Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2009:1438 - Security Advisory
Issued:
2009-09-15
Updated:
2009-09-15

RHSA-2009:1438 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a

setuid or setgid program was executed. A local, unprivileged user could use
this flaw to bypass the mmap_min_addr protection mechanism and perform a
NULL pointer dereference attack, or bypass the Address Space Layout
Randomization (ASLR) security feature. (CVE-2009-1895, Important)

  • it was discovered that, when executing a new process, the clear_child_tid

pointer in the Linux kernel is not cleared. If this pointer points to a
writable portion of the memory of the new program, the kernel could corrupt
four bytes of memory, possibly leading to a local denial of service or
privilege escalation. (CVE-2009-2848, Important)

  • Solar Designer reported a missing capability check in the z90crypt driver

in the Linux kernel. This missing check could allow a local user with an
effective user ID (euid) of 0 to bypass intended capability restrictions.
(CVE-2009-1883, Moderate)

  • a flaw was found in the way the do_sigaltstack() function in the Linux

kernel copies the stack_t structure to user-space. On 64-bit machines, this
flaw could lead to a four-byte information leak. (CVE-2009-2847, Moderate)

This update also fixes the following bugs:

  • the gcc flag "-fno-delete-null-pointer-checks" was added to the kernel

build options. This prevents gcc from optimizing out NULL pointer checks
after the first use of a pointer. NULL pointer bugs are often exploited by
attackers. Keeping these checks is a safety measure. (BZ#517964)

  • the Emulex LPFC driver has been updated to version 8.0.16.47, which

fixes a memory leak that caused memory allocation failures and system
hangs. (BZ#513192)

  • an error in the MPT Fusion driver makefile caused CSMI ioctls to not

work with Serial Attached SCSI devices. (BZ#516184)

  • this update adds the mmap_min_addr tunable and restriction checks to help

prevent unprivileged users from creating new memory mappings below the
minimum address. This can help prevent the exploitation of NULL pointer
deference bugs. Note that mmap_min_addr is set to zero (disabled) by
default for backwards compatibility. (BZ#517904)

  • time-outs resulted in I/O errors being logged to "/var/log/messages" when

running "mt erase" on tape drives using certain LSI MegaRAID SAS adapters,
preventing the command from completing. The megaraid_sas driver's timeout
value is now set to the OS layer value. (BZ#517965)

  • a locking issue caused the qla2xxx ioctl module to hang after

encountering errors. This locking issue has been corrected. This ioctl
module is used by the QLogic SAN management tools, such as SANsurfer and
scli. (BZ#519428)

  • when a RAID 1 array that uses the mptscsi driver and the LSI 1030

controller became degraded, the whole array was detected as being offline,
which could cause kernel panics at boot or data loss. (BZ#517295)

  • on 32-bit architectures, if a file was held open and frequently written

for more than 25 days, it was possible that the kernel would stop flushing
those writes to storage. (BZ#515255)

  • a memory allocation bug in ib_mthca prevented the driver from loading if

it was loaded with large values for the "num_mpt=" and "num_mtt=" options.
(BZ#518707)

  • with this update, get_random_int() is more random and no longer uses a

common seed value, reducing the possibility of predicting the values
returned. (BZ#519692)

  • a bug in __ptrace_unlink() caused it to create deadlocked and unkillable

processes. (BZ#519446)

  • previously, multiple threads using the fcntl() F_SETLK command to

synchronize file access caused a deadlock in posix_locks_deadlock(). This
could cause a system hang. (BZ#519429)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 505983 - CVE-2009-1883 kernel: missing capability check in z90crypt
  • BZ - 511171 - CVE-2009-1895 kernel: personality: fix PER_CLEAR_ON_SETID
  • BZ - 513192 - [Emulex 4.9 bug] DMA zone exhaustion from lpfc driver memory leak
  • BZ - 515255 - NFS problems on RHEL 4 where logs show different lengths
  • BZ - 515392 - CVE-2009-2847 kernel: information leak in sigaltstack
  • BZ - 515423 - CVE-2009-2848 kernel: execve: must clear current->clear_child_tid
  • BZ - 516184 - MPT driver CC_CSMI_SAS_GET_CNTLR_CONFIG IOCTL fails [rhel-4.8.z]
  • BZ - 517295 - Missing mptscsi RAID1 disk causes kernel panic when rebooted before array rebuild. [rhel-4.8.z]
  • BZ - 517904 - kernel: security: implement mmap_min_addr infrastructure [rhel-4.8.z]
  • BZ - 517964 - kernel: build with -fno-delete-null-pointer-checks [rhel-4.8.z]
  • BZ - 517965 - MegaRAID SAS 1078 tape I/O errors when using mt erase [rhel-4.8.z]
  • BZ - 518707 - num_mtt settings of 2097152 fails in RHEL with infiniband HCA [rhel-4.8.z]
  • BZ - 519428 - [NetApp 4.8 bug] Issues with "qioctlmod" module on RHEL4.8 hosts with QLogic FC inbox drivers [rhel-4.8.z]
  • BZ - 519429 - [RHEL 4] Lookups due to infinite loops in posix_locks_deadlock [rhel-4.8.z]
  • BZ - 519446 - kernel: ptrace: don't use REMOVE_LINKS/SET_LINKS for reparenting [rhel-4.9] [rhel-4.8.z]
  • BZ - 519692 - kernel: random: make get_random_int() more random [rhel-4.9] [rhel-4.8.z]

CVEs

  • CVE-2009-1895
  • CVE-2009-2848
  • CVE-2009-2847
  • CVE-2009-1883
  • CVE-2009-3238

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-89.0.11.EL.src.rpm SHA-256: c249366c7509d39c3aec75e03bc8f086f117daf7bbe916b46ece997095f20501
x86_64
kernel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 9fb9e783365c5b77966aa3fbd6214645ed66be794a227639f87657fac5c1a37d
kernel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 9fb9e783365c5b77966aa3fbd6214645ed66be794a227639f87657fac5c1a37d
kernel-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 0ecaf5f4f07e62d5387022ce50afb548674418050d8330d244eba5661934e65a
kernel-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 0ecaf5f4f07e62d5387022ce50afb548674418050d8330d244eba5661934e65a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 7cedf999680b8c1211b3e3c2ed4d7b567fbb0ed5d90094e53ce33f88ca649e34
kernel-largesmp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 7cedf999680b8c1211b3e3c2ed4d7b567fbb0ed5d90094e53ce33f88ca649e34
kernel-largesmp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: cbc901180c1c093ba6bbe9a68719f0f7f3d47de3ca845784af388c016d3bbf2a
kernel-largesmp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: cbc901180c1c093ba6bbe9a68719f0f7f3d47de3ca845784af388c016d3bbf2a
kernel-smp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: bc0ebac1f23b0b813b8fd18d809c7ecda5bdaff3618c9fb7f370bec1e0f76cf9
kernel-smp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: bc0ebac1f23b0b813b8fd18d809c7ecda5bdaff3618c9fb7f370bec1e0f76cf9
kernel-smp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 58aec531d82d9230a95cc84bf8ff51aa729ae4d0a906ef54f912a3ce39013cbe
kernel-smp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 58aec531d82d9230a95cc84bf8ff51aa729ae4d0a906ef54f912a3ce39013cbe
kernel-xenU-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 357934616d5ba8c18abff239ee71b2e6153f5d988937effe683921bba2f7b971
kernel-xenU-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 357934616d5ba8c18abff239ee71b2e6153f5d988937effe683921bba2f7b971
kernel-xenU-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: dfa948e9740f812f2d9e94065c7c45bc3589d8ed926f27842076b69570f877d7
kernel-xenU-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: dfa948e9740f812f2d9e94065c7c45bc3589d8ed926f27842076b69570f877d7
ia64
kernel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: fd44f106121c05823bdaccc4b08ef61a610ac8033007826b6613c63ae820d0b6
kernel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: fd44f106121c05823bdaccc4b08ef61a610ac8033007826b6613c63ae820d0b6
kernel-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: 6da331022dcfcb248ee2e98304a8f4e02d3886df998ec804f257c6b5932c6162
kernel-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: 6da331022dcfcb248ee2e98304a8f4e02d3886df998ec804f257c6b5932c6162
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.ia64.rpm SHA-256: db6f3ed5c0dacd953c16c889742def3e0ba4757b58179c915cf128f2bffc25ce
kernel-largesmp-2.6.9-89.0.11.EL.ia64.rpm SHA-256: db6f3ed5c0dacd953c16c889742def3e0ba4757b58179c915cf128f2bffc25ce
kernel-largesmp-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: e4507c2da7034bb4a1d85f499e2111f7248bb32895a7050abc16244b06137c7a
kernel-largesmp-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: e4507c2da7034bb4a1d85f499e2111f7248bb32895a7050abc16244b06137c7a
i386
kernel-2.6.9-89.0.11.EL.i686.rpm SHA-256: 0c24107928aa0f86448ce0172c19b8e3173a2ba9b2063b861b74af6e76fa31fd
kernel-2.6.9-89.0.11.EL.i686.rpm SHA-256: 0c24107928aa0f86448ce0172c19b8e3173a2ba9b2063b861b74af6e76fa31fd
kernel-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: fe9937ec8fd27ead416464de9a5cedee27e1d958b18c9552c669c17b584f266a
kernel-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: fe9937ec8fd27ead416464de9a5cedee27e1d958b18c9552c669c17b584f266a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-hugemem-2.6.9-89.0.11.EL.i686.rpm SHA-256: bd11526aa44e5928a5b669a69ff3da88c8985253672df94dd7ff4d3a36de884f
kernel-hugemem-2.6.9-89.0.11.EL.i686.rpm SHA-256: bd11526aa44e5928a5b669a69ff3da88c8985253672df94dd7ff4d3a36de884f
kernel-hugemem-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: cdac0a7a96e001920f71111d85a3f03e6de83ca63a62e82ee7b5ee516fa09f0a
kernel-hugemem-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: cdac0a7a96e001920f71111d85a3f03e6de83ca63a62e82ee7b5ee516fa09f0a
kernel-smp-2.6.9-89.0.11.EL.i686.rpm SHA-256: 063aad72a9fbd5260adca83639ea8d5107faca9b6da6024de7822843166faae3
kernel-smp-2.6.9-89.0.11.EL.i686.rpm SHA-256: 063aad72a9fbd5260adca83639ea8d5107faca9b6da6024de7822843166faae3
kernel-smp-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: a3f96c0f700c153dc41d095675079626225af4d33a23b62628b93bacf5045057
kernel-smp-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: a3f96c0f700c153dc41d095675079626225af4d33a23b62628b93bacf5045057
kernel-xenU-2.6.9-89.0.11.EL.i686.rpm SHA-256: 3af161ce000a0118d1b558a2898e50bc03ed86c1d1a71f24d51587b103057a4e
kernel-xenU-2.6.9-89.0.11.EL.i686.rpm SHA-256: 3af161ce000a0118d1b558a2898e50bc03ed86c1d1a71f24d51587b103057a4e
kernel-xenU-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: bcb302083d5aa7c6ce3d8d8651643327f2372189e7cb1aa1a25aad09356a885d
kernel-xenU-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: bcb302083d5aa7c6ce3d8d8651643327f2372189e7cb1aa1a25aad09356a885d

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.11.EL.src.rpm SHA-256: c249366c7509d39c3aec75e03bc8f086f117daf7bbe916b46ece997095f20501
x86_64
kernel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 9fb9e783365c5b77966aa3fbd6214645ed66be794a227639f87657fac5c1a37d
kernel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 9fb9e783365c5b77966aa3fbd6214645ed66be794a227639f87657fac5c1a37d
kernel-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 0ecaf5f4f07e62d5387022ce50afb548674418050d8330d244eba5661934e65a
kernel-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 0ecaf5f4f07e62d5387022ce50afb548674418050d8330d244eba5661934e65a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 7cedf999680b8c1211b3e3c2ed4d7b567fbb0ed5d90094e53ce33f88ca649e34
kernel-largesmp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 7cedf999680b8c1211b3e3c2ed4d7b567fbb0ed5d90094e53ce33f88ca649e34
kernel-largesmp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: cbc901180c1c093ba6bbe9a68719f0f7f3d47de3ca845784af388c016d3bbf2a
kernel-largesmp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: cbc901180c1c093ba6bbe9a68719f0f7f3d47de3ca845784af388c016d3bbf2a
kernel-smp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: bc0ebac1f23b0b813b8fd18d809c7ecda5bdaff3618c9fb7f370bec1e0f76cf9
kernel-smp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: bc0ebac1f23b0b813b8fd18d809c7ecda5bdaff3618c9fb7f370bec1e0f76cf9
kernel-smp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 58aec531d82d9230a95cc84bf8ff51aa729ae4d0a906ef54f912a3ce39013cbe
kernel-smp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 58aec531d82d9230a95cc84bf8ff51aa729ae4d0a906ef54f912a3ce39013cbe
kernel-xenU-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 357934616d5ba8c18abff239ee71b2e6153f5d988937effe683921bba2f7b971
kernel-xenU-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 357934616d5ba8c18abff239ee71b2e6153f5d988937effe683921bba2f7b971
kernel-xenU-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: dfa948e9740f812f2d9e94065c7c45bc3589d8ed926f27842076b69570f877d7
kernel-xenU-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: dfa948e9740f812f2d9e94065c7c45bc3589d8ed926f27842076b69570f877d7
ia64
kernel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: fd44f106121c05823bdaccc4b08ef61a610ac8033007826b6613c63ae820d0b6
kernel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: fd44f106121c05823bdaccc4b08ef61a610ac8033007826b6613c63ae820d0b6
kernel-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: 6da331022dcfcb248ee2e98304a8f4e02d3886df998ec804f257c6b5932c6162
kernel-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: 6da331022dcfcb248ee2e98304a8f4e02d3886df998ec804f257c6b5932c6162
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.ia64.rpm SHA-256: db6f3ed5c0dacd953c16c889742def3e0ba4757b58179c915cf128f2bffc25ce
kernel-largesmp-2.6.9-89.0.11.EL.ia64.rpm SHA-256: db6f3ed5c0dacd953c16c889742def3e0ba4757b58179c915cf128f2bffc25ce
kernel-largesmp-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: e4507c2da7034bb4a1d85f499e2111f7248bb32895a7050abc16244b06137c7a
kernel-largesmp-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: e4507c2da7034bb4a1d85f499e2111f7248bb32895a7050abc16244b06137c7a
i386
kernel-2.6.9-89.0.11.EL.i686.rpm SHA-256: 0c24107928aa0f86448ce0172c19b8e3173a2ba9b2063b861b74af6e76fa31fd
kernel-2.6.9-89.0.11.EL.i686.rpm SHA-256: 0c24107928aa0f86448ce0172c19b8e3173a2ba9b2063b861b74af6e76fa31fd
kernel-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: fe9937ec8fd27ead416464de9a5cedee27e1d958b18c9552c669c17b584f266a
kernel-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: fe9937ec8fd27ead416464de9a5cedee27e1d958b18c9552c669c17b584f266a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-hugemem-2.6.9-89.0.11.EL.i686.rpm SHA-256: bd11526aa44e5928a5b669a69ff3da88c8985253672df94dd7ff4d3a36de884f
kernel-hugemem-2.6.9-89.0.11.EL.i686.rpm SHA-256: bd11526aa44e5928a5b669a69ff3da88c8985253672df94dd7ff4d3a36de884f
kernel-hugemem-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: cdac0a7a96e001920f71111d85a3f03e6de83ca63a62e82ee7b5ee516fa09f0a
kernel-hugemem-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: cdac0a7a96e001920f71111d85a3f03e6de83ca63a62e82ee7b5ee516fa09f0a
kernel-smp-2.6.9-89.0.11.EL.i686.rpm SHA-256: 063aad72a9fbd5260adca83639ea8d5107faca9b6da6024de7822843166faae3
kernel-smp-2.6.9-89.0.11.EL.i686.rpm SHA-256: 063aad72a9fbd5260adca83639ea8d5107faca9b6da6024de7822843166faae3
kernel-smp-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: a3f96c0f700c153dc41d095675079626225af4d33a23b62628b93bacf5045057
kernel-smp-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: a3f96c0f700c153dc41d095675079626225af4d33a23b62628b93bacf5045057
kernel-xenU-2.6.9-89.0.11.EL.i686.rpm SHA-256: 3af161ce000a0118d1b558a2898e50bc03ed86c1d1a71f24d51587b103057a4e
kernel-xenU-2.6.9-89.0.11.EL.i686.rpm SHA-256: 3af161ce000a0118d1b558a2898e50bc03ed86c1d1a71f24d51587b103057a4e
kernel-xenU-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: bcb302083d5aa7c6ce3d8d8651643327f2372189e7cb1aa1a25aad09356a885d
kernel-xenU-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: bcb302083d5aa7c6ce3d8d8651643327f2372189e7cb1aa1a25aad09356a885d

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-89.0.11.EL.src.rpm SHA-256: c249366c7509d39c3aec75e03bc8f086f117daf7bbe916b46ece997095f20501
x86_64
kernel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 9fb9e783365c5b77966aa3fbd6214645ed66be794a227639f87657fac5c1a37d
kernel-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 0ecaf5f4f07e62d5387022ce50afb548674418050d8330d244eba5661934e65a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 7cedf999680b8c1211b3e3c2ed4d7b567fbb0ed5d90094e53ce33f88ca649e34
kernel-largesmp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: cbc901180c1c093ba6bbe9a68719f0f7f3d47de3ca845784af388c016d3bbf2a
kernel-smp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: bc0ebac1f23b0b813b8fd18d809c7ecda5bdaff3618c9fb7f370bec1e0f76cf9
kernel-smp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 58aec531d82d9230a95cc84bf8ff51aa729ae4d0a906ef54f912a3ce39013cbe
kernel-xenU-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 357934616d5ba8c18abff239ee71b2e6153f5d988937effe683921bba2f7b971
kernel-xenU-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: dfa948e9740f812f2d9e94065c7c45bc3589d8ed926f27842076b69570f877d7
ia64
kernel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: fd44f106121c05823bdaccc4b08ef61a610ac8033007826b6613c63ae820d0b6
kernel-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: 6da331022dcfcb248ee2e98304a8f4e02d3886df998ec804f257c6b5932c6162
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.ia64.rpm SHA-256: db6f3ed5c0dacd953c16c889742def3e0ba4757b58179c915cf128f2bffc25ce
kernel-largesmp-devel-2.6.9-89.0.11.EL.ia64.rpm SHA-256: e4507c2da7034bb4a1d85f499e2111f7248bb32895a7050abc16244b06137c7a
i386
kernel-2.6.9-89.0.11.EL.i686.rpm SHA-256: 0c24107928aa0f86448ce0172c19b8e3173a2ba9b2063b861b74af6e76fa31fd
kernel-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: fe9937ec8fd27ead416464de9a5cedee27e1d958b18c9552c669c17b584f266a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-hugemem-2.6.9-89.0.11.EL.i686.rpm SHA-256: bd11526aa44e5928a5b669a69ff3da88c8985253672df94dd7ff4d3a36de884f
kernel-hugemem-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: cdac0a7a96e001920f71111d85a3f03e6de83ca63a62e82ee7b5ee516fa09f0a
kernel-smp-2.6.9-89.0.11.EL.i686.rpm SHA-256: 063aad72a9fbd5260adca83639ea8d5107faca9b6da6024de7822843166faae3
kernel-smp-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: a3f96c0f700c153dc41d095675079626225af4d33a23b62628b93bacf5045057
kernel-xenU-2.6.9-89.0.11.EL.i686.rpm SHA-256: 3af161ce000a0118d1b558a2898e50bc03ed86c1d1a71f24d51587b103057a4e
kernel-xenU-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: bcb302083d5aa7c6ce3d8d8651643327f2372189e7cb1aa1a25aad09356a885d

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-89.0.11.EL.src.rpm SHA-256: c249366c7509d39c3aec75e03bc8f086f117daf7bbe916b46ece997095f20501
x86_64
kernel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 9fb9e783365c5b77966aa3fbd6214645ed66be794a227639f87657fac5c1a37d
kernel-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 0ecaf5f4f07e62d5387022ce50afb548674418050d8330d244eba5661934e65a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 7cedf999680b8c1211b3e3c2ed4d7b567fbb0ed5d90094e53ce33f88ca649e34
kernel-largesmp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: cbc901180c1c093ba6bbe9a68719f0f7f3d47de3ca845784af388c016d3bbf2a
kernel-smp-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: bc0ebac1f23b0b813b8fd18d809c7ecda5bdaff3618c9fb7f370bec1e0f76cf9
kernel-smp-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 58aec531d82d9230a95cc84bf8ff51aa729ae4d0a906ef54f912a3ce39013cbe
kernel-xenU-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: 357934616d5ba8c18abff239ee71b2e6153f5d988937effe683921bba2f7b971
kernel-xenU-devel-2.6.9-89.0.11.EL.x86_64.rpm SHA-256: dfa948e9740f812f2d9e94065c7c45bc3589d8ed926f27842076b69570f877d7
i386
kernel-2.6.9-89.0.11.EL.i686.rpm SHA-256: 0c24107928aa0f86448ce0172c19b8e3173a2ba9b2063b861b74af6e76fa31fd
kernel-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: fe9937ec8fd27ead416464de9a5cedee27e1d958b18c9552c669c17b584f266a
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-hugemem-2.6.9-89.0.11.EL.i686.rpm SHA-256: bd11526aa44e5928a5b669a69ff3da88c8985253672df94dd7ff4d3a36de884f
kernel-hugemem-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: cdac0a7a96e001920f71111d85a3f03e6de83ca63a62e82ee7b5ee516fa09f0a
kernel-smp-2.6.9-89.0.11.EL.i686.rpm SHA-256: 063aad72a9fbd5260adca83639ea8d5107faca9b6da6024de7822843166faae3
kernel-smp-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: a3f96c0f700c153dc41d095675079626225af4d33a23b62628b93bacf5045057
kernel-xenU-2.6.9-89.0.11.EL.i686.rpm SHA-256: 3af161ce000a0118d1b558a2898e50bc03ed86c1d1a71f24d51587b103057a4e
kernel-xenU-devel-2.6.9-89.0.11.EL.i686.rpm SHA-256: bcb302083d5aa7c6ce3d8d8651643327f2372189e7cb1aa1a25aad09356a885d

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-89.0.11.EL.src.rpm SHA-256: c249366c7509d39c3aec75e03bc8f086f117daf7bbe916b46ece997095f20501
s390x
kernel-2.6.9-89.0.11.EL.s390x.rpm SHA-256: fe1efa332e4b8ceec738ef8b85b9086274994e4928a330d637388b8f8c76d7f5
kernel-devel-2.6.9-89.0.11.EL.s390x.rpm SHA-256: 709ac2d84e60ef9bbe58ac4b8166d6977a41a001a7572076fccb207184ac16d0
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
s390
kernel-2.6.9-89.0.11.EL.s390.rpm SHA-256: 439aa3d80f4fc1d9112b2b426a2473a4c9ab074cc51d6c6c6b813fae78a32ddb
kernel-devel-2.6.9-89.0.11.EL.s390.rpm SHA-256: bda1dd2840762362737a989f5fda64e5a637d67fb8aa3a1d2bb78fb711719761
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.11.EL.src.rpm SHA-256: c249366c7509d39c3aec75e03bc8f086f117daf7bbe916b46ece997095f20501
s390x
kernel-2.6.9-89.0.11.EL.s390x.rpm SHA-256: fe1efa332e4b8ceec738ef8b85b9086274994e4928a330d637388b8f8c76d7f5
kernel-devel-2.6.9-89.0.11.EL.s390x.rpm SHA-256: 709ac2d84e60ef9bbe58ac4b8166d6977a41a001a7572076fccb207184ac16d0
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
s390
kernel-2.6.9-89.0.11.EL.s390.rpm SHA-256: 439aa3d80f4fc1d9112b2b426a2473a4c9ab074cc51d6c6c6b813fae78a32ddb
kernel-devel-2.6.9-89.0.11.EL.s390.rpm SHA-256: bda1dd2840762362737a989f5fda64e5a637d67fb8aa3a1d2bb78fb711719761
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-89.0.11.EL.src.rpm SHA-256: c249366c7509d39c3aec75e03bc8f086f117daf7bbe916b46ece997095f20501
ppc
kernel-2.6.9-89.0.11.EL.ppc64.rpm SHA-256: 51670e2ac4f9ea69ecb80020ac0aecd0d878059e6ff33a5ca78c642a7a027a23
kernel-2.6.9-89.0.11.EL.ppc64iseries.rpm SHA-256: fd3d470925216f68b4c327bf83b43c54c18a52867b6cc0a452371526f60c995b
kernel-devel-2.6.9-89.0.11.EL.ppc64.rpm SHA-256: ea279fb23b76acb6b32858d6b238bab0a92a403188922768a2e44759ef7b2b0f
kernel-devel-2.6.9-89.0.11.EL.ppc64iseries.rpm SHA-256: fc51da9f8bf76f7d46a4c7b45333342b97f4afa444d35a089f162d4e37e94367
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.ppc64.rpm SHA-256: d78895f35a24717a5413d4322d0ae1788788bcada3de2b6a0f51a373f8da07c9
kernel-largesmp-devel-2.6.9-89.0.11.EL.ppc64.rpm SHA-256: 61e0dfba1dba64c9560294a5ef2bf689e155d5bf83beb13dda8f7c6c601f7f6d

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.11.EL.src.rpm SHA-256: c249366c7509d39c3aec75e03bc8f086f117daf7bbe916b46ece997095f20501
ppc
kernel-2.6.9-89.0.11.EL.ppc64.rpm SHA-256: 51670e2ac4f9ea69ecb80020ac0aecd0d878059e6ff33a5ca78c642a7a027a23
kernel-2.6.9-89.0.11.EL.ppc64iseries.rpm SHA-256: fd3d470925216f68b4c327bf83b43c54c18a52867b6cc0a452371526f60c995b
kernel-devel-2.6.9-89.0.11.EL.ppc64.rpm SHA-256: ea279fb23b76acb6b32858d6b238bab0a92a403188922768a2e44759ef7b2b0f
kernel-devel-2.6.9-89.0.11.EL.ppc64iseries.rpm SHA-256: fc51da9f8bf76f7d46a4c7b45333342b97f4afa444d35a089f162d4e37e94367
kernel-doc-2.6.9-89.0.11.EL.noarch.rpm SHA-256: fab8ba6cb48f8bd46ea5b7c9d4b247a28d820eb6208cdf7a286804cd54c1088a
kernel-largesmp-2.6.9-89.0.11.EL.ppc64.rpm SHA-256: d78895f35a24717a5413d4322d0ae1788788bcada3de2b6a0f51a373f8da07c9
kernel-largesmp-devel-2.6.9-89.0.11.EL.ppc64.rpm SHA-256: 61e0dfba1dba64c9560294a5ef2bf689e155d5bf83beb13dda8f7c6c601f7f6d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter