Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2007:0939 - Security Advisory
Issued:
2007-11-01
Updated:
2007-11-01

RHSA-2007:0939 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix various security issues in the Red Hat
Enterprise Linux 4 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The Linux kernel is the core of the operating system.

These updated kernel packages contain fixes for the following security
issues:

  • A flaw was found in the handling of process death signals. This allowed a

local user to send arbitrary signals to the suid-process executed by that
user. A successful exploitation of this flaw depends on the structure of
the suid-program and its signal handling. (CVE-2007-3848, Important)

  • A flaw was found in the CIFS file system. This could cause the umask

values of a process to not be honored on CIFS file systems where UNIX
extensions are supported. (CVE-2007-3740, Important)

  • A flaw was found in the VFAT compat ioctl handling on 64-bit systems.

This allowed a local user to corrupt a kernel_dirent struct and cause a
denial of service. (CVE-2007-2878, Important)

  • A flaw was found in the Advanced Linux Sound Architecture (ALSA). A local

user who had the ability to read the /proc/driver/snd-page-alloc file could
see portions of kernel memory. (CVE-2007-4571, Moderate)

  • A flaw was found in the aacraid SCSI driver. This allowed a local user to

make ioctl calls to the driver that should be restricted to privileged
users. (CVE-2007-4308, Moderate)

  • A flaw was found in the stack expansion when using the hugetlb kernel on

PowerPC systems. This allowed a local user to cause a denial of service.
(CVE-2007-3739, Moderate)

  • A flaw was found in the handling of zombie processes. A local user could

create processes that would not be properly reaped which could lead to a
denial of service. (CVE-2006-6921, Moderate)

  • A flaw was found in the CIFS file system handling. The mount option

"sec=" did not enable integrity checking or produce an error message if
used. (CVE-2007-3843, Low)

  • A flaw was found in the random number generator implementation that

allowed a local user to cause a denial of service or possibly gain
privileges. This flaw could be exploited if the root user raised the
default wakeup threshold over the size of the output pool.
(CVE-2007-3105, Low)

Additionally, the following bugs were fixed:

  • A flaw was found in the kernel netpoll code, creating a potential

deadlock condition. If the xmit_lock for a given network interface is
held, and a subsequent netpoll event is generated from within the lock
owning context (a console message for example), deadlock on that cpu will
result, because the netpoll code will attempt to re-acquire the xmit_lock.
The fix is to, in the netpoll code, only attempt to take the lock, and
fail if it is already acquired (rather than block on it), and queue the
message to be sent for later delivery. Any user of netpoll code in the
kernel (netdump or netconsole services), is exposed to this problem, and
should resolve the issue by upgrading to this kernel release immediately.

  • A flaw was found where, under 64-bit mode (x86_64), AMD processors were

not able to address greater than a 40-bit physical address space; and Intel
processors were only able to address up to a 36-bit physical address space.
The fix is to increase the physical addressing for an AMD processor to 48
bits, and an Intel processor to 38 bits. Please see the Red Hat
Knowledgebase for more detailed information.

  • A flaw was found in the xenU kernel that may prevent a paravirtualized

guest with more than one CPU from starting when running under an Enterprise
Linux 5.1 hypervisor. The fix is to allow your Enterprise Linux 4 Xen SMP
guests to boot under a 5.1 hypervisor. Please see the Red Hat Knowledgebase
for more detailed information.

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to correct these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc

Fixes

  • BZ - 247726 - CVE-2007-2878 VFAT compat ioctls DoS on 64-bit
  • BZ - 248126 - autofs problem with symbolic links
  • BZ - 248325 - CVE-2007-3105 Bound check ordering issue in random driver
  • BZ - 250972 - CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG
  • BZ - 252309 - CVE-2007-4308 Missing ioctl() permission checks in aacraid driver
  • BZ - 275881 - CVE-2007-3740 CIFS should honor umask
  • BZ - 275901 - CVE-2007-3843 CIFS signing sec= mount options don't work correctly
  • BZ - 282351 - [PATCH] Fix memory leak of dma_alloc_coherent() on x86_64
  • BZ - 288961 - CVE-2007-4571 ALSA memory disclosure flaw
  • BZ - 294941 - CVE-2007-3739 LTC36188-Don't allow the stack to grow into hugetlb reserved regions
  • BZ - 302921 - CVE-2006-6921 denial of service with wedged processes
  • BZ - 320791 - EL4.5: Improperly flushed TLBs may lead to Machine check errors

CVEs

  • CVE-2007-3740
  • CVE-2007-3843
  • CVE-2007-3739
  • CVE-2007-2878
  • CVE-2007-3105
  • CVE-2007-4308
  • CVE-2007-3848
  • CVE-2006-6921
  • CVE-2007-4571

References

  • http://kbase.redhat.com/
  • http://kbase.redhat.com/faq/FAQ_42_11697.shtm
  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
x86_64
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
ia64
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
i386
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
x86_64
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
ia64
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
i386
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
x86_64
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
ia64
kernel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 1f6696e623a308775c049cf77a88e549f50eb0d72311cac84f22f881010028ff
kernel-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 6d65ed40c71947197c1ce67d5adf13d15bbfdb31b6b37239328934dc8f243863
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ia64.rpm SHA-256: fb41b3a7e1d214f04c7936aca5a33668567d1c5a953bffb8b39785df1028ef83
kernel-largesmp-devel-2.6.9-55.0.12.EL.ia64.rpm SHA-256: 9cee2c43fb9fe3b8673e92b2a0c69fb91c6d7b259268985fdbec9c0c63ce6715
i386
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
x86_64
kernel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 7cf199cc6b00286adb2d060c1391725c289f24369d95f347830156bcc5f648ee
kernel-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 05ce3ed8e8a6434048339614ac4ec7dfc8adfae37925f49189e96c0a0bcd222e
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 532110cedc73a7cd0dbedb6b03f6a030a7c03832e1c33c907ef9f225b8b73eeb
kernel-largesmp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: fa033779e393d937dd6455e57103357ec6237a69aff9fdc3d94e31687f0506a4
kernel-smp-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 016cb389bef20bc57c13bc11f86eced81289328224339a2668451405d98fb279
kernel-smp-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: 8592bc6e347004628667bc6a5d87744b7b0f2bb739a7e4cf6c2349d773db03e7
kernel-xenU-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f2f93998ebdf443c2dcbdd79c1799b1fe928e7bc7eb3d823a82f28ef49f5e480
kernel-xenU-devel-2.6.9-55.0.12.EL.x86_64.rpm SHA-256: f0dfaf60104df8ae25b6c37b778dedf4169859171f8a2e2948d13780078e9fbb
i386
kernel-2.6.9-55.0.12.EL.i686.rpm SHA-256: f0d1ee6fab804329e262625a3f78388f5fcff59879de9216cd85bedc4b012da5
kernel-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 70c6b3acf130ed0d1a86f4c638e241fe5398aea46d69092a812f94bae6e6d026
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-hugemem-2.6.9-55.0.12.EL.i686.rpm SHA-256: f7466670f1ab8ee8627b2f6293a787a170a04f70ff298e7e9dfe7be28cbf9866
kernel-hugemem-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: aad97840fc8e29c726c952a9ad6dae1e69410dee8508e2eb4955d466fd4c5b4f
kernel-smp-2.6.9-55.0.12.EL.i686.rpm SHA-256: ff56ea6d2b831b060c7a40bd1470ea5718b91c6577e3f5507d5329ac1407eed3
kernel-smp-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: c17091ae2220acc4e9054c741a527c2ad809a19b5abc775024acd822ea616e46
kernel-xenU-2.6.9-55.0.12.EL.i686.rpm SHA-256: 5c636025742418373fd706a43f4849b1fdc894ae3253ae907a13e29f0a9a5e7b
kernel-xenU-devel-2.6.9-55.0.12.EL.i686.rpm SHA-256: 580feb476875437d6a0b5cb287159eeb2c13bed4acc2a4b4c3d0a1e31f550ff5

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
s390x
kernel-2.6.9-55.0.12.EL.s390x.rpm SHA-256: 75dafb3347b6a92e411963d533f63cc603294f2b7e4faf3b0f3e47c818a92d40
kernel-devel-2.6.9-55.0.12.EL.s390x.rpm SHA-256: 5748499ff249e1f8bb17102687702ac823ea6d72981099d9a5c2b94e4888833f
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
s390
kernel-2.6.9-55.0.12.EL.s390.rpm SHA-256: a600e11388046996c648029aaf36a6e7d36aec9367486fd8659647946d8df4e9
kernel-devel-2.6.9-55.0.12.EL.s390.rpm SHA-256: 7a02ea0b3c470d6a2c3ad94450497bdbb00b7bf62ea7234e4002182d9ff700ef
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
s390x
kernel-2.6.9-55.0.12.EL.s390x.rpm SHA-256: 75dafb3347b6a92e411963d533f63cc603294f2b7e4faf3b0f3e47c818a92d40
kernel-devel-2.6.9-55.0.12.EL.s390x.rpm SHA-256: 5748499ff249e1f8bb17102687702ac823ea6d72981099d9a5c2b94e4888833f
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
s390
kernel-2.6.9-55.0.12.EL.s390.rpm SHA-256: a600e11388046996c648029aaf36a6e7d36aec9367486fd8659647946d8df4e9
kernel-devel-2.6.9-55.0.12.EL.s390.rpm SHA-256: 7a02ea0b3c470d6a2c3ad94450497bdbb00b7bf62ea7234e4002182d9ff700ef
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
ppc
kernel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 2b73fe827195bb6ea7021f74025cec9aa939c39b49811a95a3f06f333c63ac3d
kernel-2.6.9-55.0.12.EL.ppc64iseries.rpm SHA-256: 8f8cfb947a1f29e30ad652df9fcec3f537379bdb98f008c3873c2a5b455e2141
kernel-devel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 0bfd0e5cf1231859bd80e6a2d8b0c50a98b10d1d54149ed42daf8041d2df9e09
kernel-devel-2.6.9-55.0.12.EL.ppc64iseries.rpm SHA-256: 1c33e0abae88f85204566d46b974d033c76c0332233e4bf232974280f9f20e50
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: b7f9fb4deb48ddbec347cd7b46991bacd7b23d538702572384c8e8e641af2972
kernel-largesmp-devel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 5cdb3c89926a68def597aa6ef7bd173ce7c234c7e2f74f07bfab472bad9d583c

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5

SRPM
kernel-2.6.9-55.0.12.EL.src.rpm SHA-256: 2cb09a673622c40f9726eab7d0a07e7477f7bd639f91a8036becac3bfb9f1281
ppc
kernel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 2b73fe827195bb6ea7021f74025cec9aa939c39b49811a95a3f06f333c63ac3d
kernel-2.6.9-55.0.12.EL.ppc64iseries.rpm SHA-256: 8f8cfb947a1f29e30ad652df9fcec3f537379bdb98f008c3873c2a5b455e2141
kernel-devel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 0bfd0e5cf1231859bd80e6a2d8b0c50a98b10d1d54149ed42daf8041d2df9e09
kernel-devel-2.6.9-55.0.12.EL.ppc64iseries.rpm SHA-256: 1c33e0abae88f85204566d46b974d033c76c0332233e4bf232974280f9f20e50
kernel-doc-2.6.9-55.0.12.EL.noarch.rpm SHA-256: 66534794c9aa90ef4835b191bda988a12013087adde0a6977d97741cb9addeff
kernel-largesmp-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: b7f9fb4deb48ddbec347cd7b46991bacd7b23d538702572384c8e8e641af2972
kernel-largesmp-devel-2.6.9-55.0.12.EL.ppc64.rpm SHA-256: 5cdb3c89926a68def597aa6ef7bd173ce7c234c7e2f74f07bfab472bad9d583c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter