Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2012:1401 - Security Advisory
Issued:
2012-10-23
Updated:
2012-10-23

RHSA-2012:1401 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A flaw was found in the way socket buffers (skb) requiring TSO (TCP

segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
CVE-2012-3412.

This update also fixes the following bugs:

  • Previously, when a server attempted to shut down a socket, the

svc_tcp_sendto() function set the XPT_CLOSE variable if the entire reply
failed to be transmitted. However, before XPT_CLOSE could be acted upon,
other threads could send further replies before the socket was really shut
down. Consequently, data corruption could occur in the RPC record marker.
With this update, send operations on a closed socket are stopped
immediately, thus preventing this bug. (BZ#853256)

  • When a PIT (Programmable Interval Timer) MSB (Most Significant Byte)

transition occurred very close to an SMI (System Management Interrupt)
execution, the pit_verify_msb() function did not see the MSB transition.
Consequently, the pit_expect_msb() function returned success incorrectly,
eventually causing a large clock drift in the quick_pit_calibrate()
function. As a result, the TSC (Time Stamp Counter) calibration on some
systems was off by ± 20 MHz, which led to inaccurate timekeeping or ntp
synchronization failures. This update fixes pit_expect_msb() and the clock
drift no longer occurs in the described scenario. (BZ#853952)

  • Sometimes, the crypto allocation code could become unresponsive for 60

seconds or multiples thereof due to an incorrect notification mechanism.
This could cause applications, like Openswan, to become unresponsive. The
notification mechanism has been improved to avoid such hangs. (BZ#854475)

  • Traffic to the NFS server could trigger a kernel oops in the

svc_tcp_clear_pages() function. The source code has been modified, and the
kernel oops no longer occurs in this scenario. (BZ#856105)

  • Under certain circumstances, a system crash could result in data loss on

XFS file systems. If files were created immediately before the file system
was left to idle for a long period of time and then the system crashed,
those files could appear as zero-length once the file system was remounted.
This occurred even if a sync or fsync was run on the files. This was
because XFS was not correctly idling the journal, and therefore it
incorrectly replayed the inode allocation transactions upon mounting after
the system crash, which zeroed the file size. This problem has been fixed
by re-instating the periodic journal idling logic to ensure that all
metadata is flushed within 30 seconds of modification, and the journal is
updated to prevent incorrect recovery operations from occurring.
(BZ#856685)

  • On architectures with the 64-bit cputime_t type, it was possible to

trigger the "divide by zero" error, namely, on long-lived processes. A
patch has been applied to address this problem, and the "divide by zero"
error no longer occurs under these circumstances. (BZ#856702)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 i386
  • Red Hat Storage 2.0 x86_64
  • Red Hat Gluster Storage Server for On-premise 2.0 x86_64
  • Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64
  • Red Hat Enterprise Linux Server - AUS 6.2 x86_64

Fixes

  • BZ - 844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option

CVEs

  • CVE-2012-3412

References

  • https://access.redhat.com/security/updates/classification/#important
  • Note: More recent versions of these packages may be available. Click a package name for more details.

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2

    SRPM
    kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
    x86_64
    kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
    kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
    kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
    kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
    kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
    kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
    kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
    kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
    perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
    perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
    perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
    python-perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 86835d007efec6395341ec5f233009736996d8c72bf0c70d2a7f9ece6136b933
    python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
    python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
    i386
    kernel-2.6.32-220.28.1.el6.i686.rpm SHA-256: dc42851609bd9c143793c22f4ab5add2990d6db7a9212f3d02018dd8bd9755c6
    kernel-debug-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5c368740f8709a5a63ba8b48509840df9a062f3cc179647c726feda7252aac0f
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
    kernel-debug-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5f3699302a0433b7341ec6c6d804513c3da571b88492e0c8ceef87f12633251c
    kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
    kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
    kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
    kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
    kernel-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: d984d20e430c5f9d13e6eb70c47dfb6c3ed4668d691f705637c75f07c6d24d36
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.i686.rpm SHA-256: 69b14e7f6a5cc3723b44a31041fe0fe8205bbc98bced4d58725c869a335a384b
    perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: b8f56b012fffe1859f50c9480d655b4ccb493459f8ef80781638884a8950d25f
    perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
    perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
    python-perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: 39673bcba6cc539db00b313de211f5f207496a911ccd716424f3e4afd70871f9
    python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c
    python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c

    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2

    SRPM
    kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
    s390x
    kernel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 606ca9a78c2f30bca3b1cd50f61841e04aea9f39325b6d9213b535e8c9a068fa
    kernel-debug-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 4905e234248ca585fd7fe1215f311913342a2e8f6356d2d6c040658795ce6767
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3e0c7c3d9a25bdc49cfaf313e1b89de516da7a0904af18e3a2e205d25b041f06
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3e0c7c3d9a25bdc49cfaf313e1b89de516da7a0904af18e3a2e205d25b041f06
    kernel-debug-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: e3ece8eba9f1e229b5c8788ecff36e9a0247a895b8d32ceb1bbf9b4b5331de2e
    kernel-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 546e52bc8577c5c2af4d2183ca82e3566fa47024917ef9aa742551b4a9714970
    kernel-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 546e52bc8577c5c2af4d2183ca82e3566fa47024917ef9aa742551b4a9714970
    kernel-debuginfo-common-s390x-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 6bd8b20b641a4614ce5707f8556735657c4bbc92747adb5853e12f1f734a60fe
    kernel-debuginfo-common-s390x-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 6bd8b20b641a4614ce5707f8556735657c4bbc92747adb5853e12f1f734a60fe
    kernel-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3ba5c05545b42aea019a422ae58cdc91cce7563b66e4236d923cac752f5f3cd0
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.s390x.rpm SHA-256: f2ce352674c8dce71bb0fd38541af5dc8f8aa4e125a6dc77a0f78934088c7af3
    kernel-kdump-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 57f93b297cbfe7775e2268a78bcd75393e21f02db1fa1955e7aeccf3d07f7454
    kernel-kdump-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 7c0fa3eaaa0e4e5d380526c09ace88869d1f0018e7d02bccd867c8e8b0765634
    kernel-kdump-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 7c0fa3eaaa0e4e5d380526c09ace88869d1f0018e7d02bccd867c8e8b0765634
    kernel-kdump-devel-2.6.32-220.28.1.el6.s390x.rpm SHA-256: fa7da48abf8a2195dc8c7e2a14d9d9d0b5f3eae93e9f7afe8abff764ff96ad18
    perf-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 213549bbb7120ca81c084fdc3a7c64e0515217fdc142c2ca116071d88cb1876f
    perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3aa05dfada3afe0437339f961f8cbe67ed4612972d96a145377b78070a06d71d
    perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: 3aa05dfada3afe0437339f961f8cbe67ed4612972d96a145377b78070a06d71d
    python-perf-2.6.32-220.28.1.el6.s390x.rpm SHA-256: bea5852e6fe648f5cc2e07474bbb69b5790eda8de002c2ea42f14298aa4f6e83
    python-perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: b6528bb866de61d9bb68676deea1f55010307944c3b503bc52049da3635a7694
    python-perf-debuginfo-2.6.32-220.28.1.el6.s390x.rpm SHA-256: b6528bb866de61d9bb68676deea1f55010307944c3b503bc52049da3635a7694

    Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2

    SRPM
    kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
    ppc64
    kernel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c884cb498cc8c7a0c0e710076d3a4dd5a9615ae9a3955d20c8119c5adfe2b0ef
    kernel-bootwrapper-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 216917422cf0660f1d79ed66b8ac1fe972b59f621db117e03af27e9f55409b54
    kernel-debug-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 29ddee33c7f53822e9bc4c301a0123315af28ffb735758e092e662e1df45af9a
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 34e8da2f8439bf0731c89b34854eefb34766421a49fc0387cfd0354ed09f23a3
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 34e8da2f8439bf0731c89b34854eefb34766421a49fc0387cfd0354ed09f23a3
    kernel-debug-devel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 12a7e7db3781fc98503ef3748dd98eec75fba716d7ab93bbf4aa30f1bcc46e82
    kernel-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6c18dc59e422902b7971109758f592e5edf9fa09ecaba43cc1351df502195e2f
    kernel-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6c18dc59e422902b7971109758f592e5edf9fa09ecaba43cc1351df502195e2f
    kernel-debuginfo-common-ppc64-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: f19ee8d9bbfd724960bcfd35efa0c83bbd14151b0f3e89cec857b17d6e1bf1e7
    kernel-debuginfo-common-ppc64-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: f19ee8d9bbfd724960bcfd35efa0c83bbd14151b0f3e89cec857b17d6e1bf1e7
    kernel-devel-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 6bbd28dc882ab8179a698321757153a9ba02508edbb18359d02bb34dd642c440
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: fb0e1637db057ea27c6d30f61d2adbed2f23901b130c08b631a0d5bcc29f6aca
    perf-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c2c6c8636429cad4de0990b4d06286e7bf20012fa9a1a5b5fe45d6952a5fdd36
    perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c1e872d51188902ee27a185637d0aee19779d1ca88773f51fe5dbfdbf1e6a426
    perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: c1e872d51188902ee27a185637d0aee19779d1ca88773f51fe5dbfdbf1e6a426
    python-perf-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: 93925628145a460f9901efe2ec538dff95813a75c47aed816d62ba36b71f89ff
    python-perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: ff4a4bd2976d3d3fffec5dbd6355fab409c3b6dddda7c94d0f0c5f6fe8179de6
    python-perf-debuginfo-2.6.32-220.28.1.el6.ppc64.rpm SHA-256: ff4a4bd2976d3d3fffec5dbd6355fab409c3b6dddda7c94d0f0c5f6fe8179de6

    Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2

    SRPM
    kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
    x86_64
    kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
    kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
    kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
    kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
    kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
    kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
    perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
    perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
    python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
    i386
    kernel-2.6.32-220.28.1.el6.i686.rpm SHA-256: dc42851609bd9c143793c22f4ab5add2990d6db7a9212f3d02018dd8bd9755c6
    kernel-debug-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5c368740f8709a5a63ba8b48509840df9a062f3cc179647c726feda7252aac0f
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 99e26cbda4d6fa8d267a169cf3e5303f4be5aa04bfa0750f27f38fce75daac70
    kernel-debug-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: 5f3699302a0433b7341ec6c6d804513c3da571b88492e0c8ceef87f12633251c
    kernel-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 2376bcfbc710af0b352a5cd44fdedb089d3973d970b9693162fd9c8a0bc078b2
    kernel-debuginfo-common-i686-2.6.32-220.28.1.el6.i686.rpm SHA-256: 02a6208d43e840abf8ad705cd78fefff8cfb3e95ed81e0585b63209a32154908
    kernel-devel-2.6.32-220.28.1.el6.i686.rpm SHA-256: d984d20e430c5f9d13e6eb70c47dfb6c3ed4668d691f705637c75f07c6d24d36
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.i686.rpm SHA-256: 69b14e7f6a5cc3723b44a31041fe0fe8205bbc98bced4d58725c869a335a384b
    perf-2.6.32-220.28.1.el6.i686.rpm SHA-256: b8f56b012fffe1859f50c9480d655b4ccb493459f8ef80781638884a8950d25f
    perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 7080fe46b6149fc1c6c6af0f067668e61cee9075666ab2b96124f1b33ef5b909
    python-perf-debuginfo-2.6.32-220.28.1.el6.i686.rpm SHA-256: 547d3ea35cfc115ced9d0804cc51efcae94617eabe597e3d9326f53ecff63f8c

    Red Hat Storage 2.0

    SRPM
    kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
    x86_64
    kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
    kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
    kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
    kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
    kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
    kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
    perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
    perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
    python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

    Red Hat Gluster Storage Server for On-premise 2.0

    SRPM
    kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
    x86_64
    kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
    kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
    kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
    kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
    kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
    kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
    perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
    perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
    python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

    Red Hat Storage for Public Cloud (via RHUI) 2.0

    SRPM
    kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
    x86_64
    kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
    kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
    kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
    kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
    kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
    kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
    perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
    perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
    python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

    Red Hat Enterprise Linux Server - AUS 6.2

    SRPM
    kernel-2.6.32-220.28.1.el6.src.rpm SHA-256: 2bf32731ace55b8f078b7afcfd70c7b4bf3e84ae7656b3463d93599f3a1242d8
    x86_64
    kernel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 8dcde836a0613fe021abaa6c3d40d104d36818d84c26b19c1968846733f8d79a
    kernel-debug-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5443516e40878d437accd27c951ae6b4de430d33b0d36591b2c8de393a976238
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
    kernel-debug-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: a0d34bd2eaddc23532c3ea0a97727d63c501e08e70fc542005d0bcdadf6af016
    kernel-debug-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 153da43b84c817cbb71102a63fffa91be794c9d9e96609054119da546eee3239
    kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
    kernel-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 1aa1e26f435392e5f9ca096f8f0caf6b182580388e4761c75ac352c11727a83c
    kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
    kernel-debuginfo-common-x86_64-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 2c1511435a289096665c95bf76173fff5967d62ab422c4e75d758cbe32ba6900
    kernel-devel-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 85687cf233bf41b50a81254f775190a89929087dffee34b46ec64e86a14c69d5
    kernel-doc-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 5ddb81d4c82d9eec3d1bef04b4d26fc34c699aaba8b434d7b2142d6edd31fa82
    kernel-firmware-2.6.32-220.28.1.el6.noarch.rpm SHA-256: 501e01adb63b28534a03ac597a2bfc999b26d3520107e93e7fd76add8c117803
    kernel-headers-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 5eaf6d455e0867d6677fad67411f399495ef5d3710f434f92ac8d3346b4a4f0d
    perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: e4c5b5c8041dcde2632adb241752e419bec0d4c77c07019bec8ed36d8dee27fc
    perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
    perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 157833c50885a7bcc638fe33519a90cc5d91751c7f16e6cba48153c97777d180
    python-perf-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 86835d007efec6395341ec5f233009736996d8c72bf0c70d2a7f9ece6136b933
    python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8
    python-perf-debuginfo-2.6.32-220.28.1.el6.x86_64.rpm SHA-256: 9613e5d3dbd57484bbd7425d989c5109d01f2401963079776ae4458cc4b395d8

    The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

    Red Hat

    Quick Links

    • Downloads
    • Subscriptions
    • Support Cases
    • Customer Service
    • Product Documentation

    Help

    • Contact Us
    • Customer Portal FAQ
    • Log-in Assistance

    Site Info

    • Trust Red Hat
    • Browser Support Policy
    • Accessibility
    • Awards and Recognition
    • Colophon

    Related Sites

    • redhat.com
    • openshift.com
    • developers.redhat.com
    • connect.redhat.com

    About

    • Red Hat Subscription Value
    • About Red Hat
    • Red Hat Jobs
    Copyright © 2021 Red Hat, Inc.
    • Privacy Statement
    • Customer Portal Terms of Use
    • All Policies and Guidelines
    Red Hat Summit
    Twitter Facebook