Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Troubleshoot a product issue
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2010:0779 - Security Advisory
Issued:
2010-10-19
Updated:
2010-10-19

RHSA-2010:0779 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • Information leak flaws were found in the Linux kernel Traffic Control

Unit implementation. A local attacker could use these flaws to cause the
kernel to leak kernel memory to user-space, possibly leading to the
disclosure of sensitive information. (CVE-2010-2942, Moderate)

  • A flaw was found in the tcf_act_police_dump() function in the Linux

kernel network traffic policing implementation. A data structure in
tcf_act_police_dump() was not initialized properly before being copied to
user-space. A local, unprivileged user could use this flaw to cause an
information leak. (CVE-2010-3477, Moderate)

  • A missing upper bound integer check was found in the sys_io_submit()

function in the Linux kernel asynchronous I/O implementation. A local,
unprivileged user could use this flaw to cause an information leak.
(CVE-2010-3067, Low)

Red Hat would like to thank Tavis Ormandy for reporting CVE-2010-3067.

This update also fixes the following bugs:

  • When two systems using bonding devices in the adaptive load balancing

(ALB) mode communicated with each other, an endless loop of ARP replies
started between these two systems due to a faulty MAC address update. With
this update, the MAC address update no longer creates unneeded ARP replies.
(BZ#629239)

  • When running the Connectathon NFS Testsuite with certain clients and Red

Hat Enterprise Linux 4.8 as the server, nfsvers4, lock, and test2 failed
the Connectathon test. (BZ#625535)

  • For UDP/UNIX domain sockets, due to insufficient memory barriers in the

network code, a process sleeping in select() may have missed notifications
about new data. In rare cases, this bug may have caused a process to sleep
forever. (BZ#640117)

  • In certain situations, a bug found in either the HTB or TBF network

packet schedulers in the Linux kernel could have caused a kernel panic when
using Broadcom network cards with the bnx2 driver. (BZ#624363)

  • Previously, allocating fallback cqr for DASD reserve/release IOCTLs

failed because it used the memory pool of the respective device. This
update preallocates sufficient memory for a single reserve/release request.
(BZ#626828)

  • In some situations a bug prevented "force online" succeeding for a DASD

device. (BZ#626827)

  • Using the "fsstress" utility may have caused a kernel panic. (BZ#633968)
  • This update introduces additional stack guard patches. (BZ#632515)
  • A bug was found in the way the megaraid_sas driver handled physical disks

and management IOCTLs. All physical disks were exported to the disk layer,
allowing an oops in megasas_complete_cmd_dpc() when completing the IOCTL
command if a timeout occurred. (BZ#631903)

  • Previously, a warning message was returned when a large amount of

messages was passed through netconsole and a considerable amount of network
load was added. With this update, the warning message is no longer
displayed. (BZ#637729)

  • Executing a large "dd" command (1 to 5GB) on an iSCSI device with the

qla3xxx driver caused a system crash due to the incorrect storing of a
private data structure. With this update, the size of the stored data
structure is checked and the system crashes no longer occur. (BZ#624364)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 624363 - bnx2: panic in bnx2_poll_work() [rhel-4.8.z]
  • BZ - 624364 - system crashes due to corrupt net_device_wrapper structure [rhel-4.8.z]
  • BZ - 624903 - CVE-2010-2942 kernel: net sched: fix some kernel memory leaks
  • BZ - 625535 - [Kernel] cthon nfsvers4, lock, test2 failing with rhel6 client vs. rhel4 server [rhel-4.8.z]
  • BZ - 626827 - dasd: force online does not work. [rhel-4.8.z]
  • BZ - 626828 - dasd: allocate fallback cqr for reserve/release [rhel-4.8.z]
  • BZ - 629239 - [4u8] Bonding in ALB mode sends ARP in loop [rhel-4.8.z]
  • BZ - 629441 - CVE-2010-3067 kernel: do_io_submit() infoleak
  • BZ - 631903 - megaraid_sas: fix physical disk handling [rhel-4.8.z]
  • BZ - 632515 - kernel: additional stack guard patches [rhel-4.9] [rhel-4.8.z]
  • BZ - 633968 - kernel BUG at fs/mpage.c:417! [rhel-4.8.z]
  • BZ - 636386 - CVE-2010-3477 kernel: net/sched/act_police.c infoleak
  • BZ - 637729 - netconsole on e1000 cause "Badness in local_bh_enable at kernel/softirq.c:141" [rhel-4.8.z]
  • BZ - 640117 - [RHEL4.5] select() cannot return in UDP/UNIX domain socket [rhel-4.8.z]

CVEs

  • CVE-2010-2942
  • CVE-2010-3067
  • CVE-2010-3477

References

  • http://www.redhat.com/security/updates/classification/#moderate
  • Note: More recent versions of these packages may be available. Click a package name for more details.

    Red Hat Enterprise Linux Server 4

    SRPM
    kernel-2.6.9-89.31.1.EL.src.rpm SHA-256: 845a5a673eb8c643ec7da658b34c34d54478f7201a4cdf81b6beb7830054204c
    x86_64
    kernel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: fc27c93292a1525c54bf4869cfcdcb2e6ceac624c29940c7416821526d37ad26
    kernel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: fc27c93292a1525c54bf4869cfcdcb2e6ceac624c29940c7416821526d37ad26
    kernel-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 78a1d451e92854572413f8d89bc6961fc654f4f69d24480eda104833de1163af
    kernel-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 78a1d451e92854572413f8d89bc6961fc654f4f69d24480eda104833de1163af
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 6e50087bcd8f8d2b487d609aa2f7b6d31628bd80fa7f6107903f19b0e8f437ae
    kernel-largesmp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 6e50087bcd8f8d2b487d609aa2f7b6d31628bd80fa7f6107903f19b0e8f437ae
    kernel-largesmp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: dec6a031b5c940300e284f7ee93def68e3034539b469baf4bc50b50eda921bc5
    kernel-largesmp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: dec6a031b5c940300e284f7ee93def68e3034539b469baf4bc50b50eda921bc5
    kernel-smp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 9bd4cda2775ac5133c864a23525d92e32253c28bb39ca41ef17747085b0a0f00
    kernel-smp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 9bd4cda2775ac5133c864a23525d92e32253c28bb39ca41ef17747085b0a0f00
    kernel-smp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c41b6477b31835537b33112bbf886fadf7f174beb8191a7239f6dc348fe90ff0
    kernel-smp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c41b6477b31835537b33112bbf886fadf7f174beb8191a7239f6dc348fe90ff0
    kernel-xenU-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: a5125199b680d14ccffb24909796abc4f3f294f75852cabe4622215fd75e6d3b
    kernel-xenU-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: a5125199b680d14ccffb24909796abc4f3f294f75852cabe4622215fd75e6d3b
    kernel-xenU-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c83b9506076cd6a90c804412a3cfda77db030922223550b9786151f3b95d3032
    kernel-xenU-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c83b9506076cd6a90c804412a3cfda77db030922223550b9786151f3b95d3032
    ia64
    kernel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 8970b98da7f3e2afd2b90bd4b51dd5649f01dd1e529ddf4cffd4bd2a5a6feda9
    kernel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 8970b98da7f3e2afd2b90bd4b51dd5649f01dd1e529ddf4cffd4bd2a5a6feda9
    kernel-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 39d39d06d6befef056d6dc8a9dd6f100b0c9dbcc23c6488fdb45a2d327d1957c
    kernel-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 39d39d06d6befef056d6dc8a9dd6f100b0c9dbcc23c6488fdb45a2d327d1957c
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 4315e2d9a4274ea44ae6101ec110ca8124e3bdd8cd3f208a76196f1ba9b874e3
    kernel-largesmp-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 4315e2d9a4274ea44ae6101ec110ca8124e3bdd8cd3f208a76196f1ba9b874e3
    kernel-largesmp-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: cb16ac030043467964ef9ae17d9598f5769f9b3c0e9098156c5e52b7713a7503
    kernel-largesmp-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: cb16ac030043467964ef9ae17d9598f5769f9b3c0e9098156c5e52b7713a7503
    i386
    kernel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 5cd424474d73d2e8498f95295494facb9b85bde97bf93431bd966de240f1dff2
    kernel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 5cd424474d73d2e8498f95295494facb9b85bde97bf93431bd966de240f1dff2
    kernel-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 07cebc8ee70cd481ad302e4c45844d99e617900c40f2574cbdd195644bee17d4
    kernel-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 07cebc8ee70cd481ad302e4c45844d99e617900c40f2574cbdd195644bee17d4
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-hugemem-2.6.9-89.31.1.EL.i686.rpm SHA-256: d12775d9645f585e91accec34393c3cc367e1eed7805c8a32933ebf427d7f2ba
    kernel-hugemem-2.6.9-89.31.1.EL.i686.rpm SHA-256: d12775d9645f585e91accec34393c3cc367e1eed7805c8a32933ebf427d7f2ba
    kernel-hugemem-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 1daba082fffc588cf2eea79a0b5e0883a4a5ff48234ae14f9a54d0fc2898818e
    kernel-hugemem-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 1daba082fffc588cf2eea79a0b5e0883a4a5ff48234ae14f9a54d0fc2898818e
    kernel-smp-2.6.9-89.31.1.EL.i686.rpm SHA-256: 7fc31ecacd28f44dbb7e197d13de3a3a6d9b5f5e90fed04a049523d3da27526a
    kernel-smp-2.6.9-89.31.1.EL.i686.rpm SHA-256: 7fc31ecacd28f44dbb7e197d13de3a3a6d9b5f5e90fed04a049523d3da27526a
    kernel-smp-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 250cea9a360fdefc36263f8e4e5e6659f727baf554037dfb9d28b29a4e50aac3
    kernel-smp-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 250cea9a360fdefc36263f8e4e5e6659f727baf554037dfb9d28b29a4e50aac3
    kernel-xenU-2.6.9-89.31.1.EL.i686.rpm SHA-256: 12740d2042f945a9314b282edd372c171739a1e9c11f4c7709aa10d4bde84752
    kernel-xenU-2.6.9-89.31.1.EL.i686.rpm SHA-256: 12740d2042f945a9314b282edd372c171739a1e9c11f4c7709aa10d4bde84752
    kernel-xenU-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 594bf505645f2a37cbc91cef6f607bd726887c45332eb60f351a4efbc7f4a03d
    kernel-xenU-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 594bf505645f2a37cbc91cef6f607bd726887c45332eb60f351a4efbc7f4a03d

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

    SRPM
    kernel-2.6.9-89.31.1.EL.src.rpm SHA-256: 845a5a673eb8c643ec7da658b34c34d54478f7201a4cdf81b6beb7830054204c
    x86_64
    kernel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: fc27c93292a1525c54bf4869cfcdcb2e6ceac624c29940c7416821526d37ad26
    kernel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: fc27c93292a1525c54bf4869cfcdcb2e6ceac624c29940c7416821526d37ad26
    kernel-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 78a1d451e92854572413f8d89bc6961fc654f4f69d24480eda104833de1163af
    kernel-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 78a1d451e92854572413f8d89bc6961fc654f4f69d24480eda104833de1163af
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 6e50087bcd8f8d2b487d609aa2f7b6d31628bd80fa7f6107903f19b0e8f437ae
    kernel-largesmp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 6e50087bcd8f8d2b487d609aa2f7b6d31628bd80fa7f6107903f19b0e8f437ae
    kernel-largesmp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: dec6a031b5c940300e284f7ee93def68e3034539b469baf4bc50b50eda921bc5
    kernel-largesmp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: dec6a031b5c940300e284f7ee93def68e3034539b469baf4bc50b50eda921bc5
    kernel-smp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 9bd4cda2775ac5133c864a23525d92e32253c28bb39ca41ef17747085b0a0f00
    kernel-smp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 9bd4cda2775ac5133c864a23525d92e32253c28bb39ca41ef17747085b0a0f00
    kernel-smp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c41b6477b31835537b33112bbf886fadf7f174beb8191a7239f6dc348fe90ff0
    kernel-smp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c41b6477b31835537b33112bbf886fadf7f174beb8191a7239f6dc348fe90ff0
    kernel-xenU-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: a5125199b680d14ccffb24909796abc4f3f294f75852cabe4622215fd75e6d3b
    kernel-xenU-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: a5125199b680d14ccffb24909796abc4f3f294f75852cabe4622215fd75e6d3b
    kernel-xenU-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c83b9506076cd6a90c804412a3cfda77db030922223550b9786151f3b95d3032
    kernel-xenU-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c83b9506076cd6a90c804412a3cfda77db030922223550b9786151f3b95d3032
    ia64
    kernel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 8970b98da7f3e2afd2b90bd4b51dd5649f01dd1e529ddf4cffd4bd2a5a6feda9
    kernel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 8970b98da7f3e2afd2b90bd4b51dd5649f01dd1e529ddf4cffd4bd2a5a6feda9
    kernel-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 39d39d06d6befef056d6dc8a9dd6f100b0c9dbcc23c6488fdb45a2d327d1957c
    kernel-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 39d39d06d6befef056d6dc8a9dd6f100b0c9dbcc23c6488fdb45a2d327d1957c
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 4315e2d9a4274ea44ae6101ec110ca8124e3bdd8cd3f208a76196f1ba9b874e3
    kernel-largesmp-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 4315e2d9a4274ea44ae6101ec110ca8124e3bdd8cd3f208a76196f1ba9b874e3
    kernel-largesmp-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: cb16ac030043467964ef9ae17d9598f5769f9b3c0e9098156c5e52b7713a7503
    kernel-largesmp-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: cb16ac030043467964ef9ae17d9598f5769f9b3c0e9098156c5e52b7713a7503
    i386
    kernel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 5cd424474d73d2e8498f95295494facb9b85bde97bf93431bd966de240f1dff2
    kernel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 5cd424474d73d2e8498f95295494facb9b85bde97bf93431bd966de240f1dff2
    kernel-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 07cebc8ee70cd481ad302e4c45844d99e617900c40f2574cbdd195644bee17d4
    kernel-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 07cebc8ee70cd481ad302e4c45844d99e617900c40f2574cbdd195644bee17d4
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-hugemem-2.6.9-89.31.1.EL.i686.rpm SHA-256: d12775d9645f585e91accec34393c3cc367e1eed7805c8a32933ebf427d7f2ba
    kernel-hugemem-2.6.9-89.31.1.EL.i686.rpm SHA-256: d12775d9645f585e91accec34393c3cc367e1eed7805c8a32933ebf427d7f2ba
    kernel-hugemem-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 1daba082fffc588cf2eea79a0b5e0883a4a5ff48234ae14f9a54d0fc2898818e
    kernel-hugemem-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 1daba082fffc588cf2eea79a0b5e0883a4a5ff48234ae14f9a54d0fc2898818e
    kernel-smp-2.6.9-89.31.1.EL.i686.rpm SHA-256: 7fc31ecacd28f44dbb7e197d13de3a3a6d9b5f5e90fed04a049523d3da27526a
    kernel-smp-2.6.9-89.31.1.EL.i686.rpm SHA-256: 7fc31ecacd28f44dbb7e197d13de3a3a6d9b5f5e90fed04a049523d3da27526a
    kernel-smp-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 250cea9a360fdefc36263f8e4e5e6659f727baf554037dfb9d28b29a4e50aac3
    kernel-smp-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 250cea9a360fdefc36263f8e4e5e6659f727baf554037dfb9d28b29a4e50aac3
    kernel-xenU-2.6.9-89.31.1.EL.i686.rpm SHA-256: 12740d2042f945a9314b282edd372c171739a1e9c11f4c7709aa10d4bde84752
    kernel-xenU-2.6.9-89.31.1.EL.i686.rpm SHA-256: 12740d2042f945a9314b282edd372c171739a1e9c11f4c7709aa10d4bde84752
    kernel-xenU-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 594bf505645f2a37cbc91cef6f607bd726887c45332eb60f351a4efbc7f4a03d
    kernel-xenU-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 594bf505645f2a37cbc91cef6f607bd726887c45332eb60f351a4efbc7f4a03d

    Red Hat Enterprise Linux Workstation 4

    SRPM
    kernel-2.6.9-89.31.1.EL.src.rpm SHA-256: 845a5a673eb8c643ec7da658b34c34d54478f7201a4cdf81b6beb7830054204c
    x86_64
    kernel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: fc27c93292a1525c54bf4869cfcdcb2e6ceac624c29940c7416821526d37ad26
    kernel-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 78a1d451e92854572413f8d89bc6961fc654f4f69d24480eda104833de1163af
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 6e50087bcd8f8d2b487d609aa2f7b6d31628bd80fa7f6107903f19b0e8f437ae
    kernel-largesmp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: dec6a031b5c940300e284f7ee93def68e3034539b469baf4bc50b50eda921bc5
    kernel-smp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 9bd4cda2775ac5133c864a23525d92e32253c28bb39ca41ef17747085b0a0f00
    kernel-smp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c41b6477b31835537b33112bbf886fadf7f174beb8191a7239f6dc348fe90ff0
    kernel-xenU-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: a5125199b680d14ccffb24909796abc4f3f294f75852cabe4622215fd75e6d3b
    kernel-xenU-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c83b9506076cd6a90c804412a3cfda77db030922223550b9786151f3b95d3032
    ia64
    kernel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 8970b98da7f3e2afd2b90bd4b51dd5649f01dd1e529ddf4cffd4bd2a5a6feda9
    kernel-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 39d39d06d6befef056d6dc8a9dd6f100b0c9dbcc23c6488fdb45a2d327d1957c
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.ia64.rpm SHA-256: 4315e2d9a4274ea44ae6101ec110ca8124e3bdd8cd3f208a76196f1ba9b874e3
    kernel-largesmp-devel-2.6.9-89.31.1.EL.ia64.rpm SHA-256: cb16ac030043467964ef9ae17d9598f5769f9b3c0e9098156c5e52b7713a7503
    i386
    kernel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 5cd424474d73d2e8498f95295494facb9b85bde97bf93431bd966de240f1dff2
    kernel-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 07cebc8ee70cd481ad302e4c45844d99e617900c40f2574cbdd195644bee17d4
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-hugemem-2.6.9-89.31.1.EL.i686.rpm SHA-256: d12775d9645f585e91accec34393c3cc367e1eed7805c8a32933ebf427d7f2ba
    kernel-hugemem-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 1daba082fffc588cf2eea79a0b5e0883a4a5ff48234ae14f9a54d0fc2898818e
    kernel-smp-2.6.9-89.31.1.EL.i686.rpm SHA-256: 7fc31ecacd28f44dbb7e197d13de3a3a6d9b5f5e90fed04a049523d3da27526a
    kernel-smp-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 250cea9a360fdefc36263f8e4e5e6659f727baf554037dfb9d28b29a4e50aac3
    kernel-xenU-2.6.9-89.31.1.EL.i686.rpm SHA-256: 12740d2042f945a9314b282edd372c171739a1e9c11f4c7709aa10d4bde84752
    kernel-xenU-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 594bf505645f2a37cbc91cef6f607bd726887c45332eb60f351a4efbc7f4a03d

    Red Hat Enterprise Linux Desktop 4

    SRPM
    kernel-2.6.9-89.31.1.EL.src.rpm SHA-256: 845a5a673eb8c643ec7da658b34c34d54478f7201a4cdf81b6beb7830054204c
    x86_64
    kernel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: fc27c93292a1525c54bf4869cfcdcb2e6ceac624c29940c7416821526d37ad26
    kernel-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 78a1d451e92854572413f8d89bc6961fc654f4f69d24480eda104833de1163af
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 6e50087bcd8f8d2b487d609aa2f7b6d31628bd80fa7f6107903f19b0e8f437ae
    kernel-largesmp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: dec6a031b5c940300e284f7ee93def68e3034539b469baf4bc50b50eda921bc5
    kernel-smp-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: 9bd4cda2775ac5133c864a23525d92e32253c28bb39ca41ef17747085b0a0f00
    kernel-smp-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c41b6477b31835537b33112bbf886fadf7f174beb8191a7239f6dc348fe90ff0
    kernel-xenU-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: a5125199b680d14ccffb24909796abc4f3f294f75852cabe4622215fd75e6d3b
    kernel-xenU-devel-2.6.9-89.31.1.EL.x86_64.rpm SHA-256: c83b9506076cd6a90c804412a3cfda77db030922223550b9786151f3b95d3032
    i386
    kernel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 5cd424474d73d2e8498f95295494facb9b85bde97bf93431bd966de240f1dff2
    kernel-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 07cebc8ee70cd481ad302e4c45844d99e617900c40f2574cbdd195644bee17d4
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-hugemem-2.6.9-89.31.1.EL.i686.rpm SHA-256: d12775d9645f585e91accec34393c3cc367e1eed7805c8a32933ebf427d7f2ba
    kernel-hugemem-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 1daba082fffc588cf2eea79a0b5e0883a4a5ff48234ae14f9a54d0fc2898818e
    kernel-smp-2.6.9-89.31.1.EL.i686.rpm SHA-256: 7fc31ecacd28f44dbb7e197d13de3a3a6d9b5f5e90fed04a049523d3da27526a
    kernel-smp-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 250cea9a360fdefc36263f8e4e5e6659f727baf554037dfb9d28b29a4e50aac3
    kernel-xenU-2.6.9-89.31.1.EL.i686.rpm SHA-256: 12740d2042f945a9314b282edd372c171739a1e9c11f4c7709aa10d4bde84752
    kernel-xenU-devel-2.6.9-89.31.1.EL.i686.rpm SHA-256: 594bf505645f2a37cbc91cef6f607bd726887c45332eb60f351a4efbc7f4a03d

    Red Hat Enterprise Linux for IBM z Systems 4

    SRPM
    kernel-2.6.9-89.31.1.EL.src.rpm SHA-256: 845a5a673eb8c643ec7da658b34c34d54478f7201a4cdf81b6beb7830054204c
    s390x
    kernel-2.6.9-89.31.1.EL.s390x.rpm SHA-256: 406b93c06168771fb46965bed56bbf6a4c5086f970dac70da2bcd2983e3c05ed
    kernel-devel-2.6.9-89.31.1.EL.s390x.rpm SHA-256: 677e866f10e4cd3328f91a5e062bb1052d6f6e731d6cb92b53b6fdd9443d7f30
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    s390
    kernel-2.6.9-89.31.1.EL.s390.rpm SHA-256: cf358077997c5fc550abee029926a5aeb7f00bd982f15ddc870373ced6ddad95
    kernel-devel-2.6.9-89.31.1.EL.s390.rpm SHA-256: 9b2dddd10ec798b6568aab4aa8b438505f8e28eecc2afe94a6a76df5c457a41e
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702

    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

    SRPM
    kernel-2.6.9-89.31.1.EL.src.rpm SHA-256: 845a5a673eb8c643ec7da658b34c34d54478f7201a4cdf81b6beb7830054204c
    s390x
    kernel-2.6.9-89.31.1.EL.s390x.rpm SHA-256: 406b93c06168771fb46965bed56bbf6a4c5086f970dac70da2bcd2983e3c05ed
    kernel-devel-2.6.9-89.31.1.EL.s390x.rpm SHA-256: 677e866f10e4cd3328f91a5e062bb1052d6f6e731d6cb92b53b6fdd9443d7f30
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    s390
    kernel-2.6.9-89.31.1.EL.s390.rpm SHA-256: cf358077997c5fc550abee029926a5aeb7f00bd982f15ddc870373ced6ddad95
    kernel-devel-2.6.9-89.31.1.EL.s390.rpm SHA-256: 9b2dddd10ec798b6568aab4aa8b438505f8e28eecc2afe94a6a76df5c457a41e
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702

    Red Hat Enterprise Linux for Power, big endian 4

    SRPM
    kernel-2.6.9-89.31.1.EL.src.rpm SHA-256: 845a5a673eb8c643ec7da658b34c34d54478f7201a4cdf81b6beb7830054204c
    ppc
    kernel-2.6.9-89.31.1.EL.ppc64.rpm SHA-256: 86f2642be30dfa9ed8ef30c801b14815694c6982466dde3ddd26d128a1fda5c2
    kernel-2.6.9-89.31.1.EL.ppc64iseries.rpm SHA-256: a0460fdd4d071bab460b92e360eb629fcf9e8c5804169fc32c0098b71af8caa0
    kernel-devel-2.6.9-89.31.1.EL.ppc64.rpm SHA-256: 932f4b4aa269d6c3078ff8cbfbbcb5207c020c7c85eb7a7473a069d2e5f7b9cc
    kernel-devel-2.6.9-89.31.1.EL.ppc64iseries.rpm SHA-256: 9c42a06fadd4e16ec74063a72b5324b387d1937bdbc509704d35794cbea7b9fa
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.ppc64.rpm SHA-256: 6e865a6ef7743024273eb23f89508b32a37026b014156169a01c4bcbbacf2ee8
    kernel-largesmp-devel-2.6.9-89.31.1.EL.ppc64.rpm SHA-256: 8ed2a435486e02585c3566a1ac2705f827651b8ea7b505f4f8e726f6ce75acad

    Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

    SRPM
    kernel-2.6.9-89.31.1.EL.src.rpm SHA-256: 845a5a673eb8c643ec7da658b34c34d54478f7201a4cdf81b6beb7830054204c
    ppc
    kernel-2.6.9-89.31.1.EL.ppc64.rpm SHA-256: 86f2642be30dfa9ed8ef30c801b14815694c6982466dde3ddd26d128a1fda5c2
    kernel-2.6.9-89.31.1.EL.ppc64iseries.rpm SHA-256: a0460fdd4d071bab460b92e360eb629fcf9e8c5804169fc32c0098b71af8caa0
    kernel-devel-2.6.9-89.31.1.EL.ppc64.rpm SHA-256: 932f4b4aa269d6c3078ff8cbfbbcb5207c020c7c85eb7a7473a069d2e5f7b9cc
    kernel-devel-2.6.9-89.31.1.EL.ppc64iseries.rpm SHA-256: 9c42a06fadd4e16ec74063a72b5324b387d1937bdbc509704d35794cbea7b9fa
    kernel-doc-2.6.9-89.31.1.EL.noarch.rpm SHA-256: 8207b11bea59f5133e757e0923acc037ee50b5512ac9ac1e8b0a5699e58ea702
    kernel-largesmp-2.6.9-89.31.1.EL.ppc64.rpm SHA-256: 6e865a6ef7743024273eb23f89508b32a37026b014156169a01c4bcbbacf2ee8
    kernel-largesmp-devel-2.6.9-89.31.1.EL.ppc64.rpm SHA-256: 8ed2a435486e02585c3566a1ac2705f827651b8ea7b505f4f8e726f6ce75acad

    The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

    Red Hat

    Quick Links

    • Downloads
    • Subscriptions
    • Support Cases
    • Customer Service
    • Product Documentation

    Help

    • Contact Us
    • Customer Portal FAQ
    • Log-in Assistance

    Site Info

    • Trust Red Hat
    • Browser Support Policy
    • Accessibility
    • Awards and Recognition
    • Colophon

    Related Sites

    • redhat.com
    • openshift.com
    • developers.redhat.com
    • connect.redhat.com
    • cloud.redhat.com

    About

    • Red Hat Subscription Value
    • About Red Hat
    • Red Hat Jobs
    Copyright © 2021 Red Hat, Inc.
    • Privacy Statement
    • Customer Portal Terms of Use
    • All Policies and Guidelines
    Red Hat Summit
    Twitter Facebook