Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:0014 - Security Advisory
Issued:
2009-01-14
Updated:
2009-01-14

RHSA-2009:0014 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that resolve several security issues and fix
various bugs are now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update addresses the following security issues:

  • the sendmsg() function in the Linux kernel did not block during UNIX

socket garbage collection. This could, potentially, lead to a local denial
of service. (CVE-2008-5300, Important)

  • when fput() was called to close a socket, the __scm_destroy() function in

the Linux kernel could make indirect recursive calls to itself. This could,
potentially, lead to a local denial of service. (CVE-2008-5029, Important)

  • a deficiency was found in the Linux kernel virtual file system (VFS)

implementation. This could allow a local, unprivileged user to make a
series of file creations within deleted directories, possibly causing a
denial of service. (CVE-2008-3275, Moderate)

  • a buffer underflow flaw was found in the Linux kernel IB700 SBC watchdog

timer driver. This deficiency could lead to a possible information leak. By
default, the "/dev/watchdog" device is accessible only to the root user.
(CVE-2008-5702, Low)

  • the hfs and hfsplus file systems code failed to properly handle corrupted

data structures. This could, potentially, lead to a local denial of
service. (CVE-2008-4933, CVE-2008-5025, Low)

  • a flaw was found in the hfsplus file system implementation. This could,

potentially, lead to a local denial of service when write operations were
performed. (CVE-2008-4934, Low)

This update also fixes the following bugs:

  • when running Red Hat Enterprise Linux 4.6 and 4.7 on some systems running

Intel® CPUs, the cpuspeed daemon did not run, preventing the CPU speed from
being changed, such as not being reduced to an idle state when not in use.

  • mmap() could be used to gain access to beyond the first megabyte of RAM,

due to insufficient checks in the Linux kernel code. Checks have been added
to prevent this.

  • attempting to turn keyboard LEDs on and off rapidly on keyboards with

slow keyboard controllers, may have caused key presses to fail.

  • after migrating a hypervisor guest, the MAC address table was not

updated, causing packet loss and preventing network connections to the
guest. Now, a gratuitous ARP request is sent after migration. This
refreshes the ARP caches, minimizing network downtime.

  • writing crash dumps with diskdump may have caused a kernel panic on

Non-Uniform Memory Access (NUMA) systems with certain memory
configurations.

  • on big-endian systems, such as PowerPC, the getsockopt() function

incorrectly returned 0 depending on the parameters passed to it when the
time to live (TTL) value equaled 255, possibly causing memory corruption
and application crashes.

  • a problem in the kernel packages provided by the RHSA-2008:0508 advisory

caused the Linux kernel's built-in memory copy procedure to return the
wrong error code after recovering from a page fault on AMD64 and Intel 64
systems. This may have caused other Linux kernel functions to return wrong
error codes.

  • a divide-by-zero bug in the Linux kernel process scheduler, which may

have caused kernel panics on certain systems, has been resolved.

  • the netconsole kernel module caused the Linux kernel to hang when slave

interfaces of bonded network interfaces were started, resulting in a system
hang or kernel panic when restarting the network.

  • the "/proc/xen/" directory existed even if systems were not running Red

Hat Virtualization. This may have caused problems for third-party software
that checks virtualization-ability based on the existence of "/proc/xen/".
Note: this update will remove the "/proc/xen/" directory on systems not
running Red Hat Virtualization.

All Red Hat Enterprise Linux 4 users should upgrade to these updated
packages, which contain backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7 ppc

Fixes

  • BZ - 248710 - Local keyboard DoS through LED switching
  • BZ - 457858 - CVE-2008-3275 Linux kernel local filesystem DoS
  • BZ - 460862 - kernel: devmem: add range_is_allowed() check to mmap_mem() [rhel-4.7.z]
  • BZ - 469631 - CVE-2008-4933 kernel: hfsplus: fix Buffer overflow with a corrupted image
  • BZ - 469640 - CVE-2008-4934 kernel: hfsplus: check read_mapping_page() return value
  • BZ - 469891 - lost packets when live migrating (RHEL4 XEN)
  • BZ - 470034 - HP-Japan: RHEL4.6 diskdump fails when NUMA is on
  • BZ - 470196 - getsockopt() returning incorrectly in PPC
  • BZ - 470201 - CVE-2008-5029 kernel: Unix sockets kernel panic
  • BZ - 470769 - CVE-2008-5025 kernel: hfs: fix namelength memory corruption
  • BZ - 471015 - RHSA-2008:0508 linux-2.6.9-x86_64-copy_user-zero-tail.patch broken
  • BZ - 471222 - erroneous load balancing for isolated CPUs leads to divide-by-zero panic in find_busiest_group()
  • BZ - 471391 - netconsole hang the system on ifenslave operation
  • BZ - 473259 - CVE-2008-5300 kernel: fix soft lockups/OOM issues with unix socket garbage collector
  • BZ - 475733 - CVE-2008-5702 kernel: watchdog: ib700wdt.c - buffer_underflow bug
  • BZ - 476534 - Xen balloon driver on RHEL4 x86_64 with 2.6.9-78.0.1.ELsmp

CVEs

  • CVE-2008-3275
  • CVE-2008-4933
  • CVE-2008-5029
  • CVE-2008-4934
  • CVE-2008-5300
  • CVE-2008-5025
  • CVE-2008-5702

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-78.0.13.EL.src.rpm SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39
x86_64
kernel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d
kernel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474
ia64
kernel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75
kernel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539
i386
kernel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d
kernel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d
kernel-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497
kernel-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c
kernel-smp-2.6.9-78.0.13.EL.i686.rpm SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a
kernel-smp-2.6.9-78.0.13.EL.i686.rpm SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.13.EL.src.rpm SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39
x86_64
kernel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d
kernel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474
ia64
kernel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75
kernel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539
i386
kernel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d
kernel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d
kernel-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497
kernel-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c
kernel-smp-2.6.9-78.0.13.EL.i686.rpm SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a
kernel-smp-2.6.9-78.0.13.EL.i686.rpm SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-78.0.13.EL.src.rpm SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39
x86_64
kernel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474
ia64
kernel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 4ba220471bd5bdbf1c35afee17afb0b71cd119c76d7eede808eafac1e84aaa75
kernel-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 6546ef2d006ae0d80c0f370f0634e977cd40d86155bc4c4d72ba6287aec62810
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 3eb06031e899f237c7a86bb19a5b4662039d5dd8badf1a94afaae825040ccb23
kernel-largesmp-devel-2.6.9-78.0.13.EL.ia64.rpm SHA-256: 64a9b871748519178119c5880f8bb7a2307c44bb4596a141197017484b9ff539
i386
kernel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d
kernel-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c
kernel-smp-2.6.9-78.0.13.EL.i686.rpm SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-78.0.13.EL.src.rpm SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39
x86_64
kernel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: d5e3cc4176e064f081627b0c5f7d495d046c1477e0ed24dd4cb619294d29fb0d
kernel-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: c98c1cade9be7cf5d9406ba4b8c9e14ec723ea17c6dc5fbd7b292df4220928c2
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 7292d9d1fd720d5a59a7cb7b71d6d3dd7472a0fac5ab4b309a6a60ed0b61c8f3
kernel-largesmp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 45deb8cb92a6032614bb61d1906803bd4167aa803dd57979899b5e07fa104d7a
kernel-smp-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: edc344453dfa6a289a6c084ecdc649d6449bd22c98aa69bd8f63fa522c953545
kernel-smp-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 120c6a61266b976c316e13adf10b44f0db313c729c3f61979421cc3fb611dd20
kernel-xenU-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: 935232f44b6c8451fed8ded70c1f9909ab52db445fe2d96a16189f09bb85c6e3
kernel-xenU-devel-2.6.9-78.0.13.EL.x86_64.rpm SHA-256: fd3c551352cf7d211c70fab065e62cf547dded7d8c6d5869484422b41e0ee474
i386
kernel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 76eb1d6e4deb5a8fef0ad7fd1fe523bf5fc6b892c4421f2e89ed20853309ea5d
kernel-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 78bc66930cee1c979965c205d0580801cbba4b96532ccd5398d55f2f047b2497
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-hugemem-2.6.9-78.0.13.EL.i686.rpm SHA-256: e644f11d818f38feeeb39508e5a6c958714e0467274044334e824eeffefb4703
kernel-hugemem-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: af28969913735c5dbae6b375a4702f5c5d012540e8c079ab2930f09f39c2d08c
kernel-smp-2.6.9-78.0.13.EL.i686.rpm SHA-256: a9878f073b2b37d4e27e11370d839a047f89e8529ddf337aee67dce84fe9a33a
kernel-smp-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 00943b09f7078e5c072ea1cfb2f1571a3b8e1dc7414e222cadf7fe4cd1cfc40a
kernel-xenU-2.6.9-78.0.13.EL.i686.rpm SHA-256: 50d0c82639f231318910b55e9b4c885b113191bc61cc8075c7b32889f7a52b10
kernel-xenU-devel-2.6.9-78.0.13.EL.i686.rpm SHA-256: 12017227716752bae6462531b85fec0fa7eeae27f9adb6cc888025cc577c50e4

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-78.0.13.EL.src.rpm SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39
s390x
kernel-2.6.9-78.0.13.EL.s390x.rpm SHA-256: 81f060ec231f121498eb4416c2838dcbfe5ee080a3cbdb4e8f750a101af5c550
kernel-devel-2.6.9-78.0.13.EL.s390x.rpm SHA-256: f4bc211e018653253949bf1dbd6602267e3dc93789d22dbfa779226a59857805
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
s390
kernel-2.6.9-78.0.13.EL.s390.rpm SHA-256: df1dd6fab1c5eee6fa8812c5a9b60c1082b641b083321e4eece14ea0bd268486
kernel-devel-2.6.9-78.0.13.EL.s390.rpm SHA-256: 4a064957aebe96475ea5a01a308ca05925066c43b9b81a836ee678d5b2eb2c8d
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.13.EL.src.rpm SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39
s390x
kernel-2.6.9-78.0.13.EL.s390x.rpm SHA-256: 81f060ec231f121498eb4416c2838dcbfe5ee080a3cbdb4e8f750a101af5c550
kernel-devel-2.6.9-78.0.13.EL.s390x.rpm SHA-256: f4bc211e018653253949bf1dbd6602267e3dc93789d22dbfa779226a59857805
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
s390
kernel-2.6.9-78.0.13.EL.s390.rpm SHA-256: df1dd6fab1c5eee6fa8812c5a9b60c1082b641b083321e4eece14ea0bd268486
kernel-devel-2.6.9-78.0.13.EL.s390.rpm SHA-256: 4a064957aebe96475ea5a01a308ca05925066c43b9b81a836ee678d5b2eb2c8d
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-78.0.13.EL.src.rpm SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39
ppc
kernel-2.6.9-78.0.13.EL.ppc64.rpm SHA-256: c9a4292d4b703d34abe57f39bf8e36136f221051741fa0053a65be3b94a7a495
kernel-2.6.9-78.0.13.EL.ppc64iseries.rpm SHA-256: e4e3c2d6728f5c09d37e5ff3da75c14c87ed6658ab01918c16f6b94543f74d53
kernel-devel-2.6.9-78.0.13.EL.ppc64.rpm SHA-256: e3ea6fd2bbb73da72ec82781db7696b457fe21f528ea7502937a65ae9e4984b0
kernel-devel-2.6.9-78.0.13.EL.ppc64iseries.rpm SHA-256: 1459446f56760ef3a677ff12ddeab59563ac7e13fda3200cbf3577d1e1797253
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.ppc64.rpm SHA-256: c090e6cdf39368713300b591ae1e0bd58f094607dd38bdf845575b8e9fea7af0
kernel-largesmp-devel-2.6.9-78.0.13.EL.ppc64.rpm SHA-256: bdf3b6b784b44470fdad84d55990d390d1c4c840f2b1f5198c55f0ee89d6dbad

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.13.EL.src.rpm SHA-256: cdd229da00df06b899fd94a58c99a73134423d39e78a30a4e546178d2f043c39
ppc
kernel-2.6.9-78.0.13.EL.ppc64.rpm SHA-256: c9a4292d4b703d34abe57f39bf8e36136f221051741fa0053a65be3b94a7a495
kernel-2.6.9-78.0.13.EL.ppc64iseries.rpm SHA-256: e4e3c2d6728f5c09d37e5ff3da75c14c87ed6658ab01918c16f6b94543f74d53
kernel-devel-2.6.9-78.0.13.EL.ppc64.rpm SHA-256: e3ea6fd2bbb73da72ec82781db7696b457fe21f528ea7502937a65ae9e4984b0
kernel-devel-2.6.9-78.0.13.EL.ppc64iseries.rpm SHA-256: 1459446f56760ef3a677ff12ddeab59563ac7e13fda3200cbf3577d1e1797253
kernel-doc-2.6.9-78.0.13.EL.noarch.rpm SHA-256: f76dc91a6d02064f0d9a8a0f1176516c8936c0c5d2b09e0a34e79cf774ba4f78
kernel-largesmp-2.6.9-78.0.13.EL.ppc64.rpm SHA-256: c090e6cdf39368713300b591ae1e0bd58f094607dd38bdf845575b8e9fea7af0
kernel-largesmp-devel-2.6.9-78.0.13.EL.ppc64.rpm SHA-256: bdf3b6b784b44470fdad84d55990d390d1c4c840f2b1f5198c55f0ee89d6dbad

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility