Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:1430 - Security Advisory
Issued:
2012-11-06
Updated:
2012-11-06

RHSA-2012:1430 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and three bugs are now
available for Red Hat Enterprise Linux 6.1 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A flaw was found in the way socket buffers (skb) requiring TSO (TCP

segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
this issue.

This update also fixes the following bugs:

  • In the hpet_next_event() function, an interrupt could have occurred

between the read and write of the HPET (High Precision Event Timer) and the
value of HPET_COUNTER was then beyond that being written to the comparator
(HPET_Tn_CMP). Consequently, the timers were overdue for up to several
minutes. Now, a comparison is performed between the value of the counter
and the comparator in the HPET code. If the counter is beyond the
comparator, the "-ETIME" error code is returned, which fixes this bug.
(BZ#855280)

  • Traffic to the NFS server could trigger a kernel oops in the

svc_tcp_clear_pages() function. The source code has been modified, and the
kernel oops no longer occurs in this scenario. (BZ#856104)

  • A kernel oops occurred in the nf_nat code when a bogus pointer was

dereferenced in the nf_conn_nat structure. Consequently, if Source Network
Address Translation (SNAT) was performed, incorrect information could be
received by other CTS (Clear to Send) signals. A conntrack entry is now
placed in the source hash after SNAT has been completed, which prevents the
described problems. (BZ#865714)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

  • BZ - 844714 - CVE-2012-3412 kernel: sfc: potential remote denial of service through TCP MSS option

CVEs

  • CVE-2012-3412

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.35.1.el6.src.rpm SHA-256: dca013fe39fdc45b6f63807a879cb1d0af7be622d3bc942a1bee3ca7b3fbc36d
x86_64
kernel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: a2b3cf3c073e7647a04fd69ae5edd421d0c1bc556380ccdac6c19abaeef09659
kernel-debug-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 4706bebd1b2ac717a306e86c818e687e148901a6c958d5595a9962be54d57d46
kernel-debug-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 17ec1e7b506e5251907221ea2c2519c624a949e8635ff37b3219d08be7ba649c
kernel-debug-devel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 8080a4c60d01bbaf0ebcfcdbe56567356f05e7a222e7a06ccd7449b14c7dc135
kernel-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: c769302ccf74ea527ef92b8e17f1ff1c3660c2602261e64a8855f9c4f42b8059
kernel-debuginfo-common-x86_64-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 2e65c59d1497cc272393133470dd0e7778de3c776237e3dfe677150783111d5b
kernel-devel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: a5703088b7eaae497a2fd4f0df35fc08b70d68cdb42a1828daa987887b45961b
kernel-doc-2.6.32-131.35.1.el6.noarch.rpm SHA-256: 471ee9555202786dcf688c53e27587565b4334e7439838321671a6619b78659d
kernel-firmware-2.6.32-131.35.1.el6.noarch.rpm SHA-256: adbda799a58a393508f81ef3d8de89e040ffbc09a57310d71f06409bac73f90c
kernel-headers-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 001a30a7123bef4fe5fd7f2df524b1b44db92a56f9e83b7204c6a14ed2590103
perf-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: ca39ec9fbfeea189fd9480023001944b96add0b46d746be3eff501119aa79408
perf-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 7590f18e23c8627bd278c04e8e64ccef642917a1030a4783f9d44cce8ca78de5
i386
kernel-2.6.32-131.35.1.el6.i686.rpm SHA-256: 3e2fb7c1a3a9336c458586ecab47b331bafafd29d4fbcd4e5e63a57a40be87b3
kernel-debug-2.6.32-131.35.1.el6.i686.rpm SHA-256: f22765bbd12d1946ca9b4410d9c9369caa4c557644a627e182de6637a5779191
kernel-debug-debuginfo-2.6.32-131.35.1.el6.i686.rpm SHA-256: 4381e90ad43dc275625062f43716511ca29a5a98551d5a6d25ee4c755e003dd5
kernel-debug-devel-2.6.32-131.35.1.el6.i686.rpm SHA-256: 8bf13db27cf03a51585064596cbf33bb023f92cf4a1f1d88420008695132ffe2
kernel-debuginfo-2.6.32-131.35.1.el6.i686.rpm SHA-256: 8c50ffb70fe4ef5b69c7855529ec547ab1947d31a7a950acba15eb5830222dc7
kernel-debuginfo-common-i686-2.6.32-131.35.1.el6.i686.rpm SHA-256: a94aeb8b5e99fb2191322491e395b8c6b7e7db8c5fa01a0f2289a9250c9574da
kernel-devel-2.6.32-131.35.1.el6.i686.rpm SHA-256: ea3af25a33e1a8acf49e887367ade47980d9a4ac71816402fb7c683406ec481d
kernel-doc-2.6.32-131.35.1.el6.noarch.rpm SHA-256: 471ee9555202786dcf688c53e27587565b4334e7439838321671a6619b78659d
kernel-firmware-2.6.32-131.35.1.el6.noarch.rpm SHA-256: adbda799a58a393508f81ef3d8de89e040ffbc09a57310d71f06409bac73f90c
kernel-headers-2.6.32-131.35.1.el6.i686.rpm SHA-256: a12567905ad050893d3c2df3f3e742173234218eaa69a9e19e16d648b218a13e
perf-2.6.32-131.35.1.el6.i686.rpm SHA-256: d157574d4e231473263cbe14adf2f8572e2f8dff55054436be65493f628bc2c6
perf-debuginfo-2.6.32-131.35.1.el6.i686.rpm SHA-256: 7188dd23d07380689b98b5b4de72660122cf8224ab6fc15a84548a3e84bd4db4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.35.1.el6.src.rpm SHA-256: dca013fe39fdc45b6f63807a879cb1d0af7be622d3bc942a1bee3ca7b3fbc36d
s390x
kernel-2.6.32-131.35.1.el6.s390x.rpm SHA-256: e0bbe1983489549212427ee3fd9aa20bbdd94d550022cb21da3b864716cd6a3e
kernel-debug-2.6.32-131.35.1.el6.s390x.rpm SHA-256: 10de9f0db2e0458c4408329c5bb4fa49d235e93a6a5988971774df020f76638c
kernel-debug-debuginfo-2.6.32-131.35.1.el6.s390x.rpm SHA-256: b7e20221731e90d81e601b7e568ccfdc9d4370b7b14ee5883c5db69d3e1ef5b0
kernel-debug-devel-2.6.32-131.35.1.el6.s390x.rpm SHA-256: 59986acaa3e96328b11dbd277c4c08978cfd3525469dacd79a3dabf7ab241189
kernel-debuginfo-2.6.32-131.35.1.el6.s390x.rpm SHA-256: 49aaeefc25022d9437d7507e9e5839fd12ba61429b074fd59e2e16d4d6565a98
kernel-debuginfo-common-s390x-2.6.32-131.35.1.el6.s390x.rpm SHA-256: a139189c107b1897b46d796aa47330ffcdca62eb674e252d4ef2900c3ba4405c
kernel-devel-2.6.32-131.35.1.el6.s390x.rpm SHA-256: 58166fe442bfe567269cbabc2812d9c14d93253c70f0ee7508e3dfa8a6805a99
kernel-doc-2.6.32-131.35.1.el6.noarch.rpm SHA-256: 471ee9555202786dcf688c53e27587565b4334e7439838321671a6619b78659d
kernel-firmware-2.6.32-131.35.1.el6.noarch.rpm SHA-256: adbda799a58a393508f81ef3d8de89e040ffbc09a57310d71f06409bac73f90c
kernel-headers-2.6.32-131.35.1.el6.s390x.rpm SHA-256: d535b2d5b8cb3dc99f9bde75b9155304addc641645e9ec018087cd41d96af883
kernel-kdump-2.6.32-131.35.1.el6.s390x.rpm SHA-256: 3d2367a7a92ee3c8d22d6514d4b75374a431bcdfe1ed516b98533ef2f6693208
kernel-kdump-debuginfo-2.6.32-131.35.1.el6.s390x.rpm SHA-256: ef6201c1410a3ca0a81d5d7532555001979a9c0ea39139e228ee55f11613865f
kernel-kdump-devel-2.6.32-131.35.1.el6.s390x.rpm SHA-256: cf4af630f18fb0a77a875307e9b69a931aca4e25c6411f33fecdb4d00da66a97
perf-2.6.32-131.35.1.el6.s390x.rpm SHA-256: 1aaf23346aa2c48206ecfd3e9fbcd3e2efdbacb80f8406c1e93257a1901d567d
perf-debuginfo-2.6.32-131.35.1.el6.s390x.rpm SHA-256: a79b0ae09451fb59f86e25e8facd1e6641262d79ba1e6a905e1a67eeb4b7f82f

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.35.1.el6.src.rpm SHA-256: dca013fe39fdc45b6f63807a879cb1d0af7be622d3bc942a1bee3ca7b3fbc36d
ppc64
kernel-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: 9e5be5018835ecdc9078958e3fbfba0639326a59f201a80eb532f0dc5d81df1d
kernel-bootwrapper-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: a4f0a172af6db0199bb4af567ae2367b5bf9ea51296438276e08b3a20262b306
kernel-debug-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: 2b05c13788e4d0c57c3f71dbd429affdb7ad27e61ed603397459457135446287
kernel-debug-debuginfo-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: 902da3cccc5629c674426342057a5a81f244a0cf73d463a3878b77c7e39ed37b
kernel-debug-devel-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: a4285621c951c2c59656f1ff0554f44e21b57a2d8021566a3ddc4bcb37ff0437
kernel-debuginfo-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: 24751f0b69ad8e2f39cf7fccecc54a1e476fc79d6d36155c29357f280a84d127
kernel-debuginfo-common-ppc64-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: 8117c88fb3f8896ee986fb304687efdc1ee13c9d1ce7b0465d77452455ef1b25
kernel-devel-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: 52618c4d1ffa5393354a4cec0127719d592bfb6572693db3a9aa2ea9728d3574
kernel-doc-2.6.32-131.35.1.el6.noarch.rpm SHA-256: 471ee9555202786dcf688c53e27587565b4334e7439838321671a6619b78659d
kernel-firmware-2.6.32-131.35.1.el6.noarch.rpm SHA-256: adbda799a58a393508f81ef3d8de89e040ffbc09a57310d71f06409bac73f90c
kernel-headers-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: 9dec70d1d6c7532e865b6f67ae4615376e75c64afc3996125a0879a1600d6f43
perf-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: fe9e66f7a2955747573c502248f1ab5878bbe25edbb71d8a0435b03ac736b7f5
perf-debuginfo-2.6.32-131.35.1.el6.ppc64.rpm SHA-256: 5bb36f5cb7cc10945e41441464d7c9735a66d171b719fe9245888d0ba1e3eed7

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
kernel-2.6.32-131.35.1.el6.src.rpm SHA-256: dca013fe39fdc45b6f63807a879cb1d0af7be622d3bc942a1bee3ca7b3fbc36d
x86_64
kernel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: a2b3cf3c073e7647a04fd69ae5edd421d0c1bc556380ccdac6c19abaeef09659
kernel-debug-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 4706bebd1b2ac717a306e86c818e687e148901a6c958d5595a9962be54d57d46
kernel-debug-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 17ec1e7b506e5251907221ea2c2519c624a949e8635ff37b3219d08be7ba649c
kernel-debug-devel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 8080a4c60d01bbaf0ebcfcdbe56567356f05e7a222e7a06ccd7449b14c7dc135
kernel-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: c769302ccf74ea527ef92b8e17f1ff1c3660c2602261e64a8855f9c4f42b8059
kernel-debuginfo-common-x86_64-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 2e65c59d1497cc272393133470dd0e7778de3c776237e3dfe677150783111d5b
kernel-devel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: a5703088b7eaae497a2fd4f0df35fc08b70d68cdb42a1828daa987887b45961b
kernel-doc-2.6.32-131.35.1.el6.noarch.rpm SHA-256: 471ee9555202786dcf688c53e27587565b4334e7439838321671a6619b78659d
kernel-firmware-2.6.32-131.35.1.el6.noarch.rpm SHA-256: adbda799a58a393508f81ef3d8de89e040ffbc09a57310d71f06409bac73f90c
kernel-headers-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 001a30a7123bef4fe5fd7f2df524b1b44db92a56f9e83b7204c6a14ed2590103
perf-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: ca39ec9fbfeea189fd9480023001944b96add0b46d746be3eff501119aa79408
perf-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 7590f18e23c8627bd278c04e8e64ccef642917a1030a4783f9d44cce8ca78de5
i386
kernel-2.6.32-131.35.1.el6.i686.rpm SHA-256: 3e2fb7c1a3a9336c458586ecab47b331bafafd29d4fbcd4e5e63a57a40be87b3
kernel-debug-2.6.32-131.35.1.el6.i686.rpm SHA-256: f22765bbd12d1946ca9b4410d9c9369caa4c557644a627e182de6637a5779191
kernel-debug-debuginfo-2.6.32-131.35.1.el6.i686.rpm SHA-256: 4381e90ad43dc275625062f43716511ca29a5a98551d5a6d25ee4c755e003dd5
kernel-debug-devel-2.6.32-131.35.1.el6.i686.rpm SHA-256: 8bf13db27cf03a51585064596cbf33bb023f92cf4a1f1d88420008695132ffe2
kernel-debuginfo-2.6.32-131.35.1.el6.i686.rpm SHA-256: 8c50ffb70fe4ef5b69c7855529ec547ab1947d31a7a950acba15eb5830222dc7
kernel-debuginfo-common-i686-2.6.32-131.35.1.el6.i686.rpm SHA-256: a94aeb8b5e99fb2191322491e395b8c6b7e7db8c5fa01a0f2289a9250c9574da
kernel-devel-2.6.32-131.35.1.el6.i686.rpm SHA-256: ea3af25a33e1a8acf49e887367ade47980d9a4ac71816402fb7c683406ec481d
kernel-doc-2.6.32-131.35.1.el6.noarch.rpm SHA-256: 471ee9555202786dcf688c53e27587565b4334e7439838321671a6619b78659d
kernel-firmware-2.6.32-131.35.1.el6.noarch.rpm SHA-256: adbda799a58a393508f81ef3d8de89e040ffbc09a57310d71f06409bac73f90c
kernel-headers-2.6.32-131.35.1.el6.i686.rpm SHA-256: a12567905ad050893d3c2df3f3e742173234218eaa69a9e19e16d648b218a13e
perf-2.6.32-131.35.1.el6.i686.rpm SHA-256: d157574d4e231473263cbe14adf2f8572e2f8dff55054436be65493f628bc2c6
perf-debuginfo-2.6.32-131.35.1.el6.i686.rpm SHA-256: 7188dd23d07380689b98b5b4de72660122cf8224ab6fc15a84548a3e84bd4db4

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
kernel-2.6.32-131.35.1.el6.src.rpm SHA-256: dca013fe39fdc45b6f63807a879cb1d0af7be622d3bc942a1bee3ca7b3fbc36d
x86_64
kernel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: a2b3cf3c073e7647a04fd69ae5edd421d0c1bc556380ccdac6c19abaeef09659
kernel-debug-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 4706bebd1b2ac717a306e86c818e687e148901a6c958d5595a9962be54d57d46
kernel-debug-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 17ec1e7b506e5251907221ea2c2519c624a949e8635ff37b3219d08be7ba649c
kernel-debug-devel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 8080a4c60d01bbaf0ebcfcdbe56567356f05e7a222e7a06ccd7449b14c7dc135
kernel-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: c769302ccf74ea527ef92b8e17f1ff1c3660c2602261e64a8855f9c4f42b8059
kernel-debuginfo-common-x86_64-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 2e65c59d1497cc272393133470dd0e7778de3c776237e3dfe677150783111d5b
kernel-devel-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: a5703088b7eaae497a2fd4f0df35fc08b70d68cdb42a1828daa987887b45961b
kernel-doc-2.6.32-131.35.1.el6.noarch.rpm SHA-256: 471ee9555202786dcf688c53e27587565b4334e7439838321671a6619b78659d
kernel-firmware-2.6.32-131.35.1.el6.noarch.rpm SHA-256: adbda799a58a393508f81ef3d8de89e040ffbc09a57310d71f06409bac73f90c
kernel-headers-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 001a30a7123bef4fe5fd7f2df524b1b44db92a56f9e83b7204c6a14ed2590103
perf-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: ca39ec9fbfeea189fd9480023001944b96add0b46d746be3eff501119aa79408
perf-debuginfo-2.6.32-131.35.1.el6.x86_64.rpm SHA-256: 7590f18e23c8627bd278c04e8e64ccef642917a1030a4783f9d44cce8ca78de5

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter