Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2011:0421 - Security Advisory
Issued:
2011-04-07
Updated:
2011-04-07

RHSA-2011:0421 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the sctp_icmp_proto_unreachable() function in the
    Linux kernel's Stream Control Transmission Protocol (SCTP) implementation.
    A remote attacker could use this flaw to cause a denial of service.
    (CVE-2010-4526, Important)
  • A missing boundary check was found in the dvb_ca_ioctl() function in the
    Linux kernel's av7110 module. On systems that use old DVB cards that
    require the av7110 module, a local, unprivileged user could use this flaw
    to cause a denial of service or escalate their privileges. (CVE-2011-0521,
    Important)
  • A race condition was found in the way the Linux kernel's InfiniBand
    implementation set up new connections. This could allow a remote user to
    cause a denial of service. (CVE-2011-0695, Important)
  • A heap overflow flaw in the iowarrior_write() function could allow a
    user with access to an IO-Warrior USB device, that supports more than 8
    bytes per report, to cause a denial of service or escalate their
    privileges. (CVE-2010-4656, Moderate)
  • A flaw was found in the way the Linux Ethernet bridge implementation
    handled certain IGMP (Internet Group Management Protocol) packets. A local,
    unprivileged user on a system that has a network interface in an Ethernet
    bridge could use this flaw to crash that system. (CVE-2011-0716, Moderate)
  • A NULL pointer dereference flaw was found in the Generic Receive Offload
    (GRO) functionality in the Linux kernel's networking implementation. If
    both GRO and promiscuous mode were enabled on an interface in a virtual LAN
    (VLAN), it could result in a denial of service when a malformed VLAN frame
    is received on that interface. (CVE-2011-1478, Moderate)
  • A missing initialization flaw in the Linux kernel could lead to an
    information leak. (CVE-2010-3296, Low)
  • A missing security check in the Linux kernel's implementation of the
    install_special_mapping() function could allow a local, unprivileged user
    to bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low)
  • A logic error in the orinoco_ioctl_set_auth() function in the Linux
    kernel's ORiNOCO wireless extensions support implementation could render
    TKIP countermeasures ineffective when it is enabled, as it enabled the card
    instead of shutting it down. (CVE-2010-4648, Low)
  • A missing initialization flaw was found in the ethtool_get_regs()
    function in the Linux kernel's ethtool IOCTL handler. A local user who has
    the CAP_NET_ADMIN capability could use this flaw to cause an information
    leak. (CVE-2010-4655, Low)
  • An information leak was found in the Linux kernel's task_show_regs()
    implementation. On IBM S/390 systems, a local, unprivileged user could use
    this flaw to read /proc/[PID]/status files, allowing them to discover
    the CPU register values of processes. (CVE-2011-0710, Low)

Red Hat would like to thank Jens Kuehnel for reporting CVE-2011-0695; Kees
Cook for reporting CVE-2010-4656 and CVE-2010-4655; Dan Rosenberg for
reporting CVE-2010-3296; and Tavis Ormandy for reporting CVE-2010-4346.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386

Fixes

  • BZ - 633149 - CVE-2010-3296 kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory
  • BZ - 653648 - CVE-2011-0695 kernel: panic in ib_cm:cm_work_handler
  • BZ - 662189 - CVE-2010-4346 kernel: install_special_mapping skips security_file_mmap check
  • BZ - 664914 - CVE-2010-4526 kernel: sctp: a race between ICMP protocol unreachable and connect()
  • BZ - 667907 - CVE-2010-4648 kernel: orinoco: fix TKIP countermeasure behaviour
  • BZ - 672398 - CVE-2011-0521 kernel: av7110 negative array offset
  • BZ - 672420 - CVE-2010-4656 kernel: iowarrior usb device heap overflow
  • BZ - 672428 - CVE-2010-4655 kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl
  • BZ - 677850 - CVE-2011-0710 kernel: s390 task_show_regs infoleak
  • BZ - 678169 - CVE-2011-0716 kernel: deficiency in processing igmp host membership reports in br_multicast
  • BZ - 678558 - virtio_console driver never returns from selecting for write when the queue is full [rhel-6.0.z]
  • BZ - 678559 - Disallow 0-sized writes to virtio ports to go through to host (leading to VM crash) [rhel-6.0.z]
  • BZ - 678562 - writing to a virtio serial port while no one is listening on the host side hangs the guest [rhel-6.0.z]
  • BZ - 680080 - Start multi RHEL5.5 64 bit guests triggers rtl8169_interrupt hang [rhel-6.0.z]
  • BZ - 683442 - backport set_iounmap_nonlazy() to speedup reading of /proc/vmcore [rhel-6.0.z]
  • BZ - 683445 - Backport upstream cacheing fix for optimizing reads from /proc/vmcore [rhel-6.0.z]
  • BZ - 683781 - kvm: guest stale memory after migration [rhel-6.0.z]
  • BZ - 683783 - guest kernel panic when boot with nmi_watchdog=1 [rhel-6.0.z]
  • BZ - 683822 - kernel: restrict unprivileged access to kernel syslog [rhel-6.1] [rhel-6.0.z]
  • BZ - 684267 - kernel: missing CONFIG_STRICT_DEVMEM=y in S390x [rhel-6.0.z]
  • BZ - 684268 - virtio_net: missing schedule on oom [rhel-6.0.z]
  • BZ - 691270 - CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse

CVEs

  • CVE-2010-3296
  • CVE-2010-4526
  • CVE-2010-4655
  • CVE-2011-0521
  • CVE-2010-4346
  • CVE-2010-4656
  • CVE-2010-4648
  • CVE-2011-0695
  • CVE-2011-1478
  • CVE-2011-0716
  • CVE-2011-0710

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0421
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux Workstation 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux Desktop 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
s390x
kernel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 22da8ce0315583ac02639cc3e3bc9fca66b85df5e9643b5f2fe655be15476325
kernel-debug-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 8fb3df8dc37459f91781aaa580777cd9904cabff3da2be8f06e3e162794ec7ed
kernel-debug-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 89d71e0acd4a3249da864f25122be7a2f9f470a3b55ab3f79801c94759eb1145
kernel-debug-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 68703099cb4a25352abcd29e6e25eb127c14144bbeb8063ce3ffc423e22c87b1
kernel-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: eb7a2e81a075f60bff3975bffd336d2790b972352ad9d83be08f897d995d9f23
kernel-debuginfo-common-s390x-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 48b5b65c57e5bc30b5f0ecbfed9fb1a00813eb3fe060521b051b3f0f434826c3
kernel-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 993e46e7d653ae375579852bf34e511e7dae318c289594fd09ea35545a74de34
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 088b02f9480ec37cf5914a48049f4cf62ed80ce2f8624f0f093c613b6ff00d37
kernel-kdump-2.6.32-71.24.1.el6.s390x.rpm SHA-256: c9984aff4d289884bd9efabf278fccc85e3bf9f7672ce874bcc62cdff4b59c4d
kernel-kdump-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: b379261ef78dcc19260a943ca418acc9de3e263b183bf3315851ed309bf82869
kernel-kdump-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 893045560f442189e41f34389a4bf931aad78005b6d69a900e5b4f71953ec0c5
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux for Power, big endian 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
ppc64
kernel-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: b8ea81fe8253717eec181157d43d52927e3134d64c895f2a080740665f54fa23
kernel-bootwrapper-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 7fbd31f712e15d1e3818f1f45b772271420184cd9958ec07c7b2be04a42405ea
kernel-debug-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 92b639659c33daf98752963c052491c5297dcbd55986eb9085a4c84cd519cb32
kernel-debug-debuginfo-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: c942c9e188537689446c67ea0adfb25e7d9b5212e62840e3f1146f09e4ab180b
kernel-debug-devel-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 5256ecda6da13649efe21a9e2ea791e59206764f7e6c6349cd160144980d42c3
kernel-debuginfo-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 707168dd558e4407fd5c9e8786212768be5ffe67603c3d2f5f5b8dac7aa99ab2
kernel-debuginfo-common-ppc64-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 76c07bc75ce2e8bdca7d5a66ab36cfeba3201f7cd3dde05daa032c0f5c278a79
kernel-devel-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 741f4055e4fd33a5c1cc29cc14d2ae09a10b825bb90648f46dd1cb9e3f541186
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 8d86a6263482b9d16d6c8e9e1756c9bbf9e2104a20cb7abc7d04e2102ee62b9e
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux Server from RHUI 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+