Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2010:0146 - Security Advisory
Issued:
2010-03-16
Updated:
2010-03-16

RHSA-2010:0146 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • a NULL pointer dereference flaw was found in the sctp_rcv_ootb() function

in the Linux kernel Stream Control Transmission Protocol (SCTP)
implementation. A remote attacker could send a specially-crafted SCTP
packet to a target system, resulting in a denial of service.
(CVE-2010-0008, Important)

  • a NULL pointer dereference flaw was found in the Linux kernel. During a

core dump, the kernel did not check if the Virtual Dynamically-linked
Shared Object page was accessible. On Intel 64 and AMD64 systems, a local,
unprivileged user could use this flaw to cause a kernel panic by running a
crafted 32-bit application. (CVE-2009-4271, Important)

  • an information leak was found in the print_fatal_signal() implementation

in the Linux kernel. When "/proc/sys/kernel/print-fatal-signals" is set to
1 (the default value is 0), memory that is reachable by the kernel could be
leaked to user-space. This issue could also result in a system crash. Note
that this flaw only affected the i386 architecture. (CVE-2010-0003,
Moderate)

  • on AMD64 systems, it was discovered that the kernel did not ensure the

ELF interpreter was available before making a call to the SET_PERSONALITY
macro. A local attacker could use this flaw to cause a denial of service by
running a 32-bit application that attempts to execute a 64-bit application.
(CVE-2010-0307, Moderate)

  • missing capability checks were found in the ebtables implementation, used

for creating an Ethernet bridge firewall. This could allow a local,
unprivileged user to bypass intended capability restrictions and modify
ebtables rules. (CVE-2010-0007, Low)

This update also fixes the following bugs:

  • under some circumstances, a locking bug could have caused an online ext3

file system resize to deadlock, which may have, in turn, caused the file
system or the entire system to become unresponsive. In either case, a
reboot was required after the deadlock. With this update, using resize2fs
to perform an online resize of an ext3 file system works as expected.
(BZ#553135)

  • some ATA and SCSI devices were not honoring the barrier=1 mount option,

which could result in data loss after a crash or power loss. This update
applies a patch to the Linux SCSI driver to ensure ordered write caching.
This solution does not provide cache flushes; however, it does provide
data integrity on devices that have no write caching (or where write
caching is disabled) and no command queuing. For systems that have command
queuing or write cache enabled there is no guarantee of data integrity
after a crash. (BZ#560563)

  • it was found that lpfc_find_target() could loop continuously when

scanning a list of nodes due to a missing spinlock. This missing spinlock
allowed the list to be changed after the list_empty() test, resulting in a
NULL value, causing the loop. This update adds the spinlock, resolving the
issue. (BZ#561453)

  • the fix for CVE-2009-4538 provided by RHSA-2010:0020 introduced a

regression, preventing Wake on LAN (WoL) working for network devices using
the Intel PRO/1000 Linux driver, e1000e. Attempting to configure WoL for
such devices resulted in the following error, even when configuring valid
options:

"Cannot set new wake-on-lan settings: Operation not supported
not setting wol"

This update resolves this regression, and WoL now works as expected for
network devices using the e1000e driver. (BZ#565496)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 548876 - CVE-2009-4271 kernel: 32bit process on 64bit system can trigger a kernel panic
  • BZ - 553135 - ext2online resize hangs [rhel-4.8.z]
  • BZ - 554578 - CVE-2010-0003 kernel: infoleak if print-fatal-signals=1
  • BZ - 555238 - CVE-2010-0007 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN
  • BZ - 555658 - CVE-2010-0008 kernel: sctp remote denial of service
  • BZ - 560547 - CVE-2010-0307 kernel: DoS on x86_64
  • BZ - 560563 - Write barrier operations not working for libata and general SCSI disks [rhel-4.8.z]
  • BZ - 561453 - [Emulex 4.9 bug] lpfc driver doesn't acquire lock when searching hba for target [rhel-4.8.z]
  • BZ - 565496 - e1000e: wol is broken in kernel 2.6.9-89.19 [rhel-4.8.z]

CVEs

  • CVE-2010-0007
  • CVE-2010-0003
  • CVE-2010-0008
  • CVE-2009-4271
  • CVE-2010-0307

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-89.0.23.EL.src.rpm SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c
x86_64
kernel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47
kernel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47
kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca
kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de
kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de
kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da
kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da
kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb
kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb
kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136
kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136
kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf
kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf
kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117
kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117
ia64
kernel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46
kernel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46
kernel-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9
kernel-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2
kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2
kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac
kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac
i386
kernel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b
kernel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b
kernel-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f
kernel-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003
kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003
kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068
kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068
kernel-smp-2.6.9-89.0.23.EL.i686.rpm SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129
kernel-smp-2.6.9-89.0.23.EL.i686.rpm SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129
kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642
kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642
kernel-xenU-2.6.9-89.0.23.EL.i686.rpm SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827
kernel-xenU-2.6.9-89.0.23.EL.i686.rpm SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827
kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34
kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.23.EL.src.rpm SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c
x86_64
kernel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47
kernel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47
kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca
kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de
kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de
kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da
kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da
kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb
kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb
kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136
kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136
kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf
kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf
kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117
kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117
ia64
kernel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46
kernel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46
kernel-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9
kernel-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2
kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2
kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac
kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac
i386
kernel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b
kernel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b
kernel-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f
kernel-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003
kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003
kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068
kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068
kernel-smp-2.6.9-89.0.23.EL.i686.rpm SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129
kernel-smp-2.6.9-89.0.23.EL.i686.rpm SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129
kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642
kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642
kernel-xenU-2.6.9-89.0.23.EL.i686.rpm SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827
kernel-xenU-2.6.9-89.0.23.EL.i686.rpm SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827
kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34
kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-89.0.23.EL.src.rpm SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c
x86_64
kernel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47
kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de
kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da
kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb
kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136
kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf
kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117
ia64
kernel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46
kernel-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2
kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac
i386
kernel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b
kernel-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003
kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068
kernel-smp-2.6.9-89.0.23.EL.i686.rpm SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129
kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642
kernel-xenU-2.6.9-89.0.23.EL.i686.rpm SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827
kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-89.0.23.EL.src.rpm SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c
x86_64
kernel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47
kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de
kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da
kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb
kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136
kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf
kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117
i386
kernel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b
kernel-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003
kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068
kernel-smp-2.6.9-89.0.23.EL.i686.rpm SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129
kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642
kernel-xenU-2.6.9-89.0.23.EL.i686.rpm SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827
kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-89.0.23.EL.src.rpm SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c
s390x
kernel-2.6.9-89.0.23.EL.s390x.rpm SHA-256: fa2446ba400b586435a4e18a9cf82922e754727154e0e97152ef87aadbb7d65f
kernel-devel-2.6.9-89.0.23.EL.s390x.rpm SHA-256: 0cd1bec5aed4da66305f26d629c30a5c64baea8e82a5e7a3ef1eda2cf9fa2cf0
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
s390
kernel-2.6.9-89.0.23.EL.s390.rpm SHA-256: e20f212ebc4283ae379036533af14aa937d370c863934a442fbdd497681d556d
kernel-devel-2.6.9-89.0.23.EL.s390.rpm SHA-256: 1a4994f39318bcf173fa60bb51aadd475275d9bba82bdfc79834c94ff9743d85
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.23.EL.src.rpm SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c
s390x
kernel-2.6.9-89.0.23.EL.s390x.rpm SHA-256: fa2446ba400b586435a4e18a9cf82922e754727154e0e97152ef87aadbb7d65f
kernel-devel-2.6.9-89.0.23.EL.s390x.rpm SHA-256: 0cd1bec5aed4da66305f26d629c30a5c64baea8e82a5e7a3ef1eda2cf9fa2cf0
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
s390
kernel-2.6.9-89.0.23.EL.s390.rpm SHA-256: e20f212ebc4283ae379036533af14aa937d370c863934a442fbdd497681d556d
kernel-devel-2.6.9-89.0.23.EL.s390.rpm SHA-256: 1a4994f39318bcf173fa60bb51aadd475275d9bba82bdfc79834c94ff9743d85
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-89.0.23.EL.src.rpm SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c
ppc
kernel-2.6.9-89.0.23.EL.ppc64.rpm SHA-256: 403d99e3a6d18af49b6db58ec77b795d04e01df16c2ce9cab31b471f53285660
kernel-2.6.9-89.0.23.EL.ppc64iseries.rpm SHA-256: 64e3e27af60253ef8c815133b58f9c9ea14192ae3996219af92154527730fd98
kernel-devel-2.6.9-89.0.23.EL.ppc64.rpm SHA-256: 50dcc18da5fe0853779c67f38ae2a3c2591cf3e343fd371e6fd872d2108250b8
kernel-devel-2.6.9-89.0.23.EL.ppc64iseries.rpm SHA-256: 49e197eac8970bf679e190cd761bd2bcca52699032a65ef6a402a7cfa30dfe30
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.ppc64.rpm SHA-256: 9d4c81536f394870e93fd340943e901056604244fa3d87830c37a9f337523a1e
kernel-largesmp-devel-2.6.9-89.0.23.EL.ppc64.rpm SHA-256: d238af3405703e891df2533df04226191751e8bbf8e408ec3af574f302c5e7c4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.23.EL.src.rpm SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c
ppc
kernel-2.6.9-89.0.23.EL.ppc64.rpm SHA-256: 403d99e3a6d18af49b6db58ec77b795d04e01df16c2ce9cab31b471f53285660
kernel-2.6.9-89.0.23.EL.ppc64iseries.rpm SHA-256: 64e3e27af60253ef8c815133b58f9c9ea14192ae3996219af92154527730fd98
kernel-devel-2.6.9-89.0.23.EL.ppc64.rpm SHA-256: 50dcc18da5fe0853779c67f38ae2a3c2591cf3e343fd371e6fd872d2108250b8
kernel-devel-2.6.9-89.0.23.EL.ppc64iseries.rpm SHA-256: 49e197eac8970bf679e190cd761bd2bcca52699032a65ef6a402a7cfa30dfe30
kernel-doc-2.6.9-89.0.23.EL.noarch.rpm SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0
kernel-largesmp-2.6.9-89.0.23.EL.ppc64.rpm SHA-256: 9d4c81536f394870e93fd340943e901056604244fa3d87830c37a9f337523a1e
kernel-largesmp-devel-2.6.9-89.0.23.EL.ppc64.rpm SHA-256: d238af3405703e891df2533df04226191751e8bbf8e408ec3af574f302c5e7c4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter