Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2011:1350 - Security Advisory
Issued:
2011-10-05
Updated:
2011-10-05

RHSA-2011:1350 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix several security issues, various bugs, and
add one enhancement are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • Flaws in the AGPGART driver implementation when handling certain IOCTL
    commands could allow a local user to cause a denial of service or escalate
    their privileges. (CVE-2011-1745, CVE-2011-2022, Important)
  • An integer overflow flaw in agp_allocate_memory() could allow a local
    user to cause a denial of service or escalate their privileges.
    (CVE-2011-1746, Important)
  • A race condition flaw was found in the Linux kernel's eCryptfs
    implementation. A local attacker could use the mount.ecryptfs_private
    utility to mount (and then access) a directory they would otherwise not
    have access to. Note: To correct this issue, the RHSA-2011:1241
    ecryptfs-utils update, which provides the user-space part of the fix, must
    also be installed. (CVE-2011-1833, Moderate)
  • A denial of service flaw was found in the way the taskstats subsystem
    handled the registration of process exit handlers. A local, unprivileged
    user could register an unlimited amount of these handlers, leading to
    excessive CPU time and memory use. (CVE-2011-2484, Moderate)
  • A flaw was found in the way mapping expansions were handled. A local,
    unprivileged user could use this flaw to cause a wrapping condition,
    triggering a denial of service. (CVE-2011-2496, Moderate)
  • A flaw was found in the Linux kernel's Performance Events implementation.
    It could falsely lead the NMI (Non-Maskable Interrupt) Watchdog to detect a
    lockup and panic the system. A local, unprivileged user could use this flaw
    to cause a denial of service (kernel panic) using the perf tool.
    (CVE-2011-2521, Moderate)
  • A flaw in skb_gro_header_slow() in the Linux kernel could lead to GRO
    (Generic Receive Offload) fields being left in an inconsistent state. An
    attacker on the local network could use this flaw to trigger a denial of
    service. GRO is enabled by default in all network drivers that support it.
    (CVE-2011-2723, Moderate)
  • A flaw was found in the way the Linux kernel's Performance Events
    implementation handled PERF_COUNT_SW_CPU_CLOCK counter overflow. A local,
    unprivileged user could use this flaw to cause a denial of service.
    (CVE-2011-2918, Moderate)
  • A flaw was found in the Linux kernel's Trusted Platform Module (TPM)
    implementation. A local, unprivileged user could use this flaw to leak
    information to user-space. (CVE-2011-1160, Low)
  • Flaws were found in the tpacket_rcv() and packet_recvmsg() functions in
    the Linux kernel. A local, unprivileged user could use these flaws to leak
    information to user-space. (CVE-2011-2898, Low)

Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting
CVE-2011-1745, CVE-2011-2022, CVE-2011-1746, and CVE-2011-2484; the Ubuntu
Security Team for reporting CVE-2011-1833; Robert Swiecki for reporting
CVE-2011-2496; Li Yu for reporting CVE-2011-2521; Brent Meshier for
reporting CVE-2011-2723; and Peter Huewe for reporting CVE-2011-1160. The
Ubuntu Security Team acknowledges Vasiliy Kulikov of Openwall and Dan
Rosenberg as the original reporters of CVE-2011-1833.

This update also fixes various bugs and adds one enhancement. Documentation
for these changes will be available shortly from the Technical Notes
document linked to in the References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs and add the enhancement
noted in the Technical Notes. The system must be rebooted for this update
to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

  • BZ - 684671 - CVE-2011-1160 kernel: tpm infoleaks
  • BZ - 698996 - CVE-2011-1745 CVE-2011-2022 kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls
  • BZ - 698998 - CVE-2011-1746 kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()
  • BZ - 713463 - UV: fscache taints kernel; NFS requires fscache; NFS taints kernel
  • BZ - 715436 - CVE-2011-2484 kernel: taskstats: duplicate entries in listener mode can lead to DoS
  • BZ - 716538 - CVE-2011-2496 kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions
  • BZ - 719228 - CVE-2011-2521 kernel: perf, x86: fix Intel fixed counters base initialization
  • BZ - 726552 - CVE-2011-2723 kernel: gro: only reset frag0 when skb can be pulled
  • BZ - 728023 - CVE-2011-2898 kernel: af_packet: infoleak
  • BZ - 730706 - CVE-2011-2918 kernel: perf: Fix software event overflow
  • BZ - 731172 - CVE-2011-1833 kernel: ecryptfs: mount source TOCTOU race
  • BZ - 732379 - [bnx2x_extract_max_cfg:1079(ethxx)]Illegal configuration detected for Max BW - using 100 instead [rhel-6.1.z]

CVEs

  • CVE-2011-1746
  • CVE-2011-1745
  • CVE-2011-2022
  • CVE-2011-1160
  • CVE-2011-2496
  • CVE-2011-2484
  • CVE-2011-2723
  • CVE-2011-2898
  • CVE-2011-1833
  • CVE-2011-2521
  • CVE-2011-2918

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://rhn.redhat.com/errata/RHSA-2011-1241.html
  • https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/kernel.html#RHSA-2011-1350
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
x86_64
kernel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: a3013b0a41731d28eb21129d61620b347161d524df798d42012bcba9cbfc3dc7
kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: df8bde7eab977cf3ce208692d706f691b8858f0bc043d6c3f50bfa93312f64af
kernel-debug-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: fd51a071d12921b0ac627d9f8aebdb6a55f71464457cfeff80a6388bb2218e85
kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 5930d4b0139f90b278e1c72c14de933c48fb3e871384a6686b71b01ef77e31b0
kernel-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 44159d039ab590a925eac6faf94d9030143b6b54a92f3113f996283cdd05f053
kernel-debuginfo-common-x86_64-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8809314f9f318110c47ee0fcf4c43f54d1a01d981388608de0c5407f1ab43086
kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 449bb0063932cc93193af5df61c61b2da37bcf601a5a7be8ac816fda443f9d7a
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: cde41f4cf3618149482862bd676984d1e55c8c323df463c820088bae3f631d4a
perf-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8f3f22921fea5bdc2b844cb31ab07a3d16a78d5eca850cbebe4370fb4d449b99
perf-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 6d223551d959cdef7d1760a8eb5db586cf28aefb03740066289f5c734f350a74
i386
kernel-2.6.32-131.17.1.el6.i686.rpm SHA-256: acdb0f0e1c927922525d83024347d9c43173092d6870d12deebccb657e1bc6f7
kernel-debug-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9294882e44287104bf47674af25d4ee7b94a6976a765f7af96b798eacb660c67
kernel-debug-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 38d44b78d0cc29eea729f7543807906555ab9117f887f0c2f817d6564da2a162
kernel-debug-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 41b42a88d0c504c5c96cc5c5d81a7398a99475a0fc7db0921157c1b2e985119f
kernel-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 76f3efd6a0d810c0260f9f0a6950cc7f0823a92e48050512e29479321aa586fb
kernel-debuginfo-common-i686-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9e8bb2663d5fa2b84652f796134b04b04f69de3c367d0b9b8fc14c65652572c8
kernel-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 90f9667fa0e2fcdd57f03eccf0f8d2efaf149baf0828f8dba62dcb4afd550fcb
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.i686.rpm SHA-256: 34abeec184e1e457082c6e45b165587f2e67389581f2e4e5a208fb4d7506ac9f
perf-2.6.32-131.17.1.el6.i686.rpm SHA-256: ec1d63f441fc6fba7e76a00ae256d1802620e963d0609a5d6fe13cdb73b0e0db
perf-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9296f22dbaf8f7528af72c1d5a9dd282dcaf572e19fae91c3618f072f22e106a

Red Hat Enterprise Linux Server - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
x86_64
kernel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: a3013b0a41731d28eb21129d61620b347161d524df798d42012bcba9cbfc3dc7
kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: df8bde7eab977cf3ce208692d706f691b8858f0bc043d6c3f50bfa93312f64af
kernel-debug-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: fd51a071d12921b0ac627d9f8aebdb6a55f71464457cfeff80a6388bb2218e85
kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 5930d4b0139f90b278e1c72c14de933c48fb3e871384a6686b71b01ef77e31b0
kernel-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 44159d039ab590a925eac6faf94d9030143b6b54a92f3113f996283cdd05f053
kernel-debuginfo-common-x86_64-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8809314f9f318110c47ee0fcf4c43f54d1a01d981388608de0c5407f1ab43086
kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 449bb0063932cc93193af5df61c61b2da37bcf601a5a7be8ac816fda443f9d7a
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: cde41f4cf3618149482862bd676984d1e55c8c323df463c820088bae3f631d4a
perf-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8f3f22921fea5bdc2b844cb31ab07a3d16a78d5eca850cbebe4370fb4d449b99
perf-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 6d223551d959cdef7d1760a8eb5db586cf28aefb03740066289f5c734f350a74
i386
kernel-2.6.32-131.17.1.el6.i686.rpm SHA-256: acdb0f0e1c927922525d83024347d9c43173092d6870d12deebccb657e1bc6f7
kernel-debug-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9294882e44287104bf47674af25d4ee7b94a6976a765f7af96b798eacb660c67
kernel-debug-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 38d44b78d0cc29eea729f7543807906555ab9117f887f0c2f817d6564da2a162
kernel-debug-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 41b42a88d0c504c5c96cc5c5d81a7398a99475a0fc7db0921157c1b2e985119f
kernel-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 76f3efd6a0d810c0260f9f0a6950cc7f0823a92e48050512e29479321aa586fb
kernel-debuginfo-common-i686-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9e8bb2663d5fa2b84652f796134b04b04f69de3c367d0b9b8fc14c65652572c8
kernel-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 90f9667fa0e2fcdd57f03eccf0f8d2efaf149baf0828f8dba62dcb4afd550fcb
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.i686.rpm SHA-256: 34abeec184e1e457082c6e45b165587f2e67389581f2e4e5a208fb4d7506ac9f
perf-2.6.32-131.17.1.el6.i686.rpm SHA-256: ec1d63f441fc6fba7e76a00ae256d1802620e963d0609a5d6fe13cdb73b0e0db
perf-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9296f22dbaf8f7528af72c1d5a9dd282dcaf572e19fae91c3618f072f22e106a

Red Hat Enterprise Linux Workstation 6

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
x86_64
kernel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: a3013b0a41731d28eb21129d61620b347161d524df798d42012bcba9cbfc3dc7
kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: df8bde7eab977cf3ce208692d706f691b8858f0bc043d6c3f50bfa93312f64af
kernel-debug-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: fd51a071d12921b0ac627d9f8aebdb6a55f71464457cfeff80a6388bb2218e85
kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 5930d4b0139f90b278e1c72c14de933c48fb3e871384a6686b71b01ef77e31b0
kernel-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 44159d039ab590a925eac6faf94d9030143b6b54a92f3113f996283cdd05f053
kernel-debuginfo-common-x86_64-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8809314f9f318110c47ee0fcf4c43f54d1a01d981388608de0c5407f1ab43086
kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 449bb0063932cc93193af5df61c61b2da37bcf601a5a7be8ac816fda443f9d7a
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: cde41f4cf3618149482862bd676984d1e55c8c323df463c820088bae3f631d4a
perf-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8f3f22921fea5bdc2b844cb31ab07a3d16a78d5eca850cbebe4370fb4d449b99
perf-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 6d223551d959cdef7d1760a8eb5db586cf28aefb03740066289f5c734f350a74
i386
kernel-2.6.32-131.17.1.el6.i686.rpm SHA-256: acdb0f0e1c927922525d83024347d9c43173092d6870d12deebccb657e1bc6f7
kernel-debug-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9294882e44287104bf47674af25d4ee7b94a6976a765f7af96b798eacb660c67
kernel-debug-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 38d44b78d0cc29eea729f7543807906555ab9117f887f0c2f817d6564da2a162
kernel-debug-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 41b42a88d0c504c5c96cc5c5d81a7398a99475a0fc7db0921157c1b2e985119f
kernel-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 76f3efd6a0d810c0260f9f0a6950cc7f0823a92e48050512e29479321aa586fb
kernel-debuginfo-common-i686-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9e8bb2663d5fa2b84652f796134b04b04f69de3c367d0b9b8fc14c65652572c8
kernel-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 90f9667fa0e2fcdd57f03eccf0f8d2efaf149baf0828f8dba62dcb4afd550fcb
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.i686.rpm SHA-256: 34abeec184e1e457082c6e45b165587f2e67389581f2e4e5a208fb4d7506ac9f
perf-2.6.32-131.17.1.el6.i686.rpm SHA-256: ec1d63f441fc6fba7e76a00ae256d1802620e963d0609a5d6fe13cdb73b0e0db
perf-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9296f22dbaf8f7528af72c1d5a9dd282dcaf572e19fae91c3618f072f22e106a

Red Hat Enterprise Linux Desktop 6

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
x86_64
kernel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: a3013b0a41731d28eb21129d61620b347161d524df798d42012bcba9cbfc3dc7
kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: df8bde7eab977cf3ce208692d706f691b8858f0bc043d6c3f50bfa93312f64af
kernel-debug-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: fd51a071d12921b0ac627d9f8aebdb6a55f71464457cfeff80a6388bb2218e85
kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 5930d4b0139f90b278e1c72c14de933c48fb3e871384a6686b71b01ef77e31b0
kernel-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 44159d039ab590a925eac6faf94d9030143b6b54a92f3113f996283cdd05f053
kernel-debuginfo-common-x86_64-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8809314f9f318110c47ee0fcf4c43f54d1a01d981388608de0c5407f1ab43086
kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 449bb0063932cc93193af5df61c61b2da37bcf601a5a7be8ac816fda443f9d7a
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: cde41f4cf3618149482862bd676984d1e55c8c323df463c820088bae3f631d4a
perf-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8f3f22921fea5bdc2b844cb31ab07a3d16a78d5eca850cbebe4370fb4d449b99
perf-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 6d223551d959cdef7d1760a8eb5db586cf28aefb03740066289f5c734f350a74
i386
kernel-2.6.32-131.17.1.el6.i686.rpm SHA-256: acdb0f0e1c927922525d83024347d9c43173092d6870d12deebccb657e1bc6f7
kernel-debug-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9294882e44287104bf47674af25d4ee7b94a6976a765f7af96b798eacb660c67
kernel-debug-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 38d44b78d0cc29eea729f7543807906555ab9117f887f0c2f817d6564da2a162
kernel-debug-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 41b42a88d0c504c5c96cc5c5d81a7398a99475a0fc7db0921157c1b2e985119f
kernel-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 76f3efd6a0d810c0260f9f0a6950cc7f0823a92e48050512e29479321aa586fb
kernel-debuginfo-common-i686-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9e8bb2663d5fa2b84652f796134b04b04f69de3c367d0b9b8fc14c65652572c8
kernel-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 90f9667fa0e2fcdd57f03eccf0f8d2efaf149baf0828f8dba62dcb4afd550fcb
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.i686.rpm SHA-256: 34abeec184e1e457082c6e45b165587f2e67389581f2e4e5a208fb4d7506ac9f
perf-2.6.32-131.17.1.el6.i686.rpm SHA-256: ec1d63f441fc6fba7e76a00ae256d1802620e963d0609a5d6fe13cdb73b0e0db
perf-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9296f22dbaf8f7528af72c1d5a9dd282dcaf572e19fae91c3618f072f22e106a

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
s390x
kernel-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 2a9ada3f509b303eb6e018ae85dff5f34f5234c7f4768e29cd5b3bc6ed48dd57
kernel-debug-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 933a7528e8816f51ecc7e25fd5cefb3a6cafe538b8f18f34ccde1c8d33a7074e
kernel-debug-debuginfo-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 01a2dcbab39dfd9ee2d474eebe843e8114b9182f6ef57eca5ea334e09dfa0fbd
kernel-debug-devel-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 4e3942a7c145354f11c30733f00ead0076e1f3752c7bf42b5e83836cbdc071dd
kernel-debuginfo-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 36eb6e3ef9633295a43026a173c331c295b970102308592414b6d360e41e21f8
kernel-debuginfo-common-s390x-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 7a5602f6a854638c6c5df7bb3ab19e19f4d5156b45c7242a8688f4cb0630d651
kernel-devel-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 2208732435894d3a81307a464becdbeb6212746626c6e0eaf01622a57640ea43
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.s390x.rpm SHA-256: d7ab7c42e354ca8ec0c4599e22ec1907247a650a1a701b6c2480512d2fe79187
kernel-kdump-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 4614af48f3975e44cee0edb9d75f65ad9c77b985f3b545fdcc02a2f8769ea848
kernel-kdump-debuginfo-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 310edc24841e32bdf05a70f07f2d771d5810e257fbab385eec9042ad6f784d12
kernel-kdump-devel-2.6.32-131.17.1.el6.s390x.rpm SHA-256: d5702e424435c42bf21ca20300987952a21f61e5d4872effd3b83cf80c3ae964
perf-2.6.32-131.17.1.el6.s390x.rpm SHA-256: b79803f7f2ea2368d36d12fb04cb2716ad706223c95791ea6a593190d909f97c
perf-debuginfo-2.6.32-131.17.1.el6.s390x.rpm SHA-256: d5af2d9db5f4cc0b623adca91735f5fc480ba3f2bd82bcc7d662d8298a87d5f4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
s390x
kernel-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 2a9ada3f509b303eb6e018ae85dff5f34f5234c7f4768e29cd5b3bc6ed48dd57
kernel-debug-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 933a7528e8816f51ecc7e25fd5cefb3a6cafe538b8f18f34ccde1c8d33a7074e
kernel-debug-debuginfo-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 01a2dcbab39dfd9ee2d474eebe843e8114b9182f6ef57eca5ea334e09dfa0fbd
kernel-debug-devel-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 4e3942a7c145354f11c30733f00ead0076e1f3752c7bf42b5e83836cbdc071dd
kernel-debuginfo-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 36eb6e3ef9633295a43026a173c331c295b970102308592414b6d360e41e21f8
kernel-debuginfo-common-s390x-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 7a5602f6a854638c6c5df7bb3ab19e19f4d5156b45c7242a8688f4cb0630d651
kernel-devel-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 2208732435894d3a81307a464becdbeb6212746626c6e0eaf01622a57640ea43
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.s390x.rpm SHA-256: d7ab7c42e354ca8ec0c4599e22ec1907247a650a1a701b6c2480512d2fe79187
kernel-kdump-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 4614af48f3975e44cee0edb9d75f65ad9c77b985f3b545fdcc02a2f8769ea848
kernel-kdump-debuginfo-2.6.32-131.17.1.el6.s390x.rpm SHA-256: 310edc24841e32bdf05a70f07f2d771d5810e257fbab385eec9042ad6f784d12
kernel-kdump-devel-2.6.32-131.17.1.el6.s390x.rpm SHA-256: d5702e424435c42bf21ca20300987952a21f61e5d4872effd3b83cf80c3ae964
perf-2.6.32-131.17.1.el6.s390x.rpm SHA-256: b79803f7f2ea2368d36d12fb04cb2716ad706223c95791ea6a593190d909f97c
perf-debuginfo-2.6.32-131.17.1.el6.s390x.rpm SHA-256: d5af2d9db5f4cc0b623adca91735f5fc480ba3f2bd82bcc7d662d8298a87d5f4

Red Hat Enterprise Linux for Power, big endian 6

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
ppc64
kernel-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: e80cf87ff07d7f36191c80d6f92465368f840cb637c20de7875203f975043f80
kernel-bootwrapper-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: f0ecc862422c104196bb59e51ea6c5df0f8d5e376fd9b0906bf304beff2c0cda
kernel-debug-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 48a47789e096cd002248a794b3659c6c703d5848ea77c2f9e89a722d30104557
kernel-debug-debuginfo-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: bea1294e411fd38fd4477cb380e4806d025f18bdfdcca6e142be6930faec86f1
kernel-debug-devel-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 140fd120eeb0412048c2778965860cfdbba0bfd43cdda8261a1055b8f4976573
kernel-debuginfo-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: d58012133095f8f93ffe28255ec4825ecef2b7c345aec1084b11aef3f1b6cf90
kernel-debuginfo-common-ppc64-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: a224f6af118c02d8ead0d40703a17e07c83f6e0b80c1c36cc5905fcf2e3134ad
kernel-devel-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 529b4fd4fae49579f27b7a9a97e91f098f7eafbf7ae7bc6902d8131781da7eb0
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 23cf25d3008ee5af145e78c703c8719bebe383d714e4ef07fdf290cbed0748ff
perf-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 942fe208eded0a48609dfaf2332eca3512af4d39aa7e4ed6367cf832e1105108
perf-debuginfo-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 734227bbd4010e436bbbaf800c4397785568547bb95c9912a0a0a4051a740925

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
ppc64
kernel-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: e80cf87ff07d7f36191c80d6f92465368f840cb637c20de7875203f975043f80
kernel-bootwrapper-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: f0ecc862422c104196bb59e51ea6c5df0f8d5e376fd9b0906bf304beff2c0cda
kernel-debug-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 48a47789e096cd002248a794b3659c6c703d5848ea77c2f9e89a722d30104557
kernel-debug-debuginfo-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: bea1294e411fd38fd4477cb380e4806d025f18bdfdcca6e142be6930faec86f1
kernel-debug-devel-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 140fd120eeb0412048c2778965860cfdbba0bfd43cdda8261a1055b8f4976573
kernel-debuginfo-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: d58012133095f8f93ffe28255ec4825ecef2b7c345aec1084b11aef3f1b6cf90
kernel-debuginfo-common-ppc64-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: a224f6af118c02d8ead0d40703a17e07c83f6e0b80c1c36cc5905fcf2e3134ad
kernel-devel-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 529b4fd4fae49579f27b7a9a97e91f098f7eafbf7ae7bc6902d8131781da7eb0
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 23cf25d3008ee5af145e78c703c8719bebe383d714e4ef07fdf290cbed0748ff
perf-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 942fe208eded0a48609dfaf2332eca3512af4d39aa7e4ed6367cf832e1105108
perf-debuginfo-2.6.32-131.17.1.el6.ppc64.rpm SHA-256: 734227bbd4010e436bbbaf800c4397785568547bb95c9912a0a0a4051a740925

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
x86_64
kernel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: a3013b0a41731d28eb21129d61620b347161d524df798d42012bcba9cbfc3dc7
kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: df8bde7eab977cf3ce208692d706f691b8858f0bc043d6c3f50bfa93312f64af
kernel-debug-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: fd51a071d12921b0ac627d9f8aebdb6a55f71464457cfeff80a6388bb2218e85
kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 5930d4b0139f90b278e1c72c14de933c48fb3e871384a6686b71b01ef77e31b0
kernel-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 44159d039ab590a925eac6faf94d9030143b6b54a92f3113f996283cdd05f053
kernel-debuginfo-common-x86_64-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8809314f9f318110c47ee0fcf4c43f54d1a01d981388608de0c5407f1ab43086
kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 449bb0063932cc93193af5df61c61b2da37bcf601a5a7be8ac816fda443f9d7a
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: cde41f4cf3618149482862bd676984d1e55c8c323df463c820088bae3f631d4a
perf-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8f3f22921fea5bdc2b844cb31ab07a3d16a78d5eca850cbebe4370fb4d449b99
perf-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 6d223551d959cdef7d1760a8eb5db586cf28aefb03740066289f5c734f350a74

Red Hat Enterprise Linux Server from RHUI 6

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
x86_64
kernel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: a3013b0a41731d28eb21129d61620b347161d524df798d42012bcba9cbfc3dc7
kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: df8bde7eab977cf3ce208692d706f691b8858f0bc043d6c3f50bfa93312f64af
kernel-debug-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: fd51a071d12921b0ac627d9f8aebdb6a55f71464457cfeff80a6388bb2218e85
kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 5930d4b0139f90b278e1c72c14de933c48fb3e871384a6686b71b01ef77e31b0
kernel-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 44159d039ab590a925eac6faf94d9030143b6b54a92f3113f996283cdd05f053
kernel-debuginfo-common-x86_64-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8809314f9f318110c47ee0fcf4c43f54d1a01d981388608de0c5407f1ab43086
kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 449bb0063932cc93193af5df61c61b2da37bcf601a5a7be8ac816fda443f9d7a
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: cde41f4cf3618149482862bd676984d1e55c8c323df463c820088bae3f631d4a
perf-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8f3f22921fea5bdc2b844cb31ab07a3d16a78d5eca850cbebe4370fb4d449b99
perf-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 6d223551d959cdef7d1760a8eb5db586cf28aefb03740066289f5c734f350a74
i386
kernel-2.6.32-131.17.1.el6.i686.rpm SHA-256: acdb0f0e1c927922525d83024347d9c43173092d6870d12deebccb657e1bc6f7
kernel-debug-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9294882e44287104bf47674af25d4ee7b94a6976a765f7af96b798eacb660c67
kernel-debug-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 38d44b78d0cc29eea729f7543807906555ab9117f887f0c2f817d6564da2a162
kernel-debug-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 41b42a88d0c504c5c96cc5c5d81a7398a99475a0fc7db0921157c1b2e985119f
kernel-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 76f3efd6a0d810c0260f9f0a6950cc7f0823a92e48050512e29479321aa586fb
kernel-debuginfo-common-i686-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9e8bb2663d5fa2b84652f796134b04b04f69de3c367d0b9b8fc14c65652572c8
kernel-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 90f9667fa0e2fcdd57f03eccf0f8d2efaf149baf0828f8dba62dcb4afd550fcb
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.i686.rpm SHA-256: 34abeec184e1e457082c6e45b165587f2e67389581f2e4e5a208fb4d7506ac9f
perf-2.6.32-131.17.1.el6.i686.rpm SHA-256: ec1d63f441fc6fba7e76a00ae256d1802620e963d0609a5d6fe13cdb73b0e0db
perf-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9296f22dbaf8f7528af72c1d5a9dd282dcaf572e19fae91c3618f072f22e106a

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
x86_64
kernel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: a3013b0a41731d28eb21129d61620b347161d524df798d42012bcba9cbfc3dc7
kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: df8bde7eab977cf3ce208692d706f691b8858f0bc043d6c3f50bfa93312f64af
kernel-debug-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: fd51a071d12921b0ac627d9f8aebdb6a55f71464457cfeff80a6388bb2218e85
kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 5930d4b0139f90b278e1c72c14de933c48fb3e871384a6686b71b01ef77e31b0
kernel-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 44159d039ab590a925eac6faf94d9030143b6b54a92f3113f996283cdd05f053
kernel-debuginfo-common-x86_64-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8809314f9f318110c47ee0fcf4c43f54d1a01d981388608de0c5407f1ab43086
kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 449bb0063932cc93193af5df61c61b2da37bcf601a5a7be8ac816fda443f9d7a
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: cde41f4cf3618149482862bd676984d1e55c8c323df463c820088bae3f631d4a
perf-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8f3f22921fea5bdc2b844cb31ab07a3d16a78d5eca850cbebe4370fb4d449b99
perf-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 6d223551d959cdef7d1760a8eb5db586cf28aefb03740066289f5c734f350a74
i386
kernel-2.6.32-131.17.1.el6.i686.rpm SHA-256: acdb0f0e1c927922525d83024347d9c43173092d6870d12deebccb657e1bc6f7
kernel-debug-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9294882e44287104bf47674af25d4ee7b94a6976a765f7af96b798eacb660c67
kernel-debug-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 38d44b78d0cc29eea729f7543807906555ab9117f887f0c2f817d6564da2a162
kernel-debug-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 41b42a88d0c504c5c96cc5c5d81a7398a99475a0fc7db0921157c1b2e985119f
kernel-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 76f3efd6a0d810c0260f9f0a6950cc7f0823a92e48050512e29479321aa586fb
kernel-debuginfo-common-i686-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9e8bb2663d5fa2b84652f796134b04b04f69de3c367d0b9b8fc14c65652572c8
kernel-devel-2.6.32-131.17.1.el6.i686.rpm SHA-256: 90f9667fa0e2fcdd57f03eccf0f8d2efaf149baf0828f8dba62dcb4afd550fcb
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.i686.rpm SHA-256: 34abeec184e1e457082c6e45b165587f2e67389581f2e4e5a208fb4d7506ac9f
perf-2.6.32-131.17.1.el6.i686.rpm SHA-256: ec1d63f441fc6fba7e76a00ae256d1802620e963d0609a5d6fe13cdb73b0e0db
perf-debuginfo-2.6.32-131.17.1.el6.i686.rpm SHA-256: 9296f22dbaf8f7528af72c1d5a9dd282dcaf572e19fae91c3618f072f22e106a

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
kernel-2.6.32-131.17.1.el6.src.rpm SHA-256: 2d5381201fab85638bf9445aa4d649fb78dbc345f906c567f36f318b146c71d3
x86_64
kernel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: a3013b0a41731d28eb21129d61620b347161d524df798d42012bcba9cbfc3dc7
kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: df8bde7eab977cf3ce208692d706f691b8858f0bc043d6c3f50bfa93312f64af
kernel-debug-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: fd51a071d12921b0ac627d9f8aebdb6a55f71464457cfeff80a6388bb2218e85
kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 5930d4b0139f90b278e1c72c14de933c48fb3e871384a6686b71b01ef77e31b0
kernel-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 44159d039ab590a925eac6faf94d9030143b6b54a92f3113f996283cdd05f053
kernel-debuginfo-common-x86_64-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8809314f9f318110c47ee0fcf4c43f54d1a01d981388608de0c5407f1ab43086
kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 449bb0063932cc93193af5df61c61b2da37bcf601a5a7be8ac816fda443f9d7a
kernel-doc-2.6.32-131.17.1.el6.noarch.rpm SHA-256: 159e2237bc3562e5a605944d5be0e401f6e55220a5c3fc7067a9c74e492316aa
kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm SHA-256: cefbada708e058d9a66f983ed8fd687f8b0c46e02b9475d9250152352c84e427
kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: cde41f4cf3618149482862bd676984d1e55c8c323df463c820088bae3f631d4a
perf-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 8f3f22921fea5bdc2b844cb31ab07a3d16a78d5eca850cbebe4370fb4d449b99
perf-debuginfo-2.6.32-131.17.1.el6.x86_64.rpm SHA-256: 6d223551d959cdef7d1760a8eb5db586cf28aefb03740066289f5c734f350a74

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+