Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:0421 - Security Advisory
Issued:
2011-04-07
Updated:
2011-04-07

RHSA-2011:0421 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the sctp_icmp_proto_unreachable() function in the

Linux kernel's Stream Control Transmission Protocol (SCTP) implementation.
A remote attacker could use this flaw to cause a denial of service.
(CVE-2010-4526, Important)

  • A missing boundary check was found in the dvb_ca_ioctl() function in the

Linux kernel's av7110 module. On systems that use old DVB cards that
require the av7110 module, a local, unprivileged user could use this flaw
to cause a denial of service or escalate their privileges. (CVE-2011-0521,
Important)

  • A race condition was found in the way the Linux kernel's InfiniBand

implementation set up new connections. This could allow a remote user to
cause a denial of service. (CVE-2011-0695, Important)

  • A heap overflow flaw in the iowarrior_write() function could allow a

user with access to an IO-Warrior USB device, that supports more than 8
bytes per report, to cause a denial of service or escalate their
privileges. (CVE-2010-4656, Moderate)

  • A flaw was found in the way the Linux Ethernet bridge implementation

handled certain IGMP (Internet Group Management Protocol) packets. A local,
unprivileged user on a system that has a network interface in an Ethernet
bridge could use this flaw to crash that system. (CVE-2011-0716, Moderate)

  • A NULL pointer dereference flaw was found in the Generic Receive Offload

(GRO) functionality in the Linux kernel's networking implementation. If
both GRO and promiscuous mode were enabled on an interface in a virtual LAN
(VLAN), it could result in a denial of service when a malformed VLAN frame
is received on that interface. (CVE-2011-1478, Moderate)

  • A missing initialization flaw in the Linux kernel could lead to an

information leak. (CVE-2010-3296, Low)

  • A missing security check in the Linux kernel's implementation of the

install_special_mapping() function could allow a local, unprivileged user
to bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low)

  • A logic error in the orinoco_ioctl_set_auth() function in the Linux

kernel's ORiNOCO wireless extensions support implementation could render
TKIP countermeasures ineffective when it is enabled, as it enabled the card
instead of shutting it down. (CVE-2010-4648, Low)

  • A missing initialization flaw was found in the ethtool_get_regs()

function in the Linux kernel's ethtool IOCTL handler. A local user who has
the CAP_NET_ADMIN capability could use this flaw to cause an information
leak. (CVE-2010-4655, Low)

  • An information leak was found in the Linux kernel's task_show_regs()

implementation. On IBM S/390 systems, a local, unprivileged user could use
this flaw to read /proc/[PID]/status files, allowing them to discover
the CPU register values of processes. (CVE-2011-0710, Low)

Red Hat would like to thank Jens Kuehnel for reporting CVE-2011-0695; Kees
Cook for reporting CVE-2010-4656 and CVE-2010-4655; Dan Rosenberg for
reporting CVE-2010-3296; and Tavis Ormandy for reporting CVE-2010-4346.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 633149 - CVE-2010-3296 kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory
  • BZ - 653648 - CVE-2011-0695 kernel: panic in ib_cm:cm_work_handler
  • BZ - 662189 - CVE-2010-4346 kernel: install_special_mapping skips security_file_mmap check
  • BZ - 664914 - CVE-2010-4526 kernel: sctp: a race between ICMP protocol unreachable and connect()
  • BZ - 667907 - CVE-2010-4648 kernel: orinoco: fix TKIP countermeasure behaviour
  • BZ - 672398 - CVE-2011-0521 kernel: av7110 negative array offset
  • BZ - 672420 - CVE-2010-4656 kernel: iowarrior usb device heap overflow
  • BZ - 672428 - CVE-2010-4655 kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl
  • BZ - 677850 - CVE-2011-0710 kernel: s390 task_show_regs infoleak
  • BZ - 678169 - CVE-2011-0716 kernel: deficiency in processing igmp host membership reports in br_multicast
  • BZ - 678558 - virtio_console driver never returns from selecting for write when the queue is full [rhel-6.0.z]
  • BZ - 678559 - Disallow 0-sized writes to virtio ports to go through to host (leading to VM crash) [rhel-6.0.z]
  • BZ - 678562 - writing to a virtio serial port while no one is listening on the host side hangs the guest [rhel-6.0.z]
  • BZ - 680080 - Start multi RHEL5.5 64 bit guests triggers rtl8169_interrupt hang [rhel-6.0.z]
  • BZ - 683442 - backport set_iounmap_nonlazy() to speedup reading of /proc/vmcore [rhel-6.0.z]
  • BZ - 683445 - Backport upstream cacheing fix for optimizing reads from /proc/vmcore [rhel-6.0.z]
  • BZ - 683781 - kvm: guest stale memory after migration [rhel-6.0.z]
  • BZ - 683783 - guest kernel panic when boot with nmi_watchdog=1 [rhel-6.0.z]
  • BZ - 683822 - kernel: restrict unprivileged access to kernel syslog [rhel-6.1] [rhel-6.0.z]
  • BZ - 684267 - kernel: missing CONFIG_STRICT_DEVMEM=y in S390x [rhel-6.0.z]
  • BZ - 684268 - virtio_net: missing schedule on oom [rhel-6.0.z]
  • BZ - 691270 - CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse

CVEs

  • CVE-2010-3296
  • CVE-2010-4526
  • CVE-2010-4655
  • CVE-2011-0521
  • CVE-2010-4346
  • CVE-2010-4656
  • CVE-2010-4648
  • CVE-2011-0695
  • CVE-2011-1478
  • CVE-2011-0716
  • CVE-2011-0710

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0421
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux Workstation 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux Desktop 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
s390x
kernel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 22da8ce0315583ac02639cc3e3bc9fca66b85df5e9643b5f2fe655be15476325
kernel-debug-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 8fb3df8dc37459f91781aaa580777cd9904cabff3da2be8f06e3e162794ec7ed
kernel-debug-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 89d71e0acd4a3249da864f25122be7a2f9f470a3b55ab3f79801c94759eb1145
kernel-debug-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 68703099cb4a25352abcd29e6e25eb127c14144bbeb8063ce3ffc423e22c87b1
kernel-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: eb7a2e81a075f60bff3975bffd336d2790b972352ad9d83be08f897d995d9f23
kernel-debuginfo-common-s390x-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 48b5b65c57e5bc30b5f0ecbfed9fb1a00813eb3fe060521b051b3f0f434826c3
kernel-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 993e46e7d653ae375579852bf34e511e7dae318c289594fd09ea35545a74de34
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 088b02f9480ec37cf5914a48049f4cf62ed80ce2f8624f0f093c613b6ff00d37
kernel-kdump-2.6.32-71.24.1.el6.s390x.rpm SHA-256: c9984aff4d289884bd9efabf278fccc85e3bf9f7672ce874bcc62cdff4b59c4d
kernel-kdump-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: b379261ef78dcc19260a943ca418acc9de3e263b183bf3315851ed309bf82869
kernel-kdump-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 893045560f442189e41f34389a4bf931aad78005b6d69a900e5b4f71953ec0c5
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux for Power, big endian 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
ppc64
kernel-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: b8ea81fe8253717eec181157d43d52927e3134d64c895f2a080740665f54fa23
kernel-bootwrapper-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 7fbd31f712e15d1e3818f1f45b772271420184cd9958ec07c7b2be04a42405ea
kernel-debug-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 92b639659c33daf98752963c052491c5297dcbd55986eb9085a4c84cd519cb32
kernel-debug-debuginfo-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: c942c9e188537689446c67ea0adfb25e7d9b5212e62840e3f1146f09e4ab180b
kernel-debug-devel-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 5256ecda6da13649efe21a9e2ea791e59206764f7e6c6349cd160144980d42c3
kernel-debuginfo-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 707168dd558e4407fd5c9e8786212768be5ffe67603c3d2f5f5b8dac7aa99ab2
kernel-debuginfo-common-ppc64-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 76c07bc75ce2e8bdca7d5a66ab36cfeba3201f7cd3dde05daa032c0f5c278a79
kernel-devel-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 741f4055e4fd33a5c1cc29cc14d2ae09a10b825bb90648f46dd1cb9e3f541186
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.ppc64.rpm SHA-256: 8d86a6263482b9d16d6c8e9e1756c9bbf9e2104a20cb7abc7d04e2102ee62b9e
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux Server from RHUI 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
x86_64
kernel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: ec98083fe165d8e9326aa8e6d689ebafb6f80f4213647e2b21b607c826ed2299
kernel-debug-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 7474a17018f870dab8dcdd68d1383be9b6925c7fd63ff611b225cbdc2b303564
kernel-debug-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 5acbe7862da3440941fd50a0ed4256974d5cc4b7d7eac242d82db870eaaeb857
kernel-debug-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: b0881aec7d189a0a035dc7a47bb479fb5a0384aee3ce7844c2cc95fad98f7310
kernel-debuginfo-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 0e26b960165ed5120786239aeec302cc43b6a1687bc9498e4e5f9b2644a98ca4
kernel-debuginfo-common-x86_64-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: d1008cd6f6664cf169eacd3d4379607ddc826283a86a33103847d9a3a6e80e22
kernel-devel-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 88c793dd158918f03eec415df9a271f1186991e6e61e15c3b438c6300cf82ab8
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.x86_64.rpm SHA-256: 930c12930f940cf6c3d5cf839263f012ffb831a59b04c16b082c9a198b82c019
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830
i386
kernel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 614bee0377e3fa0324c8ad4536ea84ddf6fe058177f5f7f52e7cea01a77e7512
kernel-debug-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3f3455130eada97e735593ccfc3171a2f69ee2fcfc7b79ae69cc7befb5edc0d6
kernel-debug-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: 83bc5d4b1ac8740da1b0d6f300011cc7e063b43888774f1b15c36e081e252e91
kernel-debug-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: 7fe1a1d5229866adc3422826f08636faf17065bb80ec01e75a6532eabe2dbdaa
kernel-debuginfo-2.6.32-71.24.1.el6.i686.rpm SHA-256: f30e1e79abc305f562d9330724221f8947fea8c35ae77992534d1f5e3476c138
kernel-debuginfo-common-i686-2.6.32-71.24.1.el6.i686.rpm SHA-256: 3b37b7909b4873e983cb0d33ee15674b10f911017585b4b8101f8e00a8b2fa23
kernel-devel-2.6.32-71.24.1.el6.i686.rpm SHA-256: da2a567b3e25a81abf84457b35fdfeee6bb7d0bdcc56c16bd012a226b5fa61bd
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.i686.rpm SHA-256: dc634e3f1cc601f32c8c132b316ca9e552d15925bab30c9d3508050c2517a05b
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
kernel-2.6.32-71.24.1.el6.src.rpm SHA-256: 460de57fa1d8fc8760cd56d47bea2720c8d892ea25a1c33190eada67d2828ab0
s390x
kernel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 22da8ce0315583ac02639cc3e3bc9fca66b85df5e9643b5f2fe655be15476325
kernel-debug-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 8fb3df8dc37459f91781aaa580777cd9904cabff3da2be8f06e3e162794ec7ed
kernel-debug-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 89d71e0acd4a3249da864f25122be7a2f9f470a3b55ab3f79801c94759eb1145
kernel-debug-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 68703099cb4a25352abcd29e6e25eb127c14144bbeb8063ce3ffc423e22c87b1
kernel-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: eb7a2e81a075f60bff3975bffd336d2790b972352ad9d83be08f897d995d9f23
kernel-debuginfo-common-s390x-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 48b5b65c57e5bc30b5f0ecbfed9fb1a00813eb3fe060521b051b3f0f434826c3
kernel-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 993e46e7d653ae375579852bf34e511e7dae318c289594fd09ea35545a74de34
kernel-doc-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 1af94f5c8f24dda9c51e5abcea7b7a99ad3248e91662486cd09de6e45513e066
kernel-firmware-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 5bd7994a06cec3ac5b17f59727f9ad5aab000e534e63faab938ada8b69190e78
kernel-headers-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 088b02f9480ec37cf5914a48049f4cf62ed80ce2f8624f0f093c613b6ff00d37
kernel-kdump-2.6.32-71.24.1.el6.s390x.rpm SHA-256: c9984aff4d289884bd9efabf278fccc85e3bf9f7672ce874bcc62cdff4b59c4d
kernel-kdump-debuginfo-2.6.32-71.24.1.el6.s390x.rpm SHA-256: b379261ef78dcc19260a943ca418acc9de3e263b183bf3315851ed309bf82869
kernel-kdump-devel-2.6.32-71.24.1.el6.s390x.rpm SHA-256: 893045560f442189e41f34389a4bf931aad78005b6d69a900e5b4f71953ec0c5
perf-2.6.32-71.24.1.el6.noarch.rpm SHA-256: 9d862450092cae305acabcdd16482b65e1d1fa4c6799a70dfceaedf51864c830

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter