Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2008:0237 - Security Advisory
Issued:
2008-05-07
Updated:
2008-05-07

RHSA-2008:0237 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

  • the absence of a protection mechanism when attempting to access a

critical section of code has been found in the Linux kernel open file
descriptors control mechanism, fcntl. This could allow a local unprivileged
user to simultaneously execute code, which would otherwise be protected
against parallel execution. As well, a race condition when handling locks
in the Linux kernel fcntl functionality, may have allowed a process
belonging to a local unprivileged user to gain re-ordered access to the
descriptor table. (CVE-2008-1669, Important)

  • on AMD64 architectures, the possibility of a kernel crash was discovered

by testing the Linux kernel process-trace ability. This could allow a local
unprivileged user to cause a denial of service (kernel crash).
(CVE-2008-1615, Important)

  • the absence of a protection mechanism when attempting to access a

critical section of code, as well as a race condition, have been found
in the Linux kernel file system event notifier, dnotify. This could allow a
local unprivileged user to get inconsistent data, or to send arbitrary
signals to arbitrary system processes. (CVE-2008-1375, Important)

Red Hat would like to thank Nick Piggin for responsibly disclosing the
following issue:

  • when accessing kernel memory locations, certain Linux kernel drivers

registering a fault handler did not perform required range checks. A local
unprivileged user could use this flaw to gain read or write access to
arbitrary kernel memory, or possibly cause a kernel crash.
(CVE-2008-0007, Important)

  • the possibility of a kernel crash was found in the Linux kernel IPsec

protocol implementation, due to improper handling of fragmented ESP
packets. When an attacker controlling an intermediate router fragmented
these packets into very small pieces, it would cause a kernel crash on the
receiving node during packet reassembly. (CVE-2007-6282, Important)

  • a flaw in the MOXA serial driver could allow a local unprivileged user

to perform privileged operations, such as replacing firmware.
(CVE-2005-0504, Important)

As well, these updated packages fix the following bugs:

  • multiple buffer overflows in the neofb driver have been resolved. It was

not possible for an unprivileged user to exploit these issues, and as such,
they have not been handled as security issues.

  • a kernel panic, due to inconsistent detection of AGP aperture size, has

been resolved.

  • a race condition in UNIX domain sockets may have caused "recv()" to

return zero. In clustered configurations, this may have caused unexpected
failovers.

  • to prevent link storms, network link carrier events were delayed by up to

one second, causing unnecessary packet loss. Now, link carrier events are
scheduled immediately.

  • a client-side race on blocking locks caused large time delays on NFS file

systems.

  • in certain situations, the libATA sata_nv driver may have sent commands

with duplicate tags, which were rejected by SATA devices. This may have
caused infinite reboots.

  • running the "service network restart" command may have caused networking

to fail.

  • a bug in NFS caused cached information about directories to be stored

for too long, causing wrong attributes to be read.

  • on systems with a large highmem/lowmem ratio, NFS write performance may

have been very slow when using small files.

  • a bug, which caused network hangs when the system clock was wrapped

around zero, has been resolved.

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6 ppc

Fixes

  • BZ - 404291 - CVE-2007-6282 IPSec ESP kernel panics
  • BZ - 423111 - CVE-2005-0504 Buffer overflow in moxa driver
  • BZ - 428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap
  • BZ - 431430 - CVE-2008-1615 kernel: ptrace: Unprivileged crash on x86_64 %cs corruption
  • BZ - 435122 - [RHEL4.6] In unix domain sockets, recv() may incorrectly return zero
  • BZ - 436102 - Fake ARP dropped after migration leading to loss of network connectivity
  • BZ - 436129 - LTC41942-30 second flock() calls against files stored on a NetApp while using NFS
  • BZ - 436499 - libata: sata_nv may send commands with duplicate tags
  • BZ - 436749 - HP-Japan Network stack hang after service network restart
  • BZ - 437788 - NFS: Fix directory caching problem - with test case and patch.
  • BZ - 438345 - [2.6.9-55.9] VM pagecache reclaim patch causes high latency on systems with large highmem/lowmem ratios
  • BZ - 438477 - Since "Patch2037: linux-2.6.9-vm-balance.patch" my NFS performance is poorly
  • BZ - 439754 - CVE-2008-1375 kernel: race condition in dnotify (local DoS, local roothole possible)
  • BZ - 443433 - CVE-2008-1669 kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c

CVEs

  • CVE-2005-0504
  • CVE-2008-1669
  • CVE-2008-0007
  • CVE-2008-1375
  • CVE-2007-6282
  • CVE-2008-1615

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
s390x
kernel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: 61aedc47bac5a981a3066492bf303d28f802383b8d203af2d113710814676c23
kernel-devel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: f9290b6ea9b1405db00b5ba71de55de286cbae2d0f267617d49b6c23e597baf5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
s390
kernel-2.6.9-67.0.15.EL.s390.rpm SHA-256: 13436849e865c588ce46c0a4700aee3d8e07f5610a324b8cafea602d29e5ff51
kernel-devel-2.6.9-67.0.15.EL.s390.rpm SHA-256: c78a4c728db740f67dddd20ef554239715315cafd9b1089746a9cbfc9714bf50
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
s390x
kernel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: 61aedc47bac5a981a3066492bf303d28f802383b8d203af2d113710814676c23
kernel-devel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: f9290b6ea9b1405db00b5ba71de55de286cbae2d0f267617d49b6c23e597baf5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
s390
kernel-2.6.9-67.0.15.EL.s390.rpm SHA-256: 13436849e865c588ce46c0a4700aee3d8e07f5610a324b8cafea602d29e5ff51
kernel-devel-2.6.9-67.0.15.EL.s390.rpm SHA-256: c78a4c728db740f67dddd20ef554239715315cafd9b1089746a9cbfc9714bf50
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
ppc
kernel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 6aa227c433301cf16aff21e3a1502f15a35336f980f744e99ed6234f1ddb1c67
kernel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 6c51d73dd7fe35423d6c5a154ad2395b4257adc291905ebdc558b6831bf72627
kernel-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 9abeee23b73c0420406979c5010a80283e80953ced47849f3f99175f24b59cec
kernel-devel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 88715e20d8b5f42b10e4b43ad88ea31d7c5016d1dd8fa593fbb5660c6d408b45
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 46c249ff2bd979bbf9d1449b29a090bc853092599c066c7bde6d775a34a71d0e
kernel-largesmp-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 3c4cdc1e5e8e361a58397b33b43e8855e0c1bc4dd74987122294e02234cafc27

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
ppc
kernel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 6aa227c433301cf16aff21e3a1502f15a35336f980f744e99ed6234f1ddb1c67
kernel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 6c51d73dd7fe35423d6c5a154ad2395b4257adc291905ebdc558b6831bf72627
kernel-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 9abeee23b73c0420406979c5010a80283e80953ced47849f3f99175f24b59cec
kernel-devel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 88715e20d8b5f42b10e4b43ad88ea31d7c5016d1dd8fa593fbb5660c6d408b45
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 46c249ff2bd979bbf9d1449b29a090bc853092599c066c7bde6d775a34a71d0e
kernel-largesmp-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 3c4cdc1e5e8e361a58397b33b43e8855e0c1bc4dd74987122294e02234cafc27

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter