Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2013:1645 - Security Advisory
Issued:
2013-11-21
Updated:
2013-11-21

RHSA-2013:1645 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat Enterprise Linux 6 kernel update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix multiple security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 6.
This is the fifth regular update.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • A flaw was found in the way the Linux kernel's IPv6 implementation

handled certain UDP packets when the UDP Fragmentation Offload (UFO)
feature was enabled. A remote attacker could use this flaw to crash the
system or, potentially, escalate their privileges on the system.
(CVE-2013-4387, Important)

  • A flaw was found in the way the Linux kernel handled the creation of

temporary IPv6 addresses. If the IPv6 privacy extension was enabled
(/proc/sys/net/ipv6/conf/eth0/use_tempaddr set to '2'), an attacker on the
local network could disable IPv6 temporary address generation, leading to a
potential information disclosure. (CVE-2013-0343, Moderate)

  • A flaw was found in the way the Linux kernel handled HID (Human Interface

Device) reports with an out-of-bounds Report ID. An attacker with physical
access to the system could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2013-2888,
Moderate)

  • An off-by-one flaw was found in the way the ANSI CPRNG implementation in

the Linux kernel processed non-block size aligned requests. This could lead
to random numbers being generated with less bits of entropy than expected
when ANSI CPRNG was used. (CVE-2013-4345, Moderate)

  • It was found that the fix for CVE-2012-2375 released via RHSA-2012:1580

accidentally removed a check for small-sized result buffers. A local,
unprivileged user with access to an NFSv4 mount with ACL support could use
this flaw to crash the system or, potentially, escalate their privileges on
the system . (CVE-2013-4591, Moderate)

  • A flaw was found in the way IOMMU memory mappings were handled when

moving memory slots. A malicious user on a KVM host who has the ability to
assign a device to a guest could use this flaw to crash the host.
(CVE-2013-4592, Moderate)

  • Heap-based buffer overflow flaws were found in the way the Zeroplus and

Pantherlord/GreenAsia game controllers handled HID reports. An attacker
with physical access to the system could use these flaws to crash the
system or, potentially, escalate their privileges on the system.
(CVE-2013-2889, CVE-2013-2892, Moderate)

  • Two information leak flaws were found in the logical link control (LLC)

implementation in the Linux kernel. A local, unprivileged user could use
these flaws to leak kernel stack memory to user space. (CVE-2012-6542,
CVE-2013-3231, Low)

  • A heap-based buffer overflow in the way the tg3 Ethernet driver parsed

the vital product data (VPD) of devices could allow an attacker with
physical access to a system to cause a denial of service or, potentially,
escalate their privileges. (CVE-2013-1929, Low)

  • Information leak flaws in the Linux kernel could allow a privileged,

local user to leak kernel memory to user space. (CVE-2012-6545,
CVE-2013-1928, CVE-2013-2164, CVE-2013-2234, Low)

  • A format string flaw was found in the Linux kernel's block layer.

A privileged, local user could potentially use this flaw to escalate their
privileges to kernel level (ring0). (CVE-2013-2851, Low)

Red Hat would like to thank Stephan Mueller for reporting CVE-2013-4345,
and Kees Cook for reporting CVE-2013-2851.

This update also fixes several hundred bugs and adds enhancements. Refer to
the Red Hat Enterprise Linux 6.5 Release Notes for information on the most
significant of these changes, and the Technical Notes for further
information, both linked to in the References.

All Red Hat Enterprise Linux 6 users are advised to install these updated
packages, which correct these issues, and fix the bugs and add the
enhancements noted in the Red Hat Enterprise Linux 6.5 Release Notes and
Technical Notes. The system must be rebooted for this update to take
effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 627128 - kernel spec: devel_post macro: hardlink fc typo
  • BZ - 734728 - cifs: asynchronous readpages support
  • BZ - 796364 - sbc_fitpc2_wdt NULL pointer dereference
  • BZ - 815908 - NFSv4 server support for numeric IDs
  • BZ - 831158 - dm-crypt: Fix possible mempool deadlock
  • BZ - 834919 - JBD: Spotted dirty metadata buffer
  • BZ - 851269 - kernel-debug: enable CONFIG_JBD_DEBUG
  • BZ - 856764 - RHEL 6.5 Common Network Backports Tracker
  • BZ - 859562 - DM RAID: 'sync' table argument is ineffective.
  • BZ - 873659 - virt: Clocksource tsc unstable (delta = 474712882 ns). Enable clocksource failover by adding clocksource_failover kernel parameter.
  • BZ - 876528 - Set-group-ID (SGID) bit not inherited on XFS file system with ACLs on directory
  • BZ - 889973 - "kernel: device-mapper: table: 253:3: snapshot-origin: unknown target type"
  • BZ - 903297 - FCoE target: backport drivers/target from upstream
  • BZ - 908093 - gfs2: withdraw does not wait for gfs_controld
  • BZ - 913660 - nfs client crashes during open
  • BZ - 914664 - CVE-2013-0343 kernel: handling of IPv6 temporary addresses
  • BZ - 918239 - kernel-2.6.32-358.0.1 doesn't boot at virtual machine on Xen Cloud Platform
  • BZ - 920752 - cannot open device nodes for writing on RO filesystems
  • BZ - 922322 - CVE-2012-6542 Kernel: llc: information leak via getsockname
  • BZ - 922404 - CVE-2012-6545 Kernel: Bluetooth: RFCOMM - information leak
  • BZ - 928207 - transfer data using two port from guest to host,guest hang and call trace
  • BZ - 949567 - CVE-2013-1928 Kernel: information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE
  • BZ - 949932 - CVE-2013-1929 Kernel: tg3: buffer overflow in VPD firmware parsing
  • BZ - 953097 - virtio-rng, boot the guest with two rng device, cat /dev/hwrng in guest, guest will call trace
  • BZ - 956094 - CVE-2013-3231 Kernel: llc: Fix missing msg_namelen update in llc_ui_recvmsg
  • BZ - 969515 - CVE-2013-2851 kernel: block: passing disk names as format strings
  • BZ - 973100 - CVE-2013-2164 Kernel: information leak in cdrom driver
  • BZ - 980995 - CVE-2013-2234 Kernel: net: information leak in AF_KEY notify
  • BZ - 990806 - BUG: soft lockup - CPU#0 stuck for 63s! [killall5:7385]
  • BZ - 999890 - CVE-2013-2889 Kernel: HID: zeroplus: heap overflow flaw
  • BZ - 1000429 - CVE-2013-2892 Kernel: HID: pantherlord: heap overflow flaw
  • BZ - 1000451 - CVE-2013-2888 Kernel: HID: memory corruption flaw
  • BZ - 1007690 - CVE-2013-4345 kernel: ansi_cprng: off by one error in non-block size request
  • BZ - 1011927 - CVE-2013-4387 Kernel: net: IPv6: panic when UFO=On for an interface
  • BZ - 1014867 - xfssyncd and flush device threads hang in xlog_grant_head_wait
  • BZ - 1031678 - CVE-2013-4591 kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached
  • BZ - 1031702 - CVE-2013-4592 kernel: kvm: memory leak when memory slot is moved with assigned device

CVEs

  • CVE-2012-6542
  • CVE-2013-1929
  • CVE-2013-3231
  • CVE-2012-6545
  • CVE-2013-2164
  • CVE-2013-2234
  • CVE-2013-2851
  • CVE-2013-0343
  • CVE-2013-4345
  • CVE-2013-2888
  • CVE-2013-4387
  • CVE-2013-2892
  • CVE-2013-1928
  • CVE-2013-4592
  • CVE-2013-4591
  • CVE-2013-2889

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.5_Release_Notes/index.html
  • https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/kernel.html#RHSA-2013-1645
  • Note: More recent versions of these packages may be available. Click a package name for more details.

    Red Hat Enterprise Linux Server 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    x86_64
    kernel-2.6.32-431.el6.x86_64.rpm SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.x86_64.rpm SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.x86_64.rpm SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
    perf-2.6.32-431.el6.x86_64.rpm SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    python-perf-2.6.32-431.el6.x86_64.rpm SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    i386
    kernel-2.6.32-431.el6.i686.rpm SHA-256: fafe931e3bfc3528d0927c717e5a7f5995b9d0c3084460fa9af84ee46010f0e8
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.i686.rpm SHA-256: a40994bc1b2c2deb3662eedf4399816f9241e09cfe3df038da460f1d77af05b5
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-devel-2.6.32-431.el6.i686.rpm SHA-256: 39454ea7fb5dd4249153ff1a11c6a2f40e5d44fdb59fc1a30999cd921bc514c1
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-devel-2.6.32-431.el6.i686.rpm SHA-256: ad9701463405cd0f6379e7f57d16b7744d0f31e603d8507987a101140b74efa9
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.i686.rpm SHA-256: 3a961e94286f161bda90d235f78e3be0684c853b8cd411e3725169f1c95d8001
    perf-2.6.32-431.el6.i686.rpm SHA-256: bdf02fcf3f44b267d51705cec35e7343dc9b4ae5e9fc4130a7eefac066949086
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    python-perf-2.6.32-431.el6.i686.rpm SHA-256: d6dbab0602c59a05cb2a091ef3c7def0498ee1f920ba21b0b6c74d5b91dcc879
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8

    Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    x86_64
    kernel-2.6.32-431.el6.x86_64.rpm SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.x86_64.rpm SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.x86_64.rpm SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
    perf-2.6.32-431.el6.x86_64.rpm SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    python-perf-2.6.32-431.el6.x86_64.rpm SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    i386
    kernel-2.6.32-431.el6.i686.rpm SHA-256: fafe931e3bfc3528d0927c717e5a7f5995b9d0c3084460fa9af84ee46010f0e8
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.i686.rpm SHA-256: a40994bc1b2c2deb3662eedf4399816f9241e09cfe3df038da460f1d77af05b5
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-devel-2.6.32-431.el6.i686.rpm SHA-256: 39454ea7fb5dd4249153ff1a11c6a2f40e5d44fdb59fc1a30999cd921bc514c1
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-devel-2.6.32-431.el6.i686.rpm SHA-256: ad9701463405cd0f6379e7f57d16b7744d0f31e603d8507987a101140b74efa9
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.i686.rpm SHA-256: 3a961e94286f161bda90d235f78e3be0684c853b8cd411e3725169f1c95d8001
    perf-2.6.32-431.el6.i686.rpm SHA-256: bdf02fcf3f44b267d51705cec35e7343dc9b4ae5e9fc4130a7eefac066949086
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    python-perf-2.6.32-431.el6.i686.rpm SHA-256: d6dbab0602c59a05cb2a091ef3c7def0498ee1f920ba21b0b6c74d5b91dcc879
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8

    Red Hat Enterprise Linux Workstation 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    x86_64
    kernel-2.6.32-431.el6.x86_64.rpm SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.x86_64.rpm SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.x86_64.rpm SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
    perf-2.6.32-431.el6.x86_64.rpm SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    python-perf-2.6.32-431.el6.x86_64.rpm SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    i386
    kernel-2.6.32-431.el6.i686.rpm SHA-256: fafe931e3bfc3528d0927c717e5a7f5995b9d0c3084460fa9af84ee46010f0e8
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.i686.rpm SHA-256: a40994bc1b2c2deb3662eedf4399816f9241e09cfe3df038da460f1d77af05b5
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-devel-2.6.32-431.el6.i686.rpm SHA-256: 39454ea7fb5dd4249153ff1a11c6a2f40e5d44fdb59fc1a30999cd921bc514c1
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-devel-2.6.32-431.el6.i686.rpm SHA-256: ad9701463405cd0f6379e7f57d16b7744d0f31e603d8507987a101140b74efa9
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.i686.rpm SHA-256: 3a961e94286f161bda90d235f78e3be0684c853b8cd411e3725169f1c95d8001
    perf-2.6.32-431.el6.i686.rpm SHA-256: bdf02fcf3f44b267d51705cec35e7343dc9b4ae5e9fc4130a7eefac066949086
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    python-perf-2.6.32-431.el6.i686.rpm SHA-256: d6dbab0602c59a05cb2a091ef3c7def0498ee1f920ba21b0b6c74d5b91dcc879
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8

    Red Hat Enterprise Linux Desktop 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    x86_64
    kernel-2.6.32-431.el6.x86_64.rpm SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.x86_64.rpm SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.x86_64.rpm SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
    perf-2.6.32-431.el6.x86_64.rpm SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    python-perf-2.6.32-431.el6.x86_64.rpm SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    i386
    kernel-2.6.32-431.el6.i686.rpm SHA-256: fafe931e3bfc3528d0927c717e5a7f5995b9d0c3084460fa9af84ee46010f0e8
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.i686.rpm SHA-256: a40994bc1b2c2deb3662eedf4399816f9241e09cfe3df038da460f1d77af05b5
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-devel-2.6.32-431.el6.i686.rpm SHA-256: 39454ea7fb5dd4249153ff1a11c6a2f40e5d44fdb59fc1a30999cd921bc514c1
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-devel-2.6.32-431.el6.i686.rpm SHA-256: ad9701463405cd0f6379e7f57d16b7744d0f31e603d8507987a101140b74efa9
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.i686.rpm SHA-256: 3a961e94286f161bda90d235f78e3be0684c853b8cd411e3725169f1c95d8001
    perf-2.6.32-431.el6.i686.rpm SHA-256: bdf02fcf3f44b267d51705cec35e7343dc9b4ae5e9fc4130a7eefac066949086
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    python-perf-2.6.32-431.el6.i686.rpm SHA-256: d6dbab0602c59a05cb2a091ef3c7def0498ee1f920ba21b0b6c74d5b91dcc879
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8

    Red Hat Enterprise Linux for IBM z Systems 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    s390x
    kernel-2.6.32-431.el6.s390x.rpm SHA-256: 1ae5655e74f75a39e08f7c50eb7847ddfbd0afcf645abd17222b6c188a942910
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.s390x.rpm SHA-256: 968da00321ceadd265f2decebc4293a66409440ee83cf007f69eb911b4d28f74
    kernel-debug-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 243a286c6e9826f21e44ddaf2979f6977135a9cbb065cd55800d5ace68135f1f
    kernel-debug-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 243a286c6e9826f21e44ddaf2979f6977135a9cbb065cd55800d5ace68135f1f
    kernel-debug-devel-2.6.32-431.el6.s390x.rpm SHA-256: fcca1e679e28065be4f2428deb80f0cd5773bcb19afe0fd82519fbc75032c55f
    kernel-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 69d90408f1df33defc17b6460d59e84c9e1a4e7325ab92e19e93c7adce1c55bd
    kernel-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 69d90408f1df33defc17b6460d59e84c9e1a4e7325ab92e19e93c7adce1c55bd
    kernel-debuginfo-common-s390x-2.6.32-431.el6.s390x.rpm SHA-256: 5c6e87784f3c78f39eeb2c4b2bb9f7ee22104a9dd77b823fa8b0230f38da6157
    kernel-debuginfo-common-s390x-2.6.32-431.el6.s390x.rpm SHA-256: 5c6e87784f3c78f39eeb2c4b2bb9f7ee22104a9dd77b823fa8b0230f38da6157
    kernel-devel-2.6.32-431.el6.s390x.rpm SHA-256: 6c292767e853d6b7d2d4535ed6afd1a6a5f3ccbfbcabaf5ccde9e1df2c09105b
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.s390x.rpm SHA-256: 85693eef56459cfbe63cb9e9609e303dc40aacd75ce4c63ae097abf078db4e3b
    kernel-kdump-2.6.32-431.el6.s390x.rpm SHA-256: 1cf8f29c4d00b205df1acd02d99f4cdd5f4dba14fcf463d835e62c0e11d6de8b
    kernel-kdump-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: f2bd0b97370da255feb76a34779359175140317658b21176ed966c7d2f0be0bb
    kernel-kdump-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: f2bd0b97370da255feb76a34779359175140317658b21176ed966c7d2f0be0bb
    kernel-kdump-devel-2.6.32-431.el6.s390x.rpm SHA-256: c5f91f715a9429b28afe96b4c14b4e9a210ad3aea74678960951fcf0a7f8b7fb
    perf-2.6.32-431.el6.s390x.rpm SHA-256: e562b5600ea93841d70969d08cce2724908e927e9aa88ca13b7c696666bcd763
    perf-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 58ba2acd83978bcaa0f8a5b65fdcda97764699fdafad7e5d1e1d392dabb85022
    perf-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 58ba2acd83978bcaa0f8a5b65fdcda97764699fdafad7e5d1e1d392dabb85022
    python-perf-2.6.32-431.el6.s390x.rpm SHA-256: d35dd43c2b4b6e3fbfdd99b62e2160f573efd650a7a97cf927ce679cc09eb056
    python-perf-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: ea7d3ea3e4e822712bfe01d204a41e5b8451aed7d443e5facae6bf2cd543342a
    python-perf-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: ea7d3ea3e4e822712bfe01d204a41e5b8451aed7d443e5facae6bf2cd543342a

    Red Hat Enterprise Linux for Power, big endian 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    ppc64
    kernel-2.6.32-431.el6.ppc64.rpm SHA-256: e55a25ef9a1c2219d85acb986df20928ec856757c4343f70b2333fa644fa0b12
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-bootwrapper-2.6.32-431.el6.ppc64.rpm SHA-256: 176814c7311532ae6a51bad7fb1f4343797208e5d4067a6b129a30e2808d235c
    kernel-debug-2.6.32-431.el6.ppc64.rpm SHA-256: a32ff51dbc45fc96fa09477997a5782b5933fb7d4cf8444e56d655e2bd65aadf
    kernel-debug-debuginfo-2.6.32-431.el6.ppc64.rpm SHA-256: 1b360879e26568509d1ba26dbfa607aed44567c44d7e5db9341ba17a02d6641c
    kernel-debug-debuginfo-2.6.32-431.el6.ppc64.rpm SHA-256: 1b360879e26568509d1ba26dbfa607aed44567c44d7e5db9341ba17a02d6641c
    kernel-debug-devel-2.6.32-431.el6.ppc64.rpm SHA-256: e0ebafc6c148703e83dd6235ddfe468c1044a0de7e20a600923f823dad946dd8
    kernel-debuginfo-2.6.32-431.el6.ppc64.rpm SHA-256: 7877b3f5ad81da6bc692edc64c8eb6da53a21f9e418b96f4cd9456c3043b0740
    kernel-debuginfo-2.6.32-431.el6.ppc64.rpm SHA-256: 7877b3f5ad81da6bc692edc64c8eb6da53a21f9e418b96f4cd9456c3043b0740
    kernel-debuginfo-common-ppc64-2.6.32-431.el6.ppc64.rpm SHA-256: f5d178da06567bde8d740ce6c9855e24d4af83a1b9a8080f7ac911adaaaabffe
    kernel-debuginfo-common-ppc64-2.6.32-431.el6.ppc64.rpm SHA-256: f5d178da06567bde8d740ce6c9855e24d4af83a1b9a8080f7ac911adaaaabffe
    kernel-devel-2.6.32-431.el6.ppc64.rpm SHA-256: 5c692be08cf5e6232821b61e162be8c5df515dab7f8f702b9dbcfd1f36b50e11
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.ppc64.rpm SHA-256: 3fbb432c946f2b513283ab995cb4f69fb56dafd20e1b9b8b474412c4f0bcf2ab
    perf-2.6.32-431.el6.ppc64.rpm SHA-256: 7119efd13d7e00c7e0a76f997fec4ed950cc44cd264ebb440b632beea17ab3e0
    perf-debuginfo-2.6.32-431.el6.ppc64.rpm SHA-256: da8394381b28f8e73fe9301341934454876b97dc77d009e4a1a6f03852cedae4
    perf-debuginfo-2.6.32-431.el6.ppc64.rpm SHA-256: da8394381b28f8e73fe9301341934454876b97dc77d009e4a1a6f03852cedae4
    python-perf-2.6.32-431.el6.ppc64.rpm SHA-256: 759d13e71e2357483835a0c73be4778c2f9c3a11c98778d17a5675ced67ecf2e
    python-perf-debuginfo-2.6.32-431.el6.ppc64.rpm SHA-256: 63fcf717100b0ba90db6b7c9d6c67b9bd0a3dabdf94362c891d10b295bb01806
    python-perf-debuginfo-2.6.32-431.el6.ppc64.rpm SHA-256: 63fcf717100b0ba90db6b7c9d6c67b9bd0a3dabdf94362c891d10b295bb01806

    Red Hat Enterprise Linux for Scientific Computing 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    x86_64
    kernel-2.6.32-431.el6.x86_64.rpm SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.x86_64.rpm SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.x86_64.rpm SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
    perf-2.6.32-431.el6.x86_64.rpm SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    python-perf-2.6.32-431.el6.x86_64.rpm SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c

    Red Hat Enterprise Linux Server from RHUI 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    x86_64
    kernel-2.6.32-431.el6.x86_64.rpm SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.x86_64.rpm SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
    kernel-debug-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
    kernel-devel-2.6.32-431.el6.x86_64.rpm SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.x86_64.rpm SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
    perf-2.6.32-431.el6.x86_64.rpm SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
    python-perf-2.6.32-431.el6.x86_64.rpm SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
    i386
    kernel-2.6.32-431.el6.i686.rpm SHA-256: fafe931e3bfc3528d0927c717e5a7f5995b9d0c3084460fa9af84ee46010f0e8
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.i686.rpm SHA-256: a40994bc1b2c2deb3662eedf4399816f9241e09cfe3df038da460f1d77af05b5
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
    kernel-debug-devel-2.6.32-431.el6.i686.rpm SHA-256: 39454ea7fb5dd4249153ff1a11c6a2f40e5d44fdb59fc1a30999cd921bc514c1
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
    kernel-devel-2.6.32-431.el6.i686.rpm SHA-256: ad9701463405cd0f6379e7f57d16b7744d0f31e603d8507987a101140b74efa9
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.i686.rpm SHA-256: 3a961e94286f161bda90d235f78e3be0684c853b8cd411e3725169f1c95d8001
    perf-2.6.32-431.el6.i686.rpm SHA-256: bdf02fcf3f44b267d51705cec35e7343dc9b4ae5e9fc4130a7eefac066949086
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
    python-perf-2.6.32-431.el6.i686.rpm SHA-256: d6dbab0602c59a05cb2a091ef3c7def0498ee1f920ba21b0b6c74d5b91dcc879
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8
    python-perf-debuginfo-2.6.32-431.el6.i686.rpm SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8

    Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

    SRPM
    kernel-2.6.32-431.el6.src.rpm SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
    s390x
    kernel-2.6.32-431.el6.s390x.rpm SHA-256: 1ae5655e74f75a39e08f7c50eb7847ddfbd0afcf645abd17222b6c188a942910
    kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
    kernel-debug-2.6.32-431.el6.s390x.rpm SHA-256: 968da00321ceadd265f2decebc4293a66409440ee83cf007f69eb911b4d28f74
    kernel-debug-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 243a286c6e9826f21e44ddaf2979f6977135a9cbb065cd55800d5ace68135f1f
    kernel-debug-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 243a286c6e9826f21e44ddaf2979f6977135a9cbb065cd55800d5ace68135f1f
    kernel-debug-devel-2.6.32-431.el6.s390x.rpm SHA-256: fcca1e679e28065be4f2428deb80f0cd5773bcb19afe0fd82519fbc75032c55f
    kernel-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 69d90408f1df33defc17b6460d59e84c9e1a4e7325ab92e19e93c7adce1c55bd
    kernel-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 69d90408f1df33defc17b6460d59e84c9e1a4e7325ab92e19e93c7adce1c55bd
    kernel-debuginfo-common-s390x-2.6.32-431.el6.s390x.rpm SHA-256: 5c6e87784f3c78f39eeb2c4b2bb9f7ee22104a9dd77b823fa8b0230f38da6157
    kernel-debuginfo-common-s390x-2.6.32-431.el6.s390x.rpm SHA-256: 5c6e87784f3c78f39eeb2c4b2bb9f7ee22104a9dd77b823fa8b0230f38da6157
    kernel-devel-2.6.32-431.el6.s390x.rpm SHA-256: 6c292767e853d6b7d2d4535ed6afd1a6a5f3ccbfbcabaf5ccde9e1df2c09105b
    kernel-doc-2.6.32-431.el6.noarch.rpm SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
    kernel-firmware-2.6.32-431.el6.noarch.rpm SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
    kernel-headers-2.6.32-431.el6.s390x.rpm SHA-256: 85693eef56459cfbe63cb9e9609e303dc40aacd75ce4c63ae097abf078db4e3b
    kernel-kdump-2.6.32-431.el6.s390x.rpm SHA-256: 1cf8f29c4d00b205df1acd02d99f4cdd5f4dba14fcf463d835e62c0e11d6de8b
    kernel-kdump-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: f2bd0b97370da255feb76a34779359175140317658b21176ed966c7d2f0be0bb
    kernel-kdump-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: f2bd0b97370da255feb76a34779359175140317658b21176ed966c7d2f0be0bb
    kernel-kdump-devel-2.6.32-431.el6.s390x.rpm SHA-256: c5f91f715a9429b28afe96b4c14b4e9a210ad3aea74678960951fcf0a7f8b7fb
    perf-2.6.32-431.el6.s390x.rpm SHA-256: e562b5600ea93841d70969d08cce2724908e927e9aa88ca13b7c696666bcd763
    perf-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 58ba2acd83978bcaa0f8a5b65fdcda97764699fdafad7e5d1e1d392dabb85022
    perf-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: 58ba2acd83978bcaa0f8a5b65fdcda97764699fdafad7e5d1e1d392dabb85022
    python-perf-2.6.32-431.el6.s390x.rpm SHA-256: d35dd43c2b4b6e3fbfdd99b62e2160f573efd650a7a97cf927ce679cc09eb056
    python-perf-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: ea7d3ea3e4e822712bfe01d204a41e5b8451aed7d443e5facae6bf2cd543342a
    python-perf-debuginfo-2.6.32-431.el6.s390x.rpm SHA-256: ea7d3ea3e4e822712bfe01d204a41e5b8451aed7d443e5facae6bf2cd543342a

    The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

    Red Hat

    Quick Links

    • Downloads
    • Subscriptions
    • Support Cases
    • Customer Service
    • Product Documentation

    Help

    • Contact Us
    • Customer Portal FAQ
    • Log-in Assistance

    Site Info

    • Trust Red Hat
    • Browser Support Policy
    • Accessibility
    • Awards and Recognition
    • Colophon

    Related Sites

    • redhat.com
    • openshift.com
    • developers.redhat.com
    • connect.redhat.com

    About

    • Red Hat Subscription Value
    • About Red Hat
    • Red Hat Jobs
    Copyright © 2021 Red Hat, Inc.
    • Privacy Statement
    • Customer Portal Terms of Use
    • All Policies and Guidelines
    Red Hat Summit
    Twitter Facebook