Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0662 - Security Advisory
Issued:
2013-03-19
Updated:
2013-03-19

RHSA-2013:0662 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.3 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A race condition was found in the way the Linux kernel's ptrace

implementation handled PTRACE_SETREGS requests when the debuggee was woken
due to a SIGKILL signal instead of being stopped. A local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2013-0871,
Important)

This update also fixes the following bugs:

  • Previously, init scripts were unable to set the MAC address of the master

interface properly because it was overwritten by the first slave MAC
address. To avoid this problem, this update re-introduces the check for an
unassigned MAC address before setting the MAC address of the first slave
interface as the MAC address of the master interface. (BZ#908735)

  • When using transparent proxy (TProxy) over IPv6, the kernel previously

created neighbor entries for local interfaces and peers that were not
reachable directly. This update corrects this problem and the kernel no
longer creates invalid neighbor entries. (BZ#909158)

  • Due to the incorrect validation of a pointer dereference in the

d_validate() function, running a command such as ls or find on the
MultiVersion File System (MVFS), used by IBM Rational ClearCase, for
example, could trigger a kernel panic. This update modifies d_validate() to
verify the parent-child dentry relationship by searching through the
parent's d_child list. The kernel no longer panics in this situation.
(BZ#915582)

  • A previously backported patch introduced usage of the page_descs length

field but did not set the page data length for the FUSE page descriptor.
This code path can be exercised by a loopback device (pagecache_write_end)
if used over FUSE. As a result, fuse_copy_page does not copy page data from
the page descriptor to the user-space request buffer and the user space can
see uninitialized data. This could previously lead to file system data
corruption. This problem has been fixed by setting the page_descs length
prior to submitting the requests, and FUSE therefore provides correctly
initialized data. (BZ#916956)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386

Fixes

  • BZ - 911937 - CVE-2013-0871 kernel: race condition with PTRACE_SETREGS

CVEs

  • CVE-2013-0871

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.23.1.el6.src.rpm SHA-256: 569522ccc9ec708bdee36155f760263d46d382e56900751d901553aa41261f05
x86_64
kernel-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 9420c3cc615d2c56a50b98562e21492c8a99a04d875895b9dfbf12f4c280d86f
kernel-debug-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: ba99e9b4469b25c460dbb38b1a5e76e4898e4f27f767bc26eed22c1c6e1192d2
kernel-debug-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 0cb361ee6f7c2a26ca5dea0d66f201719b26eff8608a44ce1fea14813a9e393a
kernel-debug-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 0cb361ee6f7c2a26ca5dea0d66f201719b26eff8608a44ce1fea14813a9e393a
kernel-debug-devel-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: b2a4a91c12a0cb87056d0145624e9b5b581523c1c769c71948c58d7b5b85c241
kernel-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 46bf41a5510ce63f7c62b66bde30ab1c58b6a3c5e20742016055c809b45ca930
kernel-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 46bf41a5510ce63f7c62b66bde30ab1c58b6a3c5e20742016055c809b45ca930
kernel-debuginfo-common-x86_64-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: b50300f74c71b3ff94f94811580df97b85f48b0351358b1b4f008ab646a50477
kernel-debuginfo-common-x86_64-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: b50300f74c71b3ff94f94811580df97b85f48b0351358b1b4f008ab646a50477
kernel-devel-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 0f4979757bad5849a95b6f27091234ffc76abc657482b5d7e9998d8df21f6aa5
kernel-doc-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 1950cd17eeb55ff7a614e9d2d745eb929fba0a14f2d294f757768681b1572228
kernel-firmware-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 634174a8650ece40d6425e027adccae1ac6f2f4aa91571b3a8811ca772ee85d7
kernel-headers-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 3b2048a46f94b498eb091861052f8163c4b89b09af013ae6aba0e1ee5e120dd8
perf-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: ee36fa655021a4862c95fdc956a76ebc6fa60ed946d8837f0a627b97207faf6e
perf-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 76d370488996352891576aef272a4424c6d7077e90a8074f1ddfb9462755ca7a
perf-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 76d370488996352891576aef272a4424c6d7077e90a8074f1ddfb9462755ca7a
python-perf-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: f2827c8eb08441ba1ee182610803e52de9243e3e0a0d1e0e2196eb2e4d29051c
python-perf-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: ab939f826bf881189535e73624da71e9ca9ef17781be416683a7b31b8ffe7fb5
python-perf-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: ab939f826bf881189535e73624da71e9ca9ef17781be416683a7b31b8ffe7fb5
i386
kernel-2.6.32-279.23.1.el6.i686.rpm SHA-256: b7ee283f13334e43d87d1e01b3c9e66183e8401ce1681dc5fda9401c96e9f68a
kernel-debug-2.6.32-279.23.1.el6.i686.rpm SHA-256: b7bfe98001493af059dbe8d7cf80b5fcfce85730338dee24ac51940b5f02a69e
kernel-debug-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: 15a9034eb5c1f061a5bb66426aa747c278c984e781657c5711aadc8739ee998a
kernel-debug-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: 15a9034eb5c1f061a5bb66426aa747c278c984e781657c5711aadc8739ee998a
kernel-debug-devel-2.6.32-279.23.1.el6.i686.rpm SHA-256: 1b4f3ce4a4566c575b4310090ec6690dd41532ab0964638840d6098eb634797c
kernel-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: b06a4231fd1e5fcd69d3cc12928613068ba0d35c98b824f39beff74de25bcf04
kernel-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: b06a4231fd1e5fcd69d3cc12928613068ba0d35c98b824f39beff74de25bcf04
kernel-debuginfo-common-i686-2.6.32-279.23.1.el6.i686.rpm SHA-256: d0e8fb11a0b5667d9cb9594a9e2317e423bf8a37f350b621493ff3e207f5187a
kernel-debuginfo-common-i686-2.6.32-279.23.1.el6.i686.rpm SHA-256: d0e8fb11a0b5667d9cb9594a9e2317e423bf8a37f350b621493ff3e207f5187a
kernel-devel-2.6.32-279.23.1.el6.i686.rpm SHA-256: f4eac4ed726a270d68f5b3438118476213a469d379fe03bc8fa05e503e13fe78
kernel-doc-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 1950cd17eeb55ff7a614e9d2d745eb929fba0a14f2d294f757768681b1572228
kernel-firmware-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 634174a8650ece40d6425e027adccae1ac6f2f4aa91571b3a8811ca772ee85d7
kernel-headers-2.6.32-279.23.1.el6.i686.rpm SHA-256: ab957205c388c0fdf566d373ff0bd9fc155f43599026aca39bdc19babf8bfc1b
perf-2.6.32-279.23.1.el6.i686.rpm SHA-256: aa2d6fe24c67317c9ed6b3a686ebf41bae8295a885a8803d467ab9601644543f
perf-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: 8d2cdc14f00eaf009258b74deab099c5dd4557ea3161a1591b68b7b1d635ab0d
perf-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: 8d2cdc14f00eaf009258b74deab099c5dd4557ea3161a1591b68b7b1d635ab0d
python-perf-2.6.32-279.23.1.el6.i686.rpm SHA-256: f3eead38281268fd2edffeb1fff1944891e0b3bd429db778f70a883205b07051
python-perf-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: f43c12f5c5170be1d0283d277b349240bfa5601c24c934e92958eb30ee5f8f2b
python-perf-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: f43c12f5c5170be1d0283d277b349240bfa5601c24c934e92958eb30ee5f8f2b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.23.1.el6.src.rpm SHA-256: 569522ccc9ec708bdee36155f760263d46d382e56900751d901553aa41261f05
s390x
kernel-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 3527d7e7b22e5b02822bf5d392dcdb61e0bebd0a0f1dd274c766691ab542e181
kernel-debug-2.6.32-279.23.1.el6.s390x.rpm SHA-256: ccce529389f4d53425f6c90204fb8b9bcc79c4fe3e28692e418c0e8d72900441
kernel-debug-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: f032c0f03ef0f4fd199eb27c9b5724bc0e3881d8e7f4bade932a65e116dc0492
kernel-debug-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: f032c0f03ef0f4fd199eb27c9b5724bc0e3881d8e7f4bade932a65e116dc0492
kernel-debug-devel-2.6.32-279.23.1.el6.s390x.rpm SHA-256: b6f6c3e397ad7933002dbc63c7e4c92fd04d30d058d46cd5a38feb39b4db17ff
kernel-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: bc2971a6d70b690c64f5c29900f4212d9b44dcbb1132b02b7c12ec33c3bc1440
kernel-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: bc2971a6d70b690c64f5c29900f4212d9b44dcbb1132b02b7c12ec33c3bc1440
kernel-debuginfo-common-s390x-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 22b146d00465479f767539d435050b6fe0e41bb76306ec95a6d952fb3f03769e
kernel-debuginfo-common-s390x-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 22b146d00465479f767539d435050b6fe0e41bb76306ec95a6d952fb3f03769e
kernel-devel-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 3a92f27f04fe7df056674e781806d094f1363c1436db57bebb8b879c7256c316
kernel-doc-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 1950cd17eeb55ff7a614e9d2d745eb929fba0a14f2d294f757768681b1572228
kernel-firmware-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 634174a8650ece40d6425e027adccae1ac6f2f4aa91571b3a8811ca772ee85d7
kernel-headers-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 5b31abb5ee3e049edc1235caff5422ab0f8f575747b76a9e4f8ec5e416ae6c8d
kernel-kdump-2.6.32-279.23.1.el6.s390x.rpm SHA-256: c5dbbf949d98e08337fc2b0a8f71620e892a052ddc15887babacbf5655595db9
kernel-kdump-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: e281052b3c2fd8104e7c4f6a7a28d6ea03cd129c8c364afa10882bbff804d38a
kernel-kdump-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: e281052b3c2fd8104e7c4f6a7a28d6ea03cd129c8c364afa10882bbff804d38a
kernel-kdump-devel-2.6.32-279.23.1.el6.s390x.rpm SHA-256: cf0cf588825aa5069fef154db885622eab9528dfcf6eaa9b9a6f6e92cf0c773d
perf-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 7d6b31c0ea1cacb0e72658c4aa64813bab1a6a23e36a4333440df24e64e0ffb5
perf-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 3fe967822c37b69afc68b8b90c27a229e00215f8e9eb073a68b3d2b8dcac53ac
perf-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 3fe967822c37b69afc68b8b90c27a229e00215f8e9eb073a68b3d2b8dcac53ac
python-perf-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 609850421206fc27ca62524b077417053655593c544931f6e47f91ba8a40c72c
python-perf-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 2e3b538b90d728dd8106ad7d29195535f55a62e5ba9c19c250a88ea53ce224f3
python-perf-debuginfo-2.6.32-279.23.1.el6.s390x.rpm SHA-256: 2e3b538b90d728dd8106ad7d29195535f55a62e5ba9c19c250a88ea53ce224f3

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.23.1.el6.src.rpm SHA-256: 569522ccc9ec708bdee36155f760263d46d382e56900751d901553aa41261f05
ppc64
kernel-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: e528fa3927598f9ae5c35165d2c931f135f9b84b68d380af068187ca729051e7
kernel-bootwrapper-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: d6120a1fc57c79915b2506218f63c2122005429e34bf8b81e789b73510e5871b
kernel-debug-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: 4c3163f6bd6d709ede49ece2ee877dc1e5709392089a6d520801193f7cffeaba
kernel-debug-debuginfo-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: d4fec2f7a68be676da10bd29b1957cf887426a6320d67a7a4e8aeff1855dfda4
kernel-debug-debuginfo-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: d4fec2f7a68be676da10bd29b1957cf887426a6320d67a7a4e8aeff1855dfda4
kernel-debug-devel-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: d9e72ca08d8d348c647813c089f60ecac5c917b650167835f5eea2fe77e62987
kernel-debuginfo-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: 0dd2a52e831d3fde81f009e232bedeaa58fc85c37619b8650291d5777769fa5a
kernel-debuginfo-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: 0dd2a52e831d3fde81f009e232bedeaa58fc85c37619b8650291d5777769fa5a
kernel-debuginfo-common-ppc64-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: e827f3b6be85f80779978decb663e657def2f126a48719d11de99f38cb0f10f2
kernel-debuginfo-common-ppc64-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: e827f3b6be85f80779978decb663e657def2f126a48719d11de99f38cb0f10f2
kernel-devel-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: 2a4d6064210408fe981583cce48fa7f6236847d6b179056699fc83e47107020d
kernel-doc-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 1950cd17eeb55ff7a614e9d2d745eb929fba0a14f2d294f757768681b1572228
kernel-firmware-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 634174a8650ece40d6425e027adccae1ac6f2f4aa91571b3a8811ca772ee85d7
kernel-headers-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: ce818d6fc1987238e833ec55ee16502462c56abcd743ddf06b5065dd6eef4746
perf-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: 9b84c17a4830fc87cadf4324ee72fe08fc7db4bbffbbd4c1fb852b6d626cda20
perf-debuginfo-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: badd981cb02d8d854591980196a4a4769bc2c3ea487445884422b28220adc033
perf-debuginfo-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: badd981cb02d8d854591980196a4a4769bc2c3ea487445884422b28220adc033
python-perf-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: e387ca89f34e0e32d829e4e6dcc81a747227b64f8630d5ee84cf134a41388799
python-perf-debuginfo-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: 465900419e56e2f34ffc54b79a54ab98faaea3303cf8dbf04625d2ada5624778
python-perf-debuginfo-2.6.32-279.23.1.el6.ppc64.rpm SHA-256: 465900419e56e2f34ffc54b79a54ab98faaea3303cf8dbf04625d2ada5624778

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3

SRPM
kernel-2.6.32-279.23.1.el6.src.rpm SHA-256: 569522ccc9ec708bdee36155f760263d46d382e56900751d901553aa41261f05
x86_64
kernel-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 9420c3cc615d2c56a50b98562e21492c8a99a04d875895b9dfbf12f4c280d86f
kernel-debug-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: ba99e9b4469b25c460dbb38b1a5e76e4898e4f27f767bc26eed22c1c6e1192d2
kernel-debug-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 0cb361ee6f7c2a26ca5dea0d66f201719b26eff8608a44ce1fea14813a9e393a
kernel-debug-devel-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: b2a4a91c12a0cb87056d0145624e9b5b581523c1c769c71948c58d7b5b85c241
kernel-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 46bf41a5510ce63f7c62b66bde30ab1c58b6a3c5e20742016055c809b45ca930
kernel-debuginfo-common-x86_64-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: b50300f74c71b3ff94f94811580df97b85f48b0351358b1b4f008ab646a50477
kernel-devel-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 0f4979757bad5849a95b6f27091234ffc76abc657482b5d7e9998d8df21f6aa5
kernel-doc-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 1950cd17eeb55ff7a614e9d2d745eb929fba0a14f2d294f757768681b1572228
kernel-firmware-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 634174a8650ece40d6425e027adccae1ac6f2f4aa91571b3a8811ca772ee85d7
kernel-headers-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 3b2048a46f94b498eb091861052f8163c4b89b09af013ae6aba0e1ee5e120dd8
perf-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: ee36fa655021a4862c95fdc956a76ebc6fa60ed946d8837f0a627b97207faf6e
perf-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: 76d370488996352891576aef272a4424c6d7077e90a8074f1ddfb9462755ca7a
python-perf-debuginfo-2.6.32-279.23.1.el6.x86_64.rpm SHA-256: ab939f826bf881189535e73624da71e9ca9ef17781be416683a7b31b8ffe7fb5
i386
kernel-2.6.32-279.23.1.el6.i686.rpm SHA-256: b7ee283f13334e43d87d1e01b3c9e66183e8401ce1681dc5fda9401c96e9f68a
kernel-debug-2.6.32-279.23.1.el6.i686.rpm SHA-256: b7bfe98001493af059dbe8d7cf80b5fcfce85730338dee24ac51940b5f02a69e
kernel-debug-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: 15a9034eb5c1f061a5bb66426aa747c278c984e781657c5711aadc8739ee998a
kernel-debug-devel-2.6.32-279.23.1.el6.i686.rpm SHA-256: 1b4f3ce4a4566c575b4310090ec6690dd41532ab0964638840d6098eb634797c
kernel-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: b06a4231fd1e5fcd69d3cc12928613068ba0d35c98b824f39beff74de25bcf04
kernel-debuginfo-common-i686-2.6.32-279.23.1.el6.i686.rpm SHA-256: d0e8fb11a0b5667d9cb9594a9e2317e423bf8a37f350b621493ff3e207f5187a
kernel-devel-2.6.32-279.23.1.el6.i686.rpm SHA-256: f4eac4ed726a270d68f5b3438118476213a469d379fe03bc8fa05e503e13fe78
kernel-doc-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 1950cd17eeb55ff7a614e9d2d745eb929fba0a14f2d294f757768681b1572228
kernel-firmware-2.6.32-279.23.1.el6.noarch.rpm SHA-256: 634174a8650ece40d6425e027adccae1ac6f2f4aa91571b3a8811ca772ee85d7
kernel-headers-2.6.32-279.23.1.el6.i686.rpm SHA-256: ab957205c388c0fdf566d373ff0bd9fc155f43599026aca39bdc19babf8bfc1b
perf-2.6.32-279.23.1.el6.i686.rpm SHA-256: aa2d6fe24c67317c9ed6b3a686ebf41bae8295a885a8803d467ab9601644543f
perf-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: 8d2cdc14f00eaf009258b74deab099c5dd4557ea3161a1591b68b7b1d635ab0d
python-perf-debuginfo-2.6.32-279.23.1.el6.i686.rpm SHA-256: f43c12f5c5170be1d0283d277b349240bfa5601c24c934e92958eb30ee5f8f2b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility