Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0832 - Security Advisory
Issued:
2013-05-17
Updated:
2013-05-17

RHSA-2013:0832 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.3 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • It was found that the Red Hat Enterprise Linux 6.1 kernel update

(RHSA-2011:0542) introduced an integer conversion issue in the Linux
kernel's Performance Events implementation. This led to a user-supplied
index into the perf_swevent_enabled array not being validated properly,
resulting in out-of-bounds kernel memory access. A local, unprivileged user
could use this flaw to escalate their privileges. (CVE-2013-2094,
Important)

A public exploit that affects Red Hat Enterprise Linux 6 is available.

Refer to Red Hat Knowledge Solution 373743, linked to in the References,
for further information and mitigation instructions for users who are
unable to immediately apply this update.

Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386

Fixes

  • BZ - 962792 - CVE-2013-2094 kernel: perf_swevent_enabled array out-of-bound access

CVEs

  • CVE-2013-2094

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/site/solutions/373743
  • https://rhn.redhat.com/errata/RHSA-2011-0542.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.25.2.el6.src.rpm SHA-256: 099f9eac1f58ca91e301b83a2c8cb264bf48575b859767047fa9d4ac7a91b215
x86_64
kernel-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: fa2348babb9c01ee4412b276964b40b96e41acc6fa26386b4d1bb981dc9b17dc
kernel-debug-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 33a22e2413c2092564631ad14418494feda836cad78d0ccc2c7ca8fe0a666147
kernel-debug-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 66215a8048873d8c9e70cd0d0d3ff0dd6e8d6311dae5b5a4cd6499173e6f6194
kernel-debug-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 66215a8048873d8c9e70cd0d0d3ff0dd6e8d6311dae5b5a4cd6499173e6f6194
kernel-debug-devel-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 9decbc630f82e86766bb0cbce2651e80381716068ad4581f3ca311e21c589a49
kernel-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 938dd2725e203f9a61a25b70c9ff55f9e6d97fa320becc8c54ae6b38d8535d33
kernel-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 938dd2725e203f9a61a25b70c9ff55f9e6d97fa320becc8c54ae6b38d8535d33
kernel-debuginfo-common-x86_64-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 56b224ea36d523aea45f1a92754077255b47c328fb2586bc5244043b600b8e19
kernel-debuginfo-common-x86_64-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 56b224ea36d523aea45f1a92754077255b47c328fb2586bc5244043b600b8e19
kernel-devel-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: ae73b88b80584febbdddb6539699bb1c4dfba8665a01fdd3bfde26b51e7394fd
kernel-doc-2.6.32-279.25.2.el6.noarch.rpm SHA-256: c7750f80d7d0063cc758de8ea553073635641a9aaa4607650f2bec251bc403ac
kernel-firmware-2.6.32-279.25.2.el6.noarch.rpm SHA-256: 7cd31ce7781d289f1d8aeb91381caac006ac386358aa09f83dbdd8e3ed9778ac
kernel-headers-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: b8d597b84151c8c18c3f41c146073699bf574e0fc00ddbee96c67ddc6bb5a2d1
perf-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 2014e31d5a30a3bb0b90b6811e85a6632c4aebb127c4e2ac7ccbe4a83e7a1f57
perf-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: c91471769cf82cf667df14f3385a6963634f9a9c28a5b798e135b487da887020
perf-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: c91471769cf82cf667df14f3385a6963634f9a9c28a5b798e135b487da887020
python-perf-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: c0734b4379772161f281585f2054f3165b999fb72de8b3886c6d50c3354182b0
python-perf-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 7df45cfb40b6be466abcb13f0c2e61e61fadff8beba199d908927a6f06ed4a72
python-perf-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 7df45cfb40b6be466abcb13f0c2e61e61fadff8beba199d908927a6f06ed4a72
i386
kernel-2.6.32-279.25.2.el6.i686.rpm SHA-256: 6a2cb15647fc75db5aace91ae0f5b75528b8dee4fb89d4c0e05ef7d7010050f6
kernel-debug-2.6.32-279.25.2.el6.i686.rpm SHA-256: 108f34ab4fe87c4f996f576479b038ccea9ba2a8b99d1061cb37ec654ee0bb5c
kernel-debug-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: bc386f2fed761920524e38bdc1508ae59e0e20698065585eefb77b338e9137d8
kernel-debug-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: bc386f2fed761920524e38bdc1508ae59e0e20698065585eefb77b338e9137d8
kernel-debug-devel-2.6.32-279.25.2.el6.i686.rpm SHA-256: 9c0939a8f835f9bf65bf2b810b1fb20d1d1857d68768a422f04bf492743cab5f
kernel-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: 9054add6ec2ad97cff940d7030e671475994c8da981eef4580a88da0905f2b8f
kernel-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: 9054add6ec2ad97cff940d7030e671475994c8da981eef4580a88da0905f2b8f
kernel-debuginfo-common-i686-2.6.32-279.25.2.el6.i686.rpm SHA-256: 31e27c430b0b9610230e777e2a18cae1dc97cc08c1a7f3811c90388f4e02dc1d
kernel-debuginfo-common-i686-2.6.32-279.25.2.el6.i686.rpm SHA-256: 31e27c430b0b9610230e777e2a18cae1dc97cc08c1a7f3811c90388f4e02dc1d
kernel-devel-2.6.32-279.25.2.el6.i686.rpm SHA-256: b6c1d84bfc6315987b6ea2610407ebcba8a9fe395067baa5cbdd4abfd2946a25
kernel-doc-2.6.32-279.25.2.el6.noarch.rpm SHA-256: c7750f80d7d0063cc758de8ea553073635641a9aaa4607650f2bec251bc403ac
kernel-firmware-2.6.32-279.25.2.el6.noarch.rpm SHA-256: 7cd31ce7781d289f1d8aeb91381caac006ac386358aa09f83dbdd8e3ed9778ac
kernel-headers-2.6.32-279.25.2.el6.i686.rpm SHA-256: 3795f5e70f198499328223e6e3ddcf1eb00799f2918142ba9261f56d0c150f9a
perf-2.6.32-279.25.2.el6.i686.rpm SHA-256: ba31261244fabec03c26a5f52db34a6dad6e596ccfc3c79793f142e8744fc5c0
perf-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: ac5f569c8a13cccae2d185ef9694739a62779f2544ae90eff83dcb9959f76273
perf-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: ac5f569c8a13cccae2d185ef9694739a62779f2544ae90eff83dcb9959f76273
python-perf-2.6.32-279.25.2.el6.i686.rpm SHA-256: 5d872a709855fdfd612f80751fb5c04a2440d8c8285e0b5e1ab41fc36c9bd50b
python-perf-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: 557b391bdb4e9b568641ec503030365f09eba346470b7513bb8489fec946f38f
python-perf-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: 557b391bdb4e9b568641ec503030365f09eba346470b7513bb8489fec946f38f

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.25.2.el6.src.rpm SHA-256: 099f9eac1f58ca91e301b83a2c8cb264bf48575b859767047fa9d4ac7a91b215
s390x
kernel-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 38c230461a2549ceb1e3ef78865eafffda0730ef53d0d5a854f702975bf29728
kernel-debug-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 00ad445764a077218e094422628750fc853c3db0f231015066c6eec9e25e5694
kernel-debug-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 7b22a803203f46e1983b5b4e3e2222f382030c2822f83aa6c36d77284431c640
kernel-debug-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 7b22a803203f46e1983b5b4e3e2222f382030c2822f83aa6c36d77284431c640
kernel-debug-devel-2.6.32-279.25.2.el6.s390x.rpm SHA-256: bbfcfabad3234a4b1bf1c5b4ebb1dd51c3935b096c17908092792055a66a8512
kernel-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 6e1f1f1873f53533588d2c9fa29121403d2057a30a8c664a1213c3beec8f863f
kernel-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 6e1f1f1873f53533588d2c9fa29121403d2057a30a8c664a1213c3beec8f863f
kernel-debuginfo-common-s390x-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 57ccb49593bc627612c616afb774d0014bab16001d0b252e6e6fd418e55135f1
kernel-debuginfo-common-s390x-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 57ccb49593bc627612c616afb774d0014bab16001d0b252e6e6fd418e55135f1
kernel-devel-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 0695ace3c57cbbd3ad105dfe62a85fb0a023d0c59e864dfe9a661e291eac03d8
kernel-doc-2.6.32-279.25.2.el6.noarch.rpm SHA-256: c7750f80d7d0063cc758de8ea553073635641a9aaa4607650f2bec251bc403ac
kernel-firmware-2.6.32-279.25.2.el6.noarch.rpm SHA-256: 7cd31ce7781d289f1d8aeb91381caac006ac386358aa09f83dbdd8e3ed9778ac
kernel-headers-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 1b42cc7d39f5bd0c701911b562d84dbd570f7ff2e3b47268c9ec75fe524bf99e
kernel-kdump-2.6.32-279.25.2.el6.s390x.rpm SHA-256: af35fe4714db987d5cb69bd4915d93995aa28c477d6c935ffc8c6b6905404cdd
kernel-kdump-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 842da5dfd8f36ce27f6ea1d4a6e058b4b032f15099415b550fcc867069ba4515
kernel-kdump-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 842da5dfd8f36ce27f6ea1d4a6e058b4b032f15099415b550fcc867069ba4515
kernel-kdump-devel-2.6.32-279.25.2.el6.s390x.rpm SHA-256: b9ef061a01e7bbb3f73bf255e8c1c24fa25e522fcab2a6ca66916c3f5513a3d6
perf-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 22d7100ed1ced265efcc9b7fcf9c3cbbb3e16287bf64d1bafd1de228891bfdd9
perf-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 044aed83feeea666ab6e9193974183b9cf6f3d6a74242e7099c74559a8bc7f6a
perf-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 044aed83feeea666ab6e9193974183b9cf6f3d6a74242e7099c74559a8bc7f6a
python-perf-2.6.32-279.25.2.el6.s390x.rpm SHA-256: cd8388cefde30f308c8e051b8c4d54972dfa924960cba517926e111543830a5e
python-perf-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 0a96ca3fcd33698ed94b3760f8f517aa790a09bcfeb4d0630904e5ab84a046ac
python-perf-debuginfo-2.6.32-279.25.2.el6.s390x.rpm SHA-256: 0a96ca3fcd33698ed94b3760f8f517aa790a09bcfeb4d0630904e5ab84a046ac

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.25.2.el6.src.rpm SHA-256: 099f9eac1f58ca91e301b83a2c8cb264bf48575b859767047fa9d4ac7a91b215
ppc64
kernel-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 2a9d9164f917f29664192de50fc322aeb277f8545a38025dc60b69928a28d144
kernel-bootwrapper-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 3e33ff909b46a49f2c36d1ee0ccafedae77ce4aee8dbd62bd0c72d4d58f5460c
kernel-debug-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 01742913dfe4ee76280cef74ea869d8a0636c42ea13ce06c44710d1ae2fb229a
kernel-debug-debuginfo-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 5956c7ad6c544687046cefdf0a2751cb8731e4fe449569d921470e7d3610d133
kernel-debug-debuginfo-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 5956c7ad6c544687046cefdf0a2751cb8731e4fe449569d921470e7d3610d133
kernel-debug-devel-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: dda4020a6d6c0d8671ae098d61397dc817949e141e68aef0866c00acc50147e3
kernel-debuginfo-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 0b07384853472751f19713347a350263ae954425336167b798d44fce6872eddb
kernel-debuginfo-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 0b07384853472751f19713347a350263ae954425336167b798d44fce6872eddb
kernel-debuginfo-common-ppc64-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 51744993a7083e6d95ad41c1bf57ef7b86147d621e9d2aca678d8a8297bca9dc
kernel-debuginfo-common-ppc64-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 51744993a7083e6d95ad41c1bf57ef7b86147d621e9d2aca678d8a8297bca9dc
kernel-devel-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 499c24c538fae250a3fc82915f67f9d20de6d2bf57d71c71a9af4a6954347a1e
kernel-doc-2.6.32-279.25.2.el6.noarch.rpm SHA-256: c7750f80d7d0063cc758de8ea553073635641a9aaa4607650f2bec251bc403ac
kernel-firmware-2.6.32-279.25.2.el6.noarch.rpm SHA-256: 7cd31ce7781d289f1d8aeb91381caac006ac386358aa09f83dbdd8e3ed9778ac
kernel-headers-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 0f18efebdb3ea59ea166d57e8c65d86e0170a828a35d06999cc221fda7bfe8d2
perf-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: a5d76cf95ca8a06318e276f454038c55891ad221e599a89f7d7c9b624f264f52
perf-debuginfo-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: d4edbb71622f72efd1fc2f0fc2455ecace9b552ce0666fd11c458a3887b275fb
perf-debuginfo-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: d4edbb71622f72efd1fc2f0fc2455ecace9b552ce0666fd11c458a3887b275fb
python-perf-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 2c667826d8d248aaf071ae24d0a530c9ea66fa04f37c4722dd5361c6ae73fb3b
python-perf-debuginfo-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 7332cf5859b7c78e8c2bc29246d47b300391a50dbd69403cd3770b50fa0d1795
python-perf-debuginfo-2.6.32-279.25.2.el6.ppc64.rpm SHA-256: 7332cf5859b7c78e8c2bc29246d47b300391a50dbd69403cd3770b50fa0d1795

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3

SRPM
kernel-2.6.32-279.25.2.el6.src.rpm SHA-256: 099f9eac1f58ca91e301b83a2c8cb264bf48575b859767047fa9d4ac7a91b215
x86_64
kernel-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: fa2348babb9c01ee4412b276964b40b96e41acc6fa26386b4d1bb981dc9b17dc
kernel-debug-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 33a22e2413c2092564631ad14418494feda836cad78d0ccc2c7ca8fe0a666147
kernel-debug-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 66215a8048873d8c9e70cd0d0d3ff0dd6e8d6311dae5b5a4cd6499173e6f6194
kernel-debug-devel-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 9decbc630f82e86766bb0cbce2651e80381716068ad4581f3ca311e21c589a49
kernel-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 938dd2725e203f9a61a25b70c9ff55f9e6d97fa320becc8c54ae6b38d8535d33
kernel-debuginfo-common-x86_64-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 56b224ea36d523aea45f1a92754077255b47c328fb2586bc5244043b600b8e19
kernel-devel-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: ae73b88b80584febbdddb6539699bb1c4dfba8665a01fdd3bfde26b51e7394fd
kernel-doc-2.6.32-279.25.2.el6.noarch.rpm SHA-256: c7750f80d7d0063cc758de8ea553073635641a9aaa4607650f2bec251bc403ac
kernel-firmware-2.6.32-279.25.2.el6.noarch.rpm SHA-256: 7cd31ce7781d289f1d8aeb91381caac006ac386358aa09f83dbdd8e3ed9778ac
kernel-headers-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: b8d597b84151c8c18c3f41c146073699bf574e0fc00ddbee96c67ddc6bb5a2d1
perf-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 2014e31d5a30a3bb0b90b6811e85a6632c4aebb127c4e2ac7ccbe4a83e7a1f57
perf-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: c91471769cf82cf667df14f3385a6963634f9a9c28a5b798e135b487da887020
python-perf-debuginfo-2.6.32-279.25.2.el6.x86_64.rpm SHA-256: 7df45cfb40b6be466abcb13f0c2e61e61fadff8beba199d908927a6f06ed4a72
i386
kernel-2.6.32-279.25.2.el6.i686.rpm SHA-256: 6a2cb15647fc75db5aace91ae0f5b75528b8dee4fb89d4c0e05ef7d7010050f6
kernel-debug-2.6.32-279.25.2.el6.i686.rpm SHA-256: 108f34ab4fe87c4f996f576479b038ccea9ba2a8b99d1061cb37ec654ee0bb5c
kernel-debug-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: bc386f2fed761920524e38bdc1508ae59e0e20698065585eefb77b338e9137d8
kernel-debug-devel-2.6.32-279.25.2.el6.i686.rpm SHA-256: 9c0939a8f835f9bf65bf2b810b1fb20d1d1857d68768a422f04bf492743cab5f
kernel-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: 9054add6ec2ad97cff940d7030e671475994c8da981eef4580a88da0905f2b8f
kernel-debuginfo-common-i686-2.6.32-279.25.2.el6.i686.rpm SHA-256: 31e27c430b0b9610230e777e2a18cae1dc97cc08c1a7f3811c90388f4e02dc1d
kernel-devel-2.6.32-279.25.2.el6.i686.rpm SHA-256: b6c1d84bfc6315987b6ea2610407ebcba8a9fe395067baa5cbdd4abfd2946a25
kernel-doc-2.6.32-279.25.2.el6.noarch.rpm SHA-256: c7750f80d7d0063cc758de8ea553073635641a9aaa4607650f2bec251bc403ac
kernel-firmware-2.6.32-279.25.2.el6.noarch.rpm SHA-256: 7cd31ce7781d289f1d8aeb91381caac006ac386358aa09f83dbdd8e3ed9778ac
kernel-headers-2.6.32-279.25.2.el6.i686.rpm SHA-256: 3795f5e70f198499328223e6e3ddcf1eb00799f2918142ba9261f56d0c150f9a
perf-2.6.32-279.25.2.el6.i686.rpm SHA-256: ba31261244fabec03c26a5f52db34a6dad6e596ccfc3c79793f142e8744fc5c0
perf-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: ac5f569c8a13cccae2d185ef9694739a62779f2544ae90eff83dcb9959f76273
python-perf-debuginfo-2.6.32-279.25.2.el6.i686.rpm SHA-256: 557b391bdb4e9b568641ec503030365f09eba346470b7513bb8489fec946f38f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility