Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2013:0661 - Security Advisory
Issued:
2013-03-19
Updated:
2013-03-19

RHSA-2013:0661 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 6.1 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A race condition was found in the way the Linux kernel's ptrace

implementation handled PTRACE_SETREGS requests when the debuggee was woken
due to a SIGKILL signal instead of being stopped. A local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2013-0871,
Important)

This update also fixes the following bug:

  • Due to the incorrect validation of a pointer dereference in the

d_validate() function, running a command such as ls or find on the
MultiVersion File System (MVFS), used by IBM Rational ClearCase, for
example, could trigger a kernel panic. This update modifies d_validate() to
verify the parent-child dentry relationship by searching through the
parent's d_child list. The kernel no longer panics in this situation.
(BZ#915580)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

  • BZ - 911937 - CVE-2013-0871 kernel: race condition with PTRACE_SETREGS

CVEs

  • CVE-2013-0871

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.38.1.el6.src.rpm SHA-256: b2a1c2ddfd9a84e31f68b330ace2f1f0e429786b2702d99ee0b81a123060f380
x86_64
kernel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 5d86c4d02fbb2b9f902854620f5e124de11a3a387eb9fc2d755c746a8bffe91a
kernel-debug-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 0168b53275b0c8b62bec53d9988096826546475786a7d14e99e26ca07bdbba9f
kernel-debug-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: c1f78804f244971d627721790091036e442ec318830104e568696c0233df111d
kernel-debug-devel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 1173dcc28e451cf93ad276cc8f9e34f9af4ba16f28f4739d29a8a8ee5cdbfc76
kernel-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 79ad3ef3da462bf035ff7d6181701afd65e934213bcce6de90afc323147aed57
kernel-debuginfo-common-x86_64-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: d499417c661ae917b99ca832565c500612765024a1ef4063f0f8f04b175744d9
kernel-devel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 20ba34dfafb32d4841032441a2e3f490bedf25c78cb8aa0a67ca47bc5137b7c8
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: c0390f1ffab8cb50f7cce89bd74ec8b63f13f1b396b16abe854be7ef12046422
perf-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 5dd2147b07d0154979105273e574461d08c6b0de027da755be8064afe8eb8cd2
perf-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: e6f6d12dc4e391d8cc44049366b5026e531251e9e688dc167034bf211887306d
i386
kernel-2.6.32-131.38.1.el6.i686.rpm SHA-256: 6fbeee5bbc854fda87d394b53a0d0f20de3b3e7d46450f7ced163d9faa8676e5
kernel-debug-2.6.32-131.38.1.el6.i686.rpm SHA-256: 18dbb1b31951092bd35037bb0c318b5be9ac1e4d04a0b1805eb8877088c381be
kernel-debug-debuginfo-2.6.32-131.38.1.el6.i686.rpm SHA-256: 250e5b71d320f78e5f7ada600082ce8d33d233ecabe36ae9e97343ba1835605a
kernel-debug-devel-2.6.32-131.38.1.el6.i686.rpm SHA-256: 0df67b287b7ebc7da6d064a57840dc51feb367ad6445767823f107863cc18671
kernel-debuginfo-2.6.32-131.38.1.el6.i686.rpm SHA-256: 7a1740811726559a1f2ca30ec5b78bda307be2fc2801276519d21d0f4ec84847
kernel-debuginfo-common-i686-2.6.32-131.38.1.el6.i686.rpm SHA-256: 241c9378035bea12d9c4ca4bfc42cc412f20af8818324f6376d36b9494a63350
kernel-devel-2.6.32-131.38.1.el6.i686.rpm SHA-256: f7054a1b7d8b1ab182f50b73c8d85619dd7f349adfc2f790c5ae6f2bf9cd8b19
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.i686.rpm SHA-256: c4452968a24d3c724c67c064e15d22f6470293e5c92f9cc1f7d68273268adfe8
perf-2.6.32-131.38.1.el6.i686.rpm SHA-256: 71b41a8ed7549ed7b21fd59155469bb0c397b96df655e2525646b0ad85f868f9
perf-debuginfo-2.6.32-131.38.1.el6.i686.rpm SHA-256: 4bbb0fa4bc34c14ba6d261899c6ad516b4843b1cdb532d7b77a82b8a79735462

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.38.1.el6.src.rpm SHA-256: b2a1c2ddfd9a84e31f68b330ace2f1f0e429786b2702d99ee0b81a123060f380
s390x
kernel-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 5d5b1d2852a12755aa90dee401ae706341858fd61f34ca916901b4660d15c6f4
kernel-debug-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 20ba5068125bb39a19fd6ee3392787fbbda871ade7498616256328ef38e415f6
kernel-debug-debuginfo-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 62ea4398e4ed01a254cdfedf52feaf86a74a9ed67e8240c3d562660e646e4d25
kernel-debug-devel-2.6.32-131.38.1.el6.s390x.rpm SHA-256: dee07fd97be44a23025c5f575568e4a656b54368f13e76ba5a73f761f79e9c32
kernel-debuginfo-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 9afe389913566e92349d4c9adf76dce2ee727e031cec0b2ff4f9a0b36353d62d
kernel-debuginfo-common-s390x-2.6.32-131.38.1.el6.s390x.rpm SHA-256: af7dd41b4c50dcb3651b5432e2582e8f52955623794d676dfedb1b348150724c
kernel-devel-2.6.32-131.38.1.el6.s390x.rpm SHA-256: e9148fd575415fef47a1715ba6eb15bf22defcdc06727149af06d223049858c8
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 43b9a910c4fe565f2a412fde5563e4dab4fd576e8280e6ee1b2b2c2f607dcfb9
kernel-kdump-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 53394a66a46bb93e8cd57adeee4ac0833e5e4321bb93bd2565f779b035755c87
kernel-kdump-debuginfo-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 8f441bd63ab637f6992355646ce644d4d0b3d797aaeef5ccc76c99440cea39be
kernel-kdump-devel-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 0c19fcbb8cc5864809ed4e9c722b24d5e0b8384e29b92ca228436d16c4e9e460
perf-2.6.32-131.38.1.el6.s390x.rpm SHA-256: 8d601e00aa5da243ebda614d08035029fe6134f75e48026404fe97537bfaf2c2
perf-debuginfo-2.6.32-131.38.1.el6.s390x.rpm SHA-256: bbfb2a6a6cd4f83a94f261761c850edba5787916260dc3c21599013134958f1b

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.38.1.el6.src.rpm SHA-256: b2a1c2ddfd9a84e31f68b330ace2f1f0e429786b2702d99ee0b81a123060f380
ppc64
kernel-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: 3279485b197bc0bfd2fd0e16b1bd7b1feeb715245449b34e24ae6ea8571e629a
kernel-bootwrapper-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: d383efb0cbe58230ad528eadb0ec970545704f3ffdab84d5d71b780ff9112ac9
kernel-debug-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: 0c7a19ea335eae6f3eaff529301e2d07d9be394895d28d9457b0c0e4283af4d9
kernel-debug-debuginfo-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: 54cd6056a830a8ad18938767e1dbf86c723cbda9e29eed4ae71b5f5e3b9a719a
kernel-debug-devel-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: 7a3fc5c134f58d1991ff84af0a97b4bded39c0dfec3d35c240ec906127310ddc
kernel-debuginfo-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: 07c778261219132537db88ff4acf5658a3962149664d7c62d71ef45094109116
kernel-debuginfo-common-ppc64-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: 8c844e9d89dcd69d5180dcdc957bcbd0b7dca8638639f7cb31d4ad1e5084b037
kernel-devel-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: 15409eb9b60c72fbc3e6564f2bc9020550bbb931ce1bd8496d03d060cce7d9e8
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: b32026cdd2b3edecf70b430c97318bdd97966fa4d5575a0fcd3684bdcb253dee
perf-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: 7d6051de252762d95f3134bb500ba4ac3e5e945ed651f391a2b68a3443f11745
perf-debuginfo-2.6.32-131.38.1.el6.ppc64.rpm SHA-256: d906021bf292c8366dce93480932eb3dd01c51a27114e01917c9433927261439

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
kernel-2.6.32-131.38.1.el6.src.rpm SHA-256: b2a1c2ddfd9a84e31f68b330ace2f1f0e429786b2702d99ee0b81a123060f380
x86_64
kernel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 5d86c4d02fbb2b9f902854620f5e124de11a3a387eb9fc2d755c746a8bffe91a
kernel-debug-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 0168b53275b0c8b62bec53d9988096826546475786a7d14e99e26ca07bdbba9f
kernel-debug-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: c1f78804f244971d627721790091036e442ec318830104e568696c0233df111d
kernel-debug-devel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 1173dcc28e451cf93ad276cc8f9e34f9af4ba16f28f4739d29a8a8ee5cdbfc76
kernel-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 79ad3ef3da462bf035ff7d6181701afd65e934213bcce6de90afc323147aed57
kernel-debuginfo-common-x86_64-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: d499417c661ae917b99ca832565c500612765024a1ef4063f0f8f04b175744d9
kernel-devel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 20ba34dfafb32d4841032441a2e3f490bedf25c78cb8aa0a67ca47bc5137b7c8
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: c0390f1ffab8cb50f7cce89bd74ec8b63f13f1b396b16abe854be7ef12046422
perf-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 5dd2147b07d0154979105273e574461d08c6b0de027da755be8064afe8eb8cd2
perf-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: e6f6d12dc4e391d8cc44049366b5026e531251e9e688dc167034bf211887306d
i386
kernel-2.6.32-131.38.1.el6.i686.rpm SHA-256: 6fbeee5bbc854fda87d394b53a0d0f20de3b3e7d46450f7ced163d9faa8676e5
kernel-debug-2.6.32-131.38.1.el6.i686.rpm SHA-256: 18dbb1b31951092bd35037bb0c318b5be9ac1e4d04a0b1805eb8877088c381be
kernel-debug-debuginfo-2.6.32-131.38.1.el6.i686.rpm SHA-256: 250e5b71d320f78e5f7ada600082ce8d33d233ecabe36ae9e97343ba1835605a
kernel-debug-devel-2.6.32-131.38.1.el6.i686.rpm SHA-256: 0df67b287b7ebc7da6d064a57840dc51feb367ad6445767823f107863cc18671
kernel-debuginfo-2.6.32-131.38.1.el6.i686.rpm SHA-256: 7a1740811726559a1f2ca30ec5b78bda307be2fc2801276519d21d0f4ec84847
kernel-debuginfo-common-i686-2.6.32-131.38.1.el6.i686.rpm SHA-256: 241c9378035bea12d9c4ca4bfc42cc412f20af8818324f6376d36b9494a63350
kernel-devel-2.6.32-131.38.1.el6.i686.rpm SHA-256: f7054a1b7d8b1ab182f50b73c8d85619dd7f349adfc2f790c5ae6f2bf9cd8b19
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.i686.rpm SHA-256: c4452968a24d3c724c67c064e15d22f6470293e5c92f9cc1f7d68273268adfe8
perf-2.6.32-131.38.1.el6.i686.rpm SHA-256: 71b41a8ed7549ed7b21fd59155469bb0c397b96df655e2525646b0ad85f868f9
perf-debuginfo-2.6.32-131.38.1.el6.i686.rpm SHA-256: 4bbb0fa4bc34c14ba6d261899c6ad516b4843b1cdb532d7b77a82b8a79735462

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
kernel-2.6.32-131.38.1.el6.src.rpm SHA-256: b2a1c2ddfd9a84e31f68b330ace2f1f0e429786b2702d99ee0b81a123060f380
x86_64
kernel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 5d86c4d02fbb2b9f902854620f5e124de11a3a387eb9fc2d755c746a8bffe91a
kernel-debug-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 0168b53275b0c8b62bec53d9988096826546475786a7d14e99e26ca07bdbba9f
kernel-debug-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: c1f78804f244971d627721790091036e442ec318830104e568696c0233df111d
kernel-debug-devel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 1173dcc28e451cf93ad276cc8f9e34f9af4ba16f28f4739d29a8a8ee5cdbfc76
kernel-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 79ad3ef3da462bf035ff7d6181701afd65e934213bcce6de90afc323147aed57
kernel-debuginfo-common-x86_64-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: d499417c661ae917b99ca832565c500612765024a1ef4063f0f8f04b175744d9
kernel-devel-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 20ba34dfafb32d4841032441a2e3f490bedf25c78cb8aa0a67ca47bc5137b7c8
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: c0390f1ffab8cb50f7cce89bd74ec8b63f13f1b396b16abe854be7ef12046422
perf-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: 5dd2147b07d0154979105273e574461d08c6b0de027da755be8064afe8eb8cd2
perf-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm SHA-256: e6f6d12dc4e391d8cc44049366b5026e531251e9e688dc167034bf211887306d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter