Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2009:1522 - Security Advisory
Issued:
2009-10-22
Updated:
2009-10-22

RHSA-2009:1522 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • multiple, missing initialization flaws were found in the Linux kernel.

Padding data in several core network structures was not initialized
properly before being sent to user-space. These flaws could lead to
information leaks. (CVE-2005-4881, CVE-2009-3228, Moderate)

This update also fixes the following bugs:

  • a packet duplication issue was fixed via the RHSA-2008:0665 update;

however, the fix introduced a problem for systems using network bonding:
Backup slaves were unable to receive ARP packets. When using network
bonding in the "active-backup" mode and with the "arp_validate=3" option,
the bonding driver considered such backup slaves as being down (since they
were not receiving ARP packets), preventing successful failover to these
devices. (BZ#519384)

  • due to insufficient memory barriers in the network code, a process

sleeping in select() may have missed notifications about new data. In rare
cases, this bug may have caused a process to sleep forever. (BZ#519386)

  • the driver version number in the ata_piix driver was not changed between

Red Hat Enterprise Linux 4.7 and Red Hat Enterprise Linux 4.8, even though
changes had been made between these releases. This could have prevented the
driver from loading on systems that check driver versions, as this driver
appeared older than it was. (BZ#519389)

  • a bug in nlm_lookup_host() could have led to un-reclaimed locks on file

systems, resulting in the umount command failing. This bug could have also
prevented NFS services from being relocated correctly in clustered
environments. (BZ#519656)

  • the data buffer ethtool_get_strings() allocated, for the igb driver, was

smaller than the amount of data that was copied in igb_get_strings(),
because of a miscalculation in IGB_QUEUE_STATS_LEN, resulting in memory
corruption. This bug could have led to a kernel panic. (BZ#522738)

  • in some situations, write operations to a TTY device were blocked even

when the O_NONBLOCK flag was used. A reported case of this issue occurred
when a single TTY device was opened by two users (one using blocking mode,
and the other using non-blocking mode). (BZ#523930)

  • a deadlock was found in the cciss driver. In rare cases, this caused an

NMI lockup during boot. Messages such as "cciss: controller cciss[x]
failed, stopping." and "cciss[x]: controller not responding." may have
been displayed on the console. (BZ#525725)

  • on 64-bit PowerPC systems, a rollover bug in the ibmveth driver could

have caused a kernel panic. In a reported case, this panic occurred on a
system with a large uptime and under heavy network load. (BZ#527225)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 519384 - [RHEL 4] Arp Monitor - Failed to detect layer 2 switch failure [rhel-4.8.z]
  • BZ - 519386 - [RHEL4.5] Even if a process have received data but schedule() in select() cannot return [rhel-4.8.z]
  • BZ - 519389 - RHEL4.8-Beta : Update the version number of ata_piix driver [rhel-4.8.z]
  • BZ - 519656 - Bug in lockd prevents a locks being freed. [rhel-4.8.z]
  • BZ - 520990 - CVE-2009-3228 kernel: tc: uninitialised kernel memory leak
  • BZ - 521601 - CVE-2005-4881 kernel: netlink: fix numerous padding memleaks
  • BZ - 522738 - [RHEL4.8] igb driver doesn't allocate enough buffer for ethtool_get_strings() [rhel-4.8.z]
  • BZ - 523930 - [4.8]Write operation with O_NONBLOCK flag to TTY terminal is blocked [rhel-4.8.z]
  • BZ - 525725 - cciss: spinlock deadlock causes NMI on HP systems [rhel-4.8.z]
  • BZ - 527225 - BUG in ibmveth_replenish_buffer_pool at drivers/net/ibmveth.c:219 [rhel-4.8.z]

CVEs

  • CVE-2009-3228
  • CVE-2005-4881
  • CVE-2009-3612

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-89.0.15.EL.src.rpm SHA-256: ec24ab4e3d2f4fa44c830398b25a678ab9872a4a48ea2b79fb0f3d2676247a17
x86_64
kernel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6e4d7d7ac99ab8581c2b14a9b71a521ea77bd8aa5d46897d0a6ab1f11d6ba1a2
kernel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6e4d7d7ac99ab8581c2b14a9b71a521ea77bd8aa5d46897d0a6ab1f11d6ba1a2
kernel-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6d114c679c1ac73756d406fc78018c8c3fb67b28fbdd7c090b6c771e2b2fa4e1
kernel-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6d114c679c1ac73756d406fc78018c8c3fb67b28fbdd7c090b6c771e2b2fa4e1
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e4ad1e079715d10a632f68bf0d98c307cbda1703297303ad95fa7a40f2395437
kernel-largesmp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e4ad1e079715d10a632f68bf0d98c307cbda1703297303ad95fa7a40f2395437
kernel-largesmp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 93e5564ff4dc33bd386a3d3c6ed8d11a6f2f1bbeb3b785d5da3a3445038c8aa3
kernel-largesmp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 93e5564ff4dc33bd386a3d3c6ed8d11a6f2f1bbeb3b785d5da3a3445038c8aa3
kernel-smp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: fd99d86ff8ccf376483c2552afaf650c7a701bab58e6667f3d7b4b9dbf7dae63
kernel-smp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: fd99d86ff8ccf376483c2552afaf650c7a701bab58e6667f3d7b4b9dbf7dae63
kernel-smp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e439bd38ae0fd12cbff48463e38cbc36b278bfbb9390a727f0731d02eca44843
kernel-smp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e439bd38ae0fd12cbff48463e38cbc36b278bfbb9390a727f0731d02eca44843
kernel-xenU-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 108bccba462f6823dbb84c4df6e223c4972ad3f791e9b6f6086f77c2b9fda53f
kernel-xenU-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 108bccba462f6823dbb84c4df6e223c4972ad3f791e9b6f6086f77c2b9fda53f
kernel-xenU-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 5df132fd8da979cbb521eb6734572def065835eeeffcf447023151728db9767f
kernel-xenU-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 5df132fd8da979cbb521eb6734572def065835eeeffcf447023151728db9767f
ia64
kernel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 78c039afcc9b2ec9a8fa63fdfd22ecb6a3691e62a0e0a0837001a72db040adb3
kernel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 78c039afcc9b2ec9a8fa63fdfd22ecb6a3691e62a0e0a0837001a72db040adb3
kernel-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 85bcb17d2fabbdaf967fc25722d98bfdef521fd273a42de022323a59cb595dfa
kernel-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 85bcb17d2fabbdaf967fc25722d98bfdef521fd273a42de022323a59cb595dfa
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.ia64.rpm SHA-256: f541f74657bb1d1b0a887de66822c689835771fa69c8c581b124c182c5a2de04
kernel-largesmp-2.6.9-89.0.15.EL.ia64.rpm SHA-256: f541f74657bb1d1b0a887de66822c689835771fa69c8c581b124c182c5a2de04
kernel-largesmp-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 4d7a2587059b08a004c2c3a28e02eceb58195b6aa839468adffddbe5702e2aba
kernel-largesmp-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 4d7a2587059b08a004c2c3a28e02eceb58195b6aa839468adffddbe5702e2aba
i386
kernel-2.6.9-89.0.15.EL.i686.rpm SHA-256: d179d884d026e5382873b25a11a5b17ce735f43944a13bfa16cb5ebf27774f98
kernel-2.6.9-89.0.15.EL.i686.rpm SHA-256: d179d884d026e5382873b25a11a5b17ce735f43944a13bfa16cb5ebf27774f98
kernel-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: b26dfafa1f86c80514c3c7ec539f1b42ca895b7cc1fecc356142504e3ba0dd11
kernel-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: b26dfafa1f86c80514c3c7ec539f1b42ca895b7cc1fecc356142504e3ba0dd11
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-hugemem-2.6.9-89.0.15.EL.i686.rpm SHA-256: ae3e8083babca02d58c7b2921466227cd875e28b19c35a5ae8ed102a377adde9
kernel-hugemem-2.6.9-89.0.15.EL.i686.rpm SHA-256: ae3e8083babca02d58c7b2921466227cd875e28b19c35a5ae8ed102a377adde9
kernel-hugemem-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 730bc9823587bc55c63f213ada27377f92b07d8a7fb852ebe25d500ad8b7e89b
kernel-hugemem-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 730bc9823587bc55c63f213ada27377f92b07d8a7fb852ebe25d500ad8b7e89b
kernel-smp-2.6.9-89.0.15.EL.i686.rpm SHA-256: a3578225e78ebdb3d854eb53aa0905b6efc5133807e3a7c65b9e28d315eca4d4
kernel-smp-2.6.9-89.0.15.EL.i686.rpm SHA-256: a3578225e78ebdb3d854eb53aa0905b6efc5133807e3a7c65b9e28d315eca4d4
kernel-smp-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 3bfde7c224315874f3533ede3b0ec7a11e75a46247db2444a963ca35bfff6c4f
kernel-smp-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 3bfde7c224315874f3533ede3b0ec7a11e75a46247db2444a963ca35bfff6c4f
kernel-xenU-2.6.9-89.0.15.EL.i686.rpm SHA-256: e5bdbcfda9efe1fafe547ff299ed61318efe41ec18663497a706c5298e79fc4f
kernel-xenU-2.6.9-89.0.15.EL.i686.rpm SHA-256: e5bdbcfda9efe1fafe547ff299ed61318efe41ec18663497a706c5298e79fc4f
kernel-xenU-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: cb264e4dc63d57397a50d9937c3cc058f1e47c65efa384704eeee7eee3e780ed
kernel-xenU-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: cb264e4dc63d57397a50d9937c3cc058f1e47c65efa384704eeee7eee3e780ed

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.15.EL.src.rpm SHA-256: ec24ab4e3d2f4fa44c830398b25a678ab9872a4a48ea2b79fb0f3d2676247a17
x86_64
kernel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6e4d7d7ac99ab8581c2b14a9b71a521ea77bd8aa5d46897d0a6ab1f11d6ba1a2
kernel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6e4d7d7ac99ab8581c2b14a9b71a521ea77bd8aa5d46897d0a6ab1f11d6ba1a2
kernel-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6d114c679c1ac73756d406fc78018c8c3fb67b28fbdd7c090b6c771e2b2fa4e1
kernel-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6d114c679c1ac73756d406fc78018c8c3fb67b28fbdd7c090b6c771e2b2fa4e1
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e4ad1e079715d10a632f68bf0d98c307cbda1703297303ad95fa7a40f2395437
kernel-largesmp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e4ad1e079715d10a632f68bf0d98c307cbda1703297303ad95fa7a40f2395437
kernel-largesmp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 93e5564ff4dc33bd386a3d3c6ed8d11a6f2f1bbeb3b785d5da3a3445038c8aa3
kernel-largesmp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 93e5564ff4dc33bd386a3d3c6ed8d11a6f2f1bbeb3b785d5da3a3445038c8aa3
kernel-smp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: fd99d86ff8ccf376483c2552afaf650c7a701bab58e6667f3d7b4b9dbf7dae63
kernel-smp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: fd99d86ff8ccf376483c2552afaf650c7a701bab58e6667f3d7b4b9dbf7dae63
kernel-smp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e439bd38ae0fd12cbff48463e38cbc36b278bfbb9390a727f0731d02eca44843
kernel-smp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e439bd38ae0fd12cbff48463e38cbc36b278bfbb9390a727f0731d02eca44843
kernel-xenU-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 108bccba462f6823dbb84c4df6e223c4972ad3f791e9b6f6086f77c2b9fda53f
kernel-xenU-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 108bccba462f6823dbb84c4df6e223c4972ad3f791e9b6f6086f77c2b9fda53f
kernel-xenU-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 5df132fd8da979cbb521eb6734572def065835eeeffcf447023151728db9767f
kernel-xenU-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 5df132fd8da979cbb521eb6734572def065835eeeffcf447023151728db9767f
ia64
kernel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 78c039afcc9b2ec9a8fa63fdfd22ecb6a3691e62a0e0a0837001a72db040adb3
kernel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 78c039afcc9b2ec9a8fa63fdfd22ecb6a3691e62a0e0a0837001a72db040adb3
kernel-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 85bcb17d2fabbdaf967fc25722d98bfdef521fd273a42de022323a59cb595dfa
kernel-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 85bcb17d2fabbdaf967fc25722d98bfdef521fd273a42de022323a59cb595dfa
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.ia64.rpm SHA-256: f541f74657bb1d1b0a887de66822c689835771fa69c8c581b124c182c5a2de04
kernel-largesmp-2.6.9-89.0.15.EL.ia64.rpm SHA-256: f541f74657bb1d1b0a887de66822c689835771fa69c8c581b124c182c5a2de04
kernel-largesmp-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 4d7a2587059b08a004c2c3a28e02eceb58195b6aa839468adffddbe5702e2aba
kernel-largesmp-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 4d7a2587059b08a004c2c3a28e02eceb58195b6aa839468adffddbe5702e2aba
i386
kernel-2.6.9-89.0.15.EL.i686.rpm SHA-256: d179d884d026e5382873b25a11a5b17ce735f43944a13bfa16cb5ebf27774f98
kernel-2.6.9-89.0.15.EL.i686.rpm SHA-256: d179d884d026e5382873b25a11a5b17ce735f43944a13bfa16cb5ebf27774f98
kernel-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: b26dfafa1f86c80514c3c7ec539f1b42ca895b7cc1fecc356142504e3ba0dd11
kernel-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: b26dfafa1f86c80514c3c7ec539f1b42ca895b7cc1fecc356142504e3ba0dd11
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-hugemem-2.6.9-89.0.15.EL.i686.rpm SHA-256: ae3e8083babca02d58c7b2921466227cd875e28b19c35a5ae8ed102a377adde9
kernel-hugemem-2.6.9-89.0.15.EL.i686.rpm SHA-256: ae3e8083babca02d58c7b2921466227cd875e28b19c35a5ae8ed102a377adde9
kernel-hugemem-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 730bc9823587bc55c63f213ada27377f92b07d8a7fb852ebe25d500ad8b7e89b
kernel-hugemem-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 730bc9823587bc55c63f213ada27377f92b07d8a7fb852ebe25d500ad8b7e89b
kernel-smp-2.6.9-89.0.15.EL.i686.rpm SHA-256: a3578225e78ebdb3d854eb53aa0905b6efc5133807e3a7c65b9e28d315eca4d4
kernel-smp-2.6.9-89.0.15.EL.i686.rpm SHA-256: a3578225e78ebdb3d854eb53aa0905b6efc5133807e3a7c65b9e28d315eca4d4
kernel-smp-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 3bfde7c224315874f3533ede3b0ec7a11e75a46247db2444a963ca35bfff6c4f
kernel-smp-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 3bfde7c224315874f3533ede3b0ec7a11e75a46247db2444a963ca35bfff6c4f
kernel-xenU-2.6.9-89.0.15.EL.i686.rpm SHA-256: e5bdbcfda9efe1fafe547ff299ed61318efe41ec18663497a706c5298e79fc4f
kernel-xenU-2.6.9-89.0.15.EL.i686.rpm SHA-256: e5bdbcfda9efe1fafe547ff299ed61318efe41ec18663497a706c5298e79fc4f
kernel-xenU-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: cb264e4dc63d57397a50d9937c3cc058f1e47c65efa384704eeee7eee3e780ed
kernel-xenU-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: cb264e4dc63d57397a50d9937c3cc058f1e47c65efa384704eeee7eee3e780ed

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-89.0.15.EL.src.rpm SHA-256: ec24ab4e3d2f4fa44c830398b25a678ab9872a4a48ea2b79fb0f3d2676247a17
x86_64
kernel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6e4d7d7ac99ab8581c2b14a9b71a521ea77bd8aa5d46897d0a6ab1f11d6ba1a2
kernel-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6d114c679c1ac73756d406fc78018c8c3fb67b28fbdd7c090b6c771e2b2fa4e1
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e4ad1e079715d10a632f68bf0d98c307cbda1703297303ad95fa7a40f2395437
kernel-largesmp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 93e5564ff4dc33bd386a3d3c6ed8d11a6f2f1bbeb3b785d5da3a3445038c8aa3
kernel-smp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: fd99d86ff8ccf376483c2552afaf650c7a701bab58e6667f3d7b4b9dbf7dae63
kernel-smp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e439bd38ae0fd12cbff48463e38cbc36b278bfbb9390a727f0731d02eca44843
kernel-xenU-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 108bccba462f6823dbb84c4df6e223c4972ad3f791e9b6f6086f77c2b9fda53f
kernel-xenU-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 5df132fd8da979cbb521eb6734572def065835eeeffcf447023151728db9767f
ia64
kernel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 78c039afcc9b2ec9a8fa63fdfd22ecb6a3691e62a0e0a0837001a72db040adb3
kernel-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 85bcb17d2fabbdaf967fc25722d98bfdef521fd273a42de022323a59cb595dfa
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.ia64.rpm SHA-256: f541f74657bb1d1b0a887de66822c689835771fa69c8c581b124c182c5a2de04
kernel-largesmp-devel-2.6.9-89.0.15.EL.ia64.rpm SHA-256: 4d7a2587059b08a004c2c3a28e02eceb58195b6aa839468adffddbe5702e2aba
i386
kernel-2.6.9-89.0.15.EL.i686.rpm SHA-256: d179d884d026e5382873b25a11a5b17ce735f43944a13bfa16cb5ebf27774f98
kernel-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: b26dfafa1f86c80514c3c7ec539f1b42ca895b7cc1fecc356142504e3ba0dd11
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-hugemem-2.6.9-89.0.15.EL.i686.rpm SHA-256: ae3e8083babca02d58c7b2921466227cd875e28b19c35a5ae8ed102a377adde9
kernel-hugemem-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 730bc9823587bc55c63f213ada27377f92b07d8a7fb852ebe25d500ad8b7e89b
kernel-smp-2.6.9-89.0.15.EL.i686.rpm SHA-256: a3578225e78ebdb3d854eb53aa0905b6efc5133807e3a7c65b9e28d315eca4d4
kernel-smp-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 3bfde7c224315874f3533ede3b0ec7a11e75a46247db2444a963ca35bfff6c4f
kernel-xenU-2.6.9-89.0.15.EL.i686.rpm SHA-256: e5bdbcfda9efe1fafe547ff299ed61318efe41ec18663497a706c5298e79fc4f
kernel-xenU-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: cb264e4dc63d57397a50d9937c3cc058f1e47c65efa384704eeee7eee3e780ed

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-89.0.15.EL.src.rpm SHA-256: ec24ab4e3d2f4fa44c830398b25a678ab9872a4a48ea2b79fb0f3d2676247a17
x86_64
kernel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6e4d7d7ac99ab8581c2b14a9b71a521ea77bd8aa5d46897d0a6ab1f11d6ba1a2
kernel-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 6d114c679c1ac73756d406fc78018c8c3fb67b28fbdd7c090b6c771e2b2fa4e1
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e4ad1e079715d10a632f68bf0d98c307cbda1703297303ad95fa7a40f2395437
kernel-largesmp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 93e5564ff4dc33bd386a3d3c6ed8d11a6f2f1bbeb3b785d5da3a3445038c8aa3
kernel-smp-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: fd99d86ff8ccf376483c2552afaf650c7a701bab58e6667f3d7b4b9dbf7dae63
kernel-smp-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: e439bd38ae0fd12cbff48463e38cbc36b278bfbb9390a727f0731d02eca44843
kernel-xenU-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 108bccba462f6823dbb84c4df6e223c4972ad3f791e9b6f6086f77c2b9fda53f
kernel-xenU-devel-2.6.9-89.0.15.EL.x86_64.rpm SHA-256: 5df132fd8da979cbb521eb6734572def065835eeeffcf447023151728db9767f
i386
kernel-2.6.9-89.0.15.EL.i686.rpm SHA-256: d179d884d026e5382873b25a11a5b17ce735f43944a13bfa16cb5ebf27774f98
kernel-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: b26dfafa1f86c80514c3c7ec539f1b42ca895b7cc1fecc356142504e3ba0dd11
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-hugemem-2.6.9-89.0.15.EL.i686.rpm SHA-256: ae3e8083babca02d58c7b2921466227cd875e28b19c35a5ae8ed102a377adde9
kernel-hugemem-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 730bc9823587bc55c63f213ada27377f92b07d8a7fb852ebe25d500ad8b7e89b
kernel-smp-2.6.9-89.0.15.EL.i686.rpm SHA-256: a3578225e78ebdb3d854eb53aa0905b6efc5133807e3a7c65b9e28d315eca4d4
kernel-smp-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: 3bfde7c224315874f3533ede3b0ec7a11e75a46247db2444a963ca35bfff6c4f
kernel-xenU-2.6.9-89.0.15.EL.i686.rpm SHA-256: e5bdbcfda9efe1fafe547ff299ed61318efe41ec18663497a706c5298e79fc4f
kernel-xenU-devel-2.6.9-89.0.15.EL.i686.rpm SHA-256: cb264e4dc63d57397a50d9937c3cc058f1e47c65efa384704eeee7eee3e780ed

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-89.0.15.EL.src.rpm SHA-256: ec24ab4e3d2f4fa44c830398b25a678ab9872a4a48ea2b79fb0f3d2676247a17
s390x
kernel-2.6.9-89.0.15.EL.s390x.rpm SHA-256: 3686d42753aa96ac22acc1fde8a03d25fe2cc4981fb2db03d40991f2b2236f8b
kernel-devel-2.6.9-89.0.15.EL.s390x.rpm SHA-256: 4964d6ca4cfccae3c4dd621140c759be1deeb45f2ff40324d229ae01b4bb9321
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
s390
kernel-2.6.9-89.0.15.EL.s390.rpm SHA-256: 283184eb52edb29332a0760ccd97b9df0fcc1c9223b13e3f1e5721acfd5058f4
kernel-devel-2.6.9-89.0.15.EL.s390.rpm SHA-256: 60f394af8de1dfc1b1e5b5c8a0e27c266df6bc7cf00b9a833f9783094962517b
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.15.EL.src.rpm SHA-256: ec24ab4e3d2f4fa44c830398b25a678ab9872a4a48ea2b79fb0f3d2676247a17
s390x
kernel-2.6.9-89.0.15.EL.s390x.rpm SHA-256: 3686d42753aa96ac22acc1fde8a03d25fe2cc4981fb2db03d40991f2b2236f8b
kernel-devel-2.6.9-89.0.15.EL.s390x.rpm SHA-256: 4964d6ca4cfccae3c4dd621140c759be1deeb45f2ff40324d229ae01b4bb9321
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
s390
kernel-2.6.9-89.0.15.EL.s390.rpm SHA-256: 283184eb52edb29332a0760ccd97b9df0fcc1c9223b13e3f1e5721acfd5058f4
kernel-devel-2.6.9-89.0.15.EL.s390.rpm SHA-256: 60f394af8de1dfc1b1e5b5c8a0e27c266df6bc7cf00b9a833f9783094962517b
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-89.0.15.EL.src.rpm SHA-256: ec24ab4e3d2f4fa44c830398b25a678ab9872a4a48ea2b79fb0f3d2676247a17
ppc
kernel-2.6.9-89.0.15.EL.ppc64.rpm SHA-256: 6e55db321513b61def170293e4054b9fe632ae5370a5101c384a4cb83b0d8dc3
kernel-2.6.9-89.0.15.EL.ppc64iseries.rpm SHA-256: e7ea0a14fa04f098b7a2c9cf8d44a0d4376e700aaff35e89cd807c349617b452
kernel-devel-2.6.9-89.0.15.EL.ppc64.rpm SHA-256: c0a20a9d6e54f7657fc9c283043db623c2bd8ce31259ee491845761f973d6b1c
kernel-devel-2.6.9-89.0.15.EL.ppc64iseries.rpm SHA-256: ba5bbfb7554b8318dce0cb15f52662bdf09939028d8107c6ac5034a9ced30bc3
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.ppc64.rpm SHA-256: e2f8bf52a4da2fbbe9ed433ecf2c90177813e36cb4f451a9c9d8f808cbf08ee8
kernel-largesmp-devel-2.6.9-89.0.15.EL.ppc64.rpm SHA-256: f0c6a6bc95a1dcd99cc3a5b1f2bc894f00495807d6516138cbbb85918a0873c6

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.15.EL.src.rpm SHA-256: ec24ab4e3d2f4fa44c830398b25a678ab9872a4a48ea2b79fb0f3d2676247a17
ppc
kernel-2.6.9-89.0.15.EL.ppc64.rpm SHA-256: 6e55db321513b61def170293e4054b9fe632ae5370a5101c384a4cb83b0d8dc3
kernel-2.6.9-89.0.15.EL.ppc64iseries.rpm SHA-256: e7ea0a14fa04f098b7a2c9cf8d44a0d4376e700aaff35e89cd807c349617b452
kernel-devel-2.6.9-89.0.15.EL.ppc64.rpm SHA-256: c0a20a9d6e54f7657fc9c283043db623c2bd8ce31259ee491845761f973d6b1c
kernel-devel-2.6.9-89.0.15.EL.ppc64iseries.rpm SHA-256: ba5bbfb7554b8318dce0cb15f52662bdf09939028d8107c6ac5034a9ced30bc3
kernel-doc-2.6.9-89.0.15.EL.noarch.rpm SHA-256: ea420c0a31e8cf8274aaf29d36b21fdb659d24620cb83eb4f38da247478ae45b
kernel-largesmp-2.6.9-89.0.15.EL.ppc64.rpm SHA-256: e2f8bf52a4da2fbbe9ed433ecf2c90177813e36cb4f451a9c9d8f808cbf08ee8
kernel-largesmp-devel-2.6.9-89.0.15.EL.ppc64.rpm SHA-256: f0c6a6bc95a1dcd99cc3a5b1f2bc894f00495807d6516138cbbb85918a0873c6

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter