Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2010:0474 - Security Advisory
Issued:
2010-06-15
Updated:
2010-06-15

RHSA-2010:0474 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix three security issues and several bugs are
now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • a NULL pointer dereference flaw was found in the Linux kernel NFSv4

implementation. Several of the NFSv4 file locking functions failed to check
whether a file had been opened on the server before performing locking
operations on it. A local, unprivileged user on a system with an NFSv4
share mounted could possibly use this flaw to cause a kernel panic (denial
of service) or escalate their privileges. (CVE-2009-3726, Important)

  • a flaw was found in the sctp_process_unk_param() function in the Linux

kernel Stream Control Transmission Protocol (SCTP) implementation. A remote
attacker could send a specially-crafted SCTP packet to an SCTP listening
port on a target system, causing a kernel panic (denial of service).
(CVE-2010-1173, Important)

  • a race condition between finding a keyring by name and destroying a freed

keyring was found in the Linux kernel key management facility. A local,
unprivileged user could use this flaw to cause a kernel panic (denial of
service) or escalate their privileges. (CVE-2010-1437, Important)

Red Hat would like to thank Simon Vallet for responsibly reporting
CVE-2009-3726; and Jukka Taimisto and Olli Jarva of Codenomicon Ltd, Nokia
Siemens Networks, and Wind River on behalf of their customer, for
responsibly reporting CVE-2010-1173.

Bug fixes:

  • RHBA-2007:0791 introduced a regression in the Journaling Block Device

(JBD). Under certain circumstances, removing a large file (such as 300 MB
or more) did not result in inactive memory being freed, leading to the
system having a large amount of inactive memory. Now, the memory is
correctly freed. (BZ#589155)

  • the timer_interrupt() routine did not scale lost real ticks to logical

ticks correctly, possibly causing time drift for 64-bit Red Hat Enterprise
Linux 4 KVM (Kernel-based Virtual Machine) guests that were booted with the
"divider=x" kernel parameter set to a value greater than 1. "warning: many
lost ticks" messages may have been logged on the affected guest systems.
(BZ#590551)

  • a bug could have prevented NFSv3 clients from having the most up-to-date

file attributes for files on a given NFSv3 file system. In cases where a
file type changed, such as if a file was removed and replaced with a
directory of the same name, the NFSv3 client may not have noticed this
change until stat(2) was called (for example, by running "ls -l").
(BZ#596372)

  • RHBA-2007:0791 introduced bugs in the Linux kernel PCI-X subsystem. These

could have caused a system deadlock on some systems where the BIOS set the
default Maximum Memory Read Byte Count (MMRBC) to 4096, and that also use
the Intel PRO/1000 Linux driver, e1000. Errors such as "e1000: eth[x]:
e1000_clean_tx_irq: Detected Tx Unit Hang" were logged. (BZ#596374)

  • an out of memory condition in a KVM guest, using the virtio-net network

driver and also under heavy network stress, could have resulted in
that guest being unable to receive network traffic. Users had to manually
remove and re-add the virtio_net module and restart the network service
before networking worked as expected. Such memory conditions no longer
prevent KVM guests receiving network traffic. (BZ#597310)

  • when an SFQ qdisc that limited the queue size to two packets was added to

a network interface, sending traffic through that interface resulted in a
kernel crash. Such a qdisc no longer results in a kernel crash. (BZ#597312)

  • when an NFS client opened a file with the O_TRUNC flag set, it received

a valid stateid, but did not use that stateid to perform the SETATTR call.
Such cases were rejected by Red Hat Enterprise Linux 4 NFS servers with an
"NFS4ERR_BAD_STATEID" error, possibly preventing some NFS clients from
writing files to an NFS file system. (BZ#597314)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 529227 - CVE-2009-3726 kernel: nfsv4: kernel panic in nfs4_proc_lock()
  • BZ - 584645 - CVE-2010-1173 kernel: sctp: crash due to malformed SCTPChunkInit packet
  • BZ - 585094 - CVE-2010-1437 kernel: keyrings: find_keyring_by_name() can gain the freed keyring
  • BZ - 589155 - jbd not releasing data buffers, causing high inactive meory in RHEL4.6 /proc/meminfo [rhel-4.8.z]
  • BZ - 590551 - time drift due to incorrect accounting of lost ticks with VXTIME_PMTMR mode and VXTIME_TSC mode if 'tick_divider' > 1 [rhel-4.8.z]
  • BZ - 596372 - NFSv3 file attributes are not updated by READDIRPLUS reply [rhel-4.8.z]
  • BZ - 596374 - e1000_clean_tx_irq: Detected Tx Unit Hang [rhel-4.8.z]
  • BZ - 597310 - Lost the network in a KVM VM on top of 4.9 [rhel-4.8.z]
  • BZ - 597312 - SFQ qdisc crashes with limit of 2 packets [rhel-4.8.z]
  • BZ - 597314 - cthon test5 failing on nfsv4 with rhel6 client vs. rhel4 server [rhel-4.8.z]

CVEs

  • CVE-2009-3726
  • CVE-2010-1173
  • CVE-2010-1437

References

  • http://www.redhat.com/security/updates/classification/#important
  • http://kbase.redhat.com/faq/docs/DOC-31052
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
x86_64
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
ia64
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
i386
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
x86_64
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
ia64
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
i386
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
x86_64
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
ia64
kernel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: a56aa58d0197f4182c42c022fd156ff4d95f22286876a9ee6dc55fc90346bcee
kernel-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 37b83e436e872c53175f60f0f1959ed69fb96c59a6eacca17d6add07769bb79f
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 0ad343e60370b19206702452c1fa2d6fc70157b95228b375fb73913f31c6c068
kernel-largesmp-devel-2.6.9-89.0.26.EL.ia64.rpm SHA-256: 10d4035d508c7f71d6653022e2cf94f9013bd7a292f96b72651d683c652797e0
i386
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
x86_64
kernel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 4c45c10e2d87ae524c1bb9bcbc1cef2565f9b51f9587716bf51fc01c85597437
kernel-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 754f2ee25cdd918b635500b6714f2f086ab2e782f10652f2f7f049c24a8d3da9
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: cdb47938da232c572feff061bca967b935e741935e79076a19edae5042e08964
kernel-largesmp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 6a4b73f3f547dc0f134152a89aa0f9035eab3e121c5760e578001ac8446e7863
kernel-smp-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 3b70c22af063c3fdf9b2baea767ffdbda55d14457068d84fa15db42758c33b06
kernel-smp-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 881a0050a4a761e0e398572fdc3c6f6ed93f96a9a3db784d241391ebd57a2112
kernel-xenU-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 1aaa102188afc8b211edcda6223376e15e76857613f749166ac7084e1e098243
kernel-xenU-devel-2.6.9-89.0.26.EL.x86_64.rpm SHA-256: 0016c72d80a2b4dc1f492501b5150c4fa8a49e3737139ce604eab908017cb303
i386
kernel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 72f826d0fbd4872921fba7b676d7dcbe0f47bc2778d36a5c2e51aa899bb2084a
kernel-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 2ce3fb1940c524e43114ea2fdbbfaf17de27a240ef4f4831d280f2792128d0eb
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-hugemem-2.6.9-89.0.26.EL.i686.rpm SHA-256: 641bb2eaea217b5fccc2c880f29546adbf69493ee0e7a3418138cc53afa0ae6d
kernel-hugemem-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: b3a72caba3467c6c599b95b7d56e96408da484bae4e8b86552f6cf1b423d1029
kernel-smp-2.6.9-89.0.26.EL.i686.rpm SHA-256: bbde227dce99826daebf7b8805e836573ba0cc485301e656454c9880f936c1d8
kernel-smp-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: e53e41c3195867eb9fb77b853d65264e01ccfcfa1d51f9cc28d3337cef60da9f
kernel-xenU-2.6.9-89.0.26.EL.i686.rpm SHA-256: 52ae704c66d1820a254e198e4b300b594402f1f7566ee97d3ebfa45609a25cb8
kernel-xenU-devel-2.6.9-89.0.26.EL.i686.rpm SHA-256: 272ced85e6eeeeacd3455c55cfc97c9034b3c22fc9c7037b106c5e6165c73302

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
s390x
kernel-2.6.9-89.0.26.EL.s390x.rpm SHA-256: e85c4fb16e5502add2b4da5ed2cc70c07988f9d09018e16cd198b937d81d8493
kernel-devel-2.6.9-89.0.26.EL.s390x.rpm SHA-256: 35f172031eec827afea7909700d5abfd78562ec89c62bb015131c3aee3c92530
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
s390
kernel-2.6.9-89.0.26.EL.s390.rpm SHA-256: 33f72a807cbe85fca20d9365ed69f686ab197e9344600e18836f4292ef3281a3
kernel-devel-2.6.9-89.0.26.EL.s390.rpm SHA-256: 5bb31fd8d483a0982f089b9c59c59a494f9759a5b1593db2f05cf9be39118397
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
s390x
kernel-2.6.9-89.0.26.EL.s390x.rpm SHA-256: e85c4fb16e5502add2b4da5ed2cc70c07988f9d09018e16cd198b937d81d8493
kernel-devel-2.6.9-89.0.26.EL.s390x.rpm SHA-256: 35f172031eec827afea7909700d5abfd78562ec89c62bb015131c3aee3c92530
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
s390
kernel-2.6.9-89.0.26.EL.s390.rpm SHA-256: 33f72a807cbe85fca20d9365ed69f686ab197e9344600e18836f4292ef3281a3
kernel-devel-2.6.9-89.0.26.EL.s390.rpm SHA-256: 5bb31fd8d483a0982f089b9c59c59a494f9759a5b1593db2f05cf9be39118397
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
ppc
kernel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: 5062e6b2601dbcf4472df4f9fc460362f3076b273f0a4cc386b5a12214ccaf34
kernel-2.6.9-89.0.26.EL.ppc64iseries.rpm SHA-256: cc826a600471184d40a72ea9368b10756a697a46413ee948faf859e914e3c2b4
kernel-devel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: a07cb5ee1bdf9c0e4ba1ff27e28e4a63ed8b117c56d562df480bd39deba567ad
kernel-devel-2.6.9-89.0.26.EL.ppc64iseries.rpm SHA-256: f98180ba95c2c340c1232a9549fdf3c1279d097fcb1fbabd824e7ab5ab3e9e13
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: 207b51b5743706d7efb504b5bf3e2498e2f65acf31b551b0f9529b17e240ba4a
kernel-largesmp-devel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: bfc0aa6c40bab515d8fd500d4be2c7747c9d4a56906609b71ca7ea0bf071b643

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.0.26.EL.src.rpm SHA-256: 6a9b94fdfc5cbb6d1e3c527c864e274cf9cf2bb4b2c6f55e8e5a4845c21b64df
ppc
kernel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: 5062e6b2601dbcf4472df4f9fc460362f3076b273f0a4cc386b5a12214ccaf34
kernel-2.6.9-89.0.26.EL.ppc64iseries.rpm SHA-256: cc826a600471184d40a72ea9368b10756a697a46413ee948faf859e914e3c2b4
kernel-devel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: a07cb5ee1bdf9c0e4ba1ff27e28e4a63ed8b117c56d562df480bd39deba567ad
kernel-devel-2.6.9-89.0.26.EL.ppc64iseries.rpm SHA-256: f98180ba95c2c340c1232a9549fdf3c1279d097fcb1fbabd824e7ab5ab3e9e13
kernel-doc-2.6.9-89.0.26.EL.noarch.rpm SHA-256: 2c25b92fb1f64ba5d18b29b0c3e09185350485eba3a39ea8f3173abf222355dc
kernel-largesmp-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: 207b51b5743706d7efb504b5bf3e2498e2f65acf31b551b0f9529b17e240ba4a
kernel-largesmp-devel-2.6.9-89.0.26.EL.ppc64.rpm SHA-256: bfc0aa6c40bab515d8fd500d4be2c7747c9d4a56906609b71ca7ea0bf071b643

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter