Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2012:0116 - Security Advisory
Issued:
2012-02-14
Updated:
2012-02-14

RHSA-2012:0116 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

Updated kernel packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 6.1 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • The proc file system could allow a local, unprivileged user to obtain
    sensitive information or possibly cause integrity issues. (CVE-2011-1020,
    Moderate)
  • Non-member VLAN (virtual LAN) packet handling for interfaces in
    promiscuous mode and also using the be2net driver could allow an attacker
    on the local network to cause a denial of service. (CVE-2011-3347,
    Moderate)
  • A missing validation flaw was found in the Linux kernel's m_stop()
    implementation. A local, unprivileged user could use this flaw to trigger
    a denial of service. (CVE-2011-3637, Moderate)
  • A flaw was found in the Linux kernel in the way splitting two extents in
    ext4_ext_convert_to_initialized() worked. A local, unprivileged user with
    the ability to mount and unmount ext4 file systems could use this flaw to
    cause a denial of service. (CVE-2011-3638, Moderate)
  • A NULL pointer dereference flaw was found in the way the Linux kernel's
    key management facility handled user-defined key types. A local,
    unprivileged user could use the keyctl utility to cause a denial of
    service. (CVE-2011-4110, Moderate)

Red Hat would like to thank Kees Cook for reporting CVE-2011-1020; Somnath
Kotur for reporting CVE-2011-3347; and Zheng Liu for reporting
CVE-2011-3638.

This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

  • BZ - 680358 - CVE-2011-1020 kernel: no access restrictions of /proc/pid/* after setuid program exec
  • BZ - 736425 - CVE-2011-3347 kernel: be2net: promiscuous mode and non-member VLAN packets DoS
  • BZ - 747848 - CVE-2011-3637 kernel: proc: fix oops on invalid /proc/<pid>/maps access
  • BZ - 747942 - CVE-2011-3638 kernel: ext4: ext4_ext_insert_extent() kernel oops
  • BZ - 751297 - CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type

CVEs

  • CVE-2011-1020
  • CVE-2011-3347
  • CVE-2011-4110
  • CVE-2011-3638

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/kernel.html#RHSA-2012-0116
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.25.1.el6.src.rpm SHA-256: ee859b51992319905846547bd6e9667896432823440f07f0b7cc8e7d6b3e14c8
x86_64
kernel-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 8f1873ed34a9e8685bc8c2f4d1013e08a6577bb596ca058e8e6bf85ccd5066f9
kernel-debug-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 46ee59ef8831f83c24ed0ef70ccdb74b39576893f55e3a389c9e89968b90bc53
kernel-debug-debuginfo-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 243b4e23bb2558ddfff2f5c0440a8a8064d821ae4a31dc07d79b5d33deb86da4
kernel-debug-devel-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 7605a69e6a9e9cf76327b76a333503c643141f56641f70afdf239a150f47340f
kernel-debuginfo-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 4ded642f6c70f6cf54c9b977f6e528a347e0c068f8b49c2edf99efa46dd90a8b
kernel-debuginfo-common-x86_64-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: d67b087b668742040027e79896f81bb31e6c55050eef0d485e50d4f9038c8d9a
kernel-devel-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: c99312e8180432e170c1a8258aa0d8da0587cd141e510be087c076bd433205f9
kernel-doc-2.6.32-131.25.1.el6.noarch.rpm SHA-256: b002dce308308c2f7b0f9730a91ea8571f4784351773939247324aaf82f03e8f
kernel-firmware-2.6.32-131.25.1.el6.noarch.rpm SHA-256: 97cdc972d01d33d5b5dddaabf76b48439a410f1a14baafc9a0ba3fda1eb905f0
kernel-headers-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 66035cb0754fb58d4cc1ff35dc1c647a2037737027fd861ab986ce2a2bfe0441
perf-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 9c3a1191ea8e973aaf817741a25afad1343dffa9829f64de5a1d2446ce85d6a3
perf-debuginfo-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: da404ac74ce3cc16b843a6cf8f801abb0c32cfa2c485039163eecc05dae06c9e
i386
kernel-2.6.32-131.25.1.el6.i686.rpm SHA-256: 9442f83841827e240ef4747f7de0b341e33db682b59ae7c4980adbec7f34f829
kernel-debug-2.6.32-131.25.1.el6.i686.rpm SHA-256: c708de7cc5112ba50dc9ff1a637c066b4d1545a0d46dea7ca9436cd4b4567604
kernel-debug-debuginfo-2.6.32-131.25.1.el6.i686.rpm SHA-256: 8fc010299811aecdc2ff3fcd93855d47a2108bb08f997af321a8ac354f778db4
kernel-debug-devel-2.6.32-131.25.1.el6.i686.rpm SHA-256: 73f668e8c28981ae0945b6f1914a19ff1b7580eb87f47487ec0c595c33f3cd36
kernel-debuginfo-2.6.32-131.25.1.el6.i686.rpm SHA-256: 83555744a562ba887e4fdee45f85efa23c67ce74e4b15756437f24d0445e7d63
kernel-debuginfo-common-i686-2.6.32-131.25.1.el6.i686.rpm SHA-256: 3ba2852f9050c7b4036dde9aeabdeb08b56d8fb45f1ff549b4f1db58fc777dab
kernel-devel-2.6.32-131.25.1.el6.i686.rpm SHA-256: 2076d4765e222a78b536a1379dcb00965145c25d119f10c4333f79f30e8dc6e2
kernel-doc-2.6.32-131.25.1.el6.noarch.rpm SHA-256: b002dce308308c2f7b0f9730a91ea8571f4784351773939247324aaf82f03e8f
kernel-firmware-2.6.32-131.25.1.el6.noarch.rpm SHA-256: 97cdc972d01d33d5b5dddaabf76b48439a410f1a14baafc9a0ba3fda1eb905f0
kernel-headers-2.6.32-131.25.1.el6.i686.rpm SHA-256: cdce970cba37de90a69747772109385bbd1709ca87a313332b9fc7b582743c12
perf-2.6.32-131.25.1.el6.i686.rpm SHA-256: ff957f2a8032d398ee3dd7cbe9f440a0ba481768faa42849c8b46f59e6201371
perf-debuginfo-2.6.32-131.25.1.el6.i686.rpm SHA-256: 3cd512699b3666bb49650cc9afdd1469c1f161d81de1d747e2913060372082bf

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.25.1.el6.src.rpm SHA-256: ee859b51992319905846547bd6e9667896432823440f07f0b7cc8e7d6b3e14c8
s390x
kernel-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 17ea73b22a840a36257a835e214fc53eb0a42bd194371d366e6e919af0e34118
kernel-debug-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 28d2c688cd10838a02a270f523fdc0992483a47f4e9c5c5b08cdcd51fe378b0b
kernel-debug-debuginfo-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 73f583b5b3e811c6ccc820f96cdf42a2e0a0e1d7910e3da6e2e774dec5b79187
kernel-debug-devel-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 1b7a1801d97351504f288ea66167c123deb21603fa755cc95cd1555fbd2b7344
kernel-debuginfo-2.6.32-131.25.1.el6.s390x.rpm SHA-256: fb2ff11c116e35acd59d6b30703290558816adae06d889d5b12918b43f2ef0ad
kernel-debuginfo-common-s390x-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 4a5ecce656ddc6f04f9cec2651ac4da9e06368e1d13e6b64e8b1cfd56079160f
kernel-devel-2.6.32-131.25.1.el6.s390x.rpm SHA-256: d58dbc31f5ef2c693f871bb35017e14e566ffce4c88e3e9d4f58e9546a2c3c51
kernel-doc-2.6.32-131.25.1.el6.noarch.rpm SHA-256: b002dce308308c2f7b0f9730a91ea8571f4784351773939247324aaf82f03e8f
kernel-firmware-2.6.32-131.25.1.el6.noarch.rpm SHA-256: 97cdc972d01d33d5b5dddaabf76b48439a410f1a14baafc9a0ba3fda1eb905f0
kernel-headers-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 8c37a0110c63c1979cbbb3dfa75473af680cf20fab2f96873112d6a81b52e4d8
kernel-kdump-2.6.32-131.25.1.el6.s390x.rpm SHA-256: d6caa4617809fbc3d6a730028bd5b2dd56ce0f3c16390363fd3cb96e6c5beffa
kernel-kdump-debuginfo-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 68c039c56e0c7c27719a473ad72398f2ce5a7d6ad3296308889e9fdc8fd76f6a
kernel-kdump-devel-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 279d9fdd9c01d54134f0dd7f38218d3024a2ae01276c7d169a2ac0de3a685815
perf-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 24923cfa7eb332a686108c37c444c3447fcc0efb3a73b31d269b0fe7b26d9ab6
perf-debuginfo-2.6.32-131.25.1.el6.s390x.rpm SHA-256: 805934cbdd3a387536a37f4287d2e0ef92e2c4bfd7a3e98c752d880c5764aca3

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.25.1.el6.src.rpm SHA-256: ee859b51992319905846547bd6e9667896432823440f07f0b7cc8e7d6b3e14c8
ppc64
kernel-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: 41a0ad975872b7e6083ce2d38ba8ea579bc119038f5c50287df6c234236d1a5d
kernel-bootwrapper-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: 9a80af122e8f966f53033bd356d132f4d75dae69d5a08756e8faa604b1e9dd40
kernel-debug-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: 725928a62fe590793188e6fb2dd5b51a771ddde82fdec582d0a96d8e21b635e6
kernel-debug-debuginfo-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: a34139f1225ba78d22cf630a603d68b209d770cacda00b99509aade7b329f7cc
kernel-debug-devel-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: 32828eefa7379b04994ed23aac5f0eec260c28fbbe8648e7f5aa78259c62a4d2
kernel-debuginfo-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: d318cd463ec522b858c9957a37323b00469c217d8244862c545ee5f5c9adebcf
kernel-debuginfo-common-ppc64-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: c777d90df1c0eac352eabf70a908fb5df8b3dd8e71ed67b9e1a358349ce3dec2
kernel-devel-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: 830e7f67f21920b748175151b1467f3b84b5bdb888f45500e84845a96ff87fbf
kernel-doc-2.6.32-131.25.1.el6.noarch.rpm SHA-256: b002dce308308c2f7b0f9730a91ea8571f4784351773939247324aaf82f03e8f
kernel-firmware-2.6.32-131.25.1.el6.noarch.rpm SHA-256: 97cdc972d01d33d5b5dddaabf76b48439a410f1a14baafc9a0ba3fda1eb905f0
kernel-headers-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: 0f6ba2ee731d76b2a5194d167fc671cf84cd540c54a18ac0b00fcad73daac97e
perf-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: 72a1e28217a3b8ed4d2ae1be0bf357292021fa4f7b67069d24acaae82dd62817
perf-debuginfo-2.6.32-131.25.1.el6.ppc64.rpm SHA-256: a9a49e88038bb5a431136239351aa4f12bff0453e88dd8a5cfea47189b633b0f

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
kernel-2.6.32-131.25.1.el6.src.rpm SHA-256: ee859b51992319905846547bd6e9667896432823440f07f0b7cc8e7d6b3e14c8
x86_64
kernel-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 8f1873ed34a9e8685bc8c2f4d1013e08a6577bb596ca058e8e6bf85ccd5066f9
kernel-debug-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 46ee59ef8831f83c24ed0ef70ccdb74b39576893f55e3a389c9e89968b90bc53
kernel-debug-debuginfo-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 243b4e23bb2558ddfff2f5c0440a8a8064d821ae4a31dc07d79b5d33deb86da4
kernel-debug-devel-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 7605a69e6a9e9cf76327b76a333503c643141f56641f70afdf239a150f47340f
kernel-debuginfo-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 4ded642f6c70f6cf54c9b977f6e528a347e0c068f8b49c2edf99efa46dd90a8b
kernel-debuginfo-common-x86_64-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: d67b087b668742040027e79896f81bb31e6c55050eef0d485e50d4f9038c8d9a
kernel-devel-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: c99312e8180432e170c1a8258aa0d8da0587cd141e510be087c076bd433205f9
kernel-doc-2.6.32-131.25.1.el6.noarch.rpm SHA-256: b002dce308308c2f7b0f9730a91ea8571f4784351773939247324aaf82f03e8f
kernel-firmware-2.6.32-131.25.1.el6.noarch.rpm SHA-256: 97cdc972d01d33d5b5dddaabf76b48439a410f1a14baafc9a0ba3fda1eb905f0
kernel-headers-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 66035cb0754fb58d4cc1ff35dc1c647a2037737027fd861ab986ce2a2bfe0441
perf-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: 9c3a1191ea8e973aaf817741a25afad1343dffa9829f64de5a1d2446ce85d6a3
perf-debuginfo-2.6.32-131.25.1.el6.x86_64.rpm SHA-256: da404ac74ce3cc16b843a6cf8f801abb0c32cfa2c485039163eecc05dae06c9e
i386
kernel-2.6.32-131.25.1.el6.i686.rpm SHA-256: 9442f83841827e240ef4747f7de0b341e33db682b59ae7c4980adbec7f34f829
kernel-debug-2.6.32-131.25.1.el6.i686.rpm SHA-256: c708de7cc5112ba50dc9ff1a637c066b4d1545a0d46dea7ca9436cd4b4567604
kernel-debug-debuginfo-2.6.32-131.25.1.el6.i686.rpm SHA-256: 8fc010299811aecdc2ff3fcd93855d47a2108bb08f997af321a8ac354f778db4
kernel-debug-devel-2.6.32-131.25.1.el6.i686.rpm SHA-256: 73f668e8c28981ae0945b6f1914a19ff1b7580eb87f47487ec0c595c33f3cd36
kernel-debuginfo-2.6.32-131.25.1.el6.i686.rpm SHA-256: 83555744a562ba887e4fdee45f85efa23c67ce74e4b15756437f24d0445e7d63
kernel-debuginfo-common-i686-2.6.32-131.25.1.el6.i686.rpm SHA-256: 3ba2852f9050c7b4036dde9aeabdeb08b56d8fb45f1ff549b4f1db58fc777dab
kernel-devel-2.6.32-131.25.1.el6.i686.rpm SHA-256: 2076d4765e222a78b536a1379dcb00965145c25d119f10c4333f79f30e8dc6e2
kernel-doc-2.6.32-131.25.1.el6.noarch.rpm SHA-256: b002dce308308c2f7b0f9730a91ea8571f4784351773939247324aaf82f03e8f
kernel-firmware-2.6.32-131.25.1.el6.noarch.rpm SHA-256: 97cdc972d01d33d5b5dddaabf76b48439a410f1a14baafc9a0ba3fda1eb905f0
kernel-headers-2.6.32-131.25.1.el6.i686.rpm SHA-256: cdce970cba37de90a69747772109385bbd1709ca87a313332b9fc7b582743c12
perf-2.6.32-131.25.1.el6.i686.rpm SHA-256: ff957f2a8032d398ee3dd7cbe9f440a0ba481768faa42849c8b46f59e6201371
perf-debuginfo-2.6.32-131.25.1.el6.i686.rpm SHA-256: 3cd512699b3666bb49650cc9afdd1469c1f161d81de1d747e2913060372082bf

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+