Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:1401 - Security Advisory
Issued:
2012-10-23
Updated:
2012-10-23

RHSA-2012:1401 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A flaw was found in the way socket buffers (skb) requiring TSO (TCP

segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
CVE-2012-3412.

This update also fixes the following bugs:

  • Previously, when a server attempted to shut down a socket, the

svc_tcp_sendto() function set the XPT_CLOSE variable if the entire reply
failed to be transmitted. However, before XPT_CLOSE could be acted upon,
other threads could send further replies before the socket was really shut
down. Consequently, data corruption could occur in the RPC record marker.
With this update, send operations on a closed socket are stopped
immediately, thus preventing this bug. (BZ#853256)

  • When a PIT (Programmable Interval Timer) MSB (Most Significant Byte)

transition occurred very close to an SMI (System Management Interrupt)
execution, the pit_verify_msb() function did not see the MSB transition.
Consequently, the pit_expect_msb() function returned success incorrectly,
eventually causing a large clock drift in the quick_pit_calibrate()
function. As a result, the TSC (Time Stamp Counter) calibration on some
systems was off by ± 20 MHz, which led to inaccurate timekeeping or ntp
synchronization failures. This update fixes pit_expect_msb() and the clock
drift no longer occurs in the described scenario. (BZ#853952)

  • Sometimes, the crypto allocation code could become unresponsive for 60

seconds or multiples thereof due to an incorrect notification mechanism.
This could cause applications, like Openswan, to become unresponsive. The
notification mechanism has been improved to avoid such hangs. (BZ#854475)

  • Traffic to the NFS server could trigger a kernel oops in the

svc_tcp_clear_pages() function. The source code has been modified, and the
kernel oops no longer occurs in this scenario. (BZ#856105)

  • Under certain circumstances, a system crash could result in data loss on

XFS file systems. If files were created immediately before the file system
was left to idle for a long period of time and then the system crashed,
those files could appear as zero-length once the file system was remounted.
This occurred even if a sync or fsync was run on the files. This was
because XFS was not correctly idling the journal, and therefore it
incorrectly replayed the inode allocation transactions upon mounting after
the system crash, which zeroed the file size. This problem has been fixed
by re-instating the periodic journal idling logic to ensure that all
metadata is flushed within 30 seconds of modification, and the journal is
updated to prevent incorrect recovery operations from occurring.
(BZ#856685)

  • On architectures with the 64-bit cputime_t type, it was possible to

trigger the "divide by zero" error, namely, on long-lived processes. A
patch has been applied to address this problem, and the "divide by zero"
error no longer occurs under these circumstances. (BZ#856702)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 i386
  • Red Hat Storage 2.0 x86_64
  • Red Hat Gluster Storage Server for On-premise 2.0 x86_64
  • Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64
  • Red Hat Enterprise Linux Server - AUS 6.2 x86_64

Fixes

  • BZ - 844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option

CVEs

  • CVE-2012-3412

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 86835d007efec6395341ec5f233009736996d8c72bf0c70d2a7f9ece6136b933
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
i386
kernel-2.6.32-220.28.1.el6.i686.rpm SHA-256: dc42851609bd9c143793c22f4ab5add2990d6db7a9212f3d02018dd8bd9755c6
kernel-debug-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5c368740f8709a5a63ba8b48509840df9a062f3cc179647c726feda7252aac0f
kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
kernel-debug-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5f3699302a0433b7341ec6c6d804513c3da571b88492e0c8ceef87f12633251c
kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
kernel-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: d984d20e430c5f9d13e6eb70c47dfb6c3ed4668d691f705637c75f07c6d24d36
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.i686.rpm SHA-256: 69b14e7f6a5cc3723b44a31041fe0fe8205bbc98bced4d58725c869a335a384b
perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: b8f56b012fffe1859f50c9480d655b4ccb493459f8ef80781638884a8950d25f
perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
python-perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: 39673bcba6cc539db00b313de211f5f207496a911ccd716424f3e4afd70871f9
python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c
python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
s390x
kernel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 606ca9a78c2f30bca3b1cd50f61841e04aea9f39325b6d9213b535e8c9a068fa
kernel-debug-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 4905e234248ca585fd7fe1215f311913342a2e8f6356d2d6c040658795ce6767
kernel-debug-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3e0c7c3d9a25bdc49cfaf313e1b89de516da7a0904af18e3a2e205d25b041f06
kernel-debug-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3e0c7c3d9a25bdc49cfaf313e1b89de516da7a0904af18e3a2e205d25b041f06
kernel-debug-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: e3ece8eba9f1e229b5c8788ecff36e9a0247a895b8d32ceb1bbf9b4b5331de2e
kernel-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 546e52bc8577c5c2af4d2183ca82e3566fa47024917ef9aa742551b4a9714970
kernel-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 546e52bc8577c5c2af4d2183ca82e3566fa47024917ef9aa742551b4a9714970
kernel-debuginfo-common-s390x-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 6bd8b20b641a4614ce5707f8556735657c4bbc92747adb5853e12f1f734a60fe
kernel-debuginfo-common-s390x-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 6bd8b20b641a4614ce5707f8556735657c4bbc92747adb5853e12f1f734a60fe
kernel-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3ba5c05545b42aea019a422ae58cdc91cce7563b66e4236d923cac752f5f3cd0
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.s390x.rpm SHA-256: f2ce352674c8dce71bb0fd38541af5dc8f8aa4e125a6dc77a0f78934088c7af3
kernel-kdump-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 57f93b297cbfe7775e2268a78bcd75393e21f02db1fa1955e7aeccf3d07f7454
kernel-kdump-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 7c0fa3eaaa0e4e5d380526c09ace88869d1f0018e7d02bccd867c8e8b0765634
kernel-kdump-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 7c0fa3eaaa0e4e5d380526c09ace88869d1f0018e7d02bccd867c8e8b0765634
kernel-kdump-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: fa7da48abf8a2195dc8c7e2a14d9d9d0b5f3eae93e9f7afe8abff764ff96ad18
perf-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 213549bbb7120ca81c084fdc3a7c64e0515217fdc142c2ca116071d88cb1876f
perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3aa05dfada3afe0437339f961f8cbe67ed4612972d96a145377b78070a06d71d
perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3aa05dfada3afe0437339f961f8cbe67ed4612972d96a145377b78070a06d71d
python-perf-2.6.32-220.28.1.el6.s390x.rpm SHA-256: bea5852e6fe648f5cc2e07474bbb69b5790eda8de002c2ea42f14298aa4f6e83
python-perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: b6528bb866de61d9bb68676deea1f55010307944c3b503bc52049da3635a7694
python-perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: b6528bb866de61d9bb68676deea1f55010307944c3b503bc52049da3635a7694

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
ppc64
kernel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c884cb498cc8c7a0c0e710076d3a4dd5a9615ae9a3955d20c8119c5adfe2b0ef
kernel-bootwrapper-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 216917422cf0660f1d79ed66b8ac1fe972b59f621db117e03af27e9f55409b54
kernel-debug-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 29ddee33c7f53822e9bc4c301a0123315af28ffb735758e092e662e1df45af9a
kernel-debug-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 34e8da2f8439bf0731c89b34854eefb34766421a49fc0387cfd0354ed09f23a3
kernel-debug-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 34e8da2f8439bf0731c89b34854eefb34766421a49fc0387cfd0354ed09f23a3
kernel-debug-devel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 12a7e7db3781fc98503ef3748dd98eec75fba716d7ab93bbf4aa30f1bcc46e82
kernel-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6c18dc59e422902b7971109758f592e5edf9fa09ecaba43cc1351df502195e2f
kernel-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6c18dc59e422902b7971109758f592e5edf9fa09ecaba43cc1351df502195e2f
kernel-debuginfo-common-ppc64-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: f19ee8d9bbfd724960bcfd35efa0c83bbd14151b0f3e89cec857b17d6e1bf1e7
kernel-debuginfo-common-ppc64-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: f19ee8d9bbfd724960bcfd35efa0c83bbd14151b0f3e89cec857b17d6e1bf1e7
kernel-devel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6bbd28dc882ab8179a698321757153a9ba02508edbb18359d02bb34dd642c440
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: fb0e1637db057ea27c6d30f61d2adbed2f23901b130c08b631a0d5bcc29f6aca
perf-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c2c6c8636429cad4de0990b4d06286e7bf20012fa9a1a5b5fe45d6952a5fdd36
perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c1e872d51188902ee27a185637d0aee19779d1ca88773f51fe5dbfdbf1e6a426
perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c1e872d51188902ee27a185637d0aee19779d1ca88773f51fe5dbfdbf1e6a426
python-perf-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 93925628145a460f9901efe2ec538dff95813a75c47aed816d62ba36b71f89ff
python-perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: ff4a4bd2976d3d3fffec5dbd6355fab409c3b6dddda7c94d0f0c5f6fe8179de6
python-perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: ff4a4bd2976d3d3fffec5dbd6355fab409c3b6dddda7c94d0f0c5f6fe8179de6

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
i386
kernel-2.6.32-220.28.1.el6.i686.rpm SHA-256: dc42851609bd9c143793c22f4ab5add2990d6db7a9212f3d02018dd8bd9755c6
kernel-debug-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5c368740f8709a5a63ba8b48509840df9a062f3cc179647c726feda7252aac0f
kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
kernel-debug-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5f3699302a0433b7341ec6c6d804513c3da571b88492e0c8ceef87f12633251c
kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
kernel-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: d984d20e430c5f9d13e6eb70c47dfb6c3ed4668d691f705637c75f07c6d24d36
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.i686.rpm SHA-256: 69b14e7f6a5cc3723b44a31041fe0fe8205bbc98bced4d58725c869a335a384b
perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: b8f56b012fffe1859f50c9480d655b4ccb493459f8ef80781638884a8950d25f
perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c

Red Hat Storage 2.0

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

Red Hat Gluster Storage Server for On-premise 2.0

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

Red Hat Storage for Public Cloud (via RHUI) 2.0

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

Red Hat Enterprise Linux Server - AUS 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 86835d007efec6395341ec5f233009736996d8c72bf0c70d2a7f9ece6136b933
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter