Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2013:1026 - Security Advisory
Issued:
2013-07-09
Updated:
2013-07-09

RHSA-2013:1026 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A buffer overflow flaw was found in the way UTF-8 characters were

converted to UTF-16 in the utf8s_to_utf16s() function of the Linux kernel's
FAT file system implementation. A local user able to mount a FAT file
system with the "utf8=1" option could use this flaw to crash the system or,
potentially, to escalate their privileges. (CVE-2013-1773, Important)

  • A flaw was found in the way KVM (Kernel-based Virtual Machine) handled

guest time updates when the buffer the guest registered by writing to the
MSR_KVM_SYSTEM_TIME machine state register (MSR) crossed a page boundary. A
privileged guest user could use this flaw to crash the host or,
potentially, escalate their privileges, allowing them to execute arbitrary
code at the host kernel level. (CVE-2013-1796, Important)

  • A potential use-after-free flaw was found in the way KVM handled guest

time updates when the GPA (guest physical address) the guest registered by
writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) fell into a
movable or removable memory region of the hosting user-space process (by
default, QEMU-KVM) on the host. If that memory region is deregistered from
KVM using KVM_SET_USER_MEMORY_REGION and the allocated virtual memory
reused, a privileged guest user could potentially use this flaw to escalate
their privileges on the host. (CVE-2013-1797, Important)

  • A flaw was found in the way KVM emulated IOAPIC (I/O Advanced

Programmable Interrupt Controller). A missing validation check in the
ioapic_read_indirect() function could allow a privileged guest user to
crash the host, or read a substantial portion of host kernel memory.
(CVE-2013-1798, Important)

  • A format string flaw was found in the ext3_msg() function in the Linux

kernel's ext3 file system implementation. A local user who is able to mount
an ext3 file system could use this flaw to cause a denial of service or,
potentially, escalate their privileges. (CVE-2013-1848, Low)

Red Hat would like to thank Andrew Honig of Google for reporting
CVE-2013-1796, CVE-2013-1797, and CVE-2013-1798.

This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2 i386
  • Red Hat Storage 2.0 x86_64
  • Red Hat Gluster Storage Server for On-premise 2.0 x86_64
  • Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64
  • Red Hat Enterprise Linux Server - AUS 6.2 x86_64

Fixes

  • BZ - 916115 - CVE-2013-1773 kernel: VFAT slab-based buffer overflow
  • BZ - 917012 - CVE-2013-1796 kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME
  • BZ - 917013 - CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME
  • BZ - 917017 - CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads
  • BZ - 920783 - CVE-2013-1848 kernel: ext3: format string issues

CVEs

  • CVE-2013-1773
  • CVE-2013-1798
  • CVE-2013-1796
  • CVE-2013-1797
  • CVE-2013-1848

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/kernel.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.39.1.el6.src.rpm SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
x86_64
kernel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 5031fe6f72f12d7f6217e8e28c4647ce1118c1435ff0ea79cc811df1df90c0a2
kernel-debug-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ab70ac75cb7e1eba98bcee437304cb748283d8f772271f93d66d419733927d72
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 15d8e93a42b851f025e5098ae1b2ec477de956c848d3f19dbce8fb18a8999a2c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 93dd2a18138730b6ff58dde7e6210dedfeb3d6a91f101a1bed06a3a9bf502d5e
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: cdcc5487c1efda48a4b28c293327a400607a5e8d60ecb6c0c3ad888c052e9ab2
perf-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f1b8cbc00394736e854cc5b850f6f4a2bc152ed054bc3424ee0fecb5dab73b76
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
python-perf-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: cfc333fa84bb7e1c751b75b144e4305df5cf25495a3f455903d015363428bd08
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2
i386
kernel-2.6.32-220.39.1.el6.i686.rpm SHA-256: ca259d737ccdcb9ad33f20d8b25b569557849c50585a00769878d8d1659ee592
kernel-debug-2.6.32-220.39.1.el6.i686.rpm SHA-256: db465394456e3ab41b550764457d9fa60a6abe62c824b60636e9faf6ad8d2951
kernel-debug-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: cc7d312496065d80f18583a72eec0eced42fb73f4a3bf208f5565923b50175a7
kernel-debug-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: cc7d312496065d80f18583a72eec0eced42fb73f4a3bf208f5565923b50175a7
kernel-debug-devel-2.6.32-220.39.1.el6.i686.rpm SHA-256: 51d7388bf50480a979fbe84a50f71c67a9deabce811bc04ac6e66446affc26c5
kernel-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: ddf64341750f8e1bbeb762f5eafe09b23624bfbb15c8d6c612ab08834f89c4ec
kernel-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: ddf64341750f8e1bbeb762f5eafe09b23624bfbb15c8d6c612ab08834f89c4ec
kernel-debuginfo-common-i686-2.6.32-220.39.1.el6.i686.rpm SHA-256: 8e0c3b90416769a5a559d389de46ca4a4f7e38ecc999862e3d6bc2f963dcf1da
kernel-debuginfo-common-i686-2.6.32-220.39.1.el6.i686.rpm SHA-256: 8e0c3b90416769a5a559d389de46ca4a4f7e38ecc999862e3d6bc2f963dcf1da
kernel-devel-2.6.32-220.39.1.el6.i686.rpm SHA-256: 1adebd5983dbb65ac915bc0898bd8b5d139bcbfc64439630240d156d9bf8f10a
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.i686.rpm SHA-256: 51b06d1d53215540997d23bf850a3297ce5e452a2b70ed647a5ae7cece80087f
perf-2.6.32-220.39.1.el6.i686.rpm SHA-256: 33b2c099f5dba9d4778ea14fb46e1a062d18f9a1fbeee898caba4fc28db1f2bf
perf-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: 49501eab40ad292a4fe11b836efc0b847b09846a279ec9ac29a6b929893df88a
perf-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: 49501eab40ad292a4fe11b836efc0b847b09846a279ec9ac29a6b929893df88a
python-perf-2.6.32-220.39.1.el6.i686.rpm SHA-256: 10c31b66092c48b9719fabab9505212126c5c2aa9b4dcd81ee5bd7c6176b1c36
python-perf-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: 82d90f2e49182750749916146090b3ba702f5cd0a1e6726fde27469040a31b8b
python-perf-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: 82d90f2e49182750749916146090b3ba702f5cd0a1e6726fde27469040a31b8b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.39.1.el6.src.rpm SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
s390x
kernel-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 72055b8e9a388f6f213c7ad4db688112c09c6c7c974e6b0eef48cfaef9d58f03
kernel-debug-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 880b5eee78b358953494e880c673bf30c77fcc78ed86f68b52f8e2075cd21048
kernel-debug-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: ed5212d31da4288f21b027871c871f67f7e8b1b109e4d4d79879ce7f42e36e09
kernel-debug-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: ed5212d31da4288f21b027871c871f67f7e8b1b109e4d4d79879ce7f42e36e09
kernel-debug-devel-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 0e630eb4c11d59725a73b3ebed75b44444cf73de621cf68ff92c7081cf7621eb
kernel-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 49ef8f207b05c79b37454b22a863e98cd18d16d337d457b7b63363dfb1b110bf
kernel-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 49ef8f207b05c79b37454b22a863e98cd18d16d337d457b7b63363dfb1b110bf
kernel-debuginfo-common-s390x-2.6.32-220.39.1.el6.s390x.rpm SHA-256: ddb94fa3364347f1f4ce0f0de005efba47356948a68c76b4e10b34a1b1244575
kernel-debuginfo-common-s390x-2.6.32-220.39.1.el6.s390x.rpm SHA-256: ddb94fa3364347f1f4ce0f0de005efba47356948a68c76b4e10b34a1b1244575
kernel-devel-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 51fa239423ac157f80d57b945d1e166457bc37449389334ac72af7b26cf8f1ec
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.s390x.rpm SHA-256: fac43cc5bbb0ea214dd71293c7d195782bc1953d4bcd0da34a469bffe13a4ef8
kernel-kdump-2.6.32-220.39.1.el6.s390x.rpm SHA-256: f98c27750d456a6f48dcf3de92cec27e2dffc9d610a4de24cc79c85f8a0a5c03
kernel-kdump-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: a6a1ca25e240b86d820ef9e344fa2633be9ee13091477906ca62e22756a80e84
kernel-kdump-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: a6a1ca25e240b86d820ef9e344fa2633be9ee13091477906ca62e22756a80e84
kernel-kdump-devel-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 8da543c03f0784d5b45fc32e33f577e2fa77226ebf6e04cacd62d9228b510c42
perf-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 6f486526abd5698ccda055dbf6e44775d111a93c725767af9dd8623d65a5d78c
perf-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 127542e74fa49d446ade0fe29e518f0f9370f66587a1a98ac7a30ac1f526ed21
perf-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 127542e74fa49d446ade0fe29e518f0f9370f66587a1a98ac7a30ac1f526ed21
python-perf-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 1d9928f5d82ba2df4548de71b3be1a56aee969afe1a7b9e2d7d0f72f3bab5b21
python-perf-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 4e3890056e5fe79085fceb8cc32628e68db93bd4fea209ae418dbb82215b9fa9
python-perf-debuginfo-2.6.32-220.39.1.el6.s390x.rpm SHA-256: 4e3890056e5fe79085fceb8cc32628e68db93bd4fea209ae418dbb82215b9fa9

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.2

SRPM
kernel-2.6.32-220.39.1.el6.src.rpm SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
ppc64
kernel-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 7a37bfea46cbd1b4079f1b4e9c3804af41e25550e19d0cc4a92c0b11b47f1545
kernel-bootwrapper-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 666e9484abad411a41564879bb51edfb37e75f176dcfe45e8783d9d0c43b20e0
kernel-debug-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 04f991cf2b1234286b8b2a00b156529ed107ca4d6755324d46c1192c3a8f04be
kernel-debug-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: c4323e9fb009a7edecf22dc4cf03d454443532d86fda88defc338f4680c0d8bd
kernel-debug-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: c4323e9fb009a7edecf22dc4cf03d454443532d86fda88defc338f4680c0d8bd
kernel-debug-devel-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 90514f0419272bb7130d1945298332187ee593a01725882208ed240003665741
kernel-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 3a8af521d6b46cdb406d12c0ec4d4e3806b1bfbedc234cc170613a09b931780e
kernel-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 3a8af521d6b46cdb406d12c0ec4d4e3806b1bfbedc234cc170613a09b931780e
kernel-debuginfo-common-ppc64-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: b5b340bdab73f46076183c60ac8216d218b5deed8647cbbfc1c424dcc3d0059c
kernel-debuginfo-common-ppc64-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: b5b340bdab73f46076183c60ac8216d218b5deed8647cbbfc1c424dcc3d0059c
kernel-devel-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 8b1af4c22affccbb34602dcb3be3b23063d0d6619790d8fa0d7bb13b4ab2b3fc
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: b992a0a7b3893f0e431e74383d1dc72ee775f16974bfa2eb8239eff8bc334767
perf-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 657e0cdaa4e99574af5399fb535da9d7b80437631311d36cd77ce8432da7b01f
perf-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 04a688308f882739dac05e5d56cb698f26ce1587226866e15904bd663a9e4052
perf-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 04a688308f882739dac05e5d56cb698f26ce1587226866e15904bd663a9e4052
python-perf-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: ac3f42564bb8b47031b0948017c73d97a7a1dcf7956b2c2086fae6095bb4df2f
python-perf-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 630a6b33924c946db949567e160a68f66cd4cbec7c29761d42f5381a24ab7455
python-perf-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm SHA-256: 630a6b33924c946db949567e160a68f66cd4cbec7c29761d42f5381a24ab7455

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.2

SRPM
kernel-2.6.32-220.39.1.el6.src.rpm SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
x86_64
kernel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 5031fe6f72f12d7f6217e8e28c4647ce1118c1435ff0ea79cc811df1df90c0a2
kernel-debug-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ab70ac75cb7e1eba98bcee437304cb748283d8f772271f93d66d419733927d72
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 15d8e93a42b851f025e5098ae1b2ec477de956c848d3f19dbce8fb18a8999a2c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 93dd2a18138730b6ff58dde7e6210dedfeb3d6a91f101a1bed06a3a9bf502d5e
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: cdcc5487c1efda48a4b28c293327a400607a5e8d60ecb6c0c3ad888c052e9ab2
perf-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f1b8cbc00394736e854cc5b850f6f4a2bc152ed054bc3424ee0fecb5dab73b76
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2
i386
kernel-2.6.32-220.39.1.el6.i686.rpm SHA-256: ca259d737ccdcb9ad33f20d8b25b569557849c50585a00769878d8d1659ee592
kernel-debug-2.6.32-220.39.1.el6.i686.rpm SHA-256: db465394456e3ab41b550764457d9fa60a6abe62c824b60636e9faf6ad8d2951
kernel-debug-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: cc7d312496065d80f18583a72eec0eced42fb73f4a3bf208f5565923b50175a7
kernel-debug-devel-2.6.32-220.39.1.el6.i686.rpm SHA-256: 51d7388bf50480a979fbe84a50f71c67a9deabce811bc04ac6e66446affc26c5
kernel-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: ddf64341750f8e1bbeb762f5eafe09b23624bfbb15c8d6c612ab08834f89c4ec
kernel-debuginfo-common-i686-2.6.32-220.39.1.el6.i686.rpm SHA-256: 8e0c3b90416769a5a559d389de46ca4a4f7e38ecc999862e3d6bc2f963dcf1da
kernel-devel-2.6.32-220.39.1.el6.i686.rpm SHA-256: 1adebd5983dbb65ac915bc0898bd8b5d139bcbfc64439630240d156d9bf8f10a
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.i686.rpm SHA-256: 51b06d1d53215540997d23bf850a3297ce5e452a2b70ed647a5ae7cece80087f
perf-2.6.32-220.39.1.el6.i686.rpm SHA-256: 33b2c099f5dba9d4778ea14fb46e1a062d18f9a1fbeee898caba4fc28db1f2bf
perf-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: 49501eab40ad292a4fe11b836efc0b847b09846a279ec9ac29a6b929893df88a
python-perf-debuginfo-2.6.32-220.39.1.el6.i686.rpm SHA-256: 82d90f2e49182750749916146090b3ba702f5cd0a1e6726fde27469040a31b8b

Red Hat Storage 2.0

SRPM
x86_64

Red Hat Gluster Storage Server for On-premise 2.0

SRPM
kernel-2.6.32-220.39.1.el6.src.rpm SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
x86_64
kernel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 5031fe6f72f12d7f6217e8e28c4647ce1118c1435ff0ea79cc811df1df90c0a2
kernel-debug-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ab70ac75cb7e1eba98bcee437304cb748283d8f772271f93d66d419733927d72
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 15d8e93a42b851f025e5098ae1b2ec477de956c848d3f19dbce8fb18a8999a2c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 93dd2a18138730b6ff58dde7e6210dedfeb3d6a91f101a1bed06a3a9bf502d5e
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: cdcc5487c1efda48a4b28c293327a400607a5e8d60ecb6c0c3ad888c052e9ab2
perf-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f1b8cbc00394736e854cc5b850f6f4a2bc152ed054bc3424ee0fecb5dab73b76
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2

Red Hat Storage for Public Cloud (via RHUI) 2.0

SRPM
kernel-2.6.32-220.39.1.el6.src.rpm SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
x86_64
kernel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 5031fe6f72f12d7f6217e8e28c4647ce1118c1435ff0ea79cc811df1df90c0a2
kernel-debug-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ab70ac75cb7e1eba98bcee437304cb748283d8f772271f93d66d419733927d72
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 15d8e93a42b851f025e5098ae1b2ec477de956c848d3f19dbce8fb18a8999a2c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 93dd2a18138730b6ff58dde7e6210dedfeb3d6a91f101a1bed06a3a9bf502d5e
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: cdcc5487c1efda48a4b28c293327a400607a5e8d60ecb6c0c3ad888c052e9ab2
perf-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f1b8cbc00394736e854cc5b850f6f4a2bc152ed054bc3424ee0fecb5dab73b76
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2

Red Hat Enterprise Linux Server - AUS 6.2

SRPM
kernel-2.6.32-220.39.1.el6.src.rpm SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
x86_64
kernel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 5031fe6f72f12d7f6217e8e28c4647ce1118c1435ff0ea79cc811df1df90c0a2
kernel-debug-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ab70ac75cb7e1eba98bcee437304cb748283d8f772271f93d66d419733927d72
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 15d8e93a42b851f025e5098ae1b2ec477de956c848d3f19dbce8fb18a8999a2c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-devel-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 93dd2a18138730b6ff58dde7e6210dedfeb3d6a91f101a1bed06a3a9bf502d5e
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: cdcc5487c1efda48a4b28c293327a400607a5e8d60ecb6c0c3ad888c052e9ab2
perf-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: f1b8cbc00394736e854cc5b850f6f4a2bc152ed054bc3424ee0fecb5dab73b76
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
python-perf-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: cfc333fa84bb7e1c751b75b144e4305df5cf25495a3f455903d015363428bd08
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter