Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0665 - Security Advisory
Issued:
2008-07-24
Updated:
2008-07-24

RHSA-2008:0665 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Updated kernel packages for Red Hat Enterprise Linux 4.7

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux 4. This is the seventh regular
update.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Kernel Feature Support:

  • iostat displays I/O performance for partitions
  • I/O task accounting added to getrusage(), allowing comprehensive core

statistics

  • page cache pages count added to show_mem() output
  • tux O_ATOMICLOOKUP flag removed from the open() system call: replaced

with O_CLOEXEC

  • the kernel now exports process limit information to /proc/[PID]/limits
  • implement udp_poll() to reduce likelihood of false positives returned

from select()

  • the TCP_RTO_MIN parameter can now be configured to a maximum of 3000

milliseconds. This is configured using "ip route"

  • update CIFS to version 1.50

Added Features:

  • nfs.enable_ino64 boot command line parameter: enable and disable 32-bit

inode numbers when using NFS

  • tick "divider" kernel boot parameter: reduce CPU overhead, and increase

efficiency at the cost of lowering timing accuracy

  • /proc/sys/vm/nfs-writeback-lowmem-only tunable parameter: resolve NFS

read performance

  • /proc/sys/vm/write-mapped tunable option, allowing the option of faster

NFS reads

  • support for Large Receive Offload as a networking module
  • core dump masking, allowing a core dump process to skip the shared memory

segments of a process

Virtualization:

  • para-virtualized network and block device drivers, to increase

fully-virtualized guest performance

  • support for more than three VNIF numbers per guest domain

Platform Support:

  • AMD ATI SB800 SATA controller, AMD ATI SB600 and SB700 40-pin IDE cable
  • 64-bit DMA support on AMD ATI SB700
  • PCI device IDs to support Intel ICH10
  • /dev/msr[0-n] device files
  • powernow-k8 as a module
  • SLB shadow buffer support for IBM POWER6 systems
  • support for CPU frequencies greater than 32-bit on IBM POWER5, IBM POWER6
  • floating point load and store handler for IBM POWER6

Added Drivers and Updates:

  • ixgbe 1.1.18, for the Intel 82598 10GB ethernet controller
  • bnx2x 1.40.22, for network adapters on the Broadcom 5710 chipset
  • dm-hp-sw 1.0.0, for HP Active/Standby
  • zfcp version and bug fixes
  • qdio to fix FCP/SCSI write I/O expiring on LPARs
  • cio bug fixes
  • eHEA latest upstream, and netdump and netconsole support
  • ipr driver support for dual SAS RAID controllers
  • correct CPU cache info and SATA support for Intel Tolapai
  • i5000_edac support for Intel 5000 chipsets
  • i3000_edac support for Intel 3000 and 3010 chipsets
  • add i2c_piix4 module on 64-bit systems to support AMD ATI SB600, 700

and 800

  • i2c-i801 support for Intel Tolapai
  • qla4xxx: 5.01.01-d2 to 5.01.02-d4-rhel4.7-00
  • qla2xxx: 8.01.07-d4 to 8.01.07-d4-rhel4.7-02
  • cciss: 2.6.16 to 2.6.20
  • mptfusion: 3.02.99.00rh to 3.12.19.00rh
  • lpfc:0: 8.0.16.34 to 8.0.16.40
  • megaraid_sas: 00.00.03.13 to 00.00.03.18-rh1
  • stex: 3.0.0.1 to 3.6.0101.2
  • arcmsr: 1.20.00.13 to 1.20.00.15.rh4u7
  • aacraid: 1.1-5[2441] to 1.1.5[2455]

Miscellaneous Updates:

  • OFED 1.3 support
  • wacom driver to add support for Cintiq 20WSX, Wacom Intuos3 12x19, 12x12

and 4x6 tablets

  • sata_svw driver to support Broadcom HT-1100 chipsets
  • libata to un-blacklist Hitachi drives to enable NCQ
  • ide driver allows command line option to disable ide drivers
  • psmouse support for cortps protocol

These updated packages fix the following security issues:

  • NULL pointer access due to missing checks for terminal validity.

(CVE-2008-2812, Moderate)

  • a security flaw was found in the Linux kernel Universal Disk Format file

system. (CVE-2006-4145, Low)

For further details, refer to the latest Red Hat Enterprise Linux 4.7
release notes: redhat.com/docs/manuals/enterprise

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 151085 - mount are not interruptible
  • BZ - 166038 - ext2online can't resize: No space left on device
  • BZ - 171712 - A NFS export mounted using version 4 and TCP shows up as UDP in /proc/mounts
  • BZ - 179201 - pvmove causes kernel panic
  • BZ - 183119 - Assertion failure in journal_next_log_block
  • BZ - 185202 - Kernel build requires "High Memory Support"
  • BZ - 186606 - Incorrect suggestion on when to install largesmp kernel
  • BZ - 194585 - mdadm --grow -n 2 (old: 3) fails on particular raid1 devices
  • BZ - 195685 - RFE: Add dm-hp-sw to kernel to allow use of active/passive sans with dm multipathing
  • BZ - 204309 - kernel retries portmap query indefinitely when statd is down
  • BZ - 205966 - Firewall - Premature ip_conntrack timer expiry on 3+ ack or window size advertisements - (hanging tomcat threads problem)
  • BZ - 206113 - [PATCH][RHEL4U4] Fix estimate-mistake (e820-memory-hole and numnodes) of available_memory in x86_64
  • BZ - 212321 - [PATCH][RHEL4U4] Backported udp_poll() function (Fix the problem that select() returns in RHEL4 though select() must not return essentially when kernel receives broken UDP packet(s))
  • BZ - 212922 - /sbin/service iptables stop hangs on modprobe -r ipt_state
  • BZ - 219639 - Crash dump fails on IA64 with block_order set to 10
  • BZ - 227610 - READDIR on a NFSv4 directory containing a referral returns -EIO for entire directory
  • BZ - 233234 - Missing definition for mutex_destroy in linux/kernel.h
  • BZ - 247446 - RHEL4-U5: "cdrom open failed" message in /var/log/messages on every reboot
  • BZ - 247879 - dm-mirror: spinlock in write_callback has the potential for deadlock
  • BZ - 248488 - Backport divider= option from RHEL5 U1 to RHEL4
  • BZ - 248787 - [RHEL4 U4] NFS server, rpciod was stuck in a infinite loop,
  • BZ - 248954 - Oracle ASM DBWR process goes into 100% CPU spin when using hugepages on ia64
  • BZ - 249727 - xenbus has use-after-free in drivers/xen/xenbus/xenbus_xs.c
  • BZ - 250381 - xenbus suspend_mutex remains locked after transaction failure
  • BZ - 250842 - oopses when multicasting with connection oriented socket
  • BZ - 251560 - [Promise 4.7 feat] Update stex driver to version 3.6.0101.2
  • BZ - 252222 - ipv6 device reference counting error in net/ipv6/anycast.c
  • BZ - 252287 - AMD/ATI SB600/700/800 use same SMBus controller devID
  • BZ - 252400 - RHEL4 U5: ia64 machine hang when DB starts using rac/nfs/hugepages
  • BZ - 252939 - Long Delay before OOMKill launches
  • BZ - 253592 - [RHEL 4.5] forcedeth: pull latest upstream updates
  • BZ - 270661 - need a way to disable ide drivers
  • BZ - 278961 - epoll_wait(..., -100) results in printk
  • BZ - 280431 - ip_tables reference count will underflow occasionally
  • BZ - 287741 - PCI: hotplug: acpiphp: avoid acpiphp "cannot get bridge info" PCI hotplug failure
  • BZ - 299901 - We need SB800 SATA Controller supported in RHEL4.7
  • BZ - 300861 - sb600 system generates ATA errors during initscripts
  • BZ - 306911 - CVE-2006-4145 UDF truncating issue
  • BZ - 309081 - i386 compressed diskdump header contains incorrect panic cpu
  • BZ - 311431 - kernel BUG at mm/rmap.c:479 during suspend/resume testing
  • BZ - 311881 - ptrace: i386 debugger + x86_64 kernel + threaded (i386) inferior = error
  • BZ - 335361 - RHEL 4.7: SB700 contains two IDE channels
  • BZ - 337671 - [RHEL4] Patch pata_jmicron to support new controller
  • BZ - 351911 - RHEL4.6: AD1984 HDAudio does not work on AMD Trevally Board(RS690 + SB700)
  • BZ - 354371 - readdir on nfs4 passing non-posix errors to userspace
  • BZ - 355141 - pull upstream patches for smbfs
  • BZ - 359651 - [PATCH] nfsv4 fails to update content of files when open for write
  • BZ - 359671 - RHEL4: Hald causes system deadlock on ia64
  • BZ - 360311 - kernel dm: panic on shrinking device size
  • BZ - 361931 - [Stratus 4.7 bug] iounmap may sleep while holding vmlist_lock, causing a deadlock.
  • BZ - 364361 - NFS: Fix directory caching problem - with test case and patch.
  • BZ - 377351 - kernel dm: bd_mount_sem counter corruption
  • BZ - 377371 - kernel dm crypt: oops on device removal
  • BZ - 377611 - Marvell NIC using skge driver loses promiscuous mode on rewiring
  • BZ - 381221 - Assertion failure in journal_start() at fs/jbd/transaction.c:274: 'handle->h_transaction->t_journal == journal'
  • BZ - 393501 - execve returning EFBIG when running 4 GB executable
  • BZ - 396081 - Since "Patch2037: linux-2.6.9-vm-balance.patch" my NFS performance is poorly
  • BZ - 402581 - Deadlock while performing nfs operations.
  • BZ - 414131 - Checksum offloading and IP connection tracking don't play well together
  • BZ - 424541 - Please build SMBus driver i2c-piix4 as a module in RHEL4.7
  • BZ - 424871 - Implement netif_release_rx_bufs for copying receiver
  • BZ - 425721 - [QLogic 4.7 bug][3/5] qla4xxx - Targets not seen on first port (5.01.02-d2 --> 5.01.02-d3)
  • BZ - 426031 - rapid block device plug / unplug leads to kernel crash and/or soft lockup
  • BZ - 426301 - FEAT: RHEL 4.7 Intel Tolapai cpucache patch
  • BZ - 426411 - [QLogic 4.7 Bug][5/5] qla2xxx - avoid delay for loop ready when loop dead
  • BZ - 426647 - ptrace: PTRACE_SINGLESTEP,signal steps on the 2nd instr.
  • BZ - 427204 - RHEL4, make tcp_input_metrics() get minimum RTO via tcp_rto_min()
  • BZ - 427544 - Update CIFS to 1.50cRH for 4.7
  • BZ - 427799 - [RHEL-4] RFE: Add EDAC driver for Intel 3000/3010 chipsets
  • BZ - 428801 - [Areca 4.7 feat] Update the arcmsr driver to 1.20.00.15.RH
  • BZ - 428934 - Can not send redirect packet when jiffiess wraparound
  • BZ - 428964 - RHEL4.7: HDMI Audio support for AMD ATI chipsets
  • BZ - 429103 - Allocations on resume path can cause deadlock due to attempting to swap
  • BZ - 429930 - Fake ARP dropped after migration leading to loss of network connectivity
  • BZ - 430313 - [QLogic 4.7 bug][4/5] qla4xxx - Race condition fixes w/ constant qla3xxx ifup/ifdown (5.01.02-d3 --> 5.01.02-d4)
  • BZ - 430494 - [NetApp-S 4.7 bug] LUN removal status is not updated on the host without a driver reload
  • BZ - 430946 - nfs server sending short packets on nfsv2 UDP readdir replies
  • BZ - 431081 - [RHEL4.6]: Under load, an i386 PV guest on i386 HV will hang during save/restore
  • BZ - 433249 - [EMC 4.7 bug] nfs_access_cache_shrinker() race with umount
  • BZ - 433524 - oProfile Driver Module Patch for Family10h
  • BZ - 435000 - ptrace: ERESTARTSYS from calling a function from a debugger
  • BZ - 435351 - [RHEL4.7]: PV kernel can OOPs during live migrate
  • BZ - 435787 - RHEL4.7: USB stress test failure on AMD SBX00
  • BZ - 437423 - Add Xen disk and network paravirtualized drivers to bare-metal kernel
  • BZ - 437865 - [RHEL 4.6] bonding 802.3ad does not work
  • BZ - 438027 - RHEL4.6 Diskdump performance regression (mptfusion)
  • BZ - 438115 - Add invocation of weak-modules on kernel install/remove
  • BZ - 438688 - 68.25 Kernel rpm installation/uninstallation errors out
  • BZ - 438723 - 32bit NFS server returns -EIO for readdirplus request when backing file system has 32bit inodes
  • BZ - 438834 - cluster mirrors should not be attempted when cmirror modules are not loaded
  • BZ - 438975 - gettimeofday is not monotonically increasing
  • BZ - 439109 - [Broadcom 4.7 bug] HT1000 chip based systems getting blacklisted for msi
  • BZ - 439539 - RHEL4 kernel ignores extended cpu model field
  • BZ - 439540 - oprofile fix to support Penryn-based processors
  • BZ - 439926 - do not limit locked memory when RLIMIT_MEMLOCK is RLIM_INFINITY
  • BZ - 441445 - [QLogic 4.7 feat] Update qla2xxx - qla84xx variant support.
  • BZ - 442124 - bonding: incorrect backport creates possible incorrect interface flags
  • BZ - 442298 - Memory corruption due to VNIF increase
  • BZ - 442538 - kernel panic in gnttab_map when booting RHEL4 x86_64 FV xen guest
  • BZ - 442789 - oops in cifs module while trying to stop a thread (kthread_stop) during filesystem mount
  • BZ - 443052 - kernel failed to boot and dropped to xmon
  • BZ - 443053 - cciss driver crash
  • BZ - 443825 - ls shows two /proc/[pid]/limits files for every process
  • BZ - 444473 - Fake ARP dropped after migration leading to loss of network connectivity
  • BZ - 446409 - RHEL4 U6 hang in epoll_wait
  • BZ - 447315 - parted error: Can't open /dev/xvda while probing disks during installation
  • BZ - 448641 - [QLogic 4.7 bug] qla2xxx - Update firmware for 4, 8 Gb/S adapters
  • BZ - 448934 - Patch for bug 435280 introduces possibility of dead lock
  • BZ - 449381 - System hangs when using /proc/sys/vm/drop_caches under heavy load on large system.
  • BZ - 450094 - Patch for bug 360281 "Odd behaviour in mmap" introduces regression
  • BZ - 450645 - [QLogic 4.7 bug] qla2xxx- several fixes: ioctl module and slab corruption (8.02.09-d0-rhel4.7-04)
  • BZ - 450918 - vmware - Console graphic problem when mouse is moved
  • BZ - 453419 - CVE-2008-2812 kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code

CVEs

  • CVE-2008-2812
  • CVE-2006-4145

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-78.EL.src.rpm SHA-256: 252b649c90348a4bd6642feb69b4712b401a05563263b6b76ca82f76607c8ffb
x86_64
kernel-2.6.9-78.EL.x86_64.rpm SHA-256: 6c4bb93c830a98809c9a8d02877453d5a45e500f96dca36454409b0de7ac74b9
kernel-2.6.9-78.EL.x86_64.rpm SHA-256: 6c4bb93c830a98809c9a8d02877453d5a45e500f96dca36454409b0de7ac74b9
kernel-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 1d56fefd0124258aea3923b4918e027e26a6303adc599c6d6699a7b76d84b59b
kernel-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 1d56fefd0124258aea3923b4918e027e26a6303adc599c6d6699a7b76d84b59b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-largesmp-2.6.9-78.EL.x86_64.rpm SHA-256: a4cbff57923796c7015d542e0ccdedbb3b8ae9b48f3f2f5831f66a335a8fa086
kernel-largesmp-2.6.9-78.EL.x86_64.rpm SHA-256: a4cbff57923796c7015d542e0ccdedbb3b8ae9b48f3f2f5831f66a335a8fa086
kernel-largesmp-devel-2.6.9-78.EL.x86_64.rpm SHA-256: c94b40269a8e2068b3be62aab37bf7a7e9178edd1be4f35d15372df874b40190
kernel-largesmp-devel-2.6.9-78.EL.x86_64.rpm SHA-256: c94b40269a8e2068b3be62aab37bf7a7e9178edd1be4f35d15372df874b40190
kernel-smp-2.6.9-78.EL.x86_64.rpm SHA-256: 6b981846814fa184718dcdd8f48acc4da551337dbf937e0d12efdfa522d72650
kernel-smp-2.6.9-78.EL.x86_64.rpm SHA-256: 6b981846814fa184718dcdd8f48acc4da551337dbf937e0d12efdfa522d72650
kernel-smp-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 598149c8d157fa675636ffb1a5275058aeb0af9babe544448830df6d314e7f83
kernel-smp-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 598149c8d157fa675636ffb1a5275058aeb0af9babe544448830df6d314e7f83
kernel-xenU-2.6.9-78.EL.x86_64.rpm SHA-256: 596d29cefb7e2f0b5fe660bdf5108b01d2aba0712a2c4c8a6fd943e9c76e0638
kernel-xenU-2.6.9-78.EL.x86_64.rpm SHA-256: 596d29cefb7e2f0b5fe660bdf5108b01d2aba0712a2c4c8a6fd943e9c76e0638
kernel-xenU-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 2fc1b1f1b9094c0f8e6856fbeaaba1e4d6b16fda67d0e1b227ea1acf530c1021
kernel-xenU-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 2fc1b1f1b9094c0f8e6856fbeaaba1e4d6b16fda67d0e1b227ea1acf530c1021
ia64
kernel-2.6.9-78.EL.ia64.rpm SHA-256: e922c0d9c2c0fbf749f0e4d1bb68070b4bf349c357116d5b87b5ead68efc3e67
kernel-2.6.9-78.EL.ia64.rpm SHA-256: e922c0d9c2c0fbf749f0e4d1bb68070b4bf349c357116d5b87b5ead68efc3e67
kernel-devel-2.6.9-78.EL.ia64.rpm SHA-256: 5deee80e6cb4ba8eeb4832bdada8aa19c78fce07258522f7556c1c58c695e216
kernel-devel-2.6.9-78.EL.ia64.rpm SHA-256: 5deee80e6cb4ba8eeb4832bdada8aa19c78fce07258522f7556c1c58c695e216
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-largesmp-2.6.9-78.EL.ia64.rpm SHA-256: 79c84a8754e881342118ae5e36f6b54b93c33f0d995337f6437056822ac1a5ed
kernel-largesmp-2.6.9-78.EL.ia64.rpm SHA-256: 79c84a8754e881342118ae5e36f6b54b93c33f0d995337f6437056822ac1a5ed
kernel-largesmp-devel-2.6.9-78.EL.ia64.rpm SHA-256: d13205f1a12954efc1ec8c2634186b4cf4cfc3968039a7dec69651dedfadf97d
kernel-largesmp-devel-2.6.9-78.EL.ia64.rpm SHA-256: d13205f1a12954efc1ec8c2634186b4cf4cfc3968039a7dec69651dedfadf97d
i386
kernel-2.6.9-78.EL.i686.rpm SHA-256: 7d5f48ddc9c90dda4a0758434d356b58bfdaed480b402ab2ba602481e94952db
kernel-2.6.9-78.EL.i686.rpm SHA-256: 7d5f48ddc9c90dda4a0758434d356b58bfdaed480b402ab2ba602481e94952db
kernel-devel-2.6.9-78.EL.i686.rpm SHA-256: e37ab8c8855c6781dc5e2aa60da05ac97f68f72f4ce5a03085b2dbea6870dc9b
kernel-devel-2.6.9-78.EL.i686.rpm SHA-256: e37ab8c8855c6781dc5e2aa60da05ac97f68f72f4ce5a03085b2dbea6870dc9b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-hugemem-2.6.9-78.EL.i686.rpm SHA-256: 4b790db76f92aa3e7e4ed37feadf02eef775d2c9f04aae6516865886193edecc
kernel-hugemem-2.6.9-78.EL.i686.rpm SHA-256: 4b790db76f92aa3e7e4ed37feadf02eef775d2c9f04aae6516865886193edecc
kernel-hugemem-devel-2.6.9-78.EL.i686.rpm SHA-256: 3090dc2db137b3a91ab262d9fadd4c56798430ecc15707ac97cc46bc9f1e2fb8
kernel-hugemem-devel-2.6.9-78.EL.i686.rpm SHA-256: 3090dc2db137b3a91ab262d9fadd4c56798430ecc15707ac97cc46bc9f1e2fb8
kernel-smp-2.6.9-78.EL.i686.rpm SHA-256: 0c5d2e1b9d25fadd7c8a3fa78d2c43e2cfb5566aee9eb5de2f273f8c309bfffe
kernel-smp-2.6.9-78.EL.i686.rpm SHA-256: 0c5d2e1b9d25fadd7c8a3fa78d2c43e2cfb5566aee9eb5de2f273f8c309bfffe
kernel-smp-devel-2.6.9-78.EL.i686.rpm SHA-256: f5ec4ee69194755fa0e0fffd2d5679d76927f33b9a473956b073170e1ab5bc11
kernel-smp-devel-2.6.9-78.EL.i686.rpm SHA-256: f5ec4ee69194755fa0e0fffd2d5679d76927f33b9a473956b073170e1ab5bc11
kernel-xenU-2.6.9-78.EL.i686.rpm SHA-256: e5c1a6454a903b7118664a4033012ac339b9c5795203c620f16a7b13b4f1faa1
kernel-xenU-2.6.9-78.EL.i686.rpm SHA-256: e5c1a6454a903b7118664a4033012ac339b9c5795203c620f16a7b13b4f1faa1
kernel-xenU-devel-2.6.9-78.EL.i686.rpm SHA-256: 188fb4b8ab0b78e6eafe1dd42077a1299579fbddc8d929855ad33cd3a810e9b9
kernel-xenU-devel-2.6.9-78.EL.i686.rpm SHA-256: 188fb4b8ab0b78e6eafe1dd42077a1299579fbddc8d929855ad33cd3a810e9b9

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-78.EL.src.rpm SHA-256: 252b649c90348a4bd6642feb69b4712b401a05563263b6b76ca82f76607c8ffb
x86_64
kernel-2.6.9-78.EL.x86_64.rpm SHA-256: 6c4bb93c830a98809c9a8d02877453d5a45e500f96dca36454409b0de7ac74b9
kernel-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 1d56fefd0124258aea3923b4918e027e26a6303adc599c6d6699a7b76d84b59b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-largesmp-2.6.9-78.EL.x86_64.rpm SHA-256: a4cbff57923796c7015d542e0ccdedbb3b8ae9b48f3f2f5831f66a335a8fa086
kernel-largesmp-devel-2.6.9-78.EL.x86_64.rpm SHA-256: c94b40269a8e2068b3be62aab37bf7a7e9178edd1be4f35d15372df874b40190
kernel-smp-2.6.9-78.EL.x86_64.rpm SHA-256: 6b981846814fa184718dcdd8f48acc4da551337dbf937e0d12efdfa522d72650
kernel-smp-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 598149c8d157fa675636ffb1a5275058aeb0af9babe544448830df6d314e7f83
kernel-xenU-2.6.9-78.EL.x86_64.rpm SHA-256: 596d29cefb7e2f0b5fe660bdf5108b01d2aba0712a2c4c8a6fd943e9c76e0638
kernel-xenU-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 2fc1b1f1b9094c0f8e6856fbeaaba1e4d6b16fda67d0e1b227ea1acf530c1021
ia64
kernel-2.6.9-78.EL.ia64.rpm SHA-256: e922c0d9c2c0fbf749f0e4d1bb68070b4bf349c357116d5b87b5ead68efc3e67
kernel-devel-2.6.9-78.EL.ia64.rpm SHA-256: 5deee80e6cb4ba8eeb4832bdada8aa19c78fce07258522f7556c1c58c695e216
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-largesmp-2.6.9-78.EL.ia64.rpm SHA-256: 79c84a8754e881342118ae5e36f6b54b93c33f0d995337f6437056822ac1a5ed
kernel-largesmp-devel-2.6.9-78.EL.ia64.rpm SHA-256: d13205f1a12954efc1ec8c2634186b4cf4cfc3968039a7dec69651dedfadf97d
i386
kernel-2.6.9-78.EL.i686.rpm SHA-256: 7d5f48ddc9c90dda4a0758434d356b58bfdaed480b402ab2ba602481e94952db
kernel-devel-2.6.9-78.EL.i686.rpm SHA-256: e37ab8c8855c6781dc5e2aa60da05ac97f68f72f4ce5a03085b2dbea6870dc9b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-hugemem-2.6.9-78.EL.i686.rpm SHA-256: 4b790db76f92aa3e7e4ed37feadf02eef775d2c9f04aae6516865886193edecc
kernel-hugemem-devel-2.6.9-78.EL.i686.rpm SHA-256: 3090dc2db137b3a91ab262d9fadd4c56798430ecc15707ac97cc46bc9f1e2fb8
kernel-smp-2.6.9-78.EL.i686.rpm SHA-256: 0c5d2e1b9d25fadd7c8a3fa78d2c43e2cfb5566aee9eb5de2f273f8c309bfffe
kernel-smp-devel-2.6.9-78.EL.i686.rpm SHA-256: f5ec4ee69194755fa0e0fffd2d5679d76927f33b9a473956b073170e1ab5bc11
kernel-xenU-2.6.9-78.EL.i686.rpm SHA-256: e5c1a6454a903b7118664a4033012ac339b9c5795203c620f16a7b13b4f1faa1
kernel-xenU-devel-2.6.9-78.EL.i686.rpm SHA-256: 188fb4b8ab0b78e6eafe1dd42077a1299579fbddc8d929855ad33cd3a810e9b9

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-78.EL.src.rpm SHA-256: 252b649c90348a4bd6642feb69b4712b401a05563263b6b76ca82f76607c8ffb
x86_64
kernel-2.6.9-78.EL.x86_64.rpm SHA-256: 6c4bb93c830a98809c9a8d02877453d5a45e500f96dca36454409b0de7ac74b9
kernel-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 1d56fefd0124258aea3923b4918e027e26a6303adc599c6d6699a7b76d84b59b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-largesmp-2.6.9-78.EL.x86_64.rpm SHA-256: a4cbff57923796c7015d542e0ccdedbb3b8ae9b48f3f2f5831f66a335a8fa086
kernel-largesmp-devel-2.6.9-78.EL.x86_64.rpm SHA-256: c94b40269a8e2068b3be62aab37bf7a7e9178edd1be4f35d15372df874b40190
kernel-smp-2.6.9-78.EL.x86_64.rpm SHA-256: 6b981846814fa184718dcdd8f48acc4da551337dbf937e0d12efdfa522d72650
kernel-smp-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 598149c8d157fa675636ffb1a5275058aeb0af9babe544448830df6d314e7f83
kernel-xenU-2.6.9-78.EL.x86_64.rpm SHA-256: 596d29cefb7e2f0b5fe660bdf5108b01d2aba0712a2c4c8a6fd943e9c76e0638
kernel-xenU-devel-2.6.9-78.EL.x86_64.rpm SHA-256: 2fc1b1f1b9094c0f8e6856fbeaaba1e4d6b16fda67d0e1b227ea1acf530c1021
i386
kernel-2.6.9-78.EL.i686.rpm SHA-256: 7d5f48ddc9c90dda4a0758434d356b58bfdaed480b402ab2ba602481e94952db
kernel-devel-2.6.9-78.EL.i686.rpm SHA-256: e37ab8c8855c6781dc5e2aa60da05ac97f68f72f4ce5a03085b2dbea6870dc9b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-hugemem-2.6.9-78.EL.i686.rpm SHA-256: 4b790db76f92aa3e7e4ed37feadf02eef775d2c9f04aae6516865886193edecc
kernel-hugemem-devel-2.6.9-78.EL.i686.rpm SHA-256: 3090dc2db137b3a91ab262d9fadd4c56798430ecc15707ac97cc46bc9f1e2fb8
kernel-smp-2.6.9-78.EL.i686.rpm SHA-256: 0c5d2e1b9d25fadd7c8a3fa78d2c43e2cfb5566aee9eb5de2f273f8c309bfffe
kernel-smp-devel-2.6.9-78.EL.i686.rpm SHA-256: f5ec4ee69194755fa0e0fffd2d5679d76927f33b9a473956b073170e1ab5bc11
kernel-xenU-2.6.9-78.EL.i686.rpm SHA-256: e5c1a6454a903b7118664a4033012ac339b9c5795203c620f16a7b13b4f1faa1
kernel-xenU-devel-2.6.9-78.EL.i686.rpm SHA-256: 188fb4b8ab0b78e6eafe1dd42077a1299579fbddc8d929855ad33cd3a810e9b9

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-78.EL.src.rpm SHA-256: 252b649c90348a4bd6642feb69b4712b401a05563263b6b76ca82f76607c8ffb
s390x
kernel-2.6.9-78.EL.s390x.rpm SHA-256: e39bee9121e7ff96bc75eab1cac00a553a86e29c2df2ef5f1fedb30a9853cebb
kernel-devel-2.6.9-78.EL.s390x.rpm SHA-256: 66df9643f553b87a5030d383b5bfbc680b332ded051fd4232e4ffb6da23611ec
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
s390
kernel-2.6.9-78.EL.s390.rpm SHA-256: faeed37456f396b9981b698c525ce94d9aa30e9aed532cdd42a9e5f7d1f058ab
kernel-devel-2.6.9-78.EL.s390.rpm SHA-256: 33c5ef1d67820fbd3b457ca370b8166607de7b740d03c13e8a24203a3552503b
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-78.EL.src.rpm SHA-256: 252b649c90348a4bd6642feb69b4712b401a05563263b6b76ca82f76607c8ffb
ppc
kernel-2.6.9-78.EL.ppc64.rpm SHA-256: 35721587cd04a315a8f87efee0932d9732a2b3e881790c7e3aa471cebffb697d
kernel-2.6.9-78.EL.ppc64iseries.rpm SHA-256: eae4ddf50fa4a1f02669f2e08958e2b703121542bddb63d4e02d6b339ee14793
kernel-devel-2.6.9-78.EL.ppc64.rpm SHA-256: 03ed8d64efcb742eb43ba87345d847cd9cc3b381582f9af3ef4806a6984f10bd
kernel-devel-2.6.9-78.EL.ppc64iseries.rpm SHA-256: 90901613a4f5e5bccf596375246f2db977ba4d30098fd30cb9f43e397e9f0ba0
kernel-doc-2.6.9-78.EL.noarch.rpm SHA-256: 597b0ffcf5de43b12e4b498986a1ed5c3142938aed737d2561a29045a681f89b
kernel-largesmp-2.6.9-78.EL.ppc64.rpm SHA-256: b42d00c91fed59f3ce4d99fd2836bab1a1209f39f84f19b3cf49a1de366efd5b
kernel-largesmp-devel-2.6.9-78.EL.ppc64.rpm SHA-256: 8b6ed4b8b382f76d9142b22d3a6a7c1f04067937cbb88bc7e441c9bf77cf8c38

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility