Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Troubleshoot a product issue
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2008:0237 - Security Advisory
Issued:
2008-05-07
Updated:
2008-05-07

RHSA-2008:0237 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

  • the absence of a protection mechanism when attempting to access a

critical section of code has been found in the Linux kernel open file
descriptors control mechanism, fcntl. This could allow a local unprivileged
user to simultaneously execute code, which would otherwise be protected
against parallel execution. As well, a race condition when handling locks
in the Linux kernel fcntl functionality, may have allowed a process
belonging to a local unprivileged user to gain re-ordered access to the
descriptor table. (CVE-2008-1669, Important)

  • on AMD64 architectures, the possibility of a kernel crash was discovered

by testing the Linux kernel process-trace ability. This could allow a local
unprivileged user to cause a denial of service (kernel crash).
(CVE-2008-1615, Important)

  • the absence of a protection mechanism when attempting to access a

critical section of code, as well as a race condition, have been found
in the Linux kernel file system event notifier, dnotify. This could allow a
local unprivileged user to get inconsistent data, or to send arbitrary
signals to arbitrary system processes. (CVE-2008-1375, Important)

Red Hat would like to thank Nick Piggin for responsibly disclosing the
following issue:

  • when accessing kernel memory locations, certain Linux kernel drivers

registering a fault handler did not perform required range checks. A local
unprivileged user could use this flaw to gain read or write access to
arbitrary kernel memory, or possibly cause a kernel crash.
(CVE-2008-0007, Important)

  • the possibility of a kernel crash was found in the Linux kernel IPsec

protocol implementation, due to improper handling of fragmented ESP
packets. When an attacker controlling an intermediate router fragmented
these packets into very small pieces, it would cause a kernel crash on the
receiving node during packet reassembly. (CVE-2007-6282, Important)

  • a flaw in the MOXA serial driver could allow a local unprivileged user

to perform privileged operations, such as replacing firmware.
(CVE-2005-0504, Important)

As well, these updated packages fix the following bugs:

  • multiple buffer overflows in the neofb driver have been resolved. It was

not possible for an unprivileged user to exploit these issues, and as such,
they have not been handled as security issues.

  • a kernel panic, due to inconsistent detection of AGP aperture size, has

been resolved.

  • a race condition in UNIX domain sockets may have caused "recv()" to

return zero. In clustered configurations, this may have caused unexpected
failovers.

  • to prevent link storms, network link carrier events were delayed by up to

one second, causing unnecessary packet loss. Now, link carrier events are
scheduled immediately.

  • a client-side race on blocking locks caused large time delays on NFS file

systems.

  • in certain situations, the libATA sata_nv driver may have sent commands

with duplicate tags, which were rejected by SATA devices. This may have
caused infinite reboots.

  • running the "service network restart" command may have caused networking

to fail.

  • a bug in NFS caused cached information about directories to be stored

for too long, causing wrong attributes to be read.

  • on systems with a large highmem/lowmem ratio, NFS write performance may

have been very slow when using small files.

  • a bug, which caused network hangs when the system clock was wrapped

around zero, has been resolved.

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6 ppc

Fixes

  • BZ - 404291 - CVE-2007-6282 IPSec ESP kernel panics
  • BZ - 423111 - CVE-2005-0504 Buffer overflow in moxa driver
  • BZ - 428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap
  • BZ - 431430 - CVE-2008-1615 kernel: ptrace: Unprivileged crash on x86_64 %cs corruption
  • BZ - 435122 - [RHEL4.6] In unix domain sockets, recv() may incorrectly return zero
  • BZ - 436102 - Fake ARP dropped after migration leading to loss of network connectivity
  • BZ - 436129 - LTC41942-30 second flock() calls against files stored on a NetApp while using NFS
  • BZ - 436499 - libata: sata_nv may send commands with duplicate tags
  • BZ - 436749 - HP-Japan Network stack hang after service network restart
  • BZ - 437788 - NFS: Fix directory caching problem - with test case and patch.
  • BZ - 438345 - [2.6.9-55.9] VM pagecache reclaim patch causes high latency on systems with large highmem/lowmem ratios
  • BZ - 438477 - Since "Patch2037: linux-2.6.9-vm-balance.patch" my NFS performance is poorly
  • BZ - 439754 - CVE-2008-1375 kernel: race condition in dnotify (local DoS, local roothole possible)
  • BZ - 443433 - CVE-2008-1669 kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c

CVEs

  • CVE-2005-0504
  • CVE-2008-1669
  • CVE-2008-0007
  • CVE-2008-1375
  • CVE-2007-6282
  • CVE-2008-1615

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
s390x
kernel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: 61aedc47bac5a981a3066492bf303d28f802383b8d203af2d113710814676c23
kernel-devel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: f9290b6ea9b1405db00b5ba71de55de286cbae2d0f267617d49b6c23e597baf5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
s390
kernel-2.6.9-67.0.15.EL.s390.rpm SHA-256: 13436849e865c588ce46c0a4700aee3d8e07f5610a324b8cafea602d29e5ff51
kernel-devel-2.6.9-67.0.15.EL.s390.rpm SHA-256: c78a4c728db740f67dddd20ef554239715315cafd9b1089746a9cbfc9714bf50
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
s390x
kernel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: 61aedc47bac5a981a3066492bf303d28f802383b8d203af2d113710814676c23
kernel-devel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: f9290b6ea9b1405db00b5ba71de55de286cbae2d0f267617d49b6c23e597baf5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
s390
kernel-2.6.9-67.0.15.EL.s390.rpm SHA-256: 13436849e865c588ce46c0a4700aee3d8e07f5610a324b8cafea602d29e5ff51
kernel-devel-2.6.9-67.0.15.EL.s390.rpm SHA-256: c78a4c728db740f67dddd20ef554239715315cafd9b1089746a9cbfc9714bf50
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
ppc
kernel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 6aa227c433301cf16aff21e3a1502f15a35336f980f744e99ed6234f1ddb1c67
kernel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 6c51d73dd7fe35423d6c5a154ad2395b4257adc291905ebdc558b6831bf72627
kernel-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 9abeee23b73c0420406979c5010a80283e80953ced47849f3f99175f24b59cec
kernel-devel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 88715e20d8b5f42b10e4b43ad88ea31d7c5016d1dd8fa593fbb5660c6d408b45
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 46c249ff2bd979bbf9d1449b29a090bc853092599c066c7bde6d775a34a71d0e
kernel-largesmp-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 3c4cdc1e5e8e361a58397b33b43e8855e0c1bc4dd74987122294e02234cafc27

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
ppc
kernel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 6aa227c433301cf16aff21e3a1502f15a35336f980f744e99ed6234f1ddb1c67
kernel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 6c51d73dd7fe35423d6c5a154ad2395b4257adc291905ebdc558b6831bf72627
kernel-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 9abeee23b73c0420406979c5010a80283e80953ced47849f3f99175f24b59cec
kernel-devel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 88715e20d8b5f42b10e4b43ad88ea31d7c5016d1dd8fa593fbb5660c6d408b45
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 46c249ff2bd979bbf9d1449b29a090bc853092599c066c7bde6d775a34a71d0e
kernel-largesmp-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 3c4cdc1e5e8e361a58397b33b43e8855e0c1bc4dd74987122294e02234cafc27

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2021 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook