Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2010:0936 - Security Advisory
Issued:
2010-12-01
Updated:
2010-12-06

RHSA-2010:0936 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues and multiple bugs are
now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

[Update 6 December 2010]
The package list in this erratum has been updated to include the kernel-doc
packages for the IA32 architecture.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • A flaw in sctp_packet_config() in the Linux kernel's Stream Control

Transmission Protocol (SCTP) implementation could allow a remote attacker
to cause a denial of service. (CVE-2010-3432, Important)

  • A missing integer overflow check in snd_ctl_new() in the Linux kernel's

sound subsystem could allow a local, unprivileged user on a 32-bit system
to cause a denial of service or escalate their privileges. (CVE-2010-3442,
Important)

Red Hat would like to thank Dan Rosenberg for reporting CVE-2010-3442.

Bug fixes:

  • Forward time drift was observed on virtual machines using PM

timer-based kernel tick accounting and running on KVM or the Microsoft
Hyper-V Server hypervisor. Virtual machines that were booted with the
divider=x kernel parameter set to a value greater than 1 and that showed
the following in the kernel boot messages were subject to this issue:

time.c: Using PM based timekeeping

Fine grained accounting for the PM timer is introduced which eliminates
this issue. However, this fix uncovered a bug in the Xen hypervisor,
possibly causing backward time drift. If this erratum is installed in Xen
HVM guests that meet the aforementioned conditions, it is recommended that
the host use kernel-xen-2.6.18-194.26.1.el5 or newer, which includes a fix
(BZ#641915) for the backward time drift. (BZ#629237)

  • With multipath enabled, systems would occasionally halt when the

do_cciss_request function was used. This was caused by wrongly-generated
requests. Additional checks have been added to avoid the aforementioned
issue. (BZ#640193)

  • A Sun X4200 system equipped with a QLogic HBA spontaneously rebooted and

logged a Hyper-Transport Sync Flood Error to the system event log. A
Maximum Memory Read Byte Count restriction was added to fix this bug.
(BZ#640919)

  • For an active/backup bonding network interface with VLANs on top of it,

when a link failed over, it took a minute for the multicast domain to be
rejoined. This was caused by the driver not sending any IGMP join packets.
The driver now sends IGMP join packets and the multicast domain is rejoined
immediately. (BZ#641002)

  • Replacing a disk and trying to rebuild it afterwards caused the system to

panic. When a domain validation request for a hot plugged drive was sent,
the mptscsi driver did not validate its existence. This could result in the
driver accessing random memory and causing the crash. A check has been
added that describes the newly-added device and reloads the iocPg3 data
from the firmware if needed. (BZ#641137)

  • An attempt to create a VLAN interface on a bond of two bnx2 adapters in

two switch configurations resulted in a soft lockup after a few seconds.
This was caused by an incorrect use of a bonding pointer. With this update,
soft lockups no longer occur and creating a VLAN interface works as
expected. (BZ#641254)

  • Erroneous pointer checks could have caused a kernel panic. This was due

to a critical value not being copied when a network buffer was duplicated
and consumed by multiple portions of the kernel's network stack. Fixing the
copy operation resolved this bug. (BZ#642746)

  • A typo in a variable name caused it to be dereferenced in either mkdir()

or create() which could cause a kernel panic. (BZ#643342)

  • SCSI high level drivers can submit SCSI commands which would never be

completed when the device was offline. This was caused by a missing
callback for the request to complete the given command. SCSI requests are
now terminated by calling their callback when a device is offline.
(BZ#644816)

  • A kernel panic could have occurred on systems due to a recursive lock in

the 3c59x driver. Recursion is now avoided and this kernel panic no longer
occurs. (BZ#648407)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 629237 - time drift with VXTIME_PMTMR mode in case of early / short real ticks [rhel-4.8.z]
  • BZ - 637675 - CVE-2010-3432 kernel: sctp: do not reset the packet during sctp_packet_config
  • BZ - 638478 - CVE-2010-3442 kernel: prevent heap corruption in snd_ctl_new()
  • BZ - 640193 - RHEL 4.8: With multipath enabled, system occasionally halts in do_cciss_request [rhel-4.8.z]
  • BZ - 640919 - Work around HyperTransport Sync Flood Error on Sun X4200 with qla2xxx [rhel-4.8.z]
  • BZ - 641002 - Bonded interface doesn't issue IGMP report (join) on slave interface during failover [rhel-4.8.z]
  • BZ - 641137 - mptbase: panic with domain validation while rebuilding after the disk is replaced. [rhel-4.8.z]
  • BZ - 641254 - [RHEL4.8.z] soft lockup on vlan with bonding in balance-alb mode [rhel-4.8.z]
  • BZ - 642746 - RHEL4.8 panic in netif_receive_skb [rhel-4.8.z]
  • BZ - 643342 - kernel: security: testing the wrong variable in create_by_name() [rhel-4.9] [rhel-4.8.z]
  • BZ - 644816 - scsi_do_req() submitted commands (tape) never complete when device goes offline [rhel-4.8.z]
  • BZ - 648407 - Kernel panic due to recursive lock in 3c59x driver. [rhel-4.8.z]

CVEs

  • CVE-2010-3432
  • CVE-2010-3442

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
kernel-2.6.9-89.33.1.EL.src.rpm SHA-256: ec282a4bbd92675155169db65e1dc90dd36333e688ae4e14391291c6534d2794
x86_64
kernel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 92d480b39af3910b4ec98e928b2c79a7bd0d05e2036c6d5c4412c1f68e8eebd1
kernel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 92d480b39af3910b4ec98e928b2c79a7bd0d05e2036c6d5c4412c1f68e8eebd1
kernel-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 4e6af26df54dd5ff9a570589793dfa29ac6daa8a74e7424b737bbc54301eed0c
kernel-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 4e6af26df54dd5ff9a570589793dfa29ac6daa8a74e7424b737bbc54301eed0c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: f9ad89e7c3dae3ec68cfe3811500ea43bb28ac97837fa3dbfc526b002cc64ed5
kernel-largesmp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: f9ad89e7c3dae3ec68cfe3811500ea43bb28ac97837fa3dbfc526b002cc64ed5
kernel-largesmp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: d4a4488822799f3a3c3d7cfaa09f1cb4c6a0ba6f7e09e6aaf0bdea8d7b0ffc97
kernel-largesmp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: d4a4488822799f3a3c3d7cfaa09f1cb4c6a0ba6f7e09e6aaf0bdea8d7b0ffc97
kernel-smp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 9ad7e3d5a73a99426ac79f94e5422e12c962444d3fb820c59fb18e73a1bc67d3
kernel-smp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 9ad7e3d5a73a99426ac79f94e5422e12c962444d3fb820c59fb18e73a1bc67d3
kernel-smp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 656dd229085d4708d1c1afd43d52543ee2256f29bdcb2c09f1693992285cc3a4
kernel-smp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 656dd229085d4708d1c1afd43d52543ee2256f29bdcb2c09f1693992285cc3a4
kernel-xenU-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 1f49c46e3f58929ddcb5a11885910ed89ac2d1f9966fad68df15e9f3cf864c1c
kernel-xenU-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 1f49c46e3f58929ddcb5a11885910ed89ac2d1f9966fad68df15e9f3cf864c1c
kernel-xenU-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 11f8b4791d632d89ef5037e11871c5394a3717c466c491aa51e6301934d9b904
kernel-xenU-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 11f8b4791d632d89ef5037e11871c5394a3717c466c491aa51e6301934d9b904
ia64
kernel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 96f276e2b0347220ea32804e7438c572aa361f54bcbf0288a267ce416853272e
kernel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 96f276e2b0347220ea32804e7438c572aa361f54bcbf0288a267ce416853272e
kernel-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 379115bb2a77b5f9a86317f70080ac8a72fe02fd4c1fb12c0930f0e121de9aeb
kernel-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 379115bb2a77b5f9a86317f70080ac8a72fe02fd4c1fb12c0930f0e121de9aeb
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 97f7309996465d44c34d3c186a72d748291d4c783ade37f9dcdd060f2bb3322e
kernel-largesmp-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 97f7309996465d44c34d3c186a72d748291d4c783ade37f9dcdd060f2bb3322e
kernel-largesmp-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 331b2155daf789195fa116afc265a3c911468d237cbce6686fc69f1c95e4e714
kernel-largesmp-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 331b2155daf789195fa116afc265a3c911468d237cbce6686fc69f1c95e4e714
i386
kernel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 1b25d317414823360146a30100ae223c1937711ae085c24e5ba57b2d0249a58a
kernel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 1b25d317414823360146a30100ae223c1937711ae085c24e5ba57b2d0249a58a
kernel-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 8fff2f7968bd6dcf11ddc0963e831881813e8112276d60105146d3de3beb4a0c
kernel-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 8fff2f7968bd6dcf11ddc0963e831881813e8112276d60105146d3de3beb4a0c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-hugemem-2.6.9-89.33.1.EL.i686.rpm SHA-256: bed5b7887b9da0eaa8bd09c1d5fdbaf182b7dd2068c9313c446b61ad7e6fe00f
kernel-hugemem-2.6.9-89.33.1.EL.i686.rpm SHA-256: bed5b7887b9da0eaa8bd09c1d5fdbaf182b7dd2068c9313c446b61ad7e6fe00f
kernel-hugemem-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 3aeb1fb32fcfa52413cf87261e6493027f08653d5f8fe38a3f6c61419b181adc
kernel-hugemem-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 3aeb1fb32fcfa52413cf87261e6493027f08653d5f8fe38a3f6c61419b181adc
kernel-smp-2.6.9-89.33.1.EL.i686.rpm SHA-256: ab3b45d8d8092d3b6ce985b57909ff9dda1834b1557798cf5b4e0fd4548093d0
kernel-smp-2.6.9-89.33.1.EL.i686.rpm SHA-256: ab3b45d8d8092d3b6ce985b57909ff9dda1834b1557798cf5b4e0fd4548093d0
kernel-smp-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: d067f3d88a572aec3f8c62c71af617084226af49cc648260644d3d39dafd575d
kernel-smp-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: d067f3d88a572aec3f8c62c71af617084226af49cc648260644d3d39dafd575d
kernel-xenU-2.6.9-89.33.1.EL.i686.rpm SHA-256: 9e3ceb037e447ca8f459f45057744507b2f568f99c7b8a6da0b22b0a529e5640
kernel-xenU-2.6.9-89.33.1.EL.i686.rpm SHA-256: 9e3ceb037e447ca8f459f45057744507b2f568f99c7b8a6da0b22b0a529e5640
kernel-xenU-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: b5a73ebf0fd3b0147f3e74ccb01fd5e918810de73f147e7e214db07cf9e2f60d
kernel-xenU-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: b5a73ebf0fd3b0147f3e74ccb01fd5e918810de73f147e7e214db07cf9e2f60d

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.33.1.EL.src.rpm SHA-256: ec282a4bbd92675155169db65e1dc90dd36333e688ae4e14391291c6534d2794
x86_64
kernel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 92d480b39af3910b4ec98e928b2c79a7bd0d05e2036c6d5c4412c1f68e8eebd1
kernel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 92d480b39af3910b4ec98e928b2c79a7bd0d05e2036c6d5c4412c1f68e8eebd1
kernel-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 4e6af26df54dd5ff9a570589793dfa29ac6daa8a74e7424b737bbc54301eed0c
kernel-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 4e6af26df54dd5ff9a570589793dfa29ac6daa8a74e7424b737bbc54301eed0c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: f9ad89e7c3dae3ec68cfe3811500ea43bb28ac97837fa3dbfc526b002cc64ed5
kernel-largesmp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: f9ad89e7c3dae3ec68cfe3811500ea43bb28ac97837fa3dbfc526b002cc64ed5
kernel-largesmp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: d4a4488822799f3a3c3d7cfaa09f1cb4c6a0ba6f7e09e6aaf0bdea8d7b0ffc97
kernel-largesmp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: d4a4488822799f3a3c3d7cfaa09f1cb4c6a0ba6f7e09e6aaf0bdea8d7b0ffc97
kernel-smp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 9ad7e3d5a73a99426ac79f94e5422e12c962444d3fb820c59fb18e73a1bc67d3
kernel-smp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 9ad7e3d5a73a99426ac79f94e5422e12c962444d3fb820c59fb18e73a1bc67d3
kernel-smp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 656dd229085d4708d1c1afd43d52543ee2256f29bdcb2c09f1693992285cc3a4
kernel-smp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 656dd229085d4708d1c1afd43d52543ee2256f29bdcb2c09f1693992285cc3a4
kernel-xenU-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 1f49c46e3f58929ddcb5a11885910ed89ac2d1f9966fad68df15e9f3cf864c1c
kernel-xenU-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 1f49c46e3f58929ddcb5a11885910ed89ac2d1f9966fad68df15e9f3cf864c1c
kernel-xenU-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 11f8b4791d632d89ef5037e11871c5394a3717c466c491aa51e6301934d9b904
kernel-xenU-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 11f8b4791d632d89ef5037e11871c5394a3717c466c491aa51e6301934d9b904
ia64
kernel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 96f276e2b0347220ea32804e7438c572aa361f54bcbf0288a267ce416853272e
kernel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 96f276e2b0347220ea32804e7438c572aa361f54bcbf0288a267ce416853272e
kernel-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 379115bb2a77b5f9a86317f70080ac8a72fe02fd4c1fb12c0930f0e121de9aeb
kernel-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 379115bb2a77b5f9a86317f70080ac8a72fe02fd4c1fb12c0930f0e121de9aeb
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 97f7309996465d44c34d3c186a72d748291d4c783ade37f9dcdd060f2bb3322e
kernel-largesmp-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 97f7309996465d44c34d3c186a72d748291d4c783ade37f9dcdd060f2bb3322e
kernel-largesmp-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 331b2155daf789195fa116afc265a3c911468d237cbce6686fc69f1c95e4e714
kernel-largesmp-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 331b2155daf789195fa116afc265a3c911468d237cbce6686fc69f1c95e4e714
i386
kernel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 1b25d317414823360146a30100ae223c1937711ae085c24e5ba57b2d0249a58a
kernel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 1b25d317414823360146a30100ae223c1937711ae085c24e5ba57b2d0249a58a
kernel-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 8fff2f7968bd6dcf11ddc0963e831881813e8112276d60105146d3de3beb4a0c
kernel-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 8fff2f7968bd6dcf11ddc0963e831881813e8112276d60105146d3de3beb4a0c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-hugemem-2.6.9-89.33.1.EL.i686.rpm SHA-256: bed5b7887b9da0eaa8bd09c1d5fdbaf182b7dd2068c9313c446b61ad7e6fe00f
kernel-hugemem-2.6.9-89.33.1.EL.i686.rpm SHA-256: bed5b7887b9da0eaa8bd09c1d5fdbaf182b7dd2068c9313c446b61ad7e6fe00f
kernel-hugemem-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 3aeb1fb32fcfa52413cf87261e6493027f08653d5f8fe38a3f6c61419b181adc
kernel-hugemem-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 3aeb1fb32fcfa52413cf87261e6493027f08653d5f8fe38a3f6c61419b181adc
kernel-smp-2.6.9-89.33.1.EL.i686.rpm SHA-256: ab3b45d8d8092d3b6ce985b57909ff9dda1834b1557798cf5b4e0fd4548093d0
kernel-smp-2.6.9-89.33.1.EL.i686.rpm SHA-256: ab3b45d8d8092d3b6ce985b57909ff9dda1834b1557798cf5b4e0fd4548093d0
kernel-smp-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: d067f3d88a572aec3f8c62c71af617084226af49cc648260644d3d39dafd575d
kernel-smp-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: d067f3d88a572aec3f8c62c71af617084226af49cc648260644d3d39dafd575d
kernel-xenU-2.6.9-89.33.1.EL.i686.rpm SHA-256: 9e3ceb037e447ca8f459f45057744507b2f568f99c7b8a6da0b22b0a529e5640
kernel-xenU-2.6.9-89.33.1.EL.i686.rpm SHA-256: 9e3ceb037e447ca8f459f45057744507b2f568f99c7b8a6da0b22b0a529e5640
kernel-xenU-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: b5a73ebf0fd3b0147f3e74ccb01fd5e918810de73f147e7e214db07cf9e2f60d
kernel-xenU-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: b5a73ebf0fd3b0147f3e74ccb01fd5e918810de73f147e7e214db07cf9e2f60d

Red Hat Enterprise Linux Workstation 4

SRPM
kernel-2.6.9-89.33.1.EL.src.rpm SHA-256: ec282a4bbd92675155169db65e1dc90dd36333e688ae4e14391291c6534d2794
x86_64
kernel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 92d480b39af3910b4ec98e928b2c79a7bd0d05e2036c6d5c4412c1f68e8eebd1
kernel-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 4e6af26df54dd5ff9a570589793dfa29ac6daa8a74e7424b737bbc54301eed0c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: f9ad89e7c3dae3ec68cfe3811500ea43bb28ac97837fa3dbfc526b002cc64ed5
kernel-largesmp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: d4a4488822799f3a3c3d7cfaa09f1cb4c6a0ba6f7e09e6aaf0bdea8d7b0ffc97
kernel-smp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 9ad7e3d5a73a99426ac79f94e5422e12c962444d3fb820c59fb18e73a1bc67d3
kernel-smp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 656dd229085d4708d1c1afd43d52543ee2256f29bdcb2c09f1693992285cc3a4
kernel-xenU-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 1f49c46e3f58929ddcb5a11885910ed89ac2d1f9966fad68df15e9f3cf864c1c
kernel-xenU-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 11f8b4791d632d89ef5037e11871c5394a3717c466c491aa51e6301934d9b904
ia64
kernel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 96f276e2b0347220ea32804e7438c572aa361f54bcbf0288a267ce416853272e
kernel-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 379115bb2a77b5f9a86317f70080ac8a72fe02fd4c1fb12c0930f0e121de9aeb
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 97f7309996465d44c34d3c186a72d748291d4c783ade37f9dcdd060f2bb3322e
kernel-largesmp-devel-2.6.9-89.33.1.EL.ia64.rpm SHA-256: 331b2155daf789195fa116afc265a3c911468d237cbce6686fc69f1c95e4e714
i386
kernel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 1b25d317414823360146a30100ae223c1937711ae085c24e5ba57b2d0249a58a
kernel-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 8fff2f7968bd6dcf11ddc0963e831881813e8112276d60105146d3de3beb4a0c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-hugemem-2.6.9-89.33.1.EL.i686.rpm SHA-256: bed5b7887b9da0eaa8bd09c1d5fdbaf182b7dd2068c9313c446b61ad7e6fe00f
kernel-hugemem-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 3aeb1fb32fcfa52413cf87261e6493027f08653d5f8fe38a3f6c61419b181adc
kernel-smp-2.6.9-89.33.1.EL.i686.rpm SHA-256: ab3b45d8d8092d3b6ce985b57909ff9dda1834b1557798cf5b4e0fd4548093d0
kernel-smp-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: d067f3d88a572aec3f8c62c71af617084226af49cc648260644d3d39dafd575d
kernel-xenU-2.6.9-89.33.1.EL.i686.rpm SHA-256: 9e3ceb037e447ca8f459f45057744507b2f568f99c7b8a6da0b22b0a529e5640
kernel-xenU-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: b5a73ebf0fd3b0147f3e74ccb01fd5e918810de73f147e7e214db07cf9e2f60d

Red Hat Enterprise Linux Desktop 4

SRPM
kernel-2.6.9-89.33.1.EL.src.rpm SHA-256: ec282a4bbd92675155169db65e1dc90dd36333e688ae4e14391291c6534d2794
x86_64
kernel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 92d480b39af3910b4ec98e928b2c79a7bd0d05e2036c6d5c4412c1f68e8eebd1
kernel-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 4e6af26df54dd5ff9a570589793dfa29ac6daa8a74e7424b737bbc54301eed0c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: f9ad89e7c3dae3ec68cfe3811500ea43bb28ac97837fa3dbfc526b002cc64ed5
kernel-largesmp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: d4a4488822799f3a3c3d7cfaa09f1cb4c6a0ba6f7e09e6aaf0bdea8d7b0ffc97
kernel-smp-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 9ad7e3d5a73a99426ac79f94e5422e12c962444d3fb820c59fb18e73a1bc67d3
kernel-smp-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 656dd229085d4708d1c1afd43d52543ee2256f29bdcb2c09f1693992285cc3a4
kernel-xenU-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 1f49c46e3f58929ddcb5a11885910ed89ac2d1f9966fad68df15e9f3cf864c1c
kernel-xenU-devel-2.6.9-89.33.1.EL.x86_64.rpm SHA-256: 11f8b4791d632d89ef5037e11871c5394a3717c466c491aa51e6301934d9b904
i386
kernel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 1b25d317414823360146a30100ae223c1937711ae085c24e5ba57b2d0249a58a
kernel-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 8fff2f7968bd6dcf11ddc0963e831881813e8112276d60105146d3de3beb4a0c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-hugemem-2.6.9-89.33.1.EL.i686.rpm SHA-256: bed5b7887b9da0eaa8bd09c1d5fdbaf182b7dd2068c9313c446b61ad7e6fe00f
kernel-hugemem-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: 3aeb1fb32fcfa52413cf87261e6493027f08653d5f8fe38a3f6c61419b181adc
kernel-smp-2.6.9-89.33.1.EL.i686.rpm SHA-256: ab3b45d8d8092d3b6ce985b57909ff9dda1834b1557798cf5b4e0fd4548093d0
kernel-smp-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: d067f3d88a572aec3f8c62c71af617084226af49cc648260644d3d39dafd575d
kernel-xenU-2.6.9-89.33.1.EL.i686.rpm SHA-256: 9e3ceb037e447ca8f459f45057744507b2f568f99c7b8a6da0b22b0a529e5640
kernel-xenU-devel-2.6.9-89.33.1.EL.i686.rpm SHA-256: b5a73ebf0fd3b0147f3e74ccb01fd5e918810de73f147e7e214db07cf9e2f60d

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
kernel-2.6.9-89.33.1.EL.src.rpm SHA-256: ec282a4bbd92675155169db65e1dc90dd36333e688ae4e14391291c6534d2794
s390x
kernel-2.6.9-89.33.1.EL.s390x.rpm SHA-256: 598be2050f96c278b18a977ae9a394d7db03ce1d761a8a6d0e231a0618b09a13
kernel-devel-2.6.9-89.33.1.EL.s390x.rpm SHA-256: 10f4adab3acf2b53fa2ef2ee268304464bd17bb9c07b6beeb4812bf3bbb57c9c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
s390
kernel-2.6.9-89.33.1.EL.s390.rpm SHA-256: cfe65f484af77e15da3142fca68cf5ec352069a8178d495a97ff4e6d3b2d3bc3
kernel-devel-2.6.9-89.33.1.EL.s390.rpm SHA-256: c25d956282bac21855495e814b2399f1fc0e0ad31e589f1faf7cf2ea1fd29deb
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.33.1.EL.src.rpm SHA-256: ec282a4bbd92675155169db65e1dc90dd36333e688ae4e14391291c6534d2794
s390x
kernel-2.6.9-89.33.1.EL.s390x.rpm SHA-256: 598be2050f96c278b18a977ae9a394d7db03ce1d761a8a6d0e231a0618b09a13
kernel-devel-2.6.9-89.33.1.EL.s390x.rpm SHA-256: 10f4adab3acf2b53fa2ef2ee268304464bd17bb9c07b6beeb4812bf3bbb57c9c
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
s390
kernel-2.6.9-89.33.1.EL.s390.rpm SHA-256: cfe65f484af77e15da3142fca68cf5ec352069a8178d495a97ff4e6d3b2d3bc3
kernel-devel-2.6.9-89.33.1.EL.s390.rpm SHA-256: c25d956282bac21855495e814b2399f1fc0e0ad31e589f1faf7cf2ea1fd29deb
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603

Red Hat Enterprise Linux for Power, big endian 4

SRPM
kernel-2.6.9-89.33.1.EL.src.rpm SHA-256: ec282a4bbd92675155169db65e1dc90dd36333e688ae4e14391291c6534d2794
ppc
kernel-2.6.9-89.33.1.EL.ppc64.rpm SHA-256: 6660165b5bab0e68a0ad2a0aec6525a89698cd5d30d679d6457ae1cf7d70ef45
kernel-2.6.9-89.33.1.EL.ppc64iseries.rpm SHA-256: cc7fb0d8d57f23cbab13635168af534f5217a4ddd72edb6eb072ea8b8db65f7b
kernel-devel-2.6.9-89.33.1.EL.ppc64.rpm SHA-256: 6a7f85c6e0a8bbdff3621234b8a68e7ac198f5005015a78edf635faa0f442f73
kernel-devel-2.6.9-89.33.1.EL.ppc64iseries.rpm SHA-256: 79b3b9279f1444c75b9d4f58cb6738632b60518f96e5743603dff965e4bf5032
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.ppc64.rpm SHA-256: d7336899c1d359e720e902fff8ed49b1454496ec54b4c63ae3e29a9ea2944a48
kernel-largesmp-devel-2.6.9-89.33.1.EL.ppc64.rpm SHA-256: 5032eeab24c1e56915bb53242973086df1ce246048f6979958544a9c8ed1b901

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
kernel-2.6.9-89.33.1.EL.src.rpm SHA-256: ec282a4bbd92675155169db65e1dc90dd36333e688ae4e14391291c6534d2794
ppc
kernel-2.6.9-89.33.1.EL.ppc64.rpm SHA-256: 6660165b5bab0e68a0ad2a0aec6525a89698cd5d30d679d6457ae1cf7d70ef45
kernel-2.6.9-89.33.1.EL.ppc64iseries.rpm SHA-256: cc7fb0d8d57f23cbab13635168af534f5217a4ddd72edb6eb072ea8b8db65f7b
kernel-devel-2.6.9-89.33.1.EL.ppc64.rpm SHA-256: 6a7f85c6e0a8bbdff3621234b8a68e7ac198f5005015a78edf635faa0f442f73
kernel-devel-2.6.9-89.33.1.EL.ppc64iseries.rpm SHA-256: 79b3b9279f1444c75b9d4f58cb6738632b60518f96e5743603dff965e4bf5032
kernel-doc-2.6.9-89.33.1.EL.noarch.rpm SHA-256: 4382f50fb8b34325ee5a4b1fd7a64d7245c66df7230492eb6d24bff5f4ccc603
kernel-largesmp-2.6.9-89.33.1.EL.ppc64.rpm SHA-256: d7336899c1d359e720e902fff8ed49b1454496ec54b4c63ae3e29a9ea2944a48
kernel-largesmp-devel-2.6.9-89.33.1.EL.ppc64.rpm SHA-256: 5032eeab24c1e56915bb53242973086df1ce246048f6979958544a9c8ed1b901

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter