Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHBA-2013:1190 - Bug Fix Advisory
Issued:
2013-09-03
Updated:
2013-09-03

RHBA-2013:1190 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

kernel bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several bugs are now available for Red Hat
Enterprise Linux 6 Extended Update Support.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following bugs:

  • Cyclic adding and removing of the st kernel module could previously

cause a system to become unresponsive. This was caused by a disk queue
reference count bug in the SCSI tape driver. An upstream patch addressing
this bug has been backported to the SCSI tape driver and the system now
responds as expected in this situation. (BZ#979291)

  • The bnx2x driver could have previously reported an occasional MDC/MDIO

timeout error along with the loss of the link connection. This could
happen in environments using an older boot code because the MDIO clock was
set in the beginning of each boot code sequence instead of per CL45
command. To avoid this problem, the bnx2x driver now sets the MDIO clock
per CL45 command. Additionally, the MDIO clock is now implemented per EMAC
register instead of per port number, which prevents ports from using
different EMAC addresses for different PHY accesses. Also, boot code or
Management Firmware (MFW) upgrade is required to prevent the boot code
(firmware) from taking over link ownership if the driver's pulse is
delayed. The BCM57711 card requires boot code version 6.2.24 or later, and
the BCM57712/578xx cards require MFW version 7.4.22 or later. (BZ#982114)

  • If the audit queue is too long, the kernel schedules the kauditd daemon

to alleviate the load on the audit queue. Previously, if the current audit
process had any pending signals in such a situation, it entered a
busy-wait loop for the duration of an audit backlog timeout because the
wait_for_auditd() function was called as an interruptible task. This could
lead to system lockup in non-preemptive uniprocessor systems. This update
fixes the problem by setting wait_for_auditd() as uninterruptible.
(BZ#982469)

  • The kernel could rarely terminate instead of creating a dump file when

a multi-threaded process using FPU aborted. This happened because the
kernel did not wait until all threads became inactive and attempted to
dump the FPU state of active threads into memory which triggered a
BUG_ON() routine. A patch addressing this problem has been applied and the
kernel now waits for the threads to become inactive before dumping their
FPU state into memory. (BZ#988226)

  • BE family hardware could falsely indicate an unrecoverable error (UE) on

certain platforms and stop further access to be2net-based network
interface cards (NICs). A patch has been applied to disable the code that
stops further access to hardware for BE family network interface cards
(NICs). For a real UE, it is not necessary as the corresponding hardware
block is not accessible in this situation. (BZ#990087)

  • The fnic driver previously allowed I/O requests with the number of SGL

descriptors greater than is supported by Cisco UCS Palo adapters.
Consequently, the adapter returned any I/O request with more than 256 SGL
descriptors with an error indicating invalid SGLs. A patch has been
applied to limit the maximum number of supported SGLs in the fnic driver
to 256 and the problem no longer occurs. (BZ#991344)

Users should upgrade to these updated packages, which contain backported
patches to correct these bugs. The system must be rebooted for this update
to take effect

Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm

  • Uvh" as that will remove the running kernel binaries from your system. You may

use "rpm -e" to remove old kernels after determining that the new kernel
functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.34.1.el6.src.rpm SHA-256: 93641379d9b28ca954b808e5bd378620832a4f3271f894d91870f0dcb35e6459
x86_64
kernel-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 811d689c2667f5a93a7b7e67a1ab12943fc051d409bb0b5466f472146516dbc7
kernel-debug-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 51438f69325faf22c770a5b1bfda225c1c1d1bafb0fd1824e4340d688f477837
kernel-debug-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: d407ac1779dd9345c7369ae2aa22b14cd480a58518a88d37384722bb1a687284
kernel-debug-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: d407ac1779dd9345c7369ae2aa22b14cd480a58518a88d37384722bb1a687284
kernel-debug-devel-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 7ee0cddbfde06a276bb6b0dee020ea605084f04c4d3e832459fec5222863df5d
kernel-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: ca6d7cacb4848676601ba0898861bc4a1298ad61e3bf750a0f9b461aa6896226
kernel-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: ca6d7cacb4848676601ba0898861bc4a1298ad61e3bf750a0f9b461aa6896226
kernel-debuginfo-common-x86_64-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 093ceac69848ab3e9e6ee0b1cc5f67b6d3316bbca10aee447b7a33008daa09bc
kernel-debuginfo-common-x86_64-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 093ceac69848ab3e9e6ee0b1cc5f67b6d3316bbca10aee447b7a33008daa09bc
kernel-devel-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 4ebc48769fe94066f6bfc2afbbd1a2eba676a2c653e66d36f9125b5d1a3f3089
kernel-doc-2.6.32-279.34.1.el6.noarch.rpm SHA-256: 511312b89f6fdc5b078287cee2f7742da064d83d884cf5b6855163544cc7c4ab
kernel-firmware-2.6.32-279.34.1.el6.noarch.rpm SHA-256: b1885644de9402a6a5aea30225f8621b18095e6e94a326c555453ea2dd28850d
kernel-headers-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: d571c37dcae5d241b2ce0665a78f268bf121934455bb9c1cd0e771ae865c1c53
perf-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 5b8b2dd96ad25160991f034f747a408faba402da1e538b7ec410e99399d8828d
perf-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: bd100d1fd3f619bc39ba6af591ad76d54f1dda585f9cf5c4752f74f8c050e305
perf-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: bd100d1fd3f619bc39ba6af591ad76d54f1dda585f9cf5c4752f74f8c050e305
python-perf-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 6f7626a971517772eea30cabb920133090dcf885ef70e857799a9e1ac5c3e5f2
python-perf-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: a5ed1e89d3f77cf3d95914042afd2617d0149523bc000b4518e25d794e9679aa
python-perf-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: a5ed1e89d3f77cf3d95914042afd2617d0149523bc000b4518e25d794e9679aa
i386
kernel-2.6.32-279.34.1.el6.i686.rpm SHA-256: c379cdd03d4f54dd82434a28451f2c4b11a62a42dc0217db564d1d5c90086ae5
kernel-debug-2.6.32-279.34.1.el6.i686.rpm SHA-256: b77518de59bcb5852bda59ff5e660742a9cca83b38e5d071b247d7a0d203775d
kernel-debug-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: 68e8f828ab4e65f1fde5b04f3ff5fce8a5e09fca09d2f4cf66869451d3edf08a
kernel-debug-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: 68e8f828ab4e65f1fde5b04f3ff5fce8a5e09fca09d2f4cf66869451d3edf08a
kernel-debug-devel-2.6.32-279.34.1.el6.i686.rpm SHA-256: 9bb31f50dc01fa50ed239a12c92aca3f5a97d8df52b50b6ba0bf07e1e992769a
kernel-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: d5c6445178691e35c990ff17ef0faa4689e59640567b453de42c1d41172436f8
kernel-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: d5c6445178691e35c990ff17ef0faa4689e59640567b453de42c1d41172436f8
kernel-debuginfo-common-i686-2.6.32-279.34.1.el6.i686.rpm SHA-256: 5f88a291eacc99347ee9c24f3a1038a9cd21b6f5517d9ab70eab5dd436e656e1
kernel-debuginfo-common-i686-2.6.32-279.34.1.el6.i686.rpm SHA-256: 5f88a291eacc99347ee9c24f3a1038a9cd21b6f5517d9ab70eab5dd436e656e1
kernel-devel-2.6.32-279.34.1.el6.i686.rpm SHA-256: ad51cfe442e3485884d38870f81077396d3cc1509c7be0c5d3571b8102a5c32c
kernel-doc-2.6.32-279.34.1.el6.noarch.rpm SHA-256: 511312b89f6fdc5b078287cee2f7742da064d83d884cf5b6855163544cc7c4ab
kernel-firmware-2.6.32-279.34.1.el6.noarch.rpm SHA-256: b1885644de9402a6a5aea30225f8621b18095e6e94a326c555453ea2dd28850d
kernel-headers-2.6.32-279.34.1.el6.i686.rpm SHA-256: 01cb99d6ab11f6da581d47c74bbefc18edfb7b41f48f532476b8da08371baa8b
perf-2.6.32-279.34.1.el6.i686.rpm SHA-256: 0074f9cb911f6f7807944d8c479adfc4963b30902be44b7bbf46dc072b62be9a
perf-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: d2d0c5d83d3bbb218c84b9f1361f764b63ee709fb191ad6ae8a226ff0add3648
perf-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: d2d0c5d83d3bbb218c84b9f1361f764b63ee709fb191ad6ae8a226ff0add3648
python-perf-2.6.32-279.34.1.el6.i686.rpm SHA-256: 35fc89aa7f4aa4ec1fc7442ecb647fb1a979d76314d8d6af8126c2e7727b9478
python-perf-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: 304992be0416bc7d6b8e4f352f8ffb2e35c03c35c2cac428d9ac364c7e6dfb6a
python-perf-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: 304992be0416bc7d6b8e4f352f8ffb2e35c03c35c2cac428d9ac364c7e6dfb6a

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.34.1.el6.src.rpm SHA-256: 93641379d9b28ca954b808e5bd378620832a4f3271f894d91870f0dcb35e6459
s390x
kernel-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 3e2650634ac1bbbdc9268c86ac2e67d4c624923d7640e5c007e0c23d2f5c8637
kernel-debug-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 8fd806d32082a4f993468549cdb00943f265b94a44fa551426f247d5206cf521
kernel-debug-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: b4288d8f457294938d4ef4eecd26c466024634686a38026a730036366d4dda4b
kernel-debug-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: b4288d8f457294938d4ef4eecd26c466024634686a38026a730036366d4dda4b
kernel-debug-devel-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 31c808ae32129e541e03a2bc7634170a3dd686ba1933c0b16c2b772c8783e0fd
kernel-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 392f5da17021290669e5f2407a59951c4da6065d4bcce69b510e11c849e0fd1a
kernel-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 392f5da17021290669e5f2407a59951c4da6065d4bcce69b510e11c849e0fd1a
kernel-debuginfo-common-s390x-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 910c6de2bf94d4979a1add520dbaadb6dcc4780467c28becba472650c381619d
kernel-debuginfo-common-s390x-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 910c6de2bf94d4979a1add520dbaadb6dcc4780467c28becba472650c381619d
kernel-devel-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 0f84b32d91156dcecebe9f871477eda21311ec31e44f370d84b43f3510cbc572
kernel-doc-2.6.32-279.34.1.el6.noarch.rpm SHA-256: 511312b89f6fdc5b078287cee2f7742da064d83d884cf5b6855163544cc7c4ab
kernel-firmware-2.6.32-279.34.1.el6.noarch.rpm SHA-256: b1885644de9402a6a5aea30225f8621b18095e6e94a326c555453ea2dd28850d
kernel-headers-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 37527438fde5b5577f9d503218a2467d80de961953f033eea6eaed461ef6a026
kernel-kdump-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 275799f9d4a60ec2e3fd7476caee10da61c0ac404fae42f782bb7acc8168269a
kernel-kdump-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 424843c97a2867e7b683788984d0e72eb9b007e4146d3e992d3dfdf352f89454
kernel-kdump-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 424843c97a2867e7b683788984d0e72eb9b007e4146d3e992d3dfdf352f89454
kernel-kdump-devel-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 42fc51e9104e77adf9b35fd8c349904939fe9e58c412a5f7bf7db4c4995d204f
perf-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 77a1782b83398180567f6fddd1ee85acb05463b5073fee9d66acdf35d5fc9f98
perf-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 3e3696372763c6346edf47288e09f3172a6ea2c419077bb382a85c60011a0bbc
perf-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 3e3696372763c6346edf47288e09f3172a6ea2c419077bb382a85c60011a0bbc
python-perf-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 9e1bf0a8380e5c205208a90d2054e910758faec989d72a66e72b03242f8a1f91
python-perf-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 5dfd289c7045a7b399452a91c3a7828aeac353e3b0cc8ab8258b7570592c2370
python-perf-debuginfo-2.6.32-279.34.1.el6.s390x.rpm SHA-256: 5dfd289c7045a7b399452a91c3a7828aeac353e3b0cc8ab8258b7570592c2370

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.34.1.el6.src.rpm SHA-256: 93641379d9b28ca954b808e5bd378620832a4f3271f894d91870f0dcb35e6459
ppc64
kernel-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 2b3c44f450fcef820e0c39ba82502ea8bda109212f24485ec948b0d5cb375808
kernel-bootwrapper-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 62dda8f8524820bd1bfd15fddc5113ae368b509a88fc01105360198c80876fda
kernel-debug-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: e53366df553850f78d18b1374743c813932b09095b21033bc9747963bbbeabdb
kernel-debug-debuginfo-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: e86528d9fcba3b661f8cd395515bb827eeb731c1774e65bd74a5bb41622eea67
kernel-debug-debuginfo-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: e86528d9fcba3b661f8cd395515bb827eeb731c1774e65bd74a5bb41622eea67
kernel-debug-devel-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: e072aa99bf532cb16e088cf050be030df2e8895244dbc49f690805842da917e9
kernel-debuginfo-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: b790dffab90ce1ab7f9b3b6b73bba0f2f347b3cc276d33f076dcdf1cb34fd11a
kernel-debuginfo-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: b790dffab90ce1ab7f9b3b6b73bba0f2f347b3cc276d33f076dcdf1cb34fd11a
kernel-debuginfo-common-ppc64-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 59aae9436017fcf9d29036d44f0af195c8b4894b022d0e695561960c794eacad
kernel-debuginfo-common-ppc64-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 59aae9436017fcf9d29036d44f0af195c8b4894b022d0e695561960c794eacad
kernel-devel-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 0fc28b37ac1d4e4c06ac226778e16cb5d75503ab14c2cc0f9bb96d6bb1e4475b
kernel-doc-2.6.32-279.34.1.el6.noarch.rpm SHA-256: 511312b89f6fdc5b078287cee2f7742da064d83d884cf5b6855163544cc7c4ab
kernel-firmware-2.6.32-279.34.1.el6.noarch.rpm SHA-256: b1885644de9402a6a5aea30225f8621b18095e6e94a326c555453ea2dd28850d
kernel-headers-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 5c1863904dd460abf00184ae68249183a7e6a702a0f6157e58001864e0bc9b04
perf-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 86d522c9d8a952a1ad0b07c30cda1299e92257dacf780beae9923f698c3b3fd6
perf-debuginfo-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 96d01429adfaaf4525b1715218bab571cbfb9063fe6fec991952402770f746d6
perf-debuginfo-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 96d01429adfaaf4525b1715218bab571cbfb9063fe6fec991952402770f746d6
python-perf-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: 10bd844ba3a1debd0e792ae1ccb73f536f51384937ba914ac865331b1864cf12
python-perf-debuginfo-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: e9eda710a26f846bf9e6cbbd78534dc3be0db94373df379e0c6b5272cd63c986
python-perf-debuginfo-2.6.32-279.34.1.el6.ppc64.rpm SHA-256: e9eda710a26f846bf9e6cbbd78534dc3be0db94373df379e0c6b5272cd63c986

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3

SRPM
kernel-2.6.32-279.34.1.el6.src.rpm SHA-256: 93641379d9b28ca954b808e5bd378620832a4f3271f894d91870f0dcb35e6459
x86_64
kernel-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 811d689c2667f5a93a7b7e67a1ab12943fc051d409bb0b5466f472146516dbc7
kernel-debug-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 51438f69325faf22c770a5b1bfda225c1c1d1bafb0fd1824e4340d688f477837
kernel-debug-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: d407ac1779dd9345c7369ae2aa22b14cd480a58518a88d37384722bb1a687284
kernel-debug-devel-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 7ee0cddbfde06a276bb6b0dee020ea605084f04c4d3e832459fec5222863df5d
kernel-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: ca6d7cacb4848676601ba0898861bc4a1298ad61e3bf750a0f9b461aa6896226
kernel-debuginfo-common-x86_64-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 093ceac69848ab3e9e6ee0b1cc5f67b6d3316bbca10aee447b7a33008daa09bc
kernel-devel-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 4ebc48769fe94066f6bfc2afbbd1a2eba676a2c653e66d36f9125b5d1a3f3089
kernel-doc-2.6.32-279.34.1.el6.noarch.rpm SHA-256: 511312b89f6fdc5b078287cee2f7742da064d83d884cf5b6855163544cc7c4ab
kernel-firmware-2.6.32-279.34.1.el6.noarch.rpm SHA-256: b1885644de9402a6a5aea30225f8621b18095e6e94a326c555453ea2dd28850d
kernel-headers-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: d571c37dcae5d241b2ce0665a78f268bf121934455bb9c1cd0e771ae865c1c53
perf-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: 5b8b2dd96ad25160991f034f747a408faba402da1e538b7ec410e99399d8828d
perf-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: bd100d1fd3f619bc39ba6af591ad76d54f1dda585f9cf5c4752f74f8c050e305
python-perf-debuginfo-2.6.32-279.34.1.el6.x86_64.rpm SHA-256: a5ed1e89d3f77cf3d95914042afd2617d0149523bc000b4518e25d794e9679aa
i386
kernel-2.6.32-279.34.1.el6.i686.rpm SHA-256: c379cdd03d4f54dd82434a28451f2c4b11a62a42dc0217db564d1d5c90086ae5
kernel-debug-2.6.32-279.34.1.el6.i686.rpm SHA-256: b77518de59bcb5852bda59ff5e660742a9cca83b38e5d071b247d7a0d203775d
kernel-debug-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: 68e8f828ab4e65f1fde5b04f3ff5fce8a5e09fca09d2f4cf66869451d3edf08a
kernel-debug-devel-2.6.32-279.34.1.el6.i686.rpm SHA-256: 9bb31f50dc01fa50ed239a12c92aca3f5a97d8df52b50b6ba0bf07e1e992769a
kernel-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: d5c6445178691e35c990ff17ef0faa4689e59640567b453de42c1d41172436f8
kernel-debuginfo-common-i686-2.6.32-279.34.1.el6.i686.rpm SHA-256: 5f88a291eacc99347ee9c24f3a1038a9cd21b6f5517d9ab70eab5dd436e656e1
kernel-devel-2.6.32-279.34.1.el6.i686.rpm SHA-256: ad51cfe442e3485884d38870f81077396d3cc1509c7be0c5d3571b8102a5c32c
kernel-doc-2.6.32-279.34.1.el6.noarch.rpm SHA-256: 511312b89f6fdc5b078287cee2f7742da064d83d884cf5b6855163544cc7c4ab
kernel-firmware-2.6.32-279.34.1.el6.noarch.rpm SHA-256: b1885644de9402a6a5aea30225f8621b18095e6e94a326c555453ea2dd28850d
kernel-headers-2.6.32-279.34.1.el6.i686.rpm SHA-256: 01cb99d6ab11f6da581d47c74bbefc18edfb7b41f48f532476b8da08371baa8b
perf-2.6.32-279.34.1.el6.i686.rpm SHA-256: 0074f9cb911f6f7807944d8c479adfc4963b30902be44b7bbf46dc072b62be9a
perf-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: d2d0c5d83d3bbb218c84b9f1361f764b63ee709fb191ad6ae8a226ff0add3648
python-perf-debuginfo-2.6.32-279.34.1.el6.i686.rpm SHA-256: 304992be0416bc7d6b8e4f352f8ffb2e35c03c35c2cac428d9ac364c7e6dfb6a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter