Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2007:0488 - Security Advisory
Issued:
2007-06-25
Updated:
2007-06-25

RHSA-2007:0488 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues and bugs in the
Red Hat Enterprise Linux 4 kernel are now available.

This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.

Description

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

  • a flaw in the connection tracking support for SCTP that allowed a remote

user to cause a denial of service by dereferencing a NULL pointer.
(CVE-2007-2876, Important)

  • a flaw in the mount handling routine for 64-bit systems that allowed a

local user to cause denial of service (crash). (CVE-2006-7203, Important)

  • a flaw in the IPv4 forwarding base that allowed a local user to cause an

out-of-bounds access. (CVE-2007-2172, Important)

  • a flaw in the PPP over Ethernet implementation that allowed a local user

to cause a denial of service (memory consumption) by creating a socket
using connect and then releasing it before the PPPIOCGCHAN ioctl has been
called. (CVE-2007-2525, Important)

  • a flaw in the fput ioctl handling of 32-bit applications running on

64-bit platforms that allowed a local user to cause a denial of service
(panic). (CVE-2007-0773, Important)

  • a flaw in the NFS locking daemon that allowed a local user to cause

denial of service (deadlock). (CVE-2006-5158, Moderate)

  • a flaw in the sysfs_readdir function that allowed a local user to cause a

denial of service by dereferencing a NULL pointer. (CVE-2007-3104, Moderate)

  • a flaw in the core-dump handling that allowed a local user to create core

dumps from unreadable binaries via PT_INTERP. (CVE-2007-0958, Low)

  • a flaw in the Bluetooth subsystem that allowed a local user to trigger an

information leak. (CVE-2007-1353, Low)

In addition, the following bugs were addressed:

  • the NFS could recurse on the same spinlock. Also, NFS, under certain

conditions, did not completely clean up Posix locks on a file close,
leading to mount failures.

  • the 32bit compatibility didn't return to userspace correct values for the

rt_sigtimedwait system call.

  • the count for unused inodes could be incorrect at times, resulting in

dirty data not being written to disk in a timely manner.

  • the cciss driver had an incorrect disk size calculation (off-by-one

error) which prevented disk dumps.

Red Hat would like to thank Ilja van Sprundel and the OpenVZ Linux kernel
team for reporting issues fixed in this erratum.

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc

Fixes

  • BZ - 240855 - kernel spinlock panic in inode.c
  • BZ - 241784 - dirty data is not flushed on a timely manner
  • BZ - 242558 - CVE-2007-3104 Null pointer to an inode in a dentry can cause an oops in sysfs_readdir
  • BZ - 243251 - CVE-2006-5158 NFS lockd deadlock
  • BZ - 243252 - CVE-2007-0773 lost fput in a 32-bit ioctl on 64-bit x86 systems
  • BZ - 243256 - CVE-2007-0958 core-dumping unreadable binaries via PT_INTERP
  • BZ - 243259 - CVE-2007-1353 Bluetooth setsockopt() information leaks
  • BZ - 243261 - CVE-2007-2172 fib_semantics.c out of bounds access vulnerability
  • BZ - 243262 - CVE-2007-2525 PPPoE socket PPPIOCGCHAN denial of service
  • BZ - 243263 - CVE-2006-7203 oops in compat_sys_mount() when data pointer is NULL
  • BZ - 243746 - CVE-2007-2876 {ip, nf}_conntrack_sctp: remotely triggerable NULL ptr dereference
  • BZ - 243902 - diskdump to cciss fails due to off-by-one size calculation

CVEs

  • CVE-2007-0958
  • CVE-2007-2172
  • CVE-2007-2525
  • CVE-2006-7203
  • CVE-2007-1353
  • CVE-2007-0773
  • CVE-2006-5158
  • CVE-2007-3104
  • CVE-2007-2876

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-55.0.2.EL.src.rpm SHA-256: 3ca713a06695650e75d8950a790cae3782d7a7c88776d846db68af3507c6a091
x86_64
kernel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 46385ac83ad803b0213b9fa29dd4a13a4a852d555a8d2fa1aaa09cb1cc4f5e85
kernel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 46385ac83ad803b0213b9fa29dd4a13a4a852d555a8d2fa1aaa09cb1cc4f5e85
kernel-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: dd98d49a8d294921eb5c84355bd70291726f41fd926108adcf0c7f7dfa5551ad
kernel-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: dd98d49a8d294921eb5c84355bd70291726f41fd926108adcf0c7f7dfa5551ad
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 38b0852e13d654cbb788fc2a273e29f84f437bbe48ab44784854c18fc7bd4d11
kernel-largesmp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 38b0852e13d654cbb788fc2a273e29f84f437bbe48ab44784854c18fc7bd4d11
kernel-largesmp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1b5eda12bb2dd73cdca3ba2ad9d8cadd76c4958735827d285e5aa478c277cf5b
kernel-largesmp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1b5eda12bb2dd73cdca3ba2ad9d8cadd76c4958735827d285e5aa478c277cf5b
kernel-smp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 913298e764992d04d940a4329a49fad47cd757d946ac4840ce69ed6db06b5dbe
kernel-smp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 913298e764992d04d940a4329a49fad47cd757d946ac4840ce69ed6db06b5dbe
kernel-smp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: cc78c8bd7aba9103665152f0c78b891277e08206a0d8caf399172c04f5f26388
kernel-smp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: cc78c8bd7aba9103665152f0c78b891277e08206a0d8caf399172c04f5f26388
kernel-xenU-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1847d3fbfcfd971986b585833c60e6e49386c9a6b0fc83169e763f865d8c657f
kernel-xenU-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1847d3fbfcfd971986b585833c60e6e49386c9a6b0fc83169e763f865d8c657f
kernel-xenU-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: f36bd22641dd76e1d7a722ca5616f3efba5d6d66552d2fff196ae1e2fe0aea41
kernel-xenU-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: f36bd22641dd76e1d7a722ca5616f3efba5d6d66552d2fff196ae1e2fe0aea41
ia64
kernel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 8f76d1e0f68020124f793a601f9ffe02df2d455a1183fc942fb66ffe173bb869
kernel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 8f76d1e0f68020124f793a601f9ffe02df2d455a1183fc942fb66ffe173bb869
kernel-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 46414a274e71f11667f324ec3f24067ef2c9688d97417097a0c9aec8bb4f974b
kernel-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 46414a274e71f11667f324ec3f24067ef2c9688d97417097a0c9aec8bb4f974b
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 067ae23b601c003158c92aec945dee221f4ee5dc9d576045cd0c6487cf2dec24
kernel-largesmp-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 067ae23b601c003158c92aec945dee221f4ee5dc9d576045cd0c6487cf2dec24
kernel-largesmp-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 489071ddca7a23d1380d9b968a978b9118214ea4ded3f4347b64521a7eb894db
kernel-largesmp-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 489071ddca7a23d1380d9b968a978b9118214ea4ded3f4347b64521a7eb894db
i386
kernel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 070346119354741343a5ec10a219784c4ac40654bd3cc6db64cade7ba1c49960
kernel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 070346119354741343a5ec10a219784c4ac40654bd3cc6db64cade7ba1c49960
kernel-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: d98167416387092e0274f44d2a5fe0e37f9b8c13653e5ed749d6d59f661d9db4
kernel-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: d98167416387092e0274f44d2a5fe0e37f9b8c13653e5ed749d6d59f661d9db4
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-hugemem-2.6.9-55.0.2.EL.i686.rpm SHA-256: bafc50670cfbe4ccfe8a45a50721877d72eb4cf572f7a63f10b763a673d88183
kernel-hugemem-2.6.9-55.0.2.EL.i686.rpm SHA-256: bafc50670cfbe4ccfe8a45a50721877d72eb4cf572f7a63f10b763a673d88183
kernel-hugemem-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: f4f8dfc8c35e4d4224e60d9e9980d9ba6ae64ce8d19f0220b90873a88fa2fe5b
kernel-hugemem-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: f4f8dfc8c35e4d4224e60d9e9980d9ba6ae64ce8d19f0220b90873a88fa2fe5b
kernel-smp-2.6.9-55.0.2.EL.i686.rpm SHA-256: a078287911fbd6c84dff52ce8cfa944810e7aefbbd2d8ff5f9a08021f6acb3d3
kernel-smp-2.6.9-55.0.2.EL.i686.rpm SHA-256: a078287911fbd6c84dff52ce8cfa944810e7aefbbd2d8ff5f9a08021f6acb3d3
kernel-smp-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 37fc2275ab34247b2c2cd481afa504343971c59947f16a523f149f692c6b67e4
kernel-smp-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 37fc2275ab34247b2c2cd481afa504343971c59947f16a523f149f692c6b67e4
kernel-xenU-2.6.9-55.0.2.EL.i686.rpm SHA-256: be97dfcc343c48a759c583d7f94b2c28a46a3bed5dbbf086eca8ca5b53da75fa
kernel-xenU-2.6.9-55.0.2.EL.i686.rpm SHA-256: be97dfcc343c48a759c583d7f94b2c28a46a3bed5dbbf086eca8ca5b53da75fa
kernel-xenU-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: cbdd4a11a6aac7d9273449212006cce09cfc30190ec0b6b28f83707e2494e1d3
kernel-xenU-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: cbdd4a11a6aac7d9273449212006cce09cfc30190ec0b6b28f83707e2494e1d3

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.2.EL.src.rpm SHA-256: 3ca713a06695650e75d8950a790cae3782d7a7c88776d846db68af3507c6a091
x86_64
kernel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 46385ac83ad803b0213b9fa29dd4a13a4a852d555a8d2fa1aaa09cb1cc4f5e85
kernel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 46385ac83ad803b0213b9fa29dd4a13a4a852d555a8d2fa1aaa09cb1cc4f5e85
kernel-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: dd98d49a8d294921eb5c84355bd70291726f41fd926108adcf0c7f7dfa5551ad
kernel-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: dd98d49a8d294921eb5c84355bd70291726f41fd926108adcf0c7f7dfa5551ad
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 38b0852e13d654cbb788fc2a273e29f84f437bbe48ab44784854c18fc7bd4d11
kernel-largesmp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 38b0852e13d654cbb788fc2a273e29f84f437bbe48ab44784854c18fc7bd4d11
kernel-largesmp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1b5eda12bb2dd73cdca3ba2ad9d8cadd76c4958735827d285e5aa478c277cf5b
kernel-largesmp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1b5eda12bb2dd73cdca3ba2ad9d8cadd76c4958735827d285e5aa478c277cf5b
kernel-smp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 913298e764992d04d940a4329a49fad47cd757d946ac4840ce69ed6db06b5dbe
kernel-smp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 913298e764992d04d940a4329a49fad47cd757d946ac4840ce69ed6db06b5dbe
kernel-smp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: cc78c8bd7aba9103665152f0c78b891277e08206a0d8caf399172c04f5f26388
kernel-smp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: cc78c8bd7aba9103665152f0c78b891277e08206a0d8caf399172c04f5f26388
kernel-xenU-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1847d3fbfcfd971986b585833c60e6e49386c9a6b0fc83169e763f865d8c657f
kernel-xenU-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1847d3fbfcfd971986b585833c60e6e49386c9a6b0fc83169e763f865d8c657f
kernel-xenU-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: f36bd22641dd76e1d7a722ca5616f3efba5d6d66552d2fff196ae1e2fe0aea41
kernel-xenU-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: f36bd22641dd76e1d7a722ca5616f3efba5d6d66552d2fff196ae1e2fe0aea41
ia64
kernel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 8f76d1e0f68020124f793a601f9ffe02df2d455a1183fc942fb66ffe173bb869
kernel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 8f76d1e0f68020124f793a601f9ffe02df2d455a1183fc942fb66ffe173bb869
kernel-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 46414a274e71f11667f324ec3f24067ef2c9688d97417097a0c9aec8bb4f974b
kernel-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 46414a274e71f11667f324ec3f24067ef2c9688d97417097a0c9aec8bb4f974b
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 067ae23b601c003158c92aec945dee221f4ee5dc9d576045cd0c6487cf2dec24
kernel-largesmp-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 067ae23b601c003158c92aec945dee221f4ee5dc9d576045cd0c6487cf2dec24
kernel-largesmp-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 489071ddca7a23d1380d9b968a978b9118214ea4ded3f4347b64521a7eb894db
kernel-largesmp-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 489071ddca7a23d1380d9b968a978b9118214ea4ded3f4347b64521a7eb894db
i386
kernel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 070346119354741343a5ec10a219784c4ac40654bd3cc6db64cade7ba1c49960
kernel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 070346119354741343a5ec10a219784c4ac40654bd3cc6db64cade7ba1c49960
kernel-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: d98167416387092e0274f44d2a5fe0e37f9b8c13653e5ed749d6d59f661d9db4
kernel-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: d98167416387092e0274f44d2a5fe0e37f9b8c13653e5ed749d6d59f661d9db4
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-hugemem-2.6.9-55.0.2.EL.i686.rpm SHA-256: bafc50670cfbe4ccfe8a45a50721877d72eb4cf572f7a63f10b763a673d88183
kernel-hugemem-2.6.9-55.0.2.EL.i686.rpm SHA-256: bafc50670cfbe4ccfe8a45a50721877d72eb4cf572f7a63f10b763a673d88183
kernel-hugemem-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: f4f8dfc8c35e4d4224e60d9e9980d9ba6ae64ce8d19f0220b90873a88fa2fe5b
kernel-hugemem-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: f4f8dfc8c35e4d4224e60d9e9980d9ba6ae64ce8d19f0220b90873a88fa2fe5b
kernel-smp-2.6.9-55.0.2.EL.i686.rpm SHA-256: a078287911fbd6c84dff52ce8cfa944810e7aefbbd2d8ff5f9a08021f6acb3d3
kernel-smp-2.6.9-55.0.2.EL.i686.rpm SHA-256: a078287911fbd6c84dff52ce8cfa944810e7aefbbd2d8ff5f9a08021f6acb3d3
kernel-smp-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 37fc2275ab34247b2c2cd481afa504343971c59947f16a523f149f692c6b67e4
kernel-smp-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 37fc2275ab34247b2c2cd481afa504343971c59947f16a523f149f692c6b67e4
kernel-xenU-2.6.9-55.0.2.EL.i686.rpm SHA-256: be97dfcc343c48a759c583d7f94b2c28a46a3bed5dbbf086eca8ca5b53da75fa
kernel-xenU-2.6.9-55.0.2.EL.i686.rpm SHA-256: be97dfcc343c48a759c583d7f94b2c28a46a3bed5dbbf086eca8ca5b53da75fa
kernel-xenU-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: cbdd4a11a6aac7d9273449212006cce09cfc30190ec0b6b28f83707e2494e1d3
kernel-xenU-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: cbdd4a11a6aac7d9273449212006cce09cfc30190ec0b6b28f83707e2494e1d3

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-55.0.2.EL.src.rpm SHA-256: 3ca713a06695650e75d8950a790cae3782d7a7c88776d846db68af3507c6a091
x86_64
kernel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 46385ac83ad803b0213b9fa29dd4a13a4a852d555a8d2fa1aaa09cb1cc4f5e85
kernel-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: dd98d49a8d294921eb5c84355bd70291726f41fd926108adcf0c7f7dfa5551ad
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 38b0852e13d654cbb788fc2a273e29f84f437bbe48ab44784854c18fc7bd4d11
kernel-largesmp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1b5eda12bb2dd73cdca3ba2ad9d8cadd76c4958735827d285e5aa478c277cf5b
kernel-smp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 913298e764992d04d940a4329a49fad47cd757d946ac4840ce69ed6db06b5dbe
kernel-smp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: cc78c8bd7aba9103665152f0c78b891277e08206a0d8caf399172c04f5f26388
kernel-xenU-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1847d3fbfcfd971986b585833c60e6e49386c9a6b0fc83169e763f865d8c657f
kernel-xenU-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: f36bd22641dd76e1d7a722ca5616f3efba5d6d66552d2fff196ae1e2fe0aea41
ia64
kernel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 8f76d1e0f68020124f793a601f9ffe02df2d455a1183fc942fb66ffe173bb869
kernel-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 46414a274e71f11667f324ec3f24067ef2c9688d97417097a0c9aec8bb4f974b
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 067ae23b601c003158c92aec945dee221f4ee5dc9d576045cd0c6487cf2dec24
kernel-largesmp-devel-2.6.9-55.0.2.EL.ia64.rpm SHA-256: 489071ddca7a23d1380d9b968a978b9118214ea4ded3f4347b64521a7eb894db
i386
kernel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 070346119354741343a5ec10a219784c4ac40654bd3cc6db64cade7ba1c49960
kernel-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: d98167416387092e0274f44d2a5fe0e37f9b8c13653e5ed749d6d59f661d9db4
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-hugemem-2.6.9-55.0.2.EL.i686.rpm SHA-256: bafc50670cfbe4ccfe8a45a50721877d72eb4cf572f7a63f10b763a673d88183
kernel-hugemem-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: f4f8dfc8c35e4d4224e60d9e9980d9ba6ae64ce8d19f0220b90873a88fa2fe5b
kernel-smp-2.6.9-55.0.2.EL.i686.rpm SHA-256: a078287911fbd6c84dff52ce8cfa944810e7aefbbd2d8ff5f9a08021f6acb3d3
kernel-smp-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 37fc2275ab34247b2c2cd481afa504343971c59947f16a523f149f692c6b67e4
kernel-xenU-2.6.9-55.0.2.EL.i686.rpm SHA-256: be97dfcc343c48a759c583d7f94b2c28a46a3bed5dbbf086eca8ca5b53da75fa
kernel-xenU-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: cbdd4a11a6aac7d9273449212006cce09cfc30190ec0b6b28f83707e2494e1d3

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-55.0.2.EL.src.rpm SHA-256: 3ca713a06695650e75d8950a790cae3782d7a7c88776d846db68af3507c6a091
x86_64
kernel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 46385ac83ad803b0213b9fa29dd4a13a4a852d555a8d2fa1aaa09cb1cc4f5e85
kernel-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: dd98d49a8d294921eb5c84355bd70291726f41fd926108adcf0c7f7dfa5551ad
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 38b0852e13d654cbb788fc2a273e29f84f437bbe48ab44784854c18fc7bd4d11
kernel-largesmp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1b5eda12bb2dd73cdca3ba2ad9d8cadd76c4958735827d285e5aa478c277cf5b
kernel-smp-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 913298e764992d04d940a4329a49fad47cd757d946ac4840ce69ed6db06b5dbe
kernel-smp-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: cc78c8bd7aba9103665152f0c78b891277e08206a0d8caf399172c04f5f26388
kernel-xenU-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: 1847d3fbfcfd971986b585833c60e6e49386c9a6b0fc83169e763f865d8c657f
kernel-xenU-devel-2.6.9-55.0.2.EL.x86_64.rpm SHA-256: f36bd22641dd76e1d7a722ca5616f3efba5d6d66552d2fff196ae1e2fe0aea41
i386
kernel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 070346119354741343a5ec10a219784c4ac40654bd3cc6db64cade7ba1c49960
kernel-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: d98167416387092e0274f44d2a5fe0e37f9b8c13653e5ed749d6d59f661d9db4
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-hugemem-2.6.9-55.0.2.EL.i686.rpm SHA-256: bafc50670cfbe4ccfe8a45a50721877d72eb4cf572f7a63f10b763a673d88183
kernel-hugemem-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: f4f8dfc8c35e4d4224e60d9e9980d9ba6ae64ce8d19f0220b90873a88fa2fe5b
kernel-smp-2.6.9-55.0.2.EL.i686.rpm SHA-256: a078287911fbd6c84dff52ce8cfa944810e7aefbbd2d8ff5f9a08021f6acb3d3
kernel-smp-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: 37fc2275ab34247b2c2cd481afa504343971c59947f16a523f149f692c6b67e4
kernel-xenU-2.6.9-55.0.2.EL.i686.rpm SHA-256: be97dfcc343c48a759c583d7f94b2c28a46a3bed5dbbf086eca8ca5b53da75fa
kernel-xenU-devel-2.6.9-55.0.2.EL.i686.rpm SHA-256: cbdd4a11a6aac7d9273449212006cce09cfc30190ec0b6b28f83707e2494e1d3

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-55.0.2.EL.src.rpm SHA-256: 3ca713a06695650e75d8950a790cae3782d7a7c88776d846db68af3507c6a091
s390x
kernel-2.6.9-55.0.2.EL.s390x.rpm SHA-256: 2d4d1e4ccdccec2ac61a8b0040b31fc0d53da3373cefaf60487286f81eddab54
kernel-devel-2.6.9-55.0.2.EL.s390x.rpm SHA-256: 9e07ed49252648a17e4d3777dc5f8839d9516b9f1313f9789af901c8d8748453
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
s390
kernel-2.6.9-55.0.2.EL.s390.rpm SHA-256: e9360edc325de835cd907be273ef5c332cbb66e969df4f127a8537af5e66fa47
kernel-devel-2.6.9-55.0.2.EL.s390.rpm SHA-256: 3046029a33ad6d72a07af2cee165a775ddb87f4db110b5fb2d12909632cc1607
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.2.EL.src.rpm SHA-256: 3ca713a06695650e75d8950a790cae3782d7a7c88776d846db68af3507c6a091
s390x
kernel-2.6.9-55.0.2.EL.s390x.rpm SHA-256: 2d4d1e4ccdccec2ac61a8b0040b31fc0d53da3373cefaf60487286f81eddab54
kernel-devel-2.6.9-55.0.2.EL.s390x.rpm SHA-256: 9e07ed49252648a17e4d3777dc5f8839d9516b9f1313f9789af901c8d8748453
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
s390
kernel-2.6.9-55.0.2.EL.s390.rpm SHA-256: e9360edc325de835cd907be273ef5c332cbb66e969df4f127a8537af5e66fa47
kernel-devel-2.6.9-55.0.2.EL.s390.rpm SHA-256: 3046029a33ad6d72a07af2cee165a775ddb87f4db110b5fb2d12909632cc1607
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-55.0.2.EL.src.rpm SHA-256: 3ca713a06695650e75d8950a790cae3782d7a7c88776d846db68af3507c6a091
ppc
kernel-2.6.9-55.0.2.EL.ppc64.rpm SHA-256: b51ec3ef92b78bedbac925e25f2235790281e8c69468278781813f0fa7976693
kernel-2.6.9-55.0.2.EL.ppc64iseries.rpm SHA-256: 20984b4f0672d12d423709f68d57bef0cffaac4e34dd0fb24a8c0b9071dc378e
kernel-devel-2.6.9-55.0.2.EL.ppc64.rpm SHA-256: c8a58b2dccf4da5fee9f501ed782f49747dae68bd11b222a3c58cdc9d05895ac
kernel-devel-2.6.9-55.0.2.EL.ppc64iseries.rpm SHA-256: 6937c098ea02a639047faa50fdb78c7934e4a9ef732edd302e70545ec63f2dc0
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.ppc64.rpm SHA-256: 9208b12ae4796919499804dac88b85befa98ca9df6c2f277323e051e716a3010
kernel-largesmp-devel-2.6.9-55.0.2.EL.ppc64.rpm SHA-256: 0dc272e60d673b661259a608b174f16a77b0190a3331f6731e65ba0b11c7cf8a

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.2.EL.src.rpm SHA-256: 3ca713a06695650e75d8950a790cae3782d7a7c88776d846db68af3507c6a091
ppc
kernel-2.6.9-55.0.2.EL.ppc64.rpm SHA-256: b51ec3ef92b78bedbac925e25f2235790281e8c69468278781813f0fa7976693
kernel-2.6.9-55.0.2.EL.ppc64iseries.rpm SHA-256: 20984b4f0672d12d423709f68d57bef0cffaac4e34dd0fb24a8c0b9071dc378e
kernel-devel-2.6.9-55.0.2.EL.ppc64.rpm SHA-256: c8a58b2dccf4da5fee9f501ed782f49747dae68bd11b222a3c58cdc9d05895ac
kernel-devel-2.6.9-55.0.2.EL.ppc64iseries.rpm SHA-256: 6937c098ea02a639047faa50fdb78c7934e4a9ef732edd302e70545ec63f2dc0
kernel-doc-2.6.9-55.0.2.EL.noarch.rpm SHA-256: caaae8494b1cd897b9793991535147c416bf4ddf5863d8aec1f7e4e65e0e5ad1
kernel-largesmp-2.6.9-55.0.2.EL.ppc64.rpm SHA-256: 9208b12ae4796919499804dac88b85befa98ca9df6c2f277323e051e716a3010
kernel-largesmp-devel-2.6.9-55.0.2.EL.ppc64.rpm SHA-256: 0dc272e60d673b661259a608b174f16a77b0190a3331f6731e65ba0b11c7cf8a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility