Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2007:0939 - Security Advisory
Issued:
2007-11-01
Updated:
2007-11-01

RHSA-2007:0939 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix various security issues in the Red Hat
Enterprise Linux 4 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The Linux kernel is the core of the operating system.

These updated kernel packages contain fixes for the following security
issues:

  • A flaw was found in the handling of process death signals. This allowed a
    local user to send arbitrary signals to the suid-process executed by that
    user. A successful exploitation of this flaw depends on the structure of
    the suid-program and its signal handling. (CVE-2007-3848, Important)
  • A flaw was found in the CIFS file system. This could cause the umask
    values of a process to not be honored on CIFS file systems where UNIX
    extensions are supported. (CVE-2007-3740, Important)
  • A flaw was found in the VFAT compat ioctl handling on 64-bit systems.
    This allowed a local user to corrupt a kernel_dirent struct and cause a
    denial of service. (CVE-2007-2878, Important)
  • A flaw was found in the Advanced Linux Sound Architecture (ALSA). A local
    user who had the ability to read the /proc/driver/snd-page-alloc file could
    see portions of kernel memory. (CVE-2007-4571, Moderate)
  • A flaw was found in the aacraid SCSI driver. This allowed a local user to
    make ioctl calls to the driver that should be restricted to privileged
    users. (CVE-2007-4308, Moderate)
  • A flaw was found in the stack expansion when using the hugetlb kernel on
    PowerPC systems. This allowed a local user to cause a denial of service.
    (CVE-2007-3739, Moderate)
  • A flaw was found in the handling of zombie processes. A local user could
    create processes that would not be properly reaped which could lead to a
    denial of service. (CVE-2006-6921, Moderate)
  • A flaw was found in the CIFS file system handling. The mount option
    "sec=" did not enable integrity checking or produce an error message if
    used. (CVE-2007-3843, Low)
  • A flaw was found in the random number generator implementation that
    allowed a local user to cause a denial of service or possibly gain
    privileges. This flaw could be exploited if the root user raised the
    default wakeup threshold over the size of the output pool.
    (CVE-2007-3105, Low)

Additionally, the following bugs were fixed:

  • A flaw was found in the kernel netpoll code, creating a potential
    deadlock condition. If the xmit_lock for a given network interface is
    held, and a subsequent netpoll event is generated from within the lock
    owning context (a console message for example), deadlock on that cpu will
    result, because the netpoll code will attempt to re-acquire the xmit_lock.
    The fix is to, in the netpoll code, only attempt to take the lock, and
    fail if it is already acquired (rather than block on it), and queue the
    message to be sent for later delivery. Any user of netpoll code in the
    kernel (netdump or netconsole services), is exposed to this problem, and
    should resolve the issue by upgrading to this kernel release immediately.
  • A flaw was found where, under 64-bit mode (x86_64), AMD processors were
    not able to address greater than a 40-bit physical address space; and Intel
    processors were only able to address up to a 36-bit physical address space.
    The fix is to increase the physical addressing for an AMD processor to 48
    bits, and an Intel processor to 38 bits. Please see the Red Hat
    Knowledgebase for more detailed information.
  • A flaw was found in the xenU kernel that may prevent a paravirtualized
    guest with more than one CPU from starting when running under an Enterprise
    Linux 5.1 hypervisor. The fix is to allow your Enterprise Linux 4 Xen SMP
    guests to boot under a 5.1 hypervisor. Please see the Red Hat Knowledgebase
    for more detailed information.

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to correct these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server - Extended Update Support 4.5 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 4.5 ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 4.5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc

Fixes

  • BZ - 247726 - CVE-2007-2878 VFAT compat ioctls DoS on 64-bit
  • BZ - 248126 - autofs problem with symbolic links
  • BZ - 248325 - CVE-2007-3105 Bound check ordering issue in random driver
  • BZ - 250972 - CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG
  • BZ - 252309 - CVE-2007-4308 Missing ioctl() permission checks in aacraid driver
  • BZ - 275881 - CVE-2007-3740 CIFS should honor umask
  • BZ - 275901 - CVE-2007-3843 CIFS signing sec= mount options don't work correctly
  • BZ - 282351 - [PATCH] Fix memory leak of dma_alloc_coherent() on x86_64
  • BZ - 288961 - CVE-2007-4571 ALSA memory disclosure flaw
  • BZ - 294941 - CVE-2007-3739 LTC36188-Don't allow the stack to grow into hugetlb reserved regions
  • BZ - 302921 - CVE-2006-6921 denial of service with wedged processes
  • BZ - 320791 - EL4.5: Improperly flushed TLBs may lead to Machine check errors

CVEs

  • CVE-2007-3740
  • CVE-2007-3843
  • CVE-2007-3739
  • CVE-2007-2878
  • CVE-2007-3105
  • CVE-2007-4308
  • CVE-2007-3848
  • CVE-2006-6921
  • CVE-2007-4571

References

  • http://kbase.redhat.com/
  • http://kbase.redhat.com/faq/FAQ_42_11697.shtm
  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
x86_64
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
ia64
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
i386
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5

Red Hat Enterprise Linux Server - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
x86_64
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
ia64
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
i386
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
x86_64
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
ia64
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
i386
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
x86_64
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
i386
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
s390x
kernel-2.6.9-55.0.12.EL.s390x.rpm SHA-256: 75dafb3347b6a92e411963d533f63cc603294f2b7e4faf3b0f3e47c818a92d40
kernel-devel-2.6.9-55.0.12.EL.s390x.rpm SHA-256: 5748499ff249e1f8bb17102687702ac823ea6d72981099d9a5c2b94e4888833f
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
s390
kernel-2.6.9-55.0.12.EL.s390.rpm SHA-256: a600e11388046996c648029aaf36a6e7d36aec9367486fd8659647946d8df4e9
kernel-devel-2.6.9-55.0.12.EL.s390.rpm SHA-256: 7a02ea0b3c470d6a2c3ad94450497bdbb00b7bf62ea7234e4002182d9ff700ef
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
s390x
kernel-2.6.9-55.0.12.EL.s390x.rpm SHA-256: 75dafb3347b6a92e411963d533f63cc603294f2b7e4faf3b0f3e47c818a92d40
kernel-devel-2.6.9-55.0.12.EL.s390x.rpm SHA-256: 5748499ff249e1f8bb17102687702ac823ea6d72981099d9a5c2b94e4888833f
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
s390
kernel-2.6.9-55.0.12.EL.s390.rpm SHA-256: a600e11388046996c648029aaf36a6e7d36aec9367486fd8659647946d8df4e9
kernel-devel-2.6.9-55.0.12.EL.s390.rpm SHA-256: 7a02ea0b3c470d6a2c3ad94450497bdbb00b7bf62ea7234e4002182d9ff700ef
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
ppc
kernel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 2b73fe827195bb6ea7021f74025cec9aa939c39b49811a95a3f06f333c63ac3d
kernel-2.6.9-55.0.12.EL.ppc64iseries.rpm SHA-256: 8f8cfb947a1f29e30ad652df9fcec3f537379bdb98f008c3873c2a5b455e2141
kernel-devel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 0bfd0e5cf1231859bd80e6a2d8b0c50a98b10d1d54149ed42daf8041d2df9e09
kernel-devel-2.6.9-55.0.12.EL.ppc64iseries.rpm SHA-256: 1c33e0abae88f85204566d46b974d033c76c0332233e4bf232974280f9f20e50
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: b7f9fb4deb48ddbec347cd7b46991bacd7b23d538702572384c8e8e641af2972
kernel-largesmp-devel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 5cdb3c89926a68def597aa6ef7bd173ce7c234c7e2f74f07bfab472bad9d583c

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
ppc
kernel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 2b73fe827195bb6ea7021f74025cec9aa939c39b49811a95a3f06f333c63ac3d
kernel-2.6.9-55.0.12.EL.ppc64iseries.rpm SHA-256: 8f8cfb947a1f29e30ad652df9fcec3f537379bdb98f008c3873c2a5b455e2141
kernel-devel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 0bfd0e5cf1231859bd80e6a2d8b0c50a98b10d1d54149ed42daf8041d2df9e09
kernel-devel-2.6.9-55.0.12.EL.ppc64iseries.rpm SHA-256: 1c33e0abae88f85204566d46b974d033c76c0332233e4bf232974280f9f20e50
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: b7f9fb4deb48ddbec347cd7b46991bacd7b23d538702572384c8e8e641af2972
kernel-largesmp-devel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 5cdb3c89926a68def597aa6ef7bd173ce7c234c7e2f74f07bfab472bad9d583c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+