Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:0283 - Security Advisory
Issued:
2011-02-22
Updated:
2011-02-22

RHSA-2011:0283 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix three security issues, several bugs, and
add two enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A divide-by-zero flaw was found in the tcp_select_initial_window()

function in the Linux kernel's TCP/IP protocol suite implementation. A
local, unprivileged user could use this flaw to trigger a denial of service
by calling setsockopt() with certain options. (CVE-2010-4165, Moderate)

  • A use-after-free flaw in the mprotect() system call in the Linux kernel

could allow a local, unprivileged user to cause a local denial of service.
(CVE-2010-4169, Moderate)

  • A flaw was found in the Linux kernel execve() system call implementation.

A local, unprivileged user could cause large amounts of memory to be
allocated but not visible to the OOM (Out of Memory) killer, triggering a
denial of service. (CVE-2010-4243, Moderate)

Red Hat would like to thank Steve Chen for reporting CVE-2010-4165, and
Brad Spengler for reporting CVE-2010-4243.

This update also fixes several bugs and adds two enhancements.
Documentation for these bug fixes and enhancements will be available
shortly from the Technical Notes document linked to in the References
section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs and add the enhancements
noted in the Technical Notes. The system must be rebooted for this update
to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 625688 - CVE-2010-4243 kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads
  • BZ - 651671 - CVE-2010-4169 kernel: perf bug
  • BZ - 652508 - CVE-2010-4165 kernel: possible kernel oops from user MSS
  • BZ - 652720 - read from virtio-serial returns if the host side is not connect to pipe [rhel-6.0.z]
  • BZ - 658854 - [NetApp 6.1 bug] RHEL6.0 FC host hits kernel panic at scsi_error_handler [rhel-6.0.z]
  • BZ - 658891 - [6.0.z FEAT] Port KVM bug fixes for cr_access to RHEL 6 [rhel-6.0.z]
  • BZ - 659610 - [NetApp 6.1 bug] SCSI ALUA handler fails to handle ALUA transitioning properly [rhel-6.0.z]
  • BZ - 660590 - [NetApp 6.1 bug] regression: allow offlined devs to be set to running [rhel-6.0.z]
  • BZ - 661730 - NFS4 clients cannot reclaim locks after server reboot [rhel-6.0.z]
  • BZ - 661731 - kernel: Problem with execve(2) reintroduced [rhel-6.1] [rhel-6.0.z]
  • BZ - 661737 - xen PV guest kernel 2.6.32 processes lock up in D state [rhel-6.0.z]
  • BZ - 662721 - Fix hot-unplug handling of virtio-console ports [rhel-6.0.z]
  • BZ - 662921 - UV: WAR for interrupt-IOPort deadlock [rhel-6.0.z]
  • BZ - 664398 - QLogic qla2xxx: Backport critical parts of 8.03.05.01.06.1-k0 to [rhel-6.0.z]
  • BZ - 671342 - System panic in pskb_expand_head When arp_validate option is specified in bonding ARP monitor mode [rhel-6.0.z]
  • BZ - 673978 - [NetApp 6.0 Bug] Erroneous TPG ID check in SCSI ALUA Handler [rhel-6.0.z]

CVEs

  • CVE-2010-4169
  • CVE-2010-4243
  • CVE-2010-4165

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0283
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
x86_64
kernel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 57afbe1efd2cda6962451d0bf0ee63aa7cb2546a5354e9c0007bf9e4aa9ec2cf
kernel-debug-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: dc9008b71b01d031bede093ffa732d9345e61b3d14f589c62b892ad0ac8234bc
kernel-debug-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 6b1493be6b5479f31d85dfa0b85b82d31b85e401dae94801376d9c0f230a6db5
kernel-debug-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: a83bc5dc5c1416e516ce2a7ffbb6d82b78ac6dd0d1eca061a5d8ea4c9a12c2cc
kernel-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 1a60ab8169a8510e8e777284a53c453c5fcbdd80636511a477770853809a37e4
kernel-debuginfo-common-x86_64-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 09b1a629d92bf1dbb1338adb9bffc57c1e4f52afcd2157fbd6454fd22dc13ea7
kernel-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 928d3d38d096757669b9cd17b239bcabd10aa3d750b413881622ff9d4f06e561
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: e678873b17bf3ef2af3af6730f2542212faaf7f963ce85c24ccfae5765cc595c
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f
i386
kernel-2.6.32-71.18.1.el6.i686.rpm SHA-256: d409eb2283ddcb56f6b3230a2a6c7ba404b25ae86a41fb48ab7caca2ae1d1066
kernel-debug-2.6.32-71.18.1.el6.i686.rpm SHA-256: 8157bbbdd9655e5b43013dbe7ce1ab79af68ee651a2b29235a6fc2c85aa2d110
kernel-debug-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 4924321ea8df66929e3f309f473f1158f516e11aecede9fdbf055ccb33c313f9
kernel-debug-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f8c0ce69a11a607e244e4c84a2296eb1d3690379e268c0f3e16d3d89a085c9b2
kernel-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 79e4151529c7afbe72383c4c11069e86038ee9ad0aa9120ff31f2233e206dd4a
kernel-debuginfo-common-i686-2.6.32-71.18.1.el6.i686.rpm SHA-256: f606fd78d3d1010c8d09cb633373f99790a903ddb9dafafa135e189e271a9dc1
kernel-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f80ac13952746b693fcafc112eb874692283c13ac0b4a2c931425e3a3dd30c38
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.i686.rpm SHA-256: b710343bd280d1b79878d1a95fec1f8e24657ce362c21909a1740f7e0310bffc
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
x86_64
kernel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 57afbe1efd2cda6962451d0bf0ee63aa7cb2546a5354e9c0007bf9e4aa9ec2cf
kernel-debug-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: dc9008b71b01d031bede093ffa732d9345e61b3d14f589c62b892ad0ac8234bc
kernel-debug-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 6b1493be6b5479f31d85dfa0b85b82d31b85e401dae94801376d9c0f230a6db5
kernel-debug-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: a83bc5dc5c1416e516ce2a7ffbb6d82b78ac6dd0d1eca061a5d8ea4c9a12c2cc
kernel-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 1a60ab8169a8510e8e777284a53c453c5fcbdd80636511a477770853809a37e4
kernel-debuginfo-common-x86_64-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 09b1a629d92bf1dbb1338adb9bffc57c1e4f52afcd2157fbd6454fd22dc13ea7
kernel-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 928d3d38d096757669b9cd17b239bcabd10aa3d750b413881622ff9d4f06e561
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: e678873b17bf3ef2af3af6730f2542212faaf7f963ce85c24ccfae5765cc595c
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f
i386
kernel-2.6.32-71.18.1.el6.i686.rpm SHA-256: d409eb2283ddcb56f6b3230a2a6c7ba404b25ae86a41fb48ab7caca2ae1d1066
kernel-debug-2.6.32-71.18.1.el6.i686.rpm SHA-256: 8157bbbdd9655e5b43013dbe7ce1ab79af68ee651a2b29235a6fc2c85aa2d110
kernel-debug-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 4924321ea8df66929e3f309f473f1158f516e11aecede9fdbf055ccb33c313f9
kernel-debug-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f8c0ce69a11a607e244e4c84a2296eb1d3690379e268c0f3e16d3d89a085c9b2
kernel-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 79e4151529c7afbe72383c4c11069e86038ee9ad0aa9120ff31f2233e206dd4a
kernel-debuginfo-common-i686-2.6.32-71.18.1.el6.i686.rpm SHA-256: f606fd78d3d1010c8d09cb633373f99790a903ddb9dafafa135e189e271a9dc1
kernel-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f80ac13952746b693fcafc112eb874692283c13ac0b4a2c931425e3a3dd30c38
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.i686.rpm SHA-256: b710343bd280d1b79878d1a95fec1f8e24657ce362c21909a1740f7e0310bffc
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

Red Hat Enterprise Linux Workstation 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
x86_64
kernel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 57afbe1efd2cda6962451d0bf0ee63aa7cb2546a5354e9c0007bf9e4aa9ec2cf
kernel-debug-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: dc9008b71b01d031bede093ffa732d9345e61b3d14f589c62b892ad0ac8234bc
kernel-debug-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 6b1493be6b5479f31d85dfa0b85b82d31b85e401dae94801376d9c0f230a6db5
kernel-debug-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: a83bc5dc5c1416e516ce2a7ffbb6d82b78ac6dd0d1eca061a5d8ea4c9a12c2cc
kernel-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 1a60ab8169a8510e8e777284a53c453c5fcbdd80636511a477770853809a37e4
kernel-debuginfo-common-x86_64-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 09b1a629d92bf1dbb1338adb9bffc57c1e4f52afcd2157fbd6454fd22dc13ea7
kernel-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 928d3d38d096757669b9cd17b239bcabd10aa3d750b413881622ff9d4f06e561
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: e678873b17bf3ef2af3af6730f2542212faaf7f963ce85c24ccfae5765cc595c
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f
i386
kernel-2.6.32-71.18.1.el6.i686.rpm SHA-256: d409eb2283ddcb56f6b3230a2a6c7ba404b25ae86a41fb48ab7caca2ae1d1066
kernel-debug-2.6.32-71.18.1.el6.i686.rpm SHA-256: 8157bbbdd9655e5b43013dbe7ce1ab79af68ee651a2b29235a6fc2c85aa2d110
kernel-debug-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 4924321ea8df66929e3f309f473f1158f516e11aecede9fdbf055ccb33c313f9
kernel-debug-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f8c0ce69a11a607e244e4c84a2296eb1d3690379e268c0f3e16d3d89a085c9b2
kernel-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 79e4151529c7afbe72383c4c11069e86038ee9ad0aa9120ff31f2233e206dd4a
kernel-debuginfo-common-i686-2.6.32-71.18.1.el6.i686.rpm SHA-256: f606fd78d3d1010c8d09cb633373f99790a903ddb9dafafa135e189e271a9dc1
kernel-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f80ac13952746b693fcafc112eb874692283c13ac0b4a2c931425e3a3dd30c38
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.i686.rpm SHA-256: b710343bd280d1b79878d1a95fec1f8e24657ce362c21909a1740f7e0310bffc
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

Red Hat Enterprise Linux Desktop 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
x86_64
kernel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 57afbe1efd2cda6962451d0bf0ee63aa7cb2546a5354e9c0007bf9e4aa9ec2cf
kernel-debug-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: dc9008b71b01d031bede093ffa732d9345e61b3d14f589c62b892ad0ac8234bc
kernel-debug-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 6b1493be6b5479f31d85dfa0b85b82d31b85e401dae94801376d9c0f230a6db5
kernel-debug-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: a83bc5dc5c1416e516ce2a7ffbb6d82b78ac6dd0d1eca061a5d8ea4c9a12c2cc
kernel-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 1a60ab8169a8510e8e777284a53c453c5fcbdd80636511a477770853809a37e4
kernel-debuginfo-common-x86_64-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 09b1a629d92bf1dbb1338adb9bffc57c1e4f52afcd2157fbd6454fd22dc13ea7
kernel-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 928d3d38d096757669b9cd17b239bcabd10aa3d750b413881622ff9d4f06e561
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: e678873b17bf3ef2af3af6730f2542212faaf7f963ce85c24ccfae5765cc595c
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f
i386
kernel-2.6.32-71.18.1.el6.i686.rpm SHA-256: d409eb2283ddcb56f6b3230a2a6c7ba404b25ae86a41fb48ab7caca2ae1d1066
kernel-debug-2.6.32-71.18.1.el6.i686.rpm SHA-256: 8157bbbdd9655e5b43013dbe7ce1ab79af68ee651a2b29235a6fc2c85aa2d110
kernel-debug-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 4924321ea8df66929e3f309f473f1158f516e11aecede9fdbf055ccb33c313f9
kernel-debug-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f8c0ce69a11a607e244e4c84a2296eb1d3690379e268c0f3e16d3d89a085c9b2
kernel-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 79e4151529c7afbe72383c4c11069e86038ee9ad0aa9120ff31f2233e206dd4a
kernel-debuginfo-common-i686-2.6.32-71.18.1.el6.i686.rpm SHA-256: f606fd78d3d1010c8d09cb633373f99790a903ddb9dafafa135e189e271a9dc1
kernel-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f80ac13952746b693fcafc112eb874692283c13ac0b4a2c931425e3a3dd30c38
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.i686.rpm SHA-256: b710343bd280d1b79878d1a95fec1f8e24657ce362c21909a1740f7e0310bffc
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
s390x
kernel-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 5108a1f78007919a8c0b91a3db24c5a879c75fe0e5a5cb8bd66c0f769cfd2961
kernel-debug-2.6.32-71.18.1.el6.s390x.rpm SHA-256: be940120f84c187fa398a334a962f686bde9e738a7956df7c443b77bafb822f8
kernel-debug-debuginfo-2.6.32-71.18.1.el6.s390x.rpm SHA-256: d990dfe6d1507eb4ecbfde489a6ad734fc059fadd98f0406a74efe958830e785
kernel-debug-devel-2.6.32-71.18.1.el6.s390x.rpm SHA-256: fc1588cba8ba081f445217fd4550c09156b29dd1c44774ee68828c9265f259b3
kernel-debuginfo-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 6400e903dde66dca7b50f0e22b01c5ce3b5b3d170257fb15f7075eb610b1f447
kernel-debuginfo-common-s390x-2.6.32-71.18.1.el6.s390x.rpm SHA-256: aa751c5dfeb85c236d2644ea870e97554821b635c529a13572b4c6ca5389fda0
kernel-devel-2.6.32-71.18.1.el6.s390x.rpm SHA-256: d5a3125418cb8c09a649e4a7bfde1af2f8d2d036e81ef67d5a74df22330358eb
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 8843a3a3dbedd90f98f070b7aaaeaa71377c8a219870de63b635a3b3967ff535
kernel-kdump-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 7006263ecc27d62a46d5c017728fc99077f454263d3133ec1852d374fefddaf7
kernel-kdump-debuginfo-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 619533510732041540c3016b6e0d92006a27e686c0b2c482cbbfd9929ba355b4
kernel-kdump-devel-2.6.32-71.18.1.el6.s390x.rpm SHA-256: bc1e5214d5a2cb7cbb7bdc80dfa4b5147727227f183f428797168b32aacc49f7
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

Red Hat Enterprise Linux for Power, big endian 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
ppc64
kernel-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: f797ba4df93b8e3d9aec49111a4c3d178d70729184476681501fe06cef3be6be
kernel-bootwrapper-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: 7f3160701cb93d019722b489b4b8e1f181d0d4dcb87e38f933a883275b2b6413
kernel-debug-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: 82212403c414dd90f12c55bfbcf8ff5d51fb51797dce0dfc7d882d8abfeec0c5
kernel-debug-debuginfo-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: 5d58fd98a8e80ce7a4bd52281d551fd86956382ef68f49eab9e1343178b5125e
kernel-debug-devel-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: 8ef20c04968b91097f6408427463ff8abb0c7cc9ce053bd15990222d3e90c9c3
kernel-debuginfo-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: 5fc28cce794529448ae50f1d63bef492f266fe4a0675842860c8b3a0497ac8ff
kernel-debuginfo-common-ppc64-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: e84b8c715bea402b0d96688d20a2b2d996b4f414b3ae11db3fe34c2d7727ef38
kernel-devel-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: 0a7537f28dda75100753ccdaf4bab73a8433ef8169fc25d5f6083dfb4861fc7f
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.ppc64.rpm SHA-256: 4181e9efe54123eff2a421b9bece631d3536da6c2035060e68e1469f898cbfce
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
x86_64
kernel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 57afbe1efd2cda6962451d0bf0ee63aa7cb2546a5354e9c0007bf9e4aa9ec2cf
kernel-debug-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: dc9008b71b01d031bede093ffa732d9345e61b3d14f589c62b892ad0ac8234bc
kernel-debug-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 6b1493be6b5479f31d85dfa0b85b82d31b85e401dae94801376d9c0f230a6db5
kernel-debug-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: a83bc5dc5c1416e516ce2a7ffbb6d82b78ac6dd0d1eca061a5d8ea4c9a12c2cc
kernel-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 1a60ab8169a8510e8e777284a53c453c5fcbdd80636511a477770853809a37e4
kernel-debuginfo-common-x86_64-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 09b1a629d92bf1dbb1338adb9bffc57c1e4f52afcd2157fbd6454fd22dc13ea7
kernel-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 928d3d38d096757669b9cd17b239bcabd10aa3d750b413881622ff9d4f06e561
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: e678873b17bf3ef2af3af6730f2542212faaf7f963ce85c24ccfae5765cc595c
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

Red Hat Enterprise Linux Server from RHUI 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
x86_64
kernel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 57afbe1efd2cda6962451d0bf0ee63aa7cb2546a5354e9c0007bf9e4aa9ec2cf
kernel-debug-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: dc9008b71b01d031bede093ffa732d9345e61b3d14f589c62b892ad0ac8234bc
kernel-debug-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 6b1493be6b5479f31d85dfa0b85b82d31b85e401dae94801376d9c0f230a6db5
kernel-debug-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: a83bc5dc5c1416e516ce2a7ffbb6d82b78ac6dd0d1eca061a5d8ea4c9a12c2cc
kernel-debuginfo-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 1a60ab8169a8510e8e777284a53c453c5fcbdd80636511a477770853809a37e4
kernel-debuginfo-common-x86_64-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 09b1a629d92bf1dbb1338adb9bffc57c1e4f52afcd2157fbd6454fd22dc13ea7
kernel-devel-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: 928d3d38d096757669b9cd17b239bcabd10aa3d750b413881622ff9d4f06e561
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.x86_64.rpm SHA-256: e678873b17bf3ef2af3af6730f2542212faaf7f963ce85c24ccfae5765cc595c
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f
i386
kernel-2.6.32-71.18.1.el6.i686.rpm SHA-256: d409eb2283ddcb56f6b3230a2a6c7ba404b25ae86a41fb48ab7caca2ae1d1066
kernel-debug-2.6.32-71.18.1.el6.i686.rpm SHA-256: 8157bbbdd9655e5b43013dbe7ce1ab79af68ee651a2b29235a6fc2c85aa2d110
kernel-debug-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 4924321ea8df66929e3f309f473f1158f516e11aecede9fdbf055ccb33c313f9
kernel-debug-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f8c0ce69a11a607e244e4c84a2296eb1d3690379e268c0f3e16d3d89a085c9b2
kernel-debuginfo-2.6.32-71.18.1.el6.i686.rpm SHA-256: 79e4151529c7afbe72383c4c11069e86038ee9ad0aa9120ff31f2233e206dd4a
kernel-debuginfo-common-i686-2.6.32-71.18.1.el6.i686.rpm SHA-256: f606fd78d3d1010c8d09cb633373f99790a903ddb9dafafa135e189e271a9dc1
kernel-devel-2.6.32-71.18.1.el6.i686.rpm SHA-256: f80ac13952746b693fcafc112eb874692283c13ac0b4a2c931425e3a3dd30c38
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.i686.rpm SHA-256: b710343bd280d1b79878d1a95fec1f8e24657ce362c21909a1740f7e0310bffc
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
kernel-2.6.32-71.18.1.el6.src.rpm SHA-256: 8735af6f47db2ae9d5cb926d1a0380144d5fe85b8c9bd42aadd2754a2e11a295
s390x
kernel-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 5108a1f78007919a8c0b91a3db24c5a879c75fe0e5a5cb8bd66c0f769cfd2961
kernel-debug-2.6.32-71.18.1.el6.s390x.rpm SHA-256: be940120f84c187fa398a334a962f686bde9e738a7956df7c443b77bafb822f8
kernel-debug-debuginfo-2.6.32-71.18.1.el6.s390x.rpm SHA-256: d990dfe6d1507eb4ecbfde489a6ad734fc059fadd98f0406a74efe958830e785
kernel-debug-devel-2.6.32-71.18.1.el6.s390x.rpm SHA-256: fc1588cba8ba081f445217fd4550c09156b29dd1c44774ee68828c9265f259b3
kernel-debuginfo-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 6400e903dde66dca7b50f0e22b01c5ce3b5b3d170257fb15f7075eb610b1f447
kernel-debuginfo-common-s390x-2.6.32-71.18.1.el6.s390x.rpm SHA-256: aa751c5dfeb85c236d2644ea870e97554821b635c529a13572b4c6ca5389fda0
kernel-devel-2.6.32-71.18.1.el6.s390x.rpm SHA-256: d5a3125418cb8c09a649e4a7bfde1af2f8d2d036e81ef67d5a74df22330358eb
kernel-doc-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d5e811e2efe881220905635fff6ead07c10e182e0f919537eaed8e2e15be04b1
kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm SHA-256: d90ed3046639a16404c53ea20eaf8389544909e510a7869a16afb031e2dbb5af
kernel-headers-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 8843a3a3dbedd90f98f070b7aaaeaa71377c8a219870de63b635a3b3967ff535
kernel-kdump-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 7006263ecc27d62a46d5c017728fc99077f454263d3133ec1852d374fefddaf7
kernel-kdump-debuginfo-2.6.32-71.18.1.el6.s390x.rpm SHA-256: 619533510732041540c3016b6e0d92006a27e686c0b2c482cbbfd9929ba355b4
kernel-kdump-devel-2.6.32-71.18.1.el6.s390x.rpm SHA-256: bc1e5214d5a2cb7cbb7bdc80dfa4b5147727227f183f428797168b32aacc49f7
perf-2.6.32-71.18.1.el6.noarch.rpm SHA-256: 9f535097eb5f40e14feeb26f9178f258b7b67f5ddc93934e9d41e983fe32be7f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter