- Issued:
- 2009-01-14
- Updated:
- 2009-01-14
RHSA-2009:0014 - Security Advisory
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that resolve several security issues and fix
various bugs are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Description
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update addresses the following security issues:
- the sendmsg() function in the Linux kernel did not block during UNIX
socket garbage collection. This could, potentially, lead to a local denial
of service. (CVE-2008-5300, Important)
- when fput() was called to close a socket, the __scm_destroy() function in
the Linux kernel could make indirect recursive calls to itself. This could,
potentially, lead to a local denial of service. (CVE-2008-5029, Important)
- a deficiency was found in the Linux kernel virtual file system (VFS)
implementation. This could allow a local, unprivileged user to make a
series of file creations within deleted directories, possibly causing a
denial of service. (CVE-2008-3275, Moderate)
- a buffer underflow flaw was found in the Linux kernel IB700 SBC watchdog
timer driver. This deficiency could lead to a possible information leak. By
default, the "/dev/watchdog" device is accessible only to the root user.
(CVE-2008-5702, Low)
- the hfs and hfsplus file systems code failed to properly handle corrupted
data structures. This could, potentially, lead to a local denial of
service. (CVE-2008-4933, CVE-2008-5025, Low)
- a flaw was found in the hfsplus file system implementation. This could,
potentially, lead to a local denial of service when write operations were
performed. (CVE-2008-4934, Low)
This update also fixes the following bugs:
- when running Red Hat Enterprise Linux 4.6 and 4.7 on some systems running
Intel® CPUs, the cpuspeed daemon did not run, preventing the CPU speed from
being changed, such as not being reduced to an idle state when not in use.
- mmap() could be used to gain access to beyond the first megabyte of RAM,
due to insufficient checks in the Linux kernel code. Checks have been added
to prevent this.
- attempting to turn keyboard LEDs on and off rapidly on keyboards with
slow keyboard controllers, may have caused key presses to fail.
- after migrating a hypervisor guest, the MAC address table was not
updated, causing packet loss and preventing network connections to the
guest. Now, a gratuitous ARP request is sent after migration. This
refreshes the ARP caches, minimizing network downtime.
- writing crash dumps with diskdump may have caused a kernel panic on
Non-Uniform Memory Access (NUMA) systems with certain memory
configurations.
- on big-endian systems, such as PowerPC, the getsockopt() function
incorrectly returned 0 depending on the parameters passed to it when the
time to live (TTL) value equaled 255, possibly causing memory corruption
and application crashes.
- a problem in the kernel packages provided by the RHSA-2008:0508 advisory
caused the Linux kernel's built-in memory copy procedure to return the
wrong error code after recovering from a page fault on AMD64 and Intel 64
systems. This may have caused other Linux kernel functions to return wrong
error codes.
- a divide-by-zero bug in the Linux kernel process scheduler, which may
have caused kernel panics on certain systems, has been resolved.
- the netconsole kernel module caused the Linux kernel to hang when slave
interfaces of bonded network interfaces were started, resulting in a system
hang or kernel panic when restarting the network.
- the "/proc/xen/" directory existed even if systems were not running Red
Hat Virtualization. This may have caused problems for third-party software
that checks virtualization-ability based on the existence of "/proc/xen/".
Note: this update will remove the "/proc/xen/" directory on systems not
running Red Hat Virtualization.
All Red Hat Enterprise Linux 4 users should upgrade to these updated
packages, which contain backported patches to resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7 ppc
Fixes
- BZ - 248710 - Local keyboard DoS through LED switching
- BZ - 457858 - CVE-2008-3275 Linux kernel local filesystem DoS
- BZ - 460862 - kernel: devmem: add range_is_allowed() check to mmap_mem() [rhel-4.7.z]
- BZ - 469631 - CVE-2008-4933 kernel: hfsplus: fix Buffer overflow with a corrupted image
- BZ - 469640 - CVE-2008-4934 kernel: hfsplus: check read_mapping_page() return value
- BZ - 469891 - lost packets when live migrating (RHEL4 XEN)
- BZ - 470034 - HP-Japan: RHEL4.6 diskdump fails when NUMA is on
- BZ - 470196 - getsockopt() returning incorrectly in PPC
- BZ - 470201 - CVE-2008-5029 kernel: Unix sockets kernel panic
- BZ - 470769 - CVE-2008-5025 kernel: hfs: fix namelength memory corruption
- BZ - 471015 - RHSA-2008:0508 linux-2.6.9-x86_64-copy_user-zero-tail.patch broken
- BZ - 471222 - erroneous load balancing for isolated CPUs leads to divide-by-zero panic in find_busiest_group()
- BZ - 471391 - netconsole hang the system on ifenslave operation
- BZ - 473259 - CVE-2008-5300 kernel: fix soft lockups/OOM issues with unix socket garbage collector
- BZ - 475733 - CVE-2008-5702 kernel: watchdog: ib700wdt.c - buffer_underflow bug
- BZ - 476534 - Xen balloon driver on RHEL4 x86_64 with 2.6.9-78.0.1.ELsmp
CVEs
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
kernel-2.6.9-78.0.13.EL.src.rpm | SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39 |
x86_64 | |
kernel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d |
kernel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d |
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2 |
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3 |
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a |
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a |
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545 |
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545 |
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20 |
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20 |
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3 |
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3 |
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474 |
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474 |
ia64 | |
kernel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75 |
kernel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75 |
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810 |
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23 |
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539 |
i386 | |
kernel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d |
kernel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d |
kernel-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497 |
kernel-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm | SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703 |
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm | SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703 |
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c |
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c |
kernel-smp-2.6.9-78.0.13.EL.i686.rpm | SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a |
kernel-smp-2.6.9-78.0.13.EL.i686.rpm | SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a |
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a |
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a |
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10 |
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10 |
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4 |
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7
SRPM | |
---|---|
kernel-2.6.9-78.0.13.EL.src.rpm | SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39 |
x86_64 | |
kernel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d |
kernel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d |
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2 |
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3 |
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a |
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a |
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545 |
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545 |
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20 |
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20 |
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3 |
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3 |
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474 |
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474 |
ia64 | |
kernel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75 |
kernel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75 |
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810 |
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23 |
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539 |
i386 | |
kernel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d |
kernel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d |
kernel-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497 |
kernel-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm | SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703 |
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm | SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703 |
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c |
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c |
kernel-smp-2.6.9-78.0.13.EL.i686.rpm | SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a |
kernel-smp-2.6.9-78.0.13.EL.i686.rpm | SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a |
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a |
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a |
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10 |
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10 |
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4 |
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
kernel-2.6.9-78.0.13.EL.src.rpm | SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39 |
x86_64 | |
kernel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d |
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a |
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545 |
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20 |
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3 |
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474 |
ia64 | |
kernel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75 |
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm | SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539 |
i386 | |
kernel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d |
kernel-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm | SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703 |
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c |
kernel-smp-2.6.9-78.0.13.EL.i686.rpm | SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a |
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a |
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10 |
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
kernel-2.6.9-78.0.13.EL.src.rpm | SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39 |
x86_64 | |
kernel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d |
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a |
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545 |
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20 |
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3 |
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm | SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474 |
i386 | |
kernel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d |
kernel-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm | SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703 |
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c |
kernel-smp-2.6.9-78.0.13.EL.i686.rpm | SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a |
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a |
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10 |
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm | SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
kernel-2.6.9-78.0.13.EL.src.rpm | SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39 |
s390x | |
kernel-2.6.9-78.0.13.EL.s390x.rpm | SHA-256: 81f060ec231f121498eb4416c2838dcbfe5ee080a3cbdb4e8f750a101af5c550 |
kernel-devel-2.6.9-78.0.13.EL.s390x.rpm | SHA-256: f4bc211e018653253949bf1dbd6602267e3dc93789d22dbfa779226a59857805 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
s390 | |
kernel-2.6.9-78.0.13.EL.s390.rpm | SHA-256: df1dd6fab1c5eee6fa8812c5a9b60c1082b641b083321e4eece14ea0bd268486 |
kernel-devel-2.6.9-78.0.13.EL.s390.rpm | SHA-256: 4a064957aebe96475ea5a01a308ca05925066c43b9b81a836ee678d5b2eb2c8d |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7
SRPM | |
---|---|
kernel-2.6.9-78.0.13.EL.src.rpm | SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39 |
s390x | |
kernel-2.6.9-78.0.13.EL.s390x.rpm | SHA-256: 81f060ec231f121498eb4416c2838dcbfe5ee080a3cbdb4e8f750a101af5c550 |
kernel-devel-2.6.9-78.0.13.EL.s390x.rpm | SHA-256: f4bc211e018653253949bf1dbd6602267e3dc93789d22dbfa779226a59857805 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
s390 | |
kernel-2.6.9-78.0.13.EL.s390.rpm | SHA-256: df1dd6fab1c5eee6fa8812c5a9b60c1082b641b083321e4eece14ea0bd268486 |
kernel-devel-2.6.9-78.0.13.EL.s390.rpm | SHA-256: 4a064957aebe96475ea5a01a308ca05925066c43b9b81a836ee678d5b2eb2c8d |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
kernel-2.6.9-78.0.13.EL.src.rpm | SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39 |
ppc | |
kernel-2.6.9-78.0.13.EL.ppc64.rpm | SHA-256: c9a4292d4b703d34abe57f39bf8e36136f221051741fa0053a65be3b94a7a495 |
kernel-2.6.9-78.0.13.EL.ppc64iseries.rpm | SHA-256: e4e3c2d6728f5c09d37e5ff3da75c14c87ed6658ab01918c16f6b94543f74d53 |
kernel-devel-2.6.9-78.0.13.EL.ppc64.rpm | SHA-256: e3ea6fd2bbb73da72ec82781db7696b457fe21f528ea7502937a65ae9e4984b0 |
kernel-devel-2.6.9-78.0.13.EL.ppc64iseries.rpm | SHA-256: 1459446f56760ef3a677ff12ddeab59563ac7e13fda3200cbf3577d1e1797253 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.ppc64.rpm | SHA-256: c090e6cdf39368713300b591ae1e0bd58f094607dd38bdf845575b8e9fea7af0 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.ppc64.rpm | SHA-256: bdf3b6b784b44470fdad84d55990d390d1c4c840f2b1f5198c55f0ee89d6dbad |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7
SRPM | |
---|---|
kernel-2.6.9-78.0.13.EL.src.rpm | SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39 |
ppc | |
kernel-2.6.9-78.0.13.EL.ppc64.rpm | SHA-256: c9a4292d4b703d34abe57f39bf8e36136f221051741fa0053a65be3b94a7a495 |
kernel-2.6.9-78.0.13.EL.ppc64iseries.rpm | SHA-256: e4e3c2d6728f5c09d37e5ff3da75c14c87ed6658ab01918c16f6b94543f74d53 |
kernel-devel-2.6.9-78.0.13.EL.ppc64.rpm | SHA-256: e3ea6fd2bbb73da72ec82781db7696b457fe21f528ea7502937a65ae9e4984b0 |
kernel-devel-2.6.9-78.0.13.EL.ppc64iseries.rpm | SHA-256: 1459446f56760ef3a677ff12ddeab59563ac7e13fda3200cbf3577d1e1797253 |
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm | SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78 |
kernel-largesmp-2.6.9-78.0.13.EL.ppc64.rpm | SHA-256: c090e6cdf39368713300b591ae1e0bd58f094607dd38bdf845575b8e9fea7af0 |
kernel-largesmp-devel-2.6.9-78.0.13.EL.ppc64.rpm | SHA-256: bdf3b6b784b44470fdad84d55990d390d1c4c840f2b1f5198c55f0ee89d6dbad |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.