- Issued:
- 2007-11-01
- Updated:
- 2007-11-01
RHSA-2007:0939 - Security Advisory
Synopsis
Important: kernel security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix various security issues in the Red Hat
Enterprise Linux 4 kernel are now available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Description
The Linux kernel is the core of the operating system.
These updated kernel packages contain fixes for the following security
issues:
- A flaw was found in the handling of process death signals. This allowed a
local user to send arbitrary signals to the suid-process executed by that
user. A successful exploitation of this flaw depends on the structure of
the suid-program and its signal handling. (CVE-2007-3848, Important)
- A flaw was found in the CIFS file system. This could cause the umask
values of a process to not be honored on CIFS file systems where UNIX
extensions are supported. (CVE-2007-3740, Important)
- A flaw was found in the VFAT compat ioctl handling on 64-bit systems.
This allowed a local user to corrupt a kernel_dirent struct and cause a
denial of service. (CVE-2007-2878, Important)
- A flaw was found in the Advanced Linux Sound Architecture (ALSA). A local
user who had the ability to read the /proc/driver/snd-page-alloc file could
see portions of kernel memory. (CVE-2007-4571, Moderate)
- A flaw was found in the aacraid SCSI driver. This allowed a local user to
make ioctl calls to the driver that should be restricted to privileged
users. (CVE-2007-4308, Moderate)
- A flaw was found in the stack expansion when using the hugetlb kernel on
PowerPC systems. This allowed a local user to cause a denial of service.
(CVE-2007-3739, Moderate)
- A flaw was found in the handling of zombie processes. A local user could
create processes that would not be properly reaped which could lead to a
denial of service. (CVE-2006-6921, Moderate)
- A flaw was found in the CIFS file system handling. The mount option
"sec=" did not enable integrity checking or produce an error message if
used. (CVE-2007-3843, Low)
- A flaw was found in the random number generator implementation that
allowed a local user to cause a denial of service or possibly gain
privileges. This flaw could be exploited if the root user raised the
default wakeup threshold over the size of the output pool.
(CVE-2007-3105, Low)
Additionally, the following bugs were fixed:
- A flaw was found in the kernel netpoll code, creating a potential
deadlock condition. If the xmit_lock for a given network interface is
held, and a subsequent netpoll event is generated from within the lock
owning context (a console message for example), deadlock on that cpu will
result, because the netpoll code will attempt to re-acquire the xmit_lock.
The fix is to, in the netpoll code, only attempt to take the lock, and
fail if it is already acquired (rather than block on it), and queue the
message to be sent for later delivery. Any user of netpoll code in the
kernel (netdump or netconsole services), is exposed to this problem, and
should resolve the issue by upgrading to this kernel release immediately.
- A flaw was found where, under 64-bit mode (x86_64), AMD processors were
not able to address greater than a 40-bit physical address space; and Intel
processors were only able to address up to a 36-bit physical address space.
The fix is to increase the physical addressing for an AMD processor to 48
bits, and an Intel processor to 38 bits. Please see the Red Hat
Knowledgebase for more detailed information.
- A flaw was found in the xenU kernel that may prevent a paravirtualized
guest with more than one CPU from starting when running under an Enterprise
Linux 5.1 hypervisor. The fix is to allow your Enterprise Linux 4 Xen SMP
guests to boot under a 5.1 hypervisor. Please see the Red Hat Knowledgebase
for more detailed information.
Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to correct these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc
Fixes
- BZ - 247726 - CVE-2007-2878 VFAT compat ioctls DoS on 64-bit
- BZ - 248126 - autofs problem with symbolic links
- BZ - 248325 - CVE-2007-3105 Bound check ordering issue in random driver
- BZ - 250972 - CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG
- BZ - 252309 - CVE-2007-4308 Missing ioctl() permission checks in aacraid driver
- BZ - 275881 - CVE-2007-3740 CIFS should honor umask
- BZ - 275901 - CVE-2007-3843 CIFS signing sec= mount options don't work correctly
- BZ - 282351 - [PATCH] Fix memory leak of dma_alloc_coherent() on x86_64
- BZ - 288961 - CVE-2007-4571 ALSA memory disclosure flaw
- BZ - 294941 - CVE-2007-3739 LTC36188-Don't allow the stack to grow into hugetlb reserved regions
- BZ - 302921 - CVE-2006-6921 denial of service with wedged processes
- BZ - 320791 - EL4.5: Improperly flushed TLBs may lead to Machine check errors
CVEs
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
kernel-2.6.9-55.0.12.EL.src.rpm | SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281 |
x86_64 | |
kernel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee |
kernel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee |
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e |
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb |
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb |
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4 |
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279 |
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279 |
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7 |
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7 |
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480 |
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480 |
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb |
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb |
ia64 | |
kernel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff |
kernel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff |
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863 |
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83 |
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715 |
i386 | |
kernel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5 |
kernel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5 |
kernel-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026 |
kernel-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866 |
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866 |
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f |
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f |
kernel-smp-2.6.9-55.0.12.EL.i686.rpm | SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3 |
kernel-smp-2.6.9-55.0.12.EL.i686.rpm | SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3 |
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46 |
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46 |
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b |
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b |
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5 |
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.12.EL.src.rpm | SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281 |
x86_64 | |
kernel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee |
kernel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee |
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e |
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb |
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb |
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4 |
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279 |
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279 |
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7 |
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7 |
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480 |
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480 |
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb |
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb |
ia64 | |
kernel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff |
kernel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff |
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863 |
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83 |
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715 |
i386 | |
kernel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5 |
kernel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5 |
kernel-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026 |
kernel-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866 |
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866 |
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f |
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f |
kernel-smp-2.6.9-55.0.12.EL.i686.rpm | SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3 |
kernel-smp-2.6.9-55.0.12.EL.i686.rpm | SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3 |
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46 |
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46 |
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b |
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b |
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5 |
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
kernel-2.6.9-55.0.12.EL.src.rpm | SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281 |
x86_64 | |
kernel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee |
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb |
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4 |
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279 |
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7 |
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480 |
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb |
ia64 | |
kernel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff |
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm | SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715 |
i386 | |
kernel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5 |
kernel-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866 |
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f |
kernel-smp-2.6.9-55.0.12.EL.i686.rpm | SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3 |
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46 |
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b |
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
kernel-2.6.9-55.0.12.EL.src.rpm | SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281 |
x86_64 | |
kernel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee |
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb |
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4 |
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279 |
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7 |
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480 |
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm | SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb |
i386 | |
kernel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5 |
kernel-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm | SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866 |
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f |
kernel-smp-2.6.9-55.0.12.EL.i686.rpm | SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3 |
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46 |
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b |
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm | SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
kernel-2.6.9-55.0.12.EL.src.rpm | SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281 |
s390x | |
kernel-2.6.9-55.0.12.EL.s390x.rpm | SHA-256: 75dafb3347b6a92e411963d533f63cc603294f2b7e4faf3b0f3e47c818a92d40 |
kernel-devel-2.6.9-55.0.12.EL.s390x.rpm | SHA-256: 5748499ff249e1f8bb17102687702ac823ea6d72981099d9a5c2b94e4888833f |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
s390 | |
kernel-2.6.9-55.0.12.EL.s390.rpm | SHA-256: a600e11388046996c648029aaf36a6e7d36aec9367486fd8659647946d8df4e9 |
kernel-devel-2.6.9-55.0.12.EL.s390.rpm | SHA-256: 7a02ea0b3c470d6a2c3ad94450497bdbb00b7bf62ea7234e4002182d9ff700ef |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.12.EL.src.rpm | SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281 |
s390x | |
kernel-2.6.9-55.0.12.EL.s390x.rpm | SHA-256: 75dafb3347b6a92e411963d533f63cc603294f2b7e4faf3b0f3e47c818a92d40 |
kernel-devel-2.6.9-55.0.12.EL.s390x.rpm | SHA-256: 5748499ff249e1f8bb17102687702ac823ea6d72981099d9a5c2b94e4888833f |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
s390 | |
kernel-2.6.9-55.0.12.EL.s390.rpm | SHA-256: a600e11388046996c648029aaf36a6e7d36aec9367486fd8659647946d8df4e9 |
kernel-devel-2.6.9-55.0.12.EL.s390.rpm | SHA-256: 7a02ea0b3c470d6a2c3ad94450497bdbb00b7bf62ea7234e4002182d9ff700ef |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
kernel-2.6.9-55.0.12.EL.src.rpm | SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281 |
ppc | |
kernel-2.6.9-55.0.12.EL.ppc64.rpm | SHA-256: 2b73fe827195bb6ea7021f74025cec9aa939c39b49811a95a3f06f333c63ac3d |
kernel-2.6.9-55.0.12.EL.ppc64iseries.rpm | SHA-256: 8f8cfb947a1f29e30ad652df9fcec3f537379bdb98f008c3873c2a5b455e2141 |
kernel-devel-2.6.9-55.0.12.EL.ppc64.rpm | SHA-256: 0bfd0e5cf1231859bd80e6a2d8b0c50a98b10d1d54149ed42daf8041d2df9e09 |
kernel-devel-2.6.9-55.0.12.EL.ppc64iseries.rpm | SHA-256: 1c33e0abae88f85204566d46b974d033c76c0332233e4bf232974280f9f20e50 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.ppc64.rpm | SHA-256: b7f9fb4deb48ddbec347cd7b46991bacd7b23d538702572384c8e8e641af2972 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.ppc64.rpm | SHA-256: 5cdb3c89926a68def597aa6ef7bd173ce7c234c7e2f74f07bfab472bad9d583c |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5
SRPM | |
---|---|
kernel-2.6.9-55.0.12.EL.src.rpm | SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281 |
ppc | |
kernel-2.6.9-55.0.12.EL.ppc64.rpm | SHA-256: 2b73fe827195bb6ea7021f74025cec9aa939c39b49811a95a3f06f333c63ac3d |
kernel-2.6.9-55.0.12.EL.ppc64iseries.rpm | SHA-256: 8f8cfb947a1f29e30ad652df9fcec3f537379bdb98f008c3873c2a5b455e2141 |
kernel-devel-2.6.9-55.0.12.EL.ppc64.rpm | SHA-256: 0bfd0e5cf1231859bd80e6a2d8b0c50a98b10d1d54149ed42daf8041d2df9e09 |
kernel-devel-2.6.9-55.0.12.EL.ppc64iseries.rpm | SHA-256: 1c33e0abae88f85204566d46b974d033c76c0332233e4bf232974280f9f20e50 |
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm | SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff |
kernel-largesmp-2.6.9-55.0.12.EL.ppc64.rpm | SHA-256: b7f9fb4deb48ddbec347cd7b46991bacd7b23d538702572384c8e8e641af2972 |
kernel-largesmp-devel-2.6.9-55.0.12.EL.ppc64.rpm | SHA-256: 5cdb3c89926a68def597aa6ef7bd173ce7c234c7e2f74f07bfab472bad9d583c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.