Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Quay
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Open Liberty
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Quay
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Open Liberty
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Quay
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Open Liberty
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2010:0474 - Security Advisory
Issued:
2010-06-15
Updated:
2010-06-15

RHSA-2010:0474 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix three security issues and several bugs are
now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • a NULL pointer dereference flaw was found in the Linux kernel NFSv4
    implementation. Several of the NFSv4 file locking functions failed to check
    whether a file had been opened on the server before performing locking
    operations on it. A local, unprivileged user on a system with an NFSv4
    share mounted could possibly use this flaw to cause a kernel panic (denial
    of service) or escalate their privileges. (CVE-2009-3726, Important)
  • a flaw was found in the sctp_process_unk_param() function in the Linux
    kernel Stream Control Transmission Protocol (SCTP) implementation. A remote
    attacker could send a specially-crafted SCTP packet to an SCTP listening
    port on a target system, causing a kernel panic (denial of service).
    (CVE-2010-1173, Important)
  • a race condition between finding a keyring by name and destroying a freed
    keyring was found in the Linux kernel key management facility. A local,
    unprivileged user could use this flaw to cause a kernel panic (denial of
    service) or escalate their privileges. (CVE-2010-1437, Important)

Red Hat would like to thank Simon Vallet for responsibly reporting
CVE-2009-3726; and Jukka Taimisto and Olli Jarva of Codenomicon Ltd, Nokia
Siemens Networks, and Wind River on behalf of their customer, for
responsibly reporting CVE-2010-1173.

Bug fixes:

  • RHBA-2007:0791 introduced a regression in the Journaling Block Device
    (JBD). Under certain circumstances, removing a large file (such as 300 MB
    or more) did not result in inactive memory being freed, leading to the
    system having a large amount of inactive memory. Now, the memory is
    correctly freed. (BZ#589155)
  • the timer_interrupt() routine did not scale lost real ticks to logical
    ticks correctly, possibly causing time drift for 64-bit Red Hat Enterprise
    Linux 4 KVM (Kernel-based Virtual Machine) guests that were booted with the
    "divider=x" kernel parameter set to a value greater than 1. "warning: many
    lost ticks" messages may have been logged on the affected guest systems.
    (BZ#590551)
  • a bug could have prevented NFSv3 clients from having the most up-to-date
    file attributes for files on a given NFSv3 file system. In cases where a
    file type changed, such as if a file was removed and replaced with a
    directory of the same name, the NFSv3 client may not have noticed this
    change until stat(2) was called (for example, by running "ls -l").
    (BZ#596372)
  • RHBA-2007:0791 introduced bugs in the Linux kernel PCI-X subsystem. These
    could have caused a system deadlock on some systems where the BIOS set the
    default Maximum Memory Read Byte Count (MMRBC) to 4096, and that also use
    the Intel PRO/1000 Linux driver, e1000. Errors such as "e1000: eth[x]:
    e1000_clean_tx_irq: Detected Tx Unit Hang" were logged. (BZ#596374)
  • an out of memory condition in a KVM guest, using the virtio-net network
    driver and also under heavy network stress, could have resulted in
    that guest being unable to receive network traffic. Users had to manually
    remove and re-add the virtio_net module and restart the network service
    before networking worked as expected. Such memory conditions no longer
    prevent KVM guests receiving network traffic. (BZ#597310)
  • when an SFQ qdisc that limited the queue size to two packets was added to
    a network interface, sending traffic through that interface resulted in a
    kernel crash. Such a qdisc no longer results in a kernel crash. (BZ#597312)
  • when an NFS client opened a file with the O_TRUNC flag set, it received
    a valid stateid, but did not use that stateid to perform the SETATTR call.
    Such cases were rejected by Red Hat Enterprise Linux 4 NFS servers with an
    "NFS4ERR_BAD_STATEID" error, possibly preventing some NFS clients from
    writing files to an NFS file system. (BZ#597314)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 529227 - CVE-2009-3726 kernel: nfsv4: kernel panic in nfs4_proc_lock()
  • BZ - 584645 - CVE-2010-1173 kernel: sctp: crash due to malformed SCTPChunkInit packet
  • BZ - 585094 - CVE-2010-1437 kernel: keyrings: find_keyring_by_name() can gain the freed keyring
  • BZ - 589155 - jbd not releasing data buffers, causing high inactive meory in RHEL4.6 /proc/meminfo [rhel-4.8.z]
  • BZ - 590551 - time drift due to incorrect accounting of lost ticks with VXTIME_PMTMR mode and VXTIME_TSC mode if 'tick_divider' > 1 [rhel-4.8.z]
  • BZ - 596372 - NFSv3 file attributes are not updated by READDIRPLUS reply [rhel-4.8.z]
  • BZ - 596374 - e1000_clean_tx_irq: Detected Tx Unit Hang [rhel-4.8.z]
  • BZ - 597310 - Lost the network in a KVM VM on top of 4.9 [rhel-4.8.z]
  • BZ - 597312 - SFQ qdisc crashes with limit of 2 packets [rhel-4.8.z]
  • BZ - 597314 - cthon test5 failing on nfsv4 with rhel6 client vs. rhel4 server [rhel-4.8.z]

CVEs

  • CVE-2009-3726
  • CVE-2010-1173
  • CVE-2010-1437

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://kbase.redhat.com/faq/docs/DOC-31052
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
x86_64
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
ia64
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
i386
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
x86_64
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
ia64
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
i386
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
x86_64
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
ia64
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
i386
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
x86_64
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
i386
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
s390x
kernel-2.6.9-89.0.26.EL.s390x.rpm SHA-256: e85c4fb16e5502add2b4da5ed2cc70c07988f9d09018e16cd198b937d81d8493
kernel-devel-2.6.9-89.0.26.EL.s390x.rpm SHA-256: 35f172031eec827afea7909700d5abfd78562ec89c62bb015131c3aee3c92530
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
s390
kernel-2.6.9-89.0.26.EL.s390.rpm SHA-256: 33f72a807cbe85fca20d9365ed69f686ab197e9344600e18836f4292ef3281a3
kernel-devel-2.6.9-89.0.26.EL.s390.rpm SHA-256: 5bb31fd8d483a0982f089b9c59c59a494f9759a5b1593db2f05cf9be39118397
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
s390x
kernel-2.6.9-89.0.26.EL.s390x.rpm SHA-256: e85c4fb16e5502add2b4da5ed2cc70c07988f9d09018e16cd198b937d81d8493
kernel-devel-2.6.9-89.0.26.EL.s390x.rpm SHA-256: 35f172031eec827afea7909700d5abfd78562ec89c62bb015131c3aee3c92530
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
s390
kernel-2.6.9-89.0.26.EL.s390.rpm SHA-256: 33f72a807cbe85fca20d9365ed69f686ab197e9344600e18836f4292ef3281a3
kernel-devel-2.6.9-89.0.26.EL.s390.rpm SHA-256: 5bb31fd8d483a0982f089b9c59c59a494f9759a5b1593db2f05cf9be39118397
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
ppc
kernel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: 5062e6b2601dbcf4472df4f9fc460362f3076b273f0a4cc386b5a12214ccaf34
kernel-2.6.9-89.0.26.EL.ppc64iseries.rpm SHA-256: cc826a600471184d40a72ea9368b10756a697a46413ee948faf859e914e3c2b4
kernel-devel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: a07cb5ee1bdf9c0e4ba1ff27e28e4a63ed8b117c56d562df480bd39deba567ad
kernel-devel-2.6.9-89.0.26.EL.ppc64iseries.rpm SHA-256: f98180ba95c2c340c1232a9549fdf3c1279d097fcb1fbabd824e7ab5ab3e9e13
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: 207b51b5743706d7efb504b5bf3e2498e2f65acf31b551b0f9529b17e240ba4a
kernel-largesmp-devel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: bfc0aa6c40bab515d8fd500d4be2c7747c9d4a56906609b71ca7ea0bf071b643

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
ppc
kernel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: 5062e6b2601dbcf4472df4f9fc460362f3076b273f0a4cc386b5a12214ccaf34
kernel-2.6.9-89.0.26.EL.ppc64iseries.rpm SHA-256: cc826a600471184d40a72ea9368b10756a697a46413ee948faf859e914e3c2b4
kernel-devel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: a07cb5ee1bdf9c0e4ba1ff27e28e4a63ed8b117c56d562df480bd39deba567ad
kernel-devel-2.6.9-89.0.26.EL.ppc64iseries.rpm SHA-256: f98180ba95c2c340c1232a9549fdf3c1279d097fcb1fbabd824e7ab5ab3e9e13
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: 207b51b5743706d7efb504b5bf3e2498e2f65acf31b551b0f9529b17e240ba4a
kernel-largesmp-devel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: bfc0aa6c40bab515d8fd500d4be2c7747c9d4a56906609b71ca7ea0bf071b643

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2019 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook