73rh to 3.02.99.00rh
  • bnx2: 1.4.43-rh to 1.5.11
  • e1000: 7.2.7-k2-NAPI to 7.3.20-k2-NAPI
  • qla3xxx: v2.02.00-k37RH4U5 to v2.03.00-k4-RHEL4U6
  • tg3: 3.64-rh to 3.77
  • aacraid: 1.1-5[2412] to 1.1-5[2441]
  • lpfc: 0:8.0.16.27 to 0:8.0.16.34
  • megaraid_sas: 00.00.03.05 to 00.00.03.13
  • qla2100: 8.01.04-d8 to 8.01.07-d1
  • qla2200: 8.01.04-d8 to 8.01.07-d1
  • qla2300: 8.01.04-d8 to 8.01.07-d1
  • qla2322: 8.01.04-d8 to 8.01.07-d1
  • qla2400: 8.01.04-d8 to 8.01.07-d1
  • qla2xxx: 8.01.04-d8 to 8.01.07-d1
  • qla6312: 8.01.04-d8 to 8.01.07-d1
  • qla4xxx: 5.01.00-d6 to 5.01.01-d1
  • sym53c8xx: 2.1.18j to 2.1.18k
  • ehea: EHEA_0032-07 to EHEA_0058-01a
  • ipr: 2.0.11.4 to 2.0.11.5
  • adp94xx: 1.0.8-6 to 1.0.8-13
  • s2io: 2.0.8.1 to 2.0.16.1

For a comprehensive list of kernel-related updates, refer to the latest
version of the Red Hat Enterprise Linux 4.6 release notes on:

http://www.redhat.com/docs/manuals/enterprise/

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which apply these kernel updates.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 160340 - vconfig rem causes unregister_netdevice messages when HWADDR was used on base interface
  • BZ - 168280 - 30 second pause on samba mounts
  • BZ - 174707 - audit is missing fs object identity info when removing some xattrs
  • BZ - 174821 - autofs problem with symbolic links
  • BZ - 174834 - kernel dm: memory issues cause "failures" when creating many snapshots
  • BZ - 179622 - Warning: "div_ll_X_l_rem" [<module>.ko] undefined!
  • BZ - 185978 - Kernel panic in sysfs
  • BZ - 186008 - Bad page state after issue SCSI Write via SCSI Generic (sg) driver
  • BZ - 189404 - revention of OOM kills and page allocation failures under heavy load
  • BZ - 190729 - sleeping function called from invalid context at kernel/workqueue.c
  • BZ - 194570 - PPC rt_sigreturn does not restore context after interrupted syscall
  • BZ - 196759 - ENOMEM after a number of snapshots
  • BZ - 198859 - race in aio io_submit write/read
  • BZ - 199758 - Patch to disable block layer bouncing for most memory on 64bit systems
  • BZ - 202955 - bogus out-of-memory resulting in ext3 file system corruption
  • BZ - 203818 - System clock runs slowly or backwards on P4 systems under RHEL4u4.
  • BZ - 205722 - lockup in shrink_zone when node out of memory
  • BZ - 207114 - AIO layer returns OK even if it failed
  • BZ - 208830 - sysctl variable to expire quiescent template
  • BZ - 209419 - kernel BUG at fs/nfs/inode.c:1650!
  • BZ - 210281 - Process does not exit and hangs forever after calling exit_aio
  • BZ - 215407 - Add smaps functionality to RHEL-4
  • BZ - 215715 - "ip route list table local" output loses the existing routes
  • BZ - 217067 - A thread in pthread_cond_wait() is being signalled (rapidly) by two other threads but it is not being scheduled.
  • BZ - 217928 - jbd I/O errors after ext3 orphan processing on readonly device
  • BZ - 218757 - running 32-bit executables on x86_64 causes "vm_committed_space" value to increase inappropriately
  • BZ - 219085 - Silicon Integrated Systems [SiS 900] network card shuts down
  • BZ - 222798 - nfs protocol V3 :write procedure patch
  • BZ - 222999 - [Stratus 4.6 bug] sata_vsc.c sets cache line size non-optimally
  • BZ - 223433 - Kernel panic on install on 64BG EM64T
  • BZ - 224424 - NFS mishandles dentries during create style operations
  • BZ - 224638 - jbd __cleanup_transaction skips last buffer on checkpoint list
  • BZ - 226308 - natsemi ethernet controller periodically freezes
  • BZ - 226872 - [RHEL4] Gdb does not accurately output the backtrace.
  • BZ - 226947 - Can't install OS on ATI SB600 chipset with legacy IDE mode
  • BZ - 226950 - Can't install OS on ATI SB600 chipset with legacy IDE mode
  • BZ - 227135 - scsi_dump.c represents sectors using int
  • BZ - 227188 - NFSv4 SETATTR mode calls fails against netapp with -EINVAL
  • BZ - 227249 - RHEL4.5 NFSv2 intermittently fails connectathon basic test 7 when run against solaris NFS server
  • BZ - 227373 - link() on nfsv4 sometimes fails to update i_nlink count
  • BZ - 227657 - Warning about MSI interrupt for bnx2 device
  • BZ - 227726 - Oops in svcauth_gss_release and tcp_sendpage
  • BZ - 228076 - kernel spinlock panic in inode.c
  • BZ - 228461 - ext3 block bitmap leakage
  • BZ - 228623 - FR: i8xx_tco support for Intel 6300ESB Watchdog timer
  • BZ - 228801 - NFS race can create persistent stale negative dentries
  • BZ - 231319 - [QLogic 4.6 bug] Qlogic driver handles RSCN updates in a problematic way
  • BZ - 231854 - [RHEL4] Incorrect memory sizing reported by EDAC on HP xw9400
  • BZ - 232211 - double free memory corruption in smbfs
  • BZ - 233399 - [Areca RHEL 4.6] Add support for Areca RAID controllers (include arcmsr driver from 2.6.19)
  • BZ - 233543 - Random panics running as a paravirtualized guest of RHEL 5.0
  • BZ - 233653 - race condition in nbd driver triggers BUG in kunmap and kernel panic
  • BZ - 234278 - CFQ I/O scheduler causes excessive slab usage/system hangs
  • BZ - 234300 - smbfs slab corruption
  • BZ - 234580 - Unused var in alloc_ldt()
  • BZ - 234587 - VFS: Busy inodes at umount on NFSv4 filesystem
  • BZ - 235760 - ip_vs_sync_state not cleared when setsockopt(IP_VS_SO_SET_STARTDAEMON) fails
  • BZ - 236626 - dm-mirror: Call to rh_in_sync should be allowed to block in do_reads
  • BZ - 236662 - Sun 32-bit JVM unable to allocate large pages memory greater than 2147483648 bytes
  • BZ - 236786 - dirty data is not flushed on a timely manner
  • BZ - 236929 - [RHEL4 Xen]: Suspend/resume failure under load
  • BZ - 238725 - IPV4 'Treason uncloaked' message - hints at a more general kernel/net bug
  • BZ - 238795 - [Dell/LSI-E 4.6 bug] I/O terminates on linux system due to Out Of Memory
  • BZ - 239339 - update CIFS client to 1.48aRH
  • BZ - 239447 - [LSI-E 4.6 bug] Iscsi_sfnet driver will not send all data buffer when buffer size is greater than first burst length
  • BZ - 239625 - NFS O_EXCL|O_CREAT on R/O filesystem creates erroneous negative dentry
  • BZ - 239998 - [RHEL4U5] Performance of Sequential-Read is bad on cciss disk
  • BZ - 240027 - RHEL4.5: HP5750: CDROM generates errors on tray open & close
  • BZ - 240349 - wait4()'s rusage sometimes wrong when threads present across exec*()
  • BZ - 240419 - nfsv3 on krb5i printk's many RPC request reserved XXX but used YYY
  • BZ - 240752 - kernel dm io: panic on large request
  • BZ - 241002 - USB2.0 hub disappears after overcurrent on another port
  • BZ - 241215 - SATA update breaks reference counting
  • BZ - 241268 - kernel-devel does not include all needed headers on ppc64 and i386
  • BZ - 241885 - ext2/3 oops in posix_acl_permission
  • BZ - 242068 - device-mapper mirror: Blockable function [clear_region] called inside spinlock
  • BZ - 242074 - device-mapper mirror: Writes to non-synced regions must be marked/cleared in the log
  • BZ - 242965 - kernel dm: mempool_resize BUG() during multiple snapshot removals
  • BZ - 243657 - [PATCH] Fix memory leak of dma_alloc_coherent() on x86_64
  • BZ - 243834 - diskdump to cciss fails due to off-by-one size calculation
  • BZ - 244058 - kernel dm: allow offline devices
  • BZ - 244214 - kernel dm snapshot: activating of snapshot marked invalid causes incorrect mapping
  • BZ - 245631 - [QLogic 4.6 bug] [1/4] Update qla2xxx driver to version 8.01.07-d1 - Various fixes
  • BZ - 245938 - [RHEL4 Xen]: Enable Systemtap
  • BZ - 245939 - [QLogic 4.6 bug] [2/4] Update qla2xxx driver to version 8.01.07-d1 - ref-counting
  • BZ - 246086 - Is accounting of Committed memory correct?
  • BZ - 246109 - remove unused var in alloc_ldt()
  • BZ - 246234 - [QLogic 4.6 bug] [3/4] Update qla2xxx driver to version 8.01.07-d1 - 2400 firmware
  • BZ - 246586 - Ooops in queue_work on boot.
  • BZ - 246589 - lack of AMD/ATI SB600 SMBus Device ID
  • BZ - 247648 - [RHEL4.6] wacom: fix absolute coordinates on Intuos3 and Cintiq
  • BZ - 248024 - race between loading xenblk.ko and scanning for LVM partitions etc.
  • BZ - 248108 - Add more device IDs to support ATI SB700 SATA controller completely
  • BZ - 248234 - Update AHCI SATA driver with new PCI IDs
  • BZ - 248711 - FEAT: RHEL4.6: upgrade openib, openmpi to OFED 1.2
  • BZ - 249813 - Kernel triggers thousands of PTWR fixups on pte_clear()
  • BZ - 250898 - Missing critical phys_to_virt in lib/swiotlb.c
  • BZ - 251153 - [RHEL4.6] diskdump fails on MPT/Fusion adapter
  • BZ - 252137 - use after free of skb in netfront.c:network_start_xmit
  • BZ - 252315 - CIFS deadlocks in cifs_get_inode_info_unix
  • BZ - 253538 - Can't boot 2.6.9-56-smp with Vmware
  • BZ - 254222 - update RHEL_VERSION to .6
  • BZ - 276861 - ptrace: SIGTRAP on second PTRACE_ATTACH
  • BZ - 280381 - RHEL4.6: Add missing AD1984 HDAudio codec support
  • BZ - 311301 - panic/ext3 fs corruption with RHEL4-U6-re20070927.0
  • BZ - 316031 - dm-mirror: incorrect order of mirror presuspend ops causes cluster mirror hang
  • BZ - 316991 - libata: doesn't support wildcard matching in ata_blacklist_entry
  • BZ - 362371 - x86_64 largesmp kernel panics at boot time on DL585

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-67.EL.src.rpm SHA-256: 4a88398e79b73b2544e13fa94bf02d9a863a2a531c90935c78ee9593b397a04b
x86_64
kernel-2.6.9-67.EL.x86_64.rpm SHA-256: 06b87ee0494bc76141b718ed6a63f03feaaf62db3ae6ed872dc0d5b91ed04891
kernel-2.6.9-67.EL.x86_64.rpm SHA-256: 06b87ee0494bc76141b718ed6a63f03feaaf62db3ae6ed872dc0d5b91ed04891
kernel-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 419f08f5334e2ea52499e2cb655ce97efb338ff7ee377154b375367f08f24b9a
kernel-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 419f08f5334e2ea52499e2cb655ce97efb338ff7ee377154b375367f08f24b9a
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-largesmp-2.6.9-67.EL.x86_64.rpm SHA-256: f763bf0eb2d22168300e2a8cf3261b05d3dd0724c00f2cc4c25aff16d9365c4b
kernel-largesmp-2.6.9-67.EL.x86_64.rpm SHA-256: f763bf0eb2d22168300e2a8cf3261b05d3dd0724c00f2cc4c25aff16d9365c4b
kernel-largesmp-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 7eb401543ad0984bdfc824fbf9d2e572af09a3ba73cde1e03c4266e8985a2d7b
kernel-largesmp-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 7eb401543ad0984bdfc824fbf9d2e572af09a3ba73cde1e03c4266e8985a2d7b
kernel-smp-2.6.9-67.EL.x86_64.rpm SHA-256: 67787ed0d6bb91d63d0400d27c27c9a419db78228df0613520dd8bb80dfc2d23
kernel-smp-2.6.9-67.EL.x86_64.rpm SHA-256: 67787ed0d6bb91d63d0400d27c27c9a419db78228df0613520dd8bb80dfc2d23
kernel-smp-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 5eb6e0390c69556b5f8b1d1eb1e8fb4389dd45087c6e9ed6307dd1e39447660e
kernel-smp-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 5eb6e0390c69556b5f8b1d1eb1e8fb4389dd45087c6e9ed6307dd1e39447660e
kernel-xenU-2.6.9-67.EL.x86_64.rpm SHA-256: 6914985568b39eb8b09748d22e9fa8da33df12bbae11ccabe5ef2ef0fe83dbf7
kernel-xenU-2.6.9-67.EL.x86_64.rpm SHA-256: 6914985568b39eb8b09748d22e9fa8da33df12bbae11ccabe5ef2ef0fe83dbf7
kernel-xenU-devel-2.6.9-67.EL.x86_64.rpm SHA-256: bcbd7c8d8a9f58f690687bc7e3c65c85748eab92f62b2f6e3e7a5755d93285a0
kernel-xenU-devel-2.6.9-67.EL.x86_64.rpm SHA-256: bcbd7c8d8a9f58f690687bc7e3c65c85748eab92f62b2f6e3e7a5755d93285a0
ia64
kernel-2.6.9-67.EL.ia64.rpm SHA-256: 55646a8d812dfc317aec32e51f50925863365168c0c965c9ebe326fe34d2fd14
kernel-2.6.9-67.EL.ia64.rpm SHA-256: 55646a8d812dfc317aec32e51f50925863365168c0c965c9ebe326fe34d2fd14
kernel-devel-2.6.9-67.EL.ia64.rpm SHA-256: 5e7efb231440633ecf4f55e24ae594ed31e01bf6ea6cf4897f2406e22d110841
kernel-devel-2.6.9-67.EL.ia64.rpm SHA-256: 5e7efb231440633ecf4f55e24ae594ed31e01bf6ea6cf4897f2406e22d110841
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-largesmp-2.6.9-67.EL.ia64.rpm SHA-256: 52c5588d5af9cb439cf800c67777b6d723db6e8549c575ce05572991eb8fa59c
kernel-largesmp-2.6.9-67.EL.ia64.rpm SHA-256: 52c5588d5af9cb439cf800c67777b6d723db6e8549c575ce05572991eb8fa59c
kernel-largesmp-devel-2.6.9-67.EL.ia64.rpm SHA-256: e8198226b78fdbec36c9ced0a51733fc742a3d312749fe1785afaef5cfd87001
kernel-largesmp-devel-2.6.9-67.EL.ia64.rpm SHA-256: e8198226b78fdbec36c9ced0a51733fc742a3d312749fe1785afaef5cfd87001
i386
kernel-2.6.9-67.EL.i686.rpm SHA-256: 93cb2ba952778c74639776ff32e9561f295f6bf8ed5537b62a553f9256b55342
kernel-2.6.9-67.EL.i686.rpm SHA-256: 93cb2ba952778c74639776ff32e9561f295f6bf8ed5537b62a553f9256b55342
kernel-devel-2.6.9-67.EL.i686.rpm SHA-256: af0de6a33c508eebb35e52be2743bbb5a45541e98051d660c48e854a4e4292a6
kernel-devel-2.6.9-67.EL.i686.rpm SHA-256: af0de6a33c508eebb35e52be2743bbb5a45541e98051d660c48e854a4e4292a6
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-hugemem-2.6.9-67.EL.i686.rpm SHA-256: 8db3018f82d4ec4f5ee75d5378c5177b900dce55cb2203b5d765fee846070da9
kernel-hugemem-2.6.9-67.EL.i686.rpm SHA-256: 8db3018f82d4ec4f5ee75d5378c5177b900dce55cb2203b5d765fee846070da9
kernel-hugemem-devel-2.6.9-67.EL.i686.rpm SHA-256: b8d6fdd5337c5e06c0ecfaa4dbc4ebbb5bc91001d772bb5685e6cac161dfe28d
kernel-hugemem-devel-2.6.9-67.EL.i686.rpm SHA-256: b8d6fdd5337c5e06c0ecfaa4dbc4ebbb5bc91001d772bb5685e6cac161dfe28d
kernel-smp-2.6.9-67.EL.i686.rpm SHA-256: c55605187f69bea7beda38826b12cc963910992d8a7307b42066e55927b2568f
kernel-smp-2.6.9-67.EL.i686.rpm SHA-256: c55605187f69bea7beda38826b12cc963910992d8a7307b42066e55927b2568f
kernel-smp-devel-2.6.9-67.EL.i686.rpm SHA-256: 5d8f832954c5c702ad7ecf58cef0c2a8741d4f7d73f5a901142c0dfa4bd24038
kernel-smp-devel-2.6.9-67.EL.i686.rpm SHA-256: 5d8f832954c5c702ad7ecf58cef0c2a8741d4f7d73f5a901142c0dfa4bd24038
kernel-xenU-2.6.9-67.EL.i686.rpm SHA-256: 723c721c1f691385d9f94a0f27f4c332c70c7e185194f66e92de38a8e00ddc46
kernel-xenU-2.6.9-67.EL.i686.rpm SHA-256: 723c721c1f691385d9f94a0f27f4c332c70c7e185194f66e92de38a8e00ddc46
kernel-xenU-devel-2.6.9-67.EL.i686.rpm SHA-256: ca62529cd5b344f5cb02c96f8bf43949b2dbb5d60afb6889735fad674aa067b8
kernel-xenU-devel-2.6.9-67.EL.i686.rpm SHA-256: ca62529cd5b344f5cb02c96f8bf43949b2dbb5d60afb6889735fad674aa067b8

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-67.EL.src.rpm SHA-256: 4a88398e79b73b2544e13fa94bf02d9a863a2a531c90935c78ee9593b397a04b
x86_64
kernel-2.6.9-67.EL.x86_64.rpm SHA-256: 06b87ee0494bc76141b718ed6a63f03feaaf62db3ae6ed872dc0d5b91ed04891
kernel-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 419f08f5334e2ea52499e2cb655ce97efb338ff7ee377154b375367f08f24b9a
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-largesmp-2.6.9-67.EL.x86_64.rpm SHA-256: f763bf0eb2d22168300e2a8cf3261b05d3dd0724c00f2cc4c25aff16d9365c4b
kernel-largesmp-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 7eb401543ad0984bdfc824fbf9d2e572af09a3ba73cde1e03c4266e8985a2d7b
kernel-smp-2.6.9-67.EL.x86_64.rpm SHA-256: 67787ed0d6bb91d63d0400d27c27c9a419db78228df0613520dd8bb80dfc2d23
kernel-smp-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 5eb6e0390c69556b5f8b1d1eb1e8fb4389dd45087c6e9ed6307dd1e39447660e
kernel-xenU-2.6.9-67.EL.x86_64.rpm SHA-256: 6914985568b39eb8b09748d22e9fa8da33df12bbae11ccabe5ef2ef0fe83dbf7
kernel-xenU-devel-2.6.9-67.EL.x86_64.rpm SHA-256: bcbd7c8d8a9f58f690687bc7e3c65c85748eab92f62b2f6e3e7a5755d93285a0
ia64
kernel-2.6.9-67.EL.ia64.rpm SHA-256: 55646a8d812dfc317aec32e51f50925863365168c0c965c9ebe326fe34d2fd14
kernel-devel-2.6.9-67.EL.ia64.rpm SHA-256: 5e7efb231440633ecf4f55e24ae594ed31e01bf6ea6cf4897f2406e22d110841
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-largesmp-2.6.9-67.EL.ia64.rpm SHA-256: 52c5588d5af9cb439cf800c67777b6d723db6e8549c575ce05572991eb8fa59c
kernel-largesmp-devel-2.6.9-67.EL.ia64.rpm SHA-256: e8198226b78fdbec36c9ced0a51733fc742a3d312749fe1785afaef5cfd87001
i386
kernel-2.6.9-67.EL.i686.rpm SHA-256: 93cb2ba952778c74639776ff32e9561f295f6bf8ed5537b62a553f9256b55342
kernel-devel-2.6.9-67.EL.i686.rpm SHA-256: af0de6a33c508eebb35e52be2743bbb5a45541e98051d660c48e854a4e4292a6
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-hugemem-2.6.9-67.EL.i686.rpm SHA-256: 8db3018f82d4ec4f5ee75d5378c5177b900dce55cb2203b5d765fee846070da9
kernel-hugemem-devel-2.6.9-67.EL.i686.rpm SHA-256: b8d6fdd5337c5e06c0ecfaa4dbc4ebbb5bc91001d772bb5685e6cac161dfe28d
kernel-smp-2.6.9-67.EL.i686.rpm SHA-256: c55605187f69bea7beda38826b12cc963910992d8a7307b42066e55927b2568f
kernel-smp-devel-2.6.9-67.EL.i686.rpm SHA-256: 5d8f832954c5c702ad7ecf58cef0c2a8741d4f7d73f5a901142c0dfa4bd24038
kernel-xenU-2.6.9-67.EL.i686.rpm SHA-256: 723c721c1f691385d9f94a0f27f4c332c70c7e185194f66e92de38a8e00ddc46
kernel-xenU-devel-2.6.9-67.EL.i686.rpm SHA-256: ca62529cd5b344f5cb02c96f8bf43949b2dbb5d60afb6889735fad674aa067b8

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-67.EL.src.rpm SHA-256: 4a88398e79b73b2544e13fa94bf02d9a863a2a531c90935c78ee9593b397a04b
x86_64
kernel-2.6.9-67.EL.x86_64.rpm SHA-256: 06b87ee0494bc76141b718ed6a63f03feaaf62db3ae6ed872dc0d5b91ed04891
kernel-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 419f08f5334e2ea52499e2cb655ce97efb338ff7ee377154b375367f08f24b9a
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-largesmp-2.6.9-67.EL.x86_64.rpm SHA-256: f763bf0eb2d22168300e2a8cf3261b05d3dd0724c00f2cc4c25aff16d9365c4b
kernel-largesmp-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 7eb401543ad0984bdfc824fbf9d2e572af09a3ba73cde1e03c4266e8985a2d7b
kernel-smp-2.6.9-67.EL.x86_64.rpm SHA-256: 67787ed0d6bb91d63d0400d27c27c9a419db78228df0613520dd8bb80dfc2d23
kernel-smp-devel-2.6.9-67.EL.x86_64.rpm SHA-256: 5eb6e0390c69556b5f8b1d1eb1e8fb4389dd45087c6e9ed6307dd1e39447660e
kernel-xenU-2.6.9-67.EL.x86_64.rpm SHA-256: 6914985568b39eb8b09748d22e9fa8da33df12bbae11ccabe5ef2ef0fe83dbf7
kernel-xenU-devel-2.6.9-67.EL.x86_64.rpm SHA-256: bcbd7c8d8a9f58f690687bc7e3c65c85748eab92f62b2f6e3e7a5755d93285a0
i386
kernel-2.6.9-67.EL.i686.rpm SHA-256: 93cb2ba952778c74639776ff32e9561f295f6bf8ed5537b62a553f9256b55342
kernel-devel-2.6.9-67.EL.i686.rpm SHA-256: af0de6a33c508eebb35e52be2743bbb5a45541e98051d660c48e854a4e4292a6
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-hugemem-2.6.9-67.EL.i686.rpm SHA-256: 8db3018f82d4ec4f5ee75d5378c5177b900dce55cb2203b5d765fee846070da9
kernel-hugemem-devel-2.6.9-67.EL.i686.rpm SHA-256: b8d6fdd5337c5e06c0ecfaa4dbc4ebbb5bc91001d772bb5685e6cac161dfe28d
kernel-smp-2.6.9-67.EL.i686.rpm SHA-256: c55605187f69bea7beda38826b12cc963910992d8a7307b42066e55927b2568f
kernel-smp-devel-2.6.9-67.EL.i686.rpm SHA-256: 5d8f832954c5c702ad7ecf58cef0c2a8741d4f7d73f5a901142c0dfa4bd24038
kernel-xenU-2.6.9-67.EL.i686.rpm SHA-256: 723c721c1f691385d9f94a0f27f4c332c70c7e185194f66e92de38a8e00ddc46
kernel-xenU-devel-2.6.9-67.EL.i686.rpm SHA-256: ca62529cd5b344f5cb02c96f8bf43949b2dbb5d60afb6889735fad674aa067b8

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-67.EL.src.rpm SHA-256: 4a88398e79b73b2544e13fa94bf02d9a863a2a531c90935c78ee9593b397a04b
s390x
kernel-2.6.9-67.EL.s390x.rpm SHA-256: b6209cd78f1860684a733aed188342f89c631533536e00a29ca3f25d152d9979
kernel-devel-2.6.9-67.EL.s390x.rpm SHA-256: 5ab99cf942b551955eb2a90e9be6d48233a7d305a9d9462abd01ed9a08a4bddc
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
s390
kernel-2.6.9-67.EL.s390.rpm SHA-256: 2f1d0ec9499c98f03dd11ee4d5abb0ed634c36e61d552109ac5ac63fac3b235a
kernel-devel-2.6.9-67.EL.s390.rpm SHA-256: 531a1f6f5672676a4adadc6bed747cdf4104dd8e5fd9422a9878c09da32b7f3a
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-67.EL.src.rpm SHA-256: 4a88398e79b73b2544e13fa94bf02d9a863a2a531c90935c78ee9593b397a04b
ppc
kernel-2.6.9-67.EL.ppc64.rpm SHA-256: ed30b92f93172a625f429b111aa3ac3b83ae5f2565393ed656301006c846480c
kernel-2.6.9-67.EL.ppc64iseries.rpm SHA-256: ffbe56d93baa080b09407ba0ddd467c183b5590ae537ed2b9fe84ab7f98e0de6
kernel-devel-2.6.9-67.EL.ppc64.rpm SHA-256: 095063200ead35ef0ae9a1d9efd735aac0ac81dc8bf6af8ec4932272f31cfed7
kernel-devel-2.6.9-67.EL.ppc64iseries.rpm SHA-256: 3fce13c7a1eb125bb11ca1cdbc995a1975f50c194e0c316249025f244b01c307
kernel-doc-2.6.9-67.EL.noarch.rpm SHA-256: 0dcb31f537b662ac8ac925c22707172ef15753753f15bd2eef8bdeebb01469d8
kernel-largesmp-2.6.9-67.EL.ppc64.rpm SHA-256: 51cff0a5a9a1784164c5886be0b577f48c153cc70a2602f1195d787a997a69cb
kernel-largesmp-devel-2.6.9-67.EL.ppc64.rpm SHA-256: 39c5c5316ff5286251736a5de0953e3abea018c52a198346842ebd70db515b25

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter