Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:1401 - Security Advisory
Issued:
2012-10-23
Updated:
2012-10-23

RHSA-2012:1401 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A flaw was found in the way socket buffers (skb) requiring TSO (TCP

segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
CVE-2012-3412.

This update also fixes the following bugs:

  • Previously, when a server attempted to shut down a socket, the

svc_tcp_sendto() function set the XPT_CLOSE variable if the entire reply
failed to be transmitted. However, before XPT_CLOSE could be acted upon,
other threads could send further replies before the socket was really shut
down. Consequently, data corruption could occur in the RPC record marker.
With this update, send operations on a closed socket are stopped
immediately, thus preventing this bug. (BZ#853256)

  • When a PIT (Programmable Interval Timer) MSB (Most Significant Byte)

transition occurred very close to an SMI (System Management Interrupt)
execution, the pit_verify_msb() function did not see the MSB transition.
Consequently, the pit_expect_msb() function returned success incorrectly,
eventually causing a large clock drift in the quick_pit_calibrate()
function. As a result, the TSC (Time Stamp Counter) calibration on some
systems was off by ± 20 MHz, which led to inaccurate timekeeping or ntp
synchronization failures. This update fixes pit_expect_msb() and the clock
drift no longer occurs in the described scenario. (BZ#853952)

  • Sometimes, the crypto allocation code could become unresponsive for 60

seconds or multiples thereof due to an incorrect notification mechanism.
This could cause applications, like Openswan, to become unresponsive. The
notification mechanism has been improved to avoid such hangs. (BZ#854475)

  • Traffic to the NFS server could trigger a kernel oops in the

svc_tcp_clear_pages() function. The source code has been modified, and the
kernel oops no longer occurs in this scenario. (BZ#856105)

  • Under certain circumstances, a system crash could result in data loss on

XFS file systems. If files were created immediately before the file system
was left to idle for a long period of time and then the system crashed,
those files could appear as zero-length once the file system was remounted.
This occurred even if a sync or fsync was run on the files. This was
because XFS was not correctly idling the journal, and therefore it
incorrectly replayed the inode allocation transactions upon mounting after
the system crash, which zeroed the file size. This problem has been fixed
by re-instating the periodic journal idling logic to ensure that all
metadata is flushed within 30 seconds of modification, and the journal is
updated to prevent incorrect recovery operations from occurring.
(BZ#856685)

  • On architectures with the 64-bit cputime_t type, it was possible to

trigger the "divide by zero" error, namely, on long-lived processes. A
patch has been applied to address this problem, and the "divide by zero"
error no longer occurs under these circumstances. (BZ#856702)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 i386
  • Red Hat Enterprise Linux Server - AUS 6.2 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 i386
  • Red Hat Storage 2.0 x86_64
  • Red Hat Gluster Storage Server for On-premise 2.0 x86_64
  • Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64

Fixes

  • BZ - 844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option

CVEs

  • CVE-2012-3412

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 86835d007efec6395341ec5f233009736996d8c72bf0c70d2a7f9ece6136b933
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
i386
kernel-2.6.32-220.28.1.el6.i686.rpm SHA-256: dc42851609bd9c143793c22f4ab5add2990d6db7a9212f3d02018dd8bd9755c6
kernel-debug-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5c368740f8709a5a63ba8b48509840df9a062f3cc179647c726feda7252aac0f
kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
kernel-debug-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5f3699302a0433b7341ec6c6d804513c3da571b88492e0c8ceef87f12633251c
kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
kernel-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: d984d20e430c5f9d13e6eb70c47dfb6c3ed4668d691f705637c75f07c6d24d36
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.i686.rpm SHA-256: 69b14e7f6a5cc3723b44a31041fe0fe8205bbc98bced4d58725c869a335a384b
perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: b8f56b012fffe1859f50c9480d655b4ccb493459f8ef80781638884a8950d25f
perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
python-perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: 39673bcba6cc539db00b313de211f5f207496a911ccd716424f3e4afd70871f9
python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c
python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
s390x
kernel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 606ca9a78c2f30bca3b1cd50f61841e04aea9f39325b6d9213b535e8c9a068fa
kernel-debug-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 4905e234248ca585fd7fe1215f311913342a2e8f6356d2d6c040658795ce6767
kernel-debug-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3e0c7c3d9a25bdc49cfaf313e1b89de516da7a0904af18e3a2e205d25b041f06
kernel-debug-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3e0c7c3d9a25bdc49cfaf313e1b89de516da7a0904af18e3a2e205d25b041f06
kernel-debug-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: e3ece8eba9f1e229b5c8788ecff36e9a0247a895b8d32ceb1bbf9b4b5331de2e
kernel-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 546e52bc8577c5c2af4d2183ca82e3566fa47024917ef9aa742551b4a9714970
kernel-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 546e52bc8577c5c2af4d2183ca82e3566fa47024917ef9aa742551b4a9714970
kernel-debuginfo-common-s390x-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 6bd8b20b641a4614ce5707f8556735657c4bbc92747adb5853e12f1f734a60fe
kernel-debuginfo-common-s390x-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 6bd8b20b641a4614ce5707f8556735657c4bbc92747adb5853e12f1f734a60fe
kernel-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3ba5c05545b42aea019a422ae58cdc91cce7563b66e4236d923cac752f5f3cd0
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.s390x.rpm SHA-256: f2ce352674c8dce71bb0fd38541af5dc8f8aa4e125a6dc77a0f78934088c7af3
kernel-kdump-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 57f93b297cbfe7775e2268a78bcd75393e21f02db1fa1955e7aeccf3d07f7454
kernel-kdump-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 7c0fa3eaaa0e4e5d380526c09ace88869d1f0018e7d02bccd867c8e8b0765634
kernel-kdump-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 7c0fa3eaaa0e4e5d380526c09ace88869d1f0018e7d02bccd867c8e8b0765634
kernel-kdump-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: fa7da48abf8a2195dc8c7e2a14d9d9d0b5f3eae93e9f7afe8abff764ff96ad18
perf-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 213549bbb7120ca81c084fdc3a7c64e0515217fdc142c2ca116071d88cb1876f
perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3aa05dfada3afe0437339f961f8cbe67ed4612972d96a145377b78070a06d71d
perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3aa05dfada3afe0437339f961f8cbe67ed4612972d96a145377b78070a06d71d
python-perf-2.6.32-220.28.1.el6.s390x.rpm SHA-256: bea5852e6fe648f5cc2e07474bbb69b5790eda8de002c2ea42f14298aa4f6e83
python-perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: b6528bb866de61d9bb68676deea1f55010307944c3b503bc52049da3635a7694
python-perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: b6528bb866de61d9bb68676deea1f55010307944c3b503bc52049da3635a7694

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
ppc64
kernel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c884cb498cc8c7a0c0e710076d3a4dd5a9615ae9a3955d20c8119c5adfe2b0ef
kernel-bootwrapper-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 216917422cf0660f1d79ed66b8ac1fe972b59f621db117e03af27e9f55409b54
kernel-debug-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 29ddee33c7f53822e9bc4c301a0123315af28ffb735758e092e662e1df45af9a
kernel-debug-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 34e8da2f8439bf0731c89b34854eefb34766421a49fc0387cfd0354ed09f23a3
kernel-debug-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 34e8da2f8439bf0731c89b34854eefb34766421a49fc0387cfd0354ed09f23a3
kernel-debug-devel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 12a7e7db3781fc98503ef3748dd98eec75fba716d7ab93bbf4aa30f1bcc46e82
kernel-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6c18dc59e422902b7971109758f592e5edf9fa09ecaba43cc1351df502195e2f
kernel-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6c18dc59e422902b7971109758f592e5edf9fa09ecaba43cc1351df502195e2f
kernel-debuginfo-common-ppc64-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: f19ee8d9bbfd724960bcfd35efa0c83bbd14151b0f3e89cec857b17d6e1bf1e7
kernel-debuginfo-common-ppc64-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: f19ee8d9bbfd724960bcfd35efa0c83bbd14151b0f3e89cec857b17d6e1bf1e7
kernel-devel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6bbd28dc882ab8179a698321757153a9ba02508edbb18359d02bb34dd642c440
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: fb0e1637db057ea27c6d30f61d2adbed2f23901b130c08b631a0d5bcc29f6aca
perf-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c2c6c8636429cad4de0990b4d06286e7bf20012fa9a1a5b5fe45d6952a5fdd36
perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c1e872d51188902ee27a185637d0aee19779d1ca88773f51fe5dbfdbf1e6a426
perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c1e872d51188902ee27a185637d0aee19779d1ca88773f51fe5dbfdbf1e6a426
python-perf-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 93925628145a460f9901efe2ec538dff95813a75c47aed816d62ba36b71f89ff
python-perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: ff4a4bd2976d3d3fffec5dbd6355fab409c3b6dddda7c94d0f0c5f6fe8179de6
python-perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: ff4a4bd2976d3d3fffec5dbd6355fab409c3b6dddda7c94d0f0c5f6fe8179de6

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
i386
kernel-2.6.32-220.28.1.el6.i686.rpm SHA-256: dc42851609bd9c143793c22f4ab5add2990d6db7a9212f3d02018dd8bd9755c6
kernel-debug-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5c368740f8709a5a63ba8b48509840df9a062f3cc179647c726feda7252aac0f
kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
kernel-debug-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5f3699302a0433b7341ec6c6d804513c3da571b88492e0c8ceef87f12633251c
kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
kernel-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: d984d20e430c5f9d13e6eb70c47dfb6c3ed4668d691f705637c75f07c6d24d36
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.i686.rpm SHA-256: 69b14e7f6a5cc3723b44a31041fe0fe8205bbc98bced4d58725c869a335a384b
perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: b8f56b012fffe1859f50c9480d655b4ccb493459f8ef80781638884a8950d25f
perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c

Red Hat Storage 2.0

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

Red Hat Gluster Storage Server for On-premise 2.0

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

Red Hat Storage for Public Cloud (via RHUI) 2.0

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

Red Hat Enterprise Linux Server - AUS 6.2

SRPM
kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
x86_64
kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
python-perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 86835d007efec6395341ec5f233009736996d8c72bf0c70d2a7f9ece6136b933
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility