- Issued:
- 2011-05-19
- Updated:
- 2011-05-19
RHSA-2011:0542 - Security Advisory
Synopsis
Important: Red Hat Enterprise Linux 6.1 kernel security, bug fix and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix multiple security issues, address several
hundred bugs and add numerous enhancements are now available as part of the
ongoing support and maintenance of Red Hat Enterprise Linux version 6. This
is the first regular update.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
- Multiple buffer overflow flaws were found in the Linux kernel's
Management Module Support for Message Passing Technology (MPT) based
controllers. A local, unprivileged user could use these flaws to cause a
denial of service, an information leak, or escalate their privileges.
(CVE-2011-1494, CVE-2011-1495, Important)
- A flaw was found in the Linux kernel's Ethernet bonding driver
implementation. Packets coming in from network devices that have more
than 16 receive queues to a bonding interface could cause a denial of
service. (CVE-2011-1581, Important)
- A flaw was found in the Linux kernel's networking subsystem. If the
number of packets received exceeded the receiver's buffer limit, they were
queued in a backlog, consuming memory, instead of being discarded. A remote
attacker could abuse this flaw to cause a denial of service (out-of-memory
condition). (CVE-2010-4251, Moderate)
- A flaw was found in the Linux kernel's Transparent Huge Pages (THP)
implementation. A local, unprivileged user could abuse this flaw to allow
the user stack (when it is using huge pages) to grow and cause a denial of
service. (CVE-2011-0999, Moderate)
- A flaw was found in the transmit methods (xmit) for the loopback and
InfiniBand transports in the Linux kernel's Reliable Datagram Sockets (RDS)
implementation. A local, unprivileged user could use this flaw to cause a
denial of service. (CVE-2011-1023, Moderate)
- A flaw in the Linux kernel's Event Poll (epoll) implementation could
allow a local, unprivileged user to cause a denial of service.
(CVE-2011-1082, Moderate)
- An inconsistency was found in the interaction between the Linux kernel's
method for allocating NFSv4 (Network File System version 4) ACL data and
the method by which it was freed. This inconsistency led to a kernel panic
which could be triggered by a local, unprivileged user with files owned by
said user on an NFSv4 share. (CVE-2011-1090, Moderate)
- A missing validation check was found in the Linux kernel's
mac_partition() implementation, used for supporting file systems created
on Mac OS operating systems. A local attacker could use this flaw to cause
a denial of service by mounting a disk that contains specially-crafted
partitions. (CVE-2011-1010, Low)
- A buffer overflow flaw in the DEC Alpha OSF partition implementation in
the Linux kernel could allow a local attacker to cause an information leak
by mounting a disk that contains specially-crafted partition tables.
(CVE-2011-1163, Low)
- Missing validations of null-terminated string data structure elements in
the do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(),
and do_arpt_get_ctl() functions could allow a local user who has the
CAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170,
CVE-2011-1171, CVE-2011-1172, Low)
Red Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and
CVE-2011-1495; Nelson Elhage for reporting CVE-2011-1082; Timo Warns for
reporting CVE-2011-1010 and CVE-2011-1163; and Vasiliy Kulikov for
reporting CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172.
This update also fixes several hundred bugs and adds enhancements. Refer to
the Red Hat Enterprise Linux 6.1 Release Notes for information on the most
significant of these changes, and the Technical Notes for further
information, both linked to in the References.
All Red Hat Enterprise Linux 6 users are advised to install these updated
packages, which correct these issues, and fix the bugs and add the
enhancements noted in the Red Hat Enterprise Linux 6.1 Release Notes and
Technical Notes. The system must be rebooted for this update to take
effect.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
Fixes
- BZ - 463842 - [LTC 6.0 FEAT] 201227:NFS over RDMA support
- BZ - 519467 - new ext4 ioctls, tunables etc undocumented
- BZ - 550724 - xen PV guest kernel 2.6.32 processes lock up in D state
- BZ - 583064 - Virtio Net/Disk block devices get wrong parent in node device info
- BZ - 588638 - [abrt] crash in kernel: Your BIOS is broken; DMAR reported at address fed90000 returns all ones!
- BZ - 590404 - Garbled image with zc3xx-based webcam
- BZ - 591335 - IPv6 tproxy support is not present in RHEL 6 Beta
- BZ - 591466 - [abrt] WARNING: at fs/buffer.c:1159 mark_buffer_dirty+0x82/0xa0()
- BZ - 593766 - ACPI Error: Illegal I/O port address/length above 64K
- BZ - 597333 - CDTRDSR missing from <asm/termios.h>
- BZ - 601849 - bonding: backport code to allow user-controlled output slave detection.
- BZ - 607262 - Read from /proc/xen/xenbus does not honor O_NONBLOCK
- BZ - 610237 - [6u0] Bonding in ALB mode sends ARP in loop
- BZ - 612436 - udevd report unexpected exit when guest boot up with nmi_watchdog = 1 and using debugfs tracing KVM (AMD)
- BZ - 616105 - problems with 64b division on 32b platforms.
- BZ - 616296 - guest kernel panic when boot with nmi_watchdog=1
- BZ - 616660 - mrg buffers: migration breaks between systems with/without vhost
- BZ - 617199 - make exclusively owned pages belong to the local anon_vma on swapin
- BZ - 618175 - cifs: NT_STATUS_MEDIA_WRITE_PROTECTED not being mapped appropriately to POSIX error
- BZ - 618440 - jbd2/ocfs2: Fix block checksumming when a buffer is used in several transactions
- BZ - 618602 - core_pattern handler truncates parameters
- BZ - 619426 - RHEL UV: kernel patch for kexec
- BZ - 619430 - Intel HDA audio: popping/clicking sound distortion
- BZ - 619455 - Host kernel oops after a series of virsh {attach,detach}-device
- BZ - 621103 - backport wireless 2.6.32-longterm fixes
- BZ - 622575 - networking may go away after migration due to missing arp update
- BZ - 623199 - Bonded and vlan tagged network does not work in KVM guest
- BZ - 623201 - [RHEL6][Kernel] BUG: spinlock wrong CPU on CPU#2, modprobe/713 (Not tainted)
- BZ - 623968 - K10 temp support in lm_sensors
- BZ - 624069 - Upgrading NFS client to 2.6.36 release.
- BZ - 624628 - read from virtio-serial returns if the host side is not connect to pipe
- BZ - 625173 - [RHEL6][Kernel] FATAL: Error inserting ipv6, Cannot allocate memory, causes panic
- BZ - 626561 - GFS2: [RFE] fallocate support for GFS2
- BZ - 626989 - block IO controller: Pull in Group idle tunable patches from upstream
- BZ - 627926 - [RHEL6.0] e1000e devices fail to initialize interrupts properly
- BZ - 627958 - be2net: A bad assert in processing async messages from NIC
- BZ - 628805 - Fix hot-unplug handling of virtio-console ports
- BZ - 629178 - kernel: Problem with execve(2) reintroduced [rhel-6.1]
- BZ - 629197 - i8259 state is corrupted during migration
- BZ - 629418 - modpost segmentation fault
- BZ - 629423 - module signing failing on cross-builds due to linker misuse
- BZ - 629629 - groups_search() cannot handle large gid correctly
- BZ - 629715 - kernel ABI whitelist request for kspice-usb driver [Red Hat]
- BZ - 629920 - GFS1 vs GFS2 performance issue
- BZ - 630562 - kernel: additional stack guard patches [rhel-6.1]
- BZ - 631833 - Big performance regression found on connect/request/response test through IPSEC (openswan) transport
- BZ - 632021 - Cannot unplug emulated ide and rtl8139 devices in RHEL6 HVM xen guest
- BZ - 632631 - block: fix s390 tape block driver crash that occurs when it switches the IO scheduler
- BZ - 632745 - [6.1 FEAT] KVM Network Performance: mergeable rx buffers support in vhost-net
- BZ - 633825 - kswapd0 100%
- BZ - 634100 - migrate_cancel under STRESS caused guest to hang
- BZ - 634232 - PATCH: virtio_console: Fix poll blocking even though there is data to read
- BZ - 634303 - audit filtering on selinux label of userspace audit messages
- BZ - 634316 - tg3: Disable TSS
- BZ - 635041 - GFS2: inode glock stuck without holder
- BZ - 635535 - Disallow 0-sized writes to virtio ports to go through to host (leading to VM crash)
- BZ - 635537 - Disable lseek(2) for virtio ports
- BZ - 635539 - WinXP BSOD when boot up with -cpu Penryn
- BZ - 635853 - ptrace: the tracee can get the extra trap after PTRACE_DETACH
- BZ - 636291 - [LSI 6.1 bug] RHEL 6.0 iSCSI offload (cxgb3i) sessions do not log back in after several controller reset cycles [LSI CR184419]
- BZ - 636906 - 32bit compat vectored aio routines are broken
- BZ - 636994 - [NetApp 6.1 bug] SCSI ALUA handler fails to handle ALUA transitioning properly
- BZ - 637278 - Bug fixes to the 2.6.36 NFS Client
- BZ - 637279 - Bug fixes to the 2.6.36 NFS Server
- BZ - 637972 - GFS2: Not enough space reserved in gfs2_write_begin and possibly elsewhere.
- BZ - 638133 - Panic when inserting tcrypt in fips mode
- BZ - 638176 - Replies to broadcast SNMP and NetBIOS queries are dropped
- BZ - 638269 - NFS4 clients cannot reclaim locks after server reboot
- BZ - 638657 - GFS2 fatal: filesystem consistency error on rename
- BZ - 639815 - Ensure we detect removed symbols in check-kabi
- BZ - 640690 - Bonded interface doesn't issue IGMP report (join) on slave interface during failover
- BZ - 641315 - Backport upstream cacheing fix for optimizing reads from /proc/vmcore
- BZ - 642206 - /proc/bus/usb/devices formatting error
- BZ - 643236 - iscsi: get nopout and conn errors.
- BZ - 643237 - [NetApp 6.1 bug] regression: allow offlined devs to be set to running
- BZ - 643290 - sysctl: bad user of proc_doulongvec_minmax() can oops the kernel
- BZ - 643750 - virtio_console driver never returns from selecting for write when the queue is full
- BZ - 643751 - writing to a virtio serial port while no one is listening on the host side hangs the guest
- BZ - 644903 - Kernel divide by zero in find_busiest_group
- BZ - 644987 - Enable extraction of hugepage pfn(s) from /proc/<pid>/pagemap
- BZ - 645287 - [PATCH] fix size checks for mmap() on /proc/bus/pci files
- BZ - 645793 - Backport support for TCP thin-streams
- BZ - 645800 - Expose hw packet timestamps to network packet capture utilities - backport from 2.6.36
- BZ - 645824 - ext4: Don't error out the fs if the user tries to make a file too big
- BZ - 645898 - [6.1 FEAT] Port KVM bug fixes for cr_access to RHEL 6
- BZ - 646223 - cifs: multiuser mount support
- BZ - 646369 - [kvm] VIRT-IO NIC state is reported as 'unknown' on vm running over RHEL6 host
- BZ - 646384 - kernel BUG at mm/migrate.c:113!
- BZ - 646498 - [6.0] write system call returns with 0 when it should return with EFBIG.
- BZ - 646505 - Kernel warning at boot: i7core_edac: probe of 0000:80:14.0 failed with error -22
- BZ - 647334 - Allow KSM to split hugepages
- BZ - 647367 - kvm: guest stale memory after migration
- BZ - 647440 - install_process_keyring() may return wrong error code
- BZ - 648632 - ext4: writeback performance fixes
- BZ - 649248 - ethtool: Provide a default implementation of ethtool_ops::get_drvinfo
- BZ - 651005 - Excessive fpu swap entering and exiting kvm from host userspace
- BZ - 651021 - Enable discard/UNMAP/WRITE_SAME for enterprise class arrays
- BZ - 651332 - RHEL6.1: EHCI: AMD periodic frame list table quirk
- BZ - 651373 - NULL pointer dereference in reading vs. truncating race
- BZ - 651584 - GFS2: BUG_ON kernel panic in gfs2_glock_hold on 2.6.18-226
- BZ - 651639 - On AMD host, running an F14 guest with 2 cores assigned hangs for "a long time" (several 10's of minutes) at start of boot
- BZ - 651865 - cifs: bug fixes for 6.1
- BZ - 651878 - cifs: mfsymlinks support
- BZ - 652013 - If EXT4_EXTENTS_FL flag is not set, the max file size of write() is different than seek().
- BZ - 652371 - temporary loss of path to SAN results in persistent EIO with msync
- BZ - 653066 - Upgrading NFS client to 2.6.37 release
- BZ - 653068 - Upgrading NFS server to 2.6.37 release
- BZ - 653245 - kernel: restrict unprivileged access to kernel syslog [rhel-6.1]
- BZ - 654532 - Guest BSOD during installation
- BZ - 654665 - EFI/UEFI page table initialization is incorrect for x86_64 in physical mode.
- BZ - 655231 - kernel 2.6.32-84.el6 breaks systemtap
- BZ - 655521 - e1000 driver tracebacks when running under VMware ESX4
- BZ - 655718 - Win2008 and Win7 fail to load files at the beginning of installation
- BZ - 655875 - jbd2_stats_proc_init has wrong location.
- BZ - 655889 - kabitool blocks custom kernel builds when kernel version > 2.6.18-53.1.21.el5
- BZ - 655935 - [Emulex 6.1] Update lpfc driver to 8.3.5.28
- BZ - 656042 - [RFE] Include autogroup patch to aid in automatic creation of cgroups
- BZ - 656461 - cifs: fix problems with filehandle management and reporting of writeback errors
- BZ - 656835 - Memory leak in virtio-console driver if driver probe routine fails
- BZ - 656939 - GFS2: [RFE] glock scalability patches
- BZ - 657261 - Guest kernels need 'noapic' to get kexec working with virtio-blk
- BZ - 657303 - CVE-2010-4251 kernel: unlimited socket backlog DoS
- BZ - 657553 - [xfstests 243] ext4 incosistency with EOFBLOCK_FL
- BZ - 658248 - [Emulex 6.1 feat] add BSG and FC Transport patches from Upstream
- BZ - 658437 - guest kernel panic when transfering file from host to guest during migration
- BZ - 658482 - block IO controller: Allow creation of cgroup hierarchies
- BZ - 658518 - neighbour update causes an Oops when using tunnel device
- BZ - 658590 - GFS2: Use 512 B block sizes to communicate with userland quota tools
- BZ - 659119 - khugepaged numa memcg minor memleak
- BZ - 659137 - GFS2: Kernel changes necessary to allow growing completely full filesystems.
- BZ - 659480 - UV: WAR for interrupt-IOPort deadlock
- BZ - 660674 - (Mellanox) Add CX3 PCI IDs to mlx4 driver
- BZ - 660680 - iw_cxgb3 advertises incorrect max cq depth causing stalls on large MPI clusters
- BZ - 661048 - fsck.gfs2 reported statfs error after gfs2_grow
- BZ - 661172 - MCP55 message on screen at boot even with quiet
- BZ - 662125 - lldpad is generating selinux errors on 6.0-RC-4.
- BZ - 662589 - nfs4 callback from client returned to wrong address
- BZ - 662660 - OS halt on the login screen
- BZ - 662782 - Bug fixes to the 2.6.37 NFS Client
- BZ - 663042 - gfs2 FIEMAP oops
- BZ - 663119 - [Emulex 6.1 feat] Update lpfc driver to 8.3.5.30
- BZ - 663222 - [Cisco 6.1 bug] Fix memory leak in fnic and bump version to 1.5.0.1
- BZ - 663280 - Update drivers/media to 2.6.38 codebase
- BZ - 663448 - Bug fixes to the 2.6.37 NFS Server
- BZ - 663538 - Add AES to CPUID ext_features recognized by kvm..
- BZ - 663749 - Btrfs: update to latest upstream
- BZ - 663755 - RHEL6 Xen domU freeze after migrate to lower (MHz) CPU
- BZ - 663864 - kernel: restrict access to /proc/kcore to just elf headers [rhel-6.1]
- BZ - 663994 - kernels don't build on make-3.82
- BZ - 664364 - [6.0] System reset when changing EFI variable on large memory system
- BZ - 664772 - THP updates from -mm
- BZ - 665110 - System panic in pskb_expand_head When arp_validate option is specified in bonding ARP monitor mode
- BZ - 665169 - kexec: limit root to call kexec_load()
- BZ - 665360 - vhost-net/kvm lacks fixes/optimizations in net-next as of Dec 23
- BZ - 665970 - KVM crashes inside SeaBIOS when attempting to boot MS-DOS
- BZ - 666264 - ftrace: kernel/trace/ring_buffer.c:1987 rb_reserve_next_event
- BZ - 667186 - Add upstream performance enhancement to reduce time page fault handler holds mmap_sem semaphore.
- BZ - 667281 - Bug for patches outside AGP/DRM required for AGP/DRM backport.
- BZ - 667328 - lib: fix vscnprintf() if @size is == 0
- BZ - 667340 - kexec: Make sure to stop all CPUs before exiting the kernel
- BZ - 667354 - PV cdrom should be disabled on HVM guests
- BZ - 667356 - xen: unplug the emulated devices at resume time
- BZ - 667359 - forward port xen pvops changes for evtchn
- BZ - 667361 - xenfs: enable for HVM domains too
- BZ - 667654 - cifs.upcall not called when mounting second CIFS share from same server using different krb5 credentials
- BZ - 667661 - [NetApp 6.1 Bug] Include new NetApp PID entry to the alua_dev_list array in the ALUA hardware handler
- BZ - 667686 - update Documentation/vm/page-types.c to latest upstream
- BZ - 668114 - fcoe fails to login with Cisco Eaglehawk switch firmware on VFC shut/no shut
- BZ - 668340 - NUMA is not recognized for nec-em25.rhts.eng.bos.redhat.com
- BZ - 668478 - PCI sysfs rom file needs owner write access
- BZ - 668825 - Server cannot boot with kernel-2.6.32-85
- BZ - 668915 - setfacl does not update ctime when changing file permission on ext3/4
- BZ - 669252 - [XEN]RHEL6 guest fail to save/restore
- BZ - 669272 - xfs: need upstream unaligned aio/dio data corruption fixes
- BZ - 669373 - ath9k: inconsistent lock state
- BZ - 669418 - khugepaged blocking on page locks
- BZ - 669737 - net: add receive functions that return GRO result codes
- BZ - 669749 - netif_vdbg() is broken, does not compile if VERBOSE_DEBUG is not defined
- BZ - 669773 - disable NUMA for Xen PV guests
- BZ - 669787 - Additional upstream functions that make backporting easier
- BZ - 669813 - [Broadcom 6.1 feat] bnx2: Update firmware to 6.2.1+
- BZ - 669877 - GFS2: Blocks not marked free on delete
- BZ - 670063 - pages stuck in ksm pages_volatile
- BZ - 670572 - [NetApp 6.0 Bug] Erroneous TPG ID check in SCSI ALUA Handler
- BZ - 670734 - kernel panic at __rpc_create_common() when mounting nfs
- BZ - 670907 - [RHEL6.1][Kernel] BUG: unable to handle kernel NULL pointer dereference, IP: [<ffffffff814115f0>] get_rps_cpu+0x290/0x340
- BZ - 671147 - xen 64-bit PV guests fail to save-restore with kernels >= -95
- BZ - 671161 - xen microcode WARN on save-restore
- BZ - 671267 - GFS2: allow gfs2 to update quota usage through quotactl
- BZ - 671477 - [RHEL6.1] possible vmalloc_sync_all() bug
- BZ - 672234 - add POLLPRI to sock_def_readable()
- BZ - 672305 - Repeatable NFS mount hang
- BZ - 672600 - GFS2: recovery stuck on transaction lock
- BZ - 672844 - section mismatch due to wrong annotation of hugetlb_sysfs_add_hstate()
- BZ - 672937 - backport set_iounmap_nonlazy() to speedup reading of /proc/vmcore
- BZ - 673496 - DOMU-HVM FULLVIRT Guest issue
- BZ - 673532 - sfc: the rss_cpus module parameter is ignored
- BZ - 674064 - [RHEL6] panic in scsi_init_io() during connectathon
- BZ - 674147 - SPECsfs NFS V3 workload on RHEL6 running kernels 2.6.32-85 have a massive performance regression due to compact-kswap behavior
- BZ - 674286 - mmapping a read only file on a gfs2 filesystem incorrectly acquires an exclusive glock
- BZ - 674409 - usb: latest xhci fixes
- BZ - 675102 - kernel-headers 2.6.32-112.el6 broken
- BZ - 675270 - GFS2: Fails to clear glocks during unmount
- BZ - 675294 - [RHEL6.1] s/390x hang while running LTP test
- BZ - 675299 - 'tail -f' waits forever for inotify
- BZ - 675304 - Fix potential deadlock in intel-iommu
- BZ - 675745 - GFS2: panics on quotacheck update
- BZ - 675815 - Back port Bug fixes from the 2.6.38 NFS Client to the RHEL6 Client
- BZ - 675998 - /dev/crash does not require CAP_SYS_RAWIO for access
- BZ - 676009 - xen fix save/restore: unmask event channel for IRQF_TIMER
- BZ - 676099 - ip_gre module throws slab corruption errors upon removal from the kernel
- BZ - 676134 - [Cisco 6.1 Bug Fix] enic: Update enic driver to latest upstream version 2.1.1.10
- BZ - 676346 - drivers/xen/events.c clean up section mismatch warning
- BZ - 676579 - virtio_net: missing schedule on oom
- BZ - 676875 - ixgbe: update to 3.0.12-k2 causing a panic on boot
- BZ - 676948 - [RFE][6.1] sched: Try not to migrate higher priority RT tasks
- BZ - 677314 - system_reset cause KVM internal error. Suberror: 2
- BZ - 677532 - [kdump] WARNING: at kernel/watchdog.c:229 watchdog_overflow_callback+0xa9/0xd0() (Not tainted
- BZ - 677786 - Panic in get_rps_cpu+0x1ad/0x320 on kvm guest when attempting to run LTP containers test.
- BZ - 678067 - qeth: allow channel path changes in recovery
- BZ - 678209 - CVE-2011-0999 kernel: thp: prevent hugepages during args/env copying into the user stack
- BZ - 678357 - online disk resizing may cause data corruption
- BZ - 678429 - [RHEL6.1] [Kernel] When booting previous kernel we are missing the firmware
- BZ - 679002 - Wifi connection speed is very slow (intel PRO/Wireless 3945ABG), caused by plcp check
- BZ - 679021 - semantic difference between mapped file counters of memcg and global VM
- BZ - 679025 - memcg: upstream backport of various race condition fixes
- BZ - 679096 - md: Do not replace request queue lock internally
- BZ - 679282 - CVE-2011-1010 kernel: fs/partitions: Validate map_count in Mac partition tables
- BZ - 679514 - qeth: remove needless IPA-commands in offline
- BZ - 680105 - [ext4/xfstests] kernel BUG at fs/jbd2/transaction.c:1027!
- BZ - 680126 - kernel: BUG: warning at drivers/char/tty_audit.c:55/tty_audit_buf_free()
- BZ - 680140 - emc_clariion error handler panics with multiple failures
- BZ - 680345 - CVE-2011-1023 kernel: BUG_ON() in rds_send_xmit()
- BZ - 681017 - 82576 stuck after PCI AER error
- BZ - 681133 - RHEL 5.6 32bit SMP guest hang at boot up
- BZ - 681306 - tape: deadlock on global work queue
- BZ - 681360 - block IO controller: Do not use kblockd workqueue for throttle work
- BZ - 681439 - [ext4/xfstests] 133 task blocked for more than 120 seconds
- BZ - 681575 - CVE-2011-1082 kernel: potential kernel deadlock when creating circular epoll file structures
- BZ - 682110 - kdump dont't work on megaraid_sas
- BZ - 682265 - [RHEL 6] libsas: flush initial device discovery before completing ->scan_finished()
- BZ - 682641 - CVE-2011-1090 kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab
- BZ - 682726 - fix skb leak in iwlwifi
- BZ - 682742 - iwlagn: Support new 5000 microcode
- BZ - 682831 - Bad ext4 sync performance on 16 TB GPT partition
- BZ - 682951 - GFS2: umount stuck on gfs2_gl_hash_clear
- BZ - 683073 - page_referenced() sometime ignores young bits with THP
- BZ - 684008 - pE for /sbin/init has special logic that makes it unboundable
- BZ - 684705 - missed unlock_page() in gfs2_write_begin()
- BZ - 684719 - Windows guests hang when rebooting with kernel-2.6.32-121.el6
- BZ - 684816 - occasional NVS 3100 X server lockups
- BZ - 684957 - RHEL6.1-Alpha: kABI breakage on UV
- BZ - 685161 - memcg: premature oom-kill with transparent huge pages
- BZ - 687918 - thp+memcg-numa: fix BUG at include/linux/mm.h:370!
- BZ - 687921 - nfsv4 server leaking struct file on every lock operation
- BZ - 688021 - CVE-2011-1163 kernel: fs/partitions: Corrupted OSF partition table infoleak
- BZ - 688547 - RHEL6.1-20110316.1 dell-pe2800 NMI received for unknown reason
- BZ - 689321 - CVE-2011-1170 ipv4: netfilter: arp_tables: fix infoleak to userspace
- BZ - 689327 - CVE-2011-1171 ipv4: netfilter: ip_tables: fix infoleak to userspace
- BZ - 689345 - CVE-2011-1172 ipv6: netfilter: ip6_tables: fix infoleak to userspace
- BZ - 689551 - cfq-iosched: Fix a potential crash upon frequent group weight change
- BZ - 689566 - mark drivers as tech preview
- BZ - 690224 - Veritas SF 5.1 disagrees about version of symbol aio_complete
- BZ - 690754 - NFS4 with sec=krb5 does not work with 6.1 beta
- BZ - 690865 - kernel BUG at drivers/gpu/drm/i915/i915_gem.c:4238!
- BZ - 690900 - slab corruption after seeing some nfs-related BUG: warning
- BZ - 690921 - Fix compaction deadlock with SLUB and loop over tmpfs
- BZ - 691339 - RHEL6.1 HVM guest with hda+hdc or hdb+hdd crashes; plus hdb/hdd are mapped incorrectly to xvde
- BZ - 692515 - sha512hmac expects different checksum, fails on PPC64
- BZ - 694021 - CVE-2011-1494 CVE-2011-1495 kernel: drivers/scsi/mpt2sas: prevent heap overflows
- BZ - 695585 - [regression] fix be2iscsi rmmod
- BZ - 696029 - CVE-2011-1581 kernel: bonding: Incorrect TX queue offset
- BZ - 696275 - [Broadcom 6.1 feat] Support bnx2i hba-mode and non-hba mode for boot in kernel
- BZ - 696337 - Bond interface flapping and increasing rx_missed_errors
- BZ - 696376 - server BUG() on receipt of bad NFSv4 lock request
CVEs
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
x86_64 | |
kernel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 02cf7fffb9b75ab89b1040285a19a4bc37f11c40c08ec81a3fcdff99dacf9304 |
kernel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 02cf7fffb9b75ab89b1040285a19a4bc37f11c40c08ec81a3fcdff99dacf9304 |
kernel-debug-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7a0bd3da834dd9cc265b246083957453129dde9f82f22b5bc46206fa06acdf16 |
kernel-debug-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7a0bd3da834dd9cc265b246083957453129dde9f82f22b5bc46206fa06acdf16 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: a5fbdd584062d528140736d04561c342d5f2a8f5d9aed8dbb2ad59e8f5e8b5ca |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: a5fbdd584062d528140736d04561c342d5f2a8f5d9aed8dbb2ad59e8f5e8b5ca |
kernel-debug-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 0518b902f63ac84826a9c52e2231b3071af7801c94635dd0c76a86f58748ee00 |
kernel-debug-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 0518b902f63ac84826a9c52e2231b3071af7801c94635dd0c76a86f58748ee00 |
kernel-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7762191600d1954dc8f9f27ec9093c361f233c8e17c0ce547322c23cd020609e |
kernel-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7762191600d1954dc8f9f27ec9093c361f233c8e17c0ce547322c23cd020609e |
kernel-debuginfo-common-x86_64-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f52354bfe3920991cc93552bc75e12295b1307ce3902405014c17e1a78936401 |
kernel-debuginfo-common-x86_64-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f52354bfe3920991cc93552bc75e12295b1307ce3902405014c17e1a78936401 |
kernel-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: d8b7b73341afb98a954e52d94ed329a329fba7d58797d38b886bca294c84bb01 |
kernel-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: d8b7b73341afb98a954e52d94ed329a329fba7d58797d38b886bca294c84bb01 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: c8335579f487cdb5ffadb7e71831eb45639feff83219df9f4d9c843f1a3039a1 |
kernel-headers-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: c8335579f487cdb5ffadb7e71831eb45639feff83219df9f4d9c843f1a3039a1 |
perf-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 97f3e0e3746069db59c04c567f695b7bc95a27ba5e34064b549a54053dbbf17a |
perf-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 97f3e0e3746069db59c04c567f695b7bc95a27ba5e34064b549a54053dbbf17a |
perf-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f6d4252a07fc0c7d7baadae922b9591f59ea94e7caa8bf158e2dbb4b0c3eedf2 |
perf-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f6d4252a07fc0c7d7baadae922b9591f59ea94e7caa8bf158e2dbb4b0c3eedf2 |
i386 | |
kernel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 10c8dcc86eb0b7e2b93c5315d923667deba25cad7d227cc520897850de1c3cf2 |
kernel-debug-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0470201e0f6032402aadeb31013a831af1bdca99b4d8d1454f21554e8c1ba19f |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f8c3b622239f296413e434755a98c04b1ddc52cd339e36203398a5388954a70f |
kernel-debug-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0a5a8aa8966b3b3859f977cb7ee73d787d1f581c6301e7127ebf945312fc8cc4 |
kernel-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 7bba52a445d9f373eeb5527e0a1ec5511e79a37e1d46ea0a649cecf9a73a5d3f |
kernel-debuginfo-common-i686-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d76cdc0d86eef78e9b28db5588063d5895ef7dc62204e010b3d9da10f96190e2 |
kernel-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: b82e47a1123967c616ad7edeae3009f1b3f0979ca2711b00e2c16cf5f58ac8c8 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d132a32eeca9467e2f7ffe9b08c048c0747a78fe8bff9e2941a5916052acc11f |
perf-2.6.32-131.0.15.el6.i686.rpm | SHA-256: ca757bc12e9d74faa591e68a73c030a6cb8fc863bb89952645c8c47e8258a506 |
perf-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f70753b2790fda784ec5b47b94726f8b152f3dfe981ed9eb0fbcebd06dc19dd8 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
x86_64 | |
kernel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 02cf7fffb9b75ab89b1040285a19a4bc37f11c40c08ec81a3fcdff99dacf9304 |
kernel-debug-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7a0bd3da834dd9cc265b246083957453129dde9f82f22b5bc46206fa06acdf16 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: a5fbdd584062d528140736d04561c342d5f2a8f5d9aed8dbb2ad59e8f5e8b5ca |
kernel-debug-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 0518b902f63ac84826a9c52e2231b3071af7801c94635dd0c76a86f58748ee00 |
kernel-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7762191600d1954dc8f9f27ec9093c361f233c8e17c0ce547322c23cd020609e |
kernel-debuginfo-common-x86_64-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f52354bfe3920991cc93552bc75e12295b1307ce3902405014c17e1a78936401 |
kernel-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: d8b7b73341afb98a954e52d94ed329a329fba7d58797d38b886bca294c84bb01 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: c8335579f487cdb5ffadb7e71831eb45639feff83219df9f4d9c843f1a3039a1 |
perf-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 97f3e0e3746069db59c04c567f695b7bc95a27ba5e34064b549a54053dbbf17a |
perf-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f6d4252a07fc0c7d7baadae922b9591f59ea94e7caa8bf158e2dbb4b0c3eedf2 |
i386 | |
kernel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 10c8dcc86eb0b7e2b93c5315d923667deba25cad7d227cc520897850de1c3cf2 |
kernel-debug-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0470201e0f6032402aadeb31013a831af1bdca99b4d8d1454f21554e8c1ba19f |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f8c3b622239f296413e434755a98c04b1ddc52cd339e36203398a5388954a70f |
kernel-debug-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0a5a8aa8966b3b3859f977cb7ee73d787d1f581c6301e7127ebf945312fc8cc4 |
kernel-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 7bba52a445d9f373eeb5527e0a1ec5511e79a37e1d46ea0a649cecf9a73a5d3f |
kernel-debuginfo-common-i686-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d76cdc0d86eef78e9b28db5588063d5895ef7dc62204e010b3d9da10f96190e2 |
kernel-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: b82e47a1123967c616ad7edeae3009f1b3f0979ca2711b00e2c16cf5f58ac8c8 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d132a32eeca9467e2f7ffe9b08c048c0747a78fe8bff9e2941a5916052acc11f |
perf-2.6.32-131.0.15.el6.i686.rpm | SHA-256: ca757bc12e9d74faa591e68a73c030a6cb8fc863bb89952645c8c47e8258a506 |
perf-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f70753b2790fda784ec5b47b94726f8b152f3dfe981ed9eb0fbcebd06dc19dd8 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
x86_64 | |
kernel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 02cf7fffb9b75ab89b1040285a19a4bc37f11c40c08ec81a3fcdff99dacf9304 |
kernel-debug-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7a0bd3da834dd9cc265b246083957453129dde9f82f22b5bc46206fa06acdf16 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: a5fbdd584062d528140736d04561c342d5f2a8f5d9aed8dbb2ad59e8f5e8b5ca |
kernel-debug-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 0518b902f63ac84826a9c52e2231b3071af7801c94635dd0c76a86f58748ee00 |
kernel-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7762191600d1954dc8f9f27ec9093c361f233c8e17c0ce547322c23cd020609e |
kernel-debuginfo-common-x86_64-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f52354bfe3920991cc93552bc75e12295b1307ce3902405014c17e1a78936401 |
kernel-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: d8b7b73341afb98a954e52d94ed329a329fba7d58797d38b886bca294c84bb01 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: c8335579f487cdb5ffadb7e71831eb45639feff83219df9f4d9c843f1a3039a1 |
perf-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 97f3e0e3746069db59c04c567f695b7bc95a27ba5e34064b549a54053dbbf17a |
perf-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f6d4252a07fc0c7d7baadae922b9591f59ea94e7caa8bf158e2dbb4b0c3eedf2 |
i386 | |
kernel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 10c8dcc86eb0b7e2b93c5315d923667deba25cad7d227cc520897850de1c3cf2 |
kernel-debug-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0470201e0f6032402aadeb31013a831af1bdca99b4d8d1454f21554e8c1ba19f |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f8c3b622239f296413e434755a98c04b1ddc52cd339e36203398a5388954a70f |
kernel-debug-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0a5a8aa8966b3b3859f977cb7ee73d787d1f581c6301e7127ebf945312fc8cc4 |
kernel-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 7bba52a445d9f373eeb5527e0a1ec5511e79a37e1d46ea0a649cecf9a73a5d3f |
kernel-debuginfo-common-i686-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d76cdc0d86eef78e9b28db5588063d5895ef7dc62204e010b3d9da10f96190e2 |
kernel-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: b82e47a1123967c616ad7edeae3009f1b3f0979ca2711b00e2c16cf5f58ac8c8 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d132a32eeca9467e2f7ffe9b08c048c0747a78fe8bff9e2941a5916052acc11f |
perf-2.6.32-131.0.15.el6.i686.rpm | SHA-256: ca757bc12e9d74faa591e68a73c030a6cb8fc863bb89952645c8c47e8258a506 |
perf-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f70753b2790fda784ec5b47b94726f8b152f3dfe981ed9eb0fbcebd06dc19dd8 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
x86_64 | |
kernel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 02cf7fffb9b75ab89b1040285a19a4bc37f11c40c08ec81a3fcdff99dacf9304 |
kernel-debug-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7a0bd3da834dd9cc265b246083957453129dde9f82f22b5bc46206fa06acdf16 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: a5fbdd584062d528140736d04561c342d5f2a8f5d9aed8dbb2ad59e8f5e8b5ca |
kernel-debug-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 0518b902f63ac84826a9c52e2231b3071af7801c94635dd0c76a86f58748ee00 |
kernel-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7762191600d1954dc8f9f27ec9093c361f233c8e17c0ce547322c23cd020609e |
kernel-debuginfo-common-x86_64-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f52354bfe3920991cc93552bc75e12295b1307ce3902405014c17e1a78936401 |
kernel-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: d8b7b73341afb98a954e52d94ed329a329fba7d58797d38b886bca294c84bb01 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: c8335579f487cdb5ffadb7e71831eb45639feff83219df9f4d9c843f1a3039a1 |
perf-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 97f3e0e3746069db59c04c567f695b7bc95a27ba5e34064b549a54053dbbf17a |
perf-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f6d4252a07fc0c7d7baadae922b9591f59ea94e7caa8bf158e2dbb4b0c3eedf2 |
i386 | |
kernel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 10c8dcc86eb0b7e2b93c5315d923667deba25cad7d227cc520897850de1c3cf2 |
kernel-debug-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0470201e0f6032402aadeb31013a831af1bdca99b4d8d1454f21554e8c1ba19f |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f8c3b622239f296413e434755a98c04b1ddc52cd339e36203398a5388954a70f |
kernel-debug-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0a5a8aa8966b3b3859f977cb7ee73d787d1f581c6301e7127ebf945312fc8cc4 |
kernel-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 7bba52a445d9f373eeb5527e0a1ec5511e79a37e1d46ea0a649cecf9a73a5d3f |
kernel-debuginfo-common-i686-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d76cdc0d86eef78e9b28db5588063d5895ef7dc62204e010b3d9da10f96190e2 |
kernel-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: b82e47a1123967c616ad7edeae3009f1b3f0979ca2711b00e2c16cf5f58ac8c8 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d132a32eeca9467e2f7ffe9b08c048c0747a78fe8bff9e2941a5916052acc11f |
perf-2.6.32-131.0.15.el6.i686.rpm | SHA-256: ca757bc12e9d74faa591e68a73c030a6cb8fc863bb89952645c8c47e8258a506 |
perf-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f70753b2790fda784ec5b47b94726f8b152f3dfe981ed9eb0fbcebd06dc19dd8 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
s390x | |
kernel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: d48242e081d5d14461df4cf7dca83e261f742bda0c1262d48e62752f680f4e1b |
kernel-debug-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 327203eaaaaa61f0bc97dcad3bc77c5b86a16a9f4388bb296359d8d6189bb5f5 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: ecebbdad8c850510ed06e19806977ae82fa7c7d3a3943fb63c8b1050f41afa9f |
kernel-debug-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 81938fa2010344e2806ddaa93663683293ef7320cbc6c3cb875532eda4f7b009 |
kernel-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 48e0ce882220490aafa4f4922992e29761b7f7f5be7935454a10823ed18ce4fc |
kernel-debuginfo-common-s390x-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 79b9fd8079d5785e1710232163de48c809b26c6e652729ea3a51644a4444c5aa |
kernel-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: c6761bc41406e5fd15a87928480b7b46e1826911ebe7205d139ac6aff530d2bc |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 62b0a2e3aead43339a40a12cc32e2caddcf29d7f098f4b9a07ce84375bf29dd4 |
kernel-kdump-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: d93be416d692cfa720ab378cb5ae0bd13b74a7649c1e040956acfc43a801bd3e |
kernel-kdump-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 1afd44603b08ddda1738e7f204144fdf5bd25bcaa1aa3d459ace0534ff5ef498 |
kernel-kdump-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 8796d0064993ccdecdd91856f6ed2d7ea9b3006760a26e377904e644e0e02e0e |
perf-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 85cc375b3a7ffd3edf92ce49d961dce3c11e84f0746b0c3a162846f951318d3c |
perf-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 54f084717cda5d6baa35882b24cd693d60c65185d4f0f106abf6060a4989937c |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
ppc64 | |
kernel-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: 1aa455d417d7859ec3bd1258e6c0b4ec40b474d8edb8a5a600f704c59ec825b4 |
kernel-bootwrapper-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: fe2672fa6d3d46004f5298002b284dfc5d656001187fbdffde8af261c4b0a52e |
kernel-debug-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: a5295342d4f885b2ebcf1dd486f93660bddf6c05e885f3318a463d71b7234e60 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: adff554420bfffd67e5d3d07ee506de1b8922c4dc15ceed0ad23770afbf96046 |
kernel-debug-devel-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: f8b56efd30a21b42ba9a7c34c16d5dae243b4a1ff39ba17717f4905a217e6f02 |
kernel-debuginfo-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: 5d688c6c9c5e48d9ac59cb41e2fe869e09bda89c3250e7aa138c000abd9ca674 |
kernel-debuginfo-common-ppc64-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: 8d9e2c5d87d15b7451efcd3c906d0242c4aeb15bc4a6a299845811ce063bf399 |
kernel-devel-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: 8fd438fe44181ff803f968ee426afd3c55fa186d25bad5524210bf7f4927d83b |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: 474a31fbf2dba592a587ebde612ef82f6f2f25795489d0a8792a34913ecf2438 |
perf-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: 7c97401c624666e59c0bce3c8864dcefd47845464e56e521279ef8d238ad5db6 |
perf-debuginfo-2.6.32-131.0.15.el6.ppc64.rpm | SHA-256: e4a0604b21c01b8ce3d491bcd4aa94e190917a42f6c58ac0c98161b2e70e7d65 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
x86_64 | |
kernel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 02cf7fffb9b75ab89b1040285a19a4bc37f11c40c08ec81a3fcdff99dacf9304 |
kernel-debug-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7a0bd3da834dd9cc265b246083957453129dde9f82f22b5bc46206fa06acdf16 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: a5fbdd584062d528140736d04561c342d5f2a8f5d9aed8dbb2ad59e8f5e8b5ca |
kernel-debug-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 0518b902f63ac84826a9c52e2231b3071af7801c94635dd0c76a86f58748ee00 |
kernel-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7762191600d1954dc8f9f27ec9093c361f233c8e17c0ce547322c23cd020609e |
kernel-debuginfo-common-x86_64-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f52354bfe3920991cc93552bc75e12295b1307ce3902405014c17e1a78936401 |
kernel-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: d8b7b73341afb98a954e52d94ed329a329fba7d58797d38b886bca294c84bb01 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: c8335579f487cdb5ffadb7e71831eb45639feff83219df9f4d9c843f1a3039a1 |
perf-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 97f3e0e3746069db59c04c567f695b7bc95a27ba5e34064b549a54053dbbf17a |
perf-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f6d4252a07fc0c7d7baadae922b9591f59ea94e7caa8bf158e2dbb4b0c3eedf2 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
x86_64 | |
kernel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 02cf7fffb9b75ab89b1040285a19a4bc37f11c40c08ec81a3fcdff99dacf9304 |
kernel-debug-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7a0bd3da834dd9cc265b246083957453129dde9f82f22b5bc46206fa06acdf16 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: a5fbdd584062d528140736d04561c342d5f2a8f5d9aed8dbb2ad59e8f5e8b5ca |
kernel-debug-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 0518b902f63ac84826a9c52e2231b3071af7801c94635dd0c76a86f58748ee00 |
kernel-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7762191600d1954dc8f9f27ec9093c361f233c8e17c0ce547322c23cd020609e |
kernel-debuginfo-common-x86_64-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f52354bfe3920991cc93552bc75e12295b1307ce3902405014c17e1a78936401 |
kernel-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: d8b7b73341afb98a954e52d94ed329a329fba7d58797d38b886bca294c84bb01 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: c8335579f487cdb5ffadb7e71831eb45639feff83219df9f4d9c843f1a3039a1 |
perf-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 97f3e0e3746069db59c04c567f695b7bc95a27ba5e34064b549a54053dbbf17a |
perf-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f6d4252a07fc0c7d7baadae922b9591f59ea94e7caa8bf158e2dbb4b0c3eedf2 |
i386 | |
kernel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 10c8dcc86eb0b7e2b93c5315d923667deba25cad7d227cc520897850de1c3cf2 |
kernel-debug-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0470201e0f6032402aadeb31013a831af1bdca99b4d8d1454f21554e8c1ba19f |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f8c3b622239f296413e434755a98c04b1ddc52cd339e36203398a5388954a70f |
kernel-debug-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0a5a8aa8966b3b3859f977cb7ee73d787d1f581c6301e7127ebf945312fc8cc4 |
kernel-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 7bba52a445d9f373eeb5527e0a1ec5511e79a37e1d46ea0a649cecf9a73a5d3f |
kernel-debuginfo-common-i686-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d76cdc0d86eef78e9b28db5588063d5895ef7dc62204e010b3d9da10f96190e2 |
kernel-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: b82e47a1123967c616ad7edeae3009f1b3f0979ca2711b00e2c16cf5f58ac8c8 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d132a32eeca9467e2f7ffe9b08c048c0747a78fe8bff9e2941a5916052acc11f |
perf-2.6.32-131.0.15.el6.i686.rpm | SHA-256: ca757bc12e9d74faa591e68a73c030a6cb8fc863bb89952645c8c47e8258a506 |
perf-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f70753b2790fda784ec5b47b94726f8b152f3dfe981ed9eb0fbcebd06dc19dd8 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
s390x | |
kernel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: d48242e081d5d14461df4cf7dca83e261f742bda0c1262d48e62752f680f4e1b |
kernel-debug-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 327203eaaaaa61f0bc97dcad3bc77c5b86a16a9f4388bb296359d8d6189bb5f5 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: ecebbdad8c850510ed06e19806977ae82fa7c7d3a3943fb63c8b1050f41afa9f |
kernel-debug-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 81938fa2010344e2806ddaa93663683293ef7320cbc6c3cb875532eda4f7b009 |
kernel-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 48e0ce882220490aafa4f4922992e29761b7f7f5be7935454a10823ed18ce4fc |
kernel-debuginfo-common-s390x-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 79b9fd8079d5785e1710232163de48c809b26c6e652729ea3a51644a4444c5aa |
kernel-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: c6761bc41406e5fd15a87928480b7b46e1826911ebe7205d139ac6aff530d2bc |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 62b0a2e3aead43339a40a12cc32e2caddcf29d7f098f4b9a07ce84375bf29dd4 |
kernel-kdump-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: d93be416d692cfa720ab378cb5ae0bd13b74a7649c1e040956acfc43a801bd3e |
kernel-kdump-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 1afd44603b08ddda1738e7f204144fdf5bd25bcaa1aa3d459ace0534ff5ef498 |
kernel-kdump-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 8796d0064993ccdecdd91856f6ed2d7ea9b3006760a26e377904e644e0e02e0e |
perf-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 85cc375b3a7ffd3edf92ce49d961dce3c11e84f0746b0c3a162846f951318d3c |
perf-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 54f084717cda5d6baa35882b24cd693d60c65185d4f0f106abf6060a4989937c |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
x86_64 | |
kernel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 02cf7fffb9b75ab89b1040285a19a4bc37f11c40c08ec81a3fcdff99dacf9304 |
kernel-debug-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7a0bd3da834dd9cc265b246083957453129dde9f82f22b5bc46206fa06acdf16 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: a5fbdd584062d528140736d04561c342d5f2a8f5d9aed8dbb2ad59e8f5e8b5ca |
kernel-debug-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 0518b902f63ac84826a9c52e2231b3071af7801c94635dd0c76a86f58748ee00 |
kernel-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 7762191600d1954dc8f9f27ec9093c361f233c8e17c0ce547322c23cd020609e |
kernel-debuginfo-common-x86_64-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f52354bfe3920991cc93552bc75e12295b1307ce3902405014c17e1a78936401 |
kernel-devel-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: d8b7b73341afb98a954e52d94ed329a329fba7d58797d38b886bca294c84bb01 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: c8335579f487cdb5ffadb7e71831eb45639feff83219df9f4d9c843f1a3039a1 |
perf-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: 97f3e0e3746069db59c04c567f695b7bc95a27ba5e34064b549a54053dbbf17a |
perf-debuginfo-2.6.32-131.0.15.el6.x86_64.rpm | SHA-256: f6d4252a07fc0c7d7baadae922b9591f59ea94e7caa8bf158e2dbb4b0c3eedf2 |
i386 | |
kernel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 10c8dcc86eb0b7e2b93c5315d923667deba25cad7d227cc520897850de1c3cf2 |
kernel-debug-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0470201e0f6032402aadeb31013a831af1bdca99b4d8d1454f21554e8c1ba19f |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f8c3b622239f296413e434755a98c04b1ddc52cd339e36203398a5388954a70f |
kernel-debug-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 0a5a8aa8966b3b3859f977cb7ee73d787d1f581c6301e7127ebf945312fc8cc4 |
kernel-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: 7bba52a445d9f373eeb5527e0a1ec5511e79a37e1d46ea0a649cecf9a73a5d3f |
kernel-debuginfo-common-i686-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d76cdc0d86eef78e9b28db5588063d5895ef7dc62204e010b3d9da10f96190e2 |
kernel-devel-2.6.32-131.0.15.el6.i686.rpm | SHA-256: b82e47a1123967c616ad7edeae3009f1b3f0979ca2711b00e2c16cf5f58ac8c8 |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.i686.rpm | SHA-256: d132a32eeca9467e2f7ffe9b08c048c0747a78fe8bff9e2941a5916052acc11f |
perf-2.6.32-131.0.15.el6.i686.rpm | SHA-256: ca757bc12e9d74faa591e68a73c030a6cb8fc863bb89952645c8c47e8258a506 |
perf-debuginfo-2.6.32-131.0.15.el6.i686.rpm | SHA-256: f70753b2790fda784ec5b47b94726f8b152f3dfe981ed9eb0fbcebd06dc19dd8 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6
SRPM | |
---|---|
kernel-2.6.32-131.0.15.el6.src.rpm | SHA-256: 2c8c3539fff1f5b6d4b7a3b6a2c6bd57588be8e293d1f89407c68e3c06c7ea2f |
s390x | |
kernel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: d48242e081d5d14461df4cf7dca83e261f742bda0c1262d48e62752f680f4e1b |
kernel-debug-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 327203eaaaaa61f0bc97dcad3bc77c5b86a16a9f4388bb296359d8d6189bb5f5 |
kernel-debug-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: ecebbdad8c850510ed06e19806977ae82fa7c7d3a3943fb63c8b1050f41afa9f |
kernel-debug-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 81938fa2010344e2806ddaa93663683293ef7320cbc6c3cb875532eda4f7b009 |
kernel-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 48e0ce882220490aafa4f4922992e29761b7f7f5be7935454a10823ed18ce4fc |
kernel-debuginfo-common-s390x-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 79b9fd8079d5785e1710232163de48c809b26c6e652729ea3a51644a4444c5aa |
kernel-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: c6761bc41406e5fd15a87928480b7b46e1826911ebe7205d139ac6aff530d2bc |
kernel-doc-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: 7d786a5c25c442855dfd68db638535da9a71f2fa4bd8dd2ed21db0fb818714c5 |
kernel-firmware-2.6.32-131.0.15.el6.noarch.rpm | SHA-256: b3943ab9768596310235db3ab846fd8b45daa2fc4b73b75a86ceec0d268ae61d |
kernel-headers-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 62b0a2e3aead43339a40a12cc32e2caddcf29d7f098f4b9a07ce84375bf29dd4 |
kernel-kdump-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: d93be416d692cfa720ab378cb5ae0bd13b74a7649c1e040956acfc43a801bd3e |
kernel-kdump-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 1afd44603b08ddda1738e7f204144fdf5bd25bcaa1aa3d459ace0534ff5ef498 |
kernel-kdump-devel-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 8796d0064993ccdecdd91856f6ed2d7ea9b3006760a26e377904e644e0e02e0e |
perf-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 85cc375b3a7ffd3edf92ce49d961dce3c11e84f0746b0c3a162846f951318d3c |
perf-debuginfo-2.6.32-131.0.15.el6.s390x.rpm | SHA-256: 54f084717cda5d6baa35882b24cd693d60c65185d4f0f106abf6060a4989937c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.