Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:1132 - Security Advisory
Issued:
2009-06-30
Updated:
2009-06-30

RHSA-2009:1132 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues and various bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

  • a flaw was found in the Intel PRO/1000 network driver in the Linux

kernel. Frames with sizes near the MTU of an interface may be split across
multiple hardware receive descriptors. Receipt of such a frame could leak
through a validation check, leading to a corruption of the length check. A
remote attacker could use this flaw to send a specially-crafted packet that
would cause a denial of service. (CVE-2009-1385, Important)

  • the Linux kernel Network File System daemon (nfsd) implementation did not

drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)

  • Frank Filz reported the NFSv4 client was missing a file permission check

for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)

  • a missing check was found in the hypervisor_callback() function in the

Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)

  • a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and

agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)

These updated packages also fix the following bugs:

  • "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes

able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps, making it possible to bypass the Address Space
Layout Randomization (ASLR) security feature. This update addresses this
issue. (BZ#499549)

  • in some situations, the link count was not decreased when renaming unused

files on NFS mounted file systems. This may have resulted in poor
performance. With this update, the link count is decreased in these
situations, the same as is done for other file operations, such as unlink
and rmdir. (BZ#501802)

  • tcp_ack() cleared the probes_out variable even if there were outstanding

packets. When low TCP keepalive intervals were used, this bug may have
caused problems, such as connections terminating, when using remote tools
such as rsh and rlogin. (BZ#501754)

  • off-by-one errors in the time normalization code could have caused

clock_gettime() to return one billion nanoseconds, rather than adding an
extra second. This bug could have caused the name service cache daemon
(nscd) to consume excessive CPU resources. (BZ#501800)

  • a system panic could occur when one thread read "/proc/bus/input/devices"

while another was removing a device. With this update, a mutex has been
added to protect the input_dev_list and input_handler_list variables, which
resolves this issue. (BZ#501804)

  • using netdump may have caused a kernel deadlock on some systems.

(BZ#504565)

  • the file system mask, which lists capabilities for users with a file

system user ID (fsuid) of 0, was missing the CAP_MKNOD and
CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with
an fsuid other than 0 to perform actions on some file system types that
would otherwise be prevented. This update adds these capabilities. (BZ#497269)

All Red Hat Enterprise Linux 4 users should upgrade to these updated
packages, which contain backported patches to resolve these issues. Note:
The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 491572 - CVE-2009-1072 kernel: nfsd should drop CAP_MKNOD for non-root
  • BZ - 497020 - CVE-2009-1192 kernel: agp: zero pages before sending to userspace
  • BZ - 499549 - kernel: proc: avoid information leaks to non-privileged processes [rhel-4.8.z]
  • BZ - 500297 - CVE-2009-1630 kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission
  • BZ - 500945 - CVE-2009-1758 kernel: xen: local denial of service
  • BZ - 501754 - Bug with TCP tcp_ack() [RHEL 4]
  • BZ - 501800 - [RHEL4] Nscd consumes many cpu resources ( nearly 100% ) continuously.
  • BZ - 501802 - [RHEL 4] inode of the overwritten file will remain in the icache causing performance issues.
  • BZ - 501804 - [Stratus 4.9 bug] panic reading /proc/bus/input/devices during input device removal
  • BZ - 502981 - CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
  • BZ - 504565 - e1000e: sporadic hang in netdump

CVEs

  • CVE-2009-1192
  • CVE-2009-1072
  • CVE-2009-1630
  • CVE-2009-1758
  • CVE-2009-1385

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-89.0.3.EL.src.rpm SHA-256: 3e7f6be9894c5377cca5afe1450729874ae76d3c13caa6ddbb050af0c0c74674
x86_64
kernel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 322708b237e6426ad4fffa9363dc5e69c4ba21cdb203a97853b2bbb9a89e5e7b
kernel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 322708b237e6426ad4fffa9363dc5e69c4ba21cdb203a97853b2bbb9a89e5e7b
kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 53dbc4578a545c14cb22f70e179924b03e84a1430db0397682b4d1d270c87009
kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 53dbc4578a545c14cb22f70e179924b03e84a1430db0397682b4d1d270c87009
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 1aeed928ded7f3010bd908ea6b341c35b0058e58b84da6a71420a972641f4958
kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 1aeed928ded7f3010bd908ea6b341c35b0058e58b84da6a71420a972641f4958
kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5e2d328a78d5cf9679e60147ae17c5f84eb77f3bec0f5a49e356eb10f6ad6e6c
kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5e2d328a78d5cf9679e60147ae17c5f84eb77f3bec0f5a49e356eb10f6ad6e6c
kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5d3583d37e531981cb9b795bdcc65181dcec74895ead48ccb5e24ebf287182db
kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5d3583d37e531981cb9b795bdcc65181dcec74895ead48ccb5e24ebf287182db
kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: b416d68424e3e3c7f5dcf23677d8d981f7852c062542e1cb11c4fbfeb68e5f9f
kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: b416d68424e3e3c7f5dcf23677d8d981f7852c062542e1cb11c4fbfeb68e5f9f
kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: afb8a6a5ef87565e11ac496416ad44243573b6d54e4c6f5d210c9bcd3c0a624a
kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: afb8a6a5ef87565e11ac496416ad44243573b6d54e4c6f5d210c9bcd3c0a624a
kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: a7b48f7e1f4c27e7770e7125b41d145695dc764484adfe3de8ccf6ed5016760b
kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: a7b48f7e1f4c27e7770e7125b41d145695dc764484adfe3de8ccf6ed5016760b
ia64
kernel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 2c6c8abad9706637826fceebc0857eef3d7a8d75fb4936ea76921efc99387458
kernel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 2c6c8abad9706637826fceebc0857eef3d7a8d75fb4936ea76921efc99387458
kernel-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: e81f429e4256d7d881c4032fb2bdf61abf9cd6ace801de8554bdd8507a3bb9ae
kernel-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: e81f429e4256d7d881c4032fb2bdf61abf9cd6ace801de8554bdd8507a3bb9ae
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 7aa6ce95193b382b57c482f01e47b6694627b3bd02908ebfb1a185006fa1f8a7
kernel-largesmp-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 7aa6ce95193b382b57c482f01e47b6694627b3bd02908ebfb1a185006fa1f8a7
kernel-largesmp-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 8078d32e27dc250eb565fea21e9be171a67d384aaa241d6feb383e201d9332cc
kernel-largesmp-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 8078d32e27dc250eb565fea21e9be171a67d384aaa241d6feb383e201d9332cc
i386
kernel-2.6.9-89.0.3.EL.i686.rpm SHA-256: a8cdfc3c78512ec91c4fff8199da433b81b91c3cb280e477a24dd665829d4ee7
kernel-2.6.9-89.0.3.EL.i686.rpm SHA-256: a8cdfc3c78512ec91c4fff8199da433b81b91c3cb280e477a24dd665829d4ee7
kernel-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 96b5f75328bef710c2163a7aa374dda664968d059325b9e37d72ec9704aa0593
kernel-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 96b5f75328bef710c2163a7aa374dda664968d059325b9e37d72ec9704aa0593
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm SHA-256: c35c0d964e40e22bc8082108078dbbb0d7b6a9ae4ea37e5f81e1bb00c7c1d716
kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm SHA-256: c35c0d964e40e22bc8082108078dbbb0d7b6a9ae4ea37e5f81e1bb00c7c1d716
kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 54d9b1b4c4d7b50e98ea60be16db3061c5cd58ee3aada7b9cd98c0c4f6bb3ef1
kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 54d9b1b4c4d7b50e98ea60be16db3061c5cd58ee3aada7b9cd98c0c4f6bb3ef1
kernel-smp-2.6.9-89.0.3.EL.i686.rpm SHA-256: 2a454a12b2a98a7aa328ba537c2799b126f77976b9f78a8cf6bd3f52296036e2
kernel-smp-2.6.9-89.0.3.EL.i686.rpm SHA-256: 2a454a12b2a98a7aa328ba537c2799b126f77976b9f78a8cf6bd3f52296036e2
kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 1dd01f5b462b81d07959e168f511db55bf8db4712ae9ddb3fb7611f3c91cb3c3
kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 1dd01f5b462b81d07959e168f511db55bf8db4712ae9ddb3fb7611f3c91cb3c3
kernel-xenU-2.6.9-89.0.3.EL.i686.rpm SHA-256: 93fdd0269d3d95328b840e420c343fbc31030606df572a53aebc44a316335d94
kernel-xenU-2.6.9-89.0.3.EL.i686.rpm SHA-256: 93fdd0269d3d95328b840e420c343fbc31030606df572a53aebc44a316335d94
kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 0710aae30cc1c9af5358ea9c90a3400e782b4791ecae4aa7ae11563f00bd502f
kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 0710aae30cc1c9af5358ea9c90a3400e782b4791ecae4aa7ae11563f00bd502f

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.3.EL.src.rpm SHA-256: 3e7f6be9894c5377cca5afe1450729874ae76d3c13caa6ddbb050af0c0c74674
x86_64
kernel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 322708b237e6426ad4fffa9363dc5e69c4ba21cdb203a97853b2bbb9a89e5e7b
kernel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 322708b237e6426ad4fffa9363dc5e69c4ba21cdb203a97853b2bbb9a89e5e7b
kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 53dbc4578a545c14cb22f70e179924b03e84a1430db0397682b4d1d270c87009
kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 53dbc4578a545c14cb22f70e179924b03e84a1430db0397682b4d1d270c87009
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 1aeed928ded7f3010bd908ea6b341c35b0058e58b84da6a71420a972641f4958
kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 1aeed928ded7f3010bd908ea6b341c35b0058e58b84da6a71420a972641f4958
kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5e2d328a78d5cf9679e60147ae17c5f84eb77f3bec0f5a49e356eb10f6ad6e6c
kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5e2d328a78d5cf9679e60147ae17c5f84eb77f3bec0f5a49e356eb10f6ad6e6c
kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5d3583d37e531981cb9b795bdcc65181dcec74895ead48ccb5e24ebf287182db
kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5d3583d37e531981cb9b795bdcc65181dcec74895ead48ccb5e24ebf287182db
kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: b416d68424e3e3c7f5dcf23677d8d981f7852c062542e1cb11c4fbfeb68e5f9f
kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: b416d68424e3e3c7f5dcf23677d8d981f7852c062542e1cb11c4fbfeb68e5f9f
kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: afb8a6a5ef87565e11ac496416ad44243573b6d54e4c6f5d210c9bcd3c0a624a
kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: afb8a6a5ef87565e11ac496416ad44243573b6d54e4c6f5d210c9bcd3c0a624a
kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: a7b48f7e1f4c27e7770e7125b41d145695dc764484adfe3de8ccf6ed5016760b
kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: a7b48f7e1f4c27e7770e7125b41d145695dc764484adfe3de8ccf6ed5016760b
ia64
kernel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 2c6c8abad9706637826fceebc0857eef3d7a8d75fb4936ea76921efc99387458
kernel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 2c6c8abad9706637826fceebc0857eef3d7a8d75fb4936ea76921efc99387458
kernel-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: e81f429e4256d7d881c4032fb2bdf61abf9cd6ace801de8554bdd8507a3bb9ae
kernel-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: e81f429e4256d7d881c4032fb2bdf61abf9cd6ace801de8554bdd8507a3bb9ae
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 7aa6ce95193b382b57c482f01e47b6694627b3bd02908ebfb1a185006fa1f8a7
kernel-largesmp-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 7aa6ce95193b382b57c482f01e47b6694627b3bd02908ebfb1a185006fa1f8a7
kernel-largesmp-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 8078d32e27dc250eb565fea21e9be171a67d384aaa241d6feb383e201d9332cc
kernel-largesmp-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 8078d32e27dc250eb565fea21e9be171a67d384aaa241d6feb383e201d9332cc
i386
kernel-2.6.9-89.0.3.EL.i686.rpm SHA-256: a8cdfc3c78512ec91c4fff8199da433b81b91c3cb280e477a24dd665829d4ee7
kernel-2.6.9-89.0.3.EL.i686.rpm SHA-256: a8cdfc3c78512ec91c4fff8199da433b81b91c3cb280e477a24dd665829d4ee7
kernel-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 96b5f75328bef710c2163a7aa374dda664968d059325b9e37d72ec9704aa0593
kernel-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 96b5f75328bef710c2163a7aa374dda664968d059325b9e37d72ec9704aa0593
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm SHA-256: c35c0d964e40e22bc8082108078dbbb0d7b6a9ae4ea37e5f81e1bb00c7c1d716
kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm SHA-256: c35c0d964e40e22bc8082108078dbbb0d7b6a9ae4ea37e5f81e1bb00c7c1d716
kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 54d9b1b4c4d7b50e98ea60be16db3061c5cd58ee3aada7b9cd98c0c4f6bb3ef1
kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 54d9b1b4c4d7b50e98ea60be16db3061c5cd58ee3aada7b9cd98c0c4f6bb3ef1
kernel-smp-2.6.9-89.0.3.EL.i686.rpm SHA-256: 2a454a12b2a98a7aa328ba537c2799b126f77976b9f78a8cf6bd3f52296036e2
kernel-smp-2.6.9-89.0.3.EL.i686.rpm SHA-256: 2a454a12b2a98a7aa328ba537c2799b126f77976b9f78a8cf6bd3f52296036e2
kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 1dd01f5b462b81d07959e168f511db55bf8db4712ae9ddb3fb7611f3c91cb3c3
kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 1dd01f5b462b81d07959e168f511db55bf8db4712ae9ddb3fb7611f3c91cb3c3
kernel-xenU-2.6.9-89.0.3.EL.i686.rpm SHA-256: 93fdd0269d3d95328b840e420c343fbc31030606df572a53aebc44a316335d94
kernel-xenU-2.6.9-89.0.3.EL.i686.rpm SHA-256: 93fdd0269d3d95328b840e420c343fbc31030606df572a53aebc44a316335d94
kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 0710aae30cc1c9af5358ea9c90a3400e782b4791ecae4aa7ae11563f00bd502f
kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 0710aae30cc1c9af5358ea9c90a3400e782b4791ecae4aa7ae11563f00bd502f

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-89.0.3.EL.src.rpm SHA-256: 3e7f6be9894c5377cca5afe1450729874ae76d3c13caa6ddbb050af0c0c74674
x86_64
kernel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 322708b237e6426ad4fffa9363dc5e69c4ba21cdb203a97853b2bbb9a89e5e7b
kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 53dbc4578a545c14cb22f70e179924b03e84a1430db0397682b4d1d270c87009
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 1aeed928ded7f3010bd908ea6b341c35b0058e58b84da6a71420a972641f4958
kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5e2d328a78d5cf9679e60147ae17c5f84eb77f3bec0f5a49e356eb10f6ad6e6c
kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5d3583d37e531981cb9b795bdcc65181dcec74895ead48ccb5e24ebf287182db
kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: b416d68424e3e3c7f5dcf23677d8d981f7852c062542e1cb11c4fbfeb68e5f9f
kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: afb8a6a5ef87565e11ac496416ad44243573b6d54e4c6f5d210c9bcd3c0a624a
kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: a7b48f7e1f4c27e7770e7125b41d145695dc764484adfe3de8ccf6ed5016760b
ia64
kernel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 2c6c8abad9706637826fceebc0857eef3d7a8d75fb4936ea76921efc99387458
kernel-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: e81f429e4256d7d881c4032fb2bdf61abf9cd6ace801de8554bdd8507a3bb9ae
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 7aa6ce95193b382b57c482f01e47b6694627b3bd02908ebfb1a185006fa1f8a7
kernel-largesmp-devel-2.6.9-89.0.3.EL.ia64.rpm SHA-256: 8078d32e27dc250eb565fea21e9be171a67d384aaa241d6feb383e201d9332cc
i386
kernel-2.6.9-89.0.3.EL.i686.rpm SHA-256: a8cdfc3c78512ec91c4fff8199da433b81b91c3cb280e477a24dd665829d4ee7
kernel-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 96b5f75328bef710c2163a7aa374dda664968d059325b9e37d72ec9704aa0593
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm SHA-256: c35c0d964e40e22bc8082108078dbbb0d7b6a9ae4ea37e5f81e1bb00c7c1d716
kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 54d9b1b4c4d7b50e98ea60be16db3061c5cd58ee3aada7b9cd98c0c4f6bb3ef1
kernel-smp-2.6.9-89.0.3.EL.i686.rpm SHA-256: 2a454a12b2a98a7aa328ba537c2799b126f77976b9f78a8cf6bd3f52296036e2
kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 1dd01f5b462b81d07959e168f511db55bf8db4712ae9ddb3fb7611f3c91cb3c3
kernel-xenU-2.6.9-89.0.3.EL.i686.rpm SHA-256: 93fdd0269d3d95328b840e420c343fbc31030606df572a53aebc44a316335d94
kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 0710aae30cc1c9af5358ea9c90a3400e782b4791ecae4aa7ae11563f00bd502f

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-89.0.3.EL.src.rpm SHA-256: 3e7f6be9894c5377cca5afe1450729874ae76d3c13caa6ddbb050af0c0c74674
x86_64
kernel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 322708b237e6426ad4fffa9363dc5e69c4ba21cdb203a97853b2bbb9a89e5e7b
kernel-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 53dbc4578a545c14cb22f70e179924b03e84a1430db0397682b4d1d270c87009
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 1aeed928ded7f3010bd908ea6b341c35b0058e58b84da6a71420a972641f4958
kernel-largesmp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5e2d328a78d5cf9679e60147ae17c5f84eb77f3bec0f5a49e356eb10f6ad6e6c
kernel-smp-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: 5d3583d37e531981cb9b795bdcc65181dcec74895ead48ccb5e24ebf287182db
kernel-smp-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: b416d68424e3e3c7f5dcf23677d8d981f7852c062542e1cb11c4fbfeb68e5f9f
kernel-xenU-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: afb8a6a5ef87565e11ac496416ad44243573b6d54e4c6f5d210c9bcd3c0a624a
kernel-xenU-devel-2.6.9-89.0.3.EL.x86_64.rpm SHA-256: a7b48f7e1f4c27e7770e7125b41d145695dc764484adfe3de8ccf6ed5016760b
i386
kernel-2.6.9-89.0.3.EL.i686.rpm SHA-256: a8cdfc3c78512ec91c4fff8199da433b81b91c3cb280e477a24dd665829d4ee7
kernel-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 96b5f75328bef710c2163a7aa374dda664968d059325b9e37d72ec9704aa0593
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-hugemem-2.6.9-89.0.3.EL.i686.rpm SHA-256: c35c0d964e40e22bc8082108078dbbb0d7b6a9ae4ea37e5f81e1bb00c7c1d716
kernel-hugemem-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 54d9b1b4c4d7b50e98ea60be16db3061c5cd58ee3aada7b9cd98c0c4f6bb3ef1
kernel-smp-2.6.9-89.0.3.EL.i686.rpm SHA-256: 2a454a12b2a98a7aa328ba537c2799b126f77976b9f78a8cf6bd3f52296036e2
kernel-smp-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 1dd01f5b462b81d07959e168f511db55bf8db4712ae9ddb3fb7611f3c91cb3c3
kernel-xenU-2.6.9-89.0.3.EL.i686.rpm SHA-256: 93fdd0269d3d95328b840e420c343fbc31030606df572a53aebc44a316335d94
kernel-xenU-devel-2.6.9-89.0.3.EL.i686.rpm SHA-256: 0710aae30cc1c9af5358ea9c90a3400e782b4791ecae4aa7ae11563f00bd502f

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-89.0.3.EL.src.rpm SHA-256: 3e7f6be9894c5377cca5afe1450729874ae76d3c13caa6ddbb050af0c0c74674
s390x
kernel-2.6.9-89.0.3.EL.s390x.rpm SHA-256: 453e4943349f89a57a037d559031e440096dc58589673768270af9157f6bb430
kernel-devel-2.6.9-89.0.3.EL.s390x.rpm SHA-256: eeb4a6fb9007966420b5c664acf08388a99b3e3c4a93421095ac3fdb7441f429
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
s390
kernel-2.6.9-89.0.3.EL.s390.rpm SHA-256: 217f33e874198e3de908f0302ee56a19851107763f1dc66d00658af7edcda0c2
kernel-devel-2.6.9-89.0.3.EL.s390.rpm SHA-256: d44193dadf893816d183f7af76631cedc56048225287ac9541d1e83d37e46f15
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.3.EL.src.rpm SHA-256: 3e7f6be9894c5377cca5afe1450729874ae76d3c13caa6ddbb050af0c0c74674
s390x
kernel-2.6.9-89.0.3.EL.s390x.rpm SHA-256: 453e4943349f89a57a037d559031e440096dc58589673768270af9157f6bb430
kernel-devel-2.6.9-89.0.3.EL.s390x.rpm SHA-256: eeb4a6fb9007966420b5c664acf08388a99b3e3c4a93421095ac3fdb7441f429
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
s390
kernel-2.6.9-89.0.3.EL.s390.rpm SHA-256: 217f33e874198e3de908f0302ee56a19851107763f1dc66d00658af7edcda0c2
kernel-devel-2.6.9-89.0.3.EL.s390.rpm SHA-256: d44193dadf893816d183f7af76631cedc56048225287ac9541d1e83d37e46f15
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-89.0.3.EL.src.rpm SHA-256: 3e7f6be9894c5377cca5afe1450729874ae76d3c13caa6ddbb050af0c0c74674
ppc
kernel-2.6.9-89.0.3.EL.ppc64.rpm SHA-256: 38a6b76bfd3ff6b45a1ea2e8578bfee791339361043291b5034882e003f3c83a
kernel-2.6.9-89.0.3.EL.ppc64iseries.rpm SHA-256: edfcc250937874520e694cf2145a64c8a5bcdce3cda7bceeb53661bd691a58e4
kernel-devel-2.6.9-89.0.3.EL.ppc64.rpm SHA-256: fc11e5e1335b17320e95e601fcffd0959f22f6d374024aa606a7e2912ee54776
kernel-devel-2.6.9-89.0.3.EL.ppc64iseries.rpm SHA-256: d6d8b09385ca128d5656213a850819206c37d90857fa70d61c1ce4f7d966e07d
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.ppc64.rpm SHA-256: 9a2294db2a8e9dbd4f6adcf2c6a87a012be6e3a5e35af661ac635342335fd544
kernel-largesmp-devel-2.6.9-89.0.3.EL.ppc64.rpm SHA-256: 22d21e50d30bb93fc2768f6045c4942dce97968113ad45dc9ff2d135f7992c30

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.3.EL.src.rpm SHA-256: 3e7f6be9894c5377cca5afe1450729874ae76d3c13caa6ddbb050af0c0c74674
ppc
kernel-2.6.9-89.0.3.EL.ppc64.rpm SHA-256: 38a6b76bfd3ff6b45a1ea2e8578bfee791339361043291b5034882e003f3c83a
kernel-2.6.9-89.0.3.EL.ppc64iseries.rpm SHA-256: edfcc250937874520e694cf2145a64c8a5bcdce3cda7bceeb53661bd691a58e4
kernel-devel-2.6.9-89.0.3.EL.ppc64.rpm SHA-256: fc11e5e1335b17320e95e601fcffd0959f22f6d374024aa606a7e2912ee54776
kernel-devel-2.6.9-89.0.3.EL.ppc64iseries.rpm SHA-256: d6d8b09385ca128d5656213a850819206c37d90857fa70d61c1ce4f7d966e07d
kernel-doc-2.6.9-89.0.3.EL.noarch.rpm SHA-256: f02d0aa5b4fcdde1fc895d32053e2d6344e73baa20443553eb1813215cd071cc
kernel-largesmp-2.6.9-89.0.3.EL.ppc64.rpm SHA-256: 9a2294db2a8e9dbd4f6adcf2c6a87a012be6e3a5e35af661ac635342335fd544
kernel-largesmp-devel-2.6.9-89.0.3.EL.ppc64.rpm SHA-256: 22d21e50d30bb93fc2768f6045c4942dce97968113ad45dc9ff2d135f7992c30

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility