Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2008:0237 - Security Advisory
Issued:
2008-05-07
Updated:
2008-05-07

RHSA-2008:0237 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

  • the absence of a protection mechanism when attempting to access a
    critical section of code has been found in the Linux kernel open file
    descriptors control mechanism, fcntl. This could allow a local unprivileged
    user to simultaneously execute code, which would otherwise be protected
    against parallel execution. As well, a race condition when handling locks
    in the Linux kernel fcntl functionality, may have allowed a process
    belonging to a local unprivileged user to gain re-ordered access to the
    descriptor table. (CVE-2008-1669, Important)
  • on AMD64 architectures, the possibility of a kernel crash was discovered
    by testing the Linux kernel process-trace ability. This could allow a local
    unprivileged user to cause a denial of service (kernel crash).
    (CVE-2008-1615, Important)
  • the absence of a protection mechanism when attempting to access a
    critical section of code, as well as a race condition, have been found
    in the Linux kernel file system event notifier, dnotify. This could allow a
    local unprivileged user to get inconsistent data, or to send arbitrary
    signals to arbitrary system processes. (CVE-2008-1375, Important)

Red Hat would like to thank Nick Piggin for responsibly disclosing the
following issue:

  • when accessing kernel memory locations, certain Linux kernel drivers
    registering a fault handler did not perform required range checks. A local
    unprivileged user could use this flaw to gain read or write access to
    arbitrary kernel memory, or possibly cause a kernel crash.
    (CVE-2008-0007, Important)
  • the possibility of a kernel crash was found in the Linux kernel IPsec
    protocol implementation, due to improper handling of fragmented ESP
    packets. When an attacker controlling an intermediate router fragmented
    these packets into very small pieces, it would cause a kernel crash on the
    receiving node during packet reassembly. (CVE-2007-6282, Important)
  • a flaw in the MOXA serial driver could allow a local unprivileged user
    to perform privileged operations, such as replacing firmware.
    (CVE-2005-0504, Important)

As well, these updated packages fix the following bugs:

  • multiple buffer overflows in the neofb driver have been resolved. It was
    not possible for an unprivileged user to exploit these issues, and as such,
    they have not been handled as security issues.
  • a kernel panic, due to inconsistent detection of AGP aperture size, has
    been resolved.
  • a race condition in UNIX domain sockets may have caused "recv()" to
    return zero. In clustered configurations, this may have caused unexpected
    failovers.
  • to prevent link storms, network link carrier events were delayed by up to
    one second, causing unnecessary packet loss. Now, link carrier events are
    scheduled immediately.
  • a client-side race on blocking locks caused large time delays on NFS file
    systems.
  • in certain situations, the libATA sata_nv driver may have sent commands
    with duplicate tags, which were rejected by SATA devices. This may have
    caused infinite reboots.
  • running the "service network restart" command may have caused networking
    to fail.
  • a bug in NFS caused cached information about directories to be stored
    for too long, causing wrong attributes to be read.
  • on systems with a large highmem/lowmem ratio, NFS write performance may
    have been very slow when using small files.
  • a bug, which caused network hangs when the system clock was wrapped
    around zero, has been resolved.

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server - Extended Update Support 4.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 4.6 ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 4.6 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6 ppc

Fixes

  • BZ - 404291 - CVE-2007-6282 IPSec ESP kernel panics
  • BZ - 423111 - CVE-2005-0504 Buffer overflow in moxa driver
  • BZ - 428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap
  • BZ - 431430 - CVE-2008-1615 kernel: ptrace: Unprivileged crash on x86_64 %cs corruption
  • BZ - 435122 - [RHEL4.6] In unix domain sockets, recv() may incorrectly return zero
  • BZ - 436102 - Fake ARP dropped after migration leading to loss of network connectivity
  • BZ - 436129 - LTC41942-30 second flock() calls against files stored on a NetApp while using NFS
  • BZ - 436499 - libata: sata_nv may send commands with duplicate tags
  • BZ - 436749 - HP-Japan Network stack hang after service network restart
  • BZ - 437788 - NFS: Fix directory caching problem - with test case and patch.
  • BZ - 438345 - [2.6.9-55.9] VM pagecache reclaim patch causes high latency on systems with large highmem/lowmem ratios
  • BZ - 438477 - Since "Patch2037: linux-2.6.9-vm-balance.patch" my NFS performance is poorly
  • BZ - 439754 - CVE-2008-1375 kernel: race condition in dnotify (local DoS, local roothole possible)
  • BZ - 443433 - CVE-2008-1669 kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c

CVEs

  • CVE-2005-0504
  • CVE-2008-1669
  • CVE-2008-0007
  • CVE-2008-1375
  • CVE-2007-6282
  • CVE-2008-1615

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux Server - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
ia64
kernel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: a969beaa6b68727bcf41d05c3ab8ceb2faa4562a8bce5e0b4fbfe71c281426ac
kernel-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: b6e447f75c43c71c39398a457298b6a6cc53fcc4c130a845095ead1b679cc36a
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm SHA-256: e11a5cd66ff8282adef2690bf4b961eab80e1bbc127266b43bc76d97e5eb6627
kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm SHA-256: 8094a160d4891ba1f8320ffa31111817097fbbeed543f8a6c61824d09cb606df
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
x86_64
kernel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: a0c49e0d3ec4853f6cfd5b04ee207a0d5a6082789fc9e61e6494dc9047650097
kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 7463a97379d9a12fbf68c6e912330c25bcf97384cf7969bd0e550f31ec6daca5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 8e7025133a87fdcb9459862031b8045d36c845a91a6a8af05f3051cfbf86f411
kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 2418bf841e9ee7e2174fa936091a21e3f2c18b32d77a2e7488bc03fe07d9e3cc
kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 145c205ab73d59b6944aa2edcbb1330ec35a157a1f63c60832d36c3731713c51
kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 332045def85403eb41b4839ea1c09b416a662ba20ac5b8698249edc7ceadb2d2
kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: f719fe2336189536151d315bdc8a670e6cdf9fa6293b71b785acade531dfa932
kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm SHA-256: 9686961683227242a9968531fa4cde81bdec489d888bdd887664077ffcf82601
i386
kernel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 28889589f6288ae6036dc81383865f398314459376218c43455a0d102f043ecb
kernel-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 6b14c7965b9b4b6950479f10758d4178e70fc3e16d046f5c0d374e9927de8e8f
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm SHA-256: e74f0f0ac243c3810a1d52f6bb963f27d43558c24b43f24c458c14881e2044d5
kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: e5f5b33abb8c0b0ff95004cde4f0da616132ace9bfc4c03e759d04497590a639
kernel-smp-2.6.9-67.0.15.EL.i686.rpm SHA-256: 55e00308b061a5b460d7e8ab0c8fb2addacdf30c168f6f30200e9a5aea7214a7
kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: 08ae282707a0efd169921b30fd6ae69ed40f5fb30a5e283a0afd642bf4332a4a
kernel-xenU-2.6.9-67.0.15.EL.i686.rpm SHA-256: 624e0672ae632cfb8397d9bb70a7943f6de4e83d85e4503e7b3be31fe2000be5
kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm SHA-256: f80d8c234300fa940f81424ae161ad27ada405d3595e83b9001d653e894c7eec

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
s390x
kernel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: 61aedc47bac5a981a3066492bf303d28f802383b8d203af2d113710814676c23
kernel-devel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: f9290b6ea9b1405db00b5ba71de55de286cbae2d0f267617d49b6c23e597baf5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
s390
kernel-2.6.9-67.0.15.EL.s390.rpm SHA-256: 13436849e865c588ce46c0a4700aee3d8e07f5610a324b8cafea602d29e5ff51
kernel-devel-2.6.9-67.0.15.EL.s390.rpm SHA-256: c78a4c728db740f67dddd20ef554239715315cafd9b1089746a9cbfc9714bf50
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
s390x
kernel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: 61aedc47bac5a981a3066492bf303d28f802383b8d203af2d113710814676c23
kernel-devel-2.6.9-67.0.15.EL.s390x.rpm SHA-256: f9290b6ea9b1405db00b5ba71de55de286cbae2d0f267617d49b6c23e597baf5
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
s390
kernel-2.6.9-67.0.15.EL.s390.rpm SHA-256: 13436849e865c588ce46c0a4700aee3d8e07f5610a324b8cafea602d29e5ff51
kernel-devel-2.6.9-67.0.15.EL.s390.rpm SHA-256: c78a4c728db740f67dddd20ef554239715315cafd9b1089746a9cbfc9714bf50
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
ppc
kernel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 6aa227c433301cf16aff21e3a1502f15a35336f980f744e99ed6234f1ddb1c67
kernel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 6c51d73dd7fe35423d6c5a154ad2395b4257adc291905ebdc558b6831bf72627
kernel-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 9abeee23b73c0420406979c5010a80283e80953ced47849f3f99175f24b59cec
kernel-devel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 88715e20d8b5f42b10e4b43ad88ea31d7c5016d1dd8fa593fbb5660c6d408b45
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 46c249ff2bd979bbf9d1449b29a090bc853092599c066c7bde6d775a34a71d0e
kernel-largesmp-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 3c4cdc1e5e8e361a58397b33b43e8855e0c1bc4dd74987122294e02234cafc27

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6

SRPM
kernel-2.6.9-67.0.15.EL.src.rpm SHA-256: 0bf2aac8843cffcf729964c324f500f370590c98f7ba0305c357c408adaf3fdb
ppc
kernel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 6aa227c433301cf16aff21e3a1502f15a35336f980f744e99ed6234f1ddb1c67
kernel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 6c51d73dd7fe35423d6c5a154ad2395b4257adc291905ebdc558b6831bf72627
kernel-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 9abeee23b73c0420406979c5010a80283e80953ced47849f3f99175f24b59cec
kernel-devel-2.6.9-67.0.15.EL.ppc64iseries.rpm SHA-256: 88715e20d8b5f42b10e4b43ad88ea31d7c5016d1dd8fa593fbb5660c6d408b45
kernel-doc-2.6.9-67.0.15.EL.noarch.rpm SHA-256: edbc9ce8a83e0f89e4b1d5c741224aa489ffa82001a1ae10b36ce6dd645d4255
kernel-largesmp-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 46c249ff2bd979bbf9d1449b29a090bc853092599c066c7bde6d775a34a71d0e
kernel-largesmp-devel-2.6.9-67.0.15.EL.ppc64.rpm SHA-256: 3c4cdc1e5e8e361a58397b33b43e8855e0c1bc4dd74987122294e02234cafc27

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+