Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:1783 - Security Advisory
Issued:
2013-12-05
Updated:
2013-12-05

RHSA-2013:1783 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix three security issues and several bugs are
now available for Red Hat Enterprise Linux 6.3 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A race condition was found in the way asynchronous I/O and fallocate()

interacted when using the ext4 file system. A local, unprivileged user
could use this flaw to expose random data from an extent whose data blocks
have not yet been written, and thus contain data from a deleted file.
(CVE-2012-4508, Important)

  • An information leak flaw was found in the way the Linux kernel's device

mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data from
disk blocks in free space, which are normally inaccessible. (CVE-2013-4299,
Moderate)

  • A format string flaw was found in the Linux kernel's block layer.

A privileged, local user could potentially use this flaw to escalate their
privileges to kernel level (ring0). (CVE-2013-2851, Low)

Red Hat would like to thank Theodore Ts'o for reporting CVE-2012-4508,
Fujitsu for reporting CVE-2013-4299, and Kees Cook for reporting
CVE-2013-2851. Upstream acknowledges Dmitry Monakhov as the original
reporter of CVE-2012-4508.

This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386
  • Red Hat Enterprise Linux EUS Compute Node 6.3 x86_64

Fixes

  • BZ - 869904 - CVE-2012-4508 kernel: ext4: AIO vs fallocate stale data exposure
  • BZ - 969515 - CVE-2013-2851 kernel: block: passing disk names as format strings
  • BZ - 1004233 - CVE-2013-4299 kernel: dm: dm-snapshot data leak

CVEs

  • CVE-2012-4508
  • CVE-2013-2851
  • CVE-2013-4299

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.3_Technical_Notes/kernel.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.39.1.el6.src.rpm SHA-256: 77dd68b6c57a85193ee196714fb2f1cffbda329add9b65b19e134a083aa94ee8
x86_64
kernel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: d7d6e64fdc2a5e387f60c489efaa24ff1f7208fa21259183c778e0b745726dfd
kernel-debug-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: d0b3676d4ac24a0cdb1e858f4e9b017c6a2112038769d10a909e437ab949be2c
kernel-debug-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 9ab6ba9b553733a75a86148ffeb7bb6e31f22d3bf9efb3da370fa8209be47802
kernel-debug-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 9ab6ba9b553733a75a86148ffeb7bb6e31f22d3bf9efb3da370fa8209be47802
kernel-debug-devel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: afb7410cee881db8b79e88d8816365ab74a89c1a933d41ebb8d909fa05d64b5f
kernel-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: b9a17c771fd815aae6d4989fb84d06d859d1b4ff4ed9af27af8e789f714a01db
kernel-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: b9a17c771fd815aae6d4989fb84d06d859d1b4ff4ed9af27af8e789f714a01db
kernel-debuginfo-common-x86_64-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 94b4e0c55695fbce04cc834b68761578978f7c829f756af81402110eb442cd61
kernel-debuginfo-common-x86_64-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 94b4e0c55695fbce04cc834b68761578978f7c829f756af81402110eb442cd61
kernel-devel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: c74e65a1adeb990c49a48101317bd942c0fdb5f4e7ddf3a1c35cf64ab3627195
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 5f343db45b5ac2004d83e4f23ff814c270c5603f5fdd83bb5ac71dd134315fa5
perf-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: ed5dab017d548a2cbbdba2676b0f8b18bf602ab0de84332a76202b2ef644d0da
perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: da77e82791c4654890650ff309e529702f65bd57a67c4dc34a98123d48fbe9e1
perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: da77e82791c4654890650ff309e529702f65bd57a67c4dc34a98123d48fbe9e1
python-perf-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 036b754993c347ca938c50e48f06e98b98ac5e6e8d563be76c6159a5dfea9ce8
python-perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 57c41ff5886ac5a28bce48d7038b2d0031762cd8ad83712e434a1e09af1db8a3
python-perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 57c41ff5886ac5a28bce48d7038b2d0031762cd8ad83712e434a1e09af1db8a3
i386
kernel-2.6.32-279.39.1.el6.i686.rpm SHA-256: 2516ae92d3a7481b268ee6cf859eaff55e4b148c845031becabba7dce86e8af5
kernel-debug-2.6.32-279.39.1.el6.i686.rpm SHA-256: 2a96ac91722edda32834a4433890e79f2211947b52cc5b21c74885cdde74ae67
kernel-debug-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: f759645ec89f89b9c7195c11b029f2ac23afd0ae6567ff6ab0df34e0fff60ac0
kernel-debug-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: f759645ec89f89b9c7195c11b029f2ac23afd0ae6567ff6ab0df34e0fff60ac0
kernel-debug-devel-2.6.32-279.39.1.el6.i686.rpm SHA-256: b4bed37bf1dc8d8d1ac0674725d153d3d3024c5f3f927638bc0fc8e738f11dcf
kernel-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 17331228d3062b87ebbbc84af5d04f4377246bf3efd6aef97432cb615b76b5d3
kernel-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 17331228d3062b87ebbbc84af5d04f4377246bf3efd6aef97432cb615b76b5d3
kernel-debuginfo-common-i686-2.6.32-279.39.1.el6.i686.rpm SHA-256: af53b4278e1a50d56216ea3e9a87de2fc30744d8c51fabdf3a625b47e1c7eee5
kernel-debuginfo-common-i686-2.6.32-279.39.1.el6.i686.rpm SHA-256: af53b4278e1a50d56216ea3e9a87de2fc30744d8c51fabdf3a625b47e1c7eee5
kernel-devel-2.6.32-279.39.1.el6.i686.rpm SHA-256: d9d325c3ce9abddd3a0a5301791b81e7877d99b034e503099da4233b39c3e33c
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.i686.rpm SHA-256: a72b27f00910efcf2dfb2e7c3f2837ee06a39cf84d22c1e2dc4d6b6521466c57
perf-2.6.32-279.39.1.el6.i686.rpm SHA-256: 4d99d3dfc8cf8c0832b50f3ef28d64ae149a192724ed1b6158b21a4ac86b1075
perf-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 0845f7aea104b050364df82b2cc97fef0dd9cdf2c425faaa51ca26e3a08b5b01
perf-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 0845f7aea104b050364df82b2cc97fef0dd9cdf2c425faaa51ca26e3a08b5b01
python-perf-2.6.32-279.39.1.el6.i686.rpm SHA-256: 68b7ebab0c00ae425dd230052cca6fae3724859a8fad7df4b790226f3d93d4db
python-perf-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 4664416be224d9ac3f502a43a232770a6bc22710484b88f0b9ad8a0cf8381dd7
python-perf-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 4664416be224d9ac3f502a43a232770a6bc22710484b88f0b9ad8a0cf8381dd7

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.39.1.el6.src.rpm SHA-256: 77dd68b6c57a85193ee196714fb2f1cffbda329add9b65b19e134a083aa94ee8
s390x
kernel-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 623eccf7835c794184ffc116a04fc6dc3ed62a110f73b591e4460300dadd1264
kernel-debug-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 59406a3b5fc750452b6f4d3f6c63405b32fc84f759140379c08dc00af3758dab
kernel-debug-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 32b41e121dffe56f2dde3aa093c8f9d311e7c66fd3f6c032869a7c64dec2b4eb
kernel-debug-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 32b41e121dffe56f2dde3aa093c8f9d311e7c66fd3f6c032869a7c64dec2b4eb
kernel-debug-devel-2.6.32-279.39.1.el6.s390x.rpm SHA-256: fa08678e806828f78c2322a2afd7849ada5e25302ef529d267b2b8d192ba6f40
kernel-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 0489446fa26418c9b2f66606dc1770858c56fc6afb6d49bab358d220b562255a
kernel-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 0489446fa26418c9b2f66606dc1770858c56fc6afb6d49bab358d220b562255a
kernel-debuginfo-common-s390x-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 3ef4d10c0a0c9dba35cd50c909dfbdff5a04c6b21ccceb74f17dba90ce8c4246
kernel-debuginfo-common-s390x-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 3ef4d10c0a0c9dba35cd50c909dfbdff5a04c6b21ccceb74f17dba90ce8c4246
kernel-devel-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 2bef511b2a4dce142decd57ab87ef801957f95c1548a05a5e6bda9064f13c71c
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 59c431b57464ce50f08c2ae05f100a04397ed16080f82e4f854eefe14f0dae2e
kernel-kdump-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 2cf316b6052e669eae1b223700b8a8f314efb8ebbdee9b681803ae1098cf2d49
kernel-kdump-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 343c21e0ff75375af2f7646b779a3a63b3ac02e70a3776cd5f487098bee307c8
kernel-kdump-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 343c21e0ff75375af2f7646b779a3a63b3ac02e70a3776cd5f487098bee307c8
kernel-kdump-devel-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 75b4c106f3160f80b28e2e95d9fb54c6e41c2f8268eacd1e606467a7d490a5bf
perf-2.6.32-279.39.1.el6.s390x.rpm SHA-256: b8a9b5c4231e0671149627facfaf9219b71e3d3dae3763afe2634bd952770c22
perf-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: af109185f1b6a47d6c2331b7613e5175567e6a93e9dfb9b3932d8d4543bfaf4c
perf-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: af109185f1b6a47d6c2331b7613e5175567e6a93e9dfb9b3932d8d4543bfaf4c
python-perf-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 6435238075b2cf2ff8d67730b0c5c375b5e350373ad2720a833ab99d8d3f79df
python-perf-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 4fee3dbb6511fe87b8c65e0451e97b495505b5a942196b2f8fc9b97b08a2dae4
python-perf-debuginfo-2.6.32-279.39.1.el6.s390x.rpm SHA-256: 4fee3dbb6511fe87b8c65e0451e97b495505b5a942196b2f8fc9b97b08a2dae4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3

SRPM
kernel-2.6.32-279.39.1.el6.src.rpm SHA-256: 77dd68b6c57a85193ee196714fb2f1cffbda329add9b65b19e134a083aa94ee8
ppc64
kernel-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 0e1d136f80e26e1696da76fbd70bb796edc7c5983a21817da4bb4d37308dba03
kernel-bootwrapper-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 95c7ac0becd135d9c5b9e203591cd2a6c4aecc411f45eecdb7742e2021680187
kernel-debug-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: ceeffeddcfecfbbeef2c8cdf56d52b54b0c6850f1db8caec9d6eeab07928048d
kernel-debug-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 92aecbbfc439ff3d5b25fbb47f7e193884516702d580a6c5d1ec77e0bfa0f5ca
kernel-debug-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 92aecbbfc439ff3d5b25fbb47f7e193884516702d580a6c5d1ec77e0bfa0f5ca
kernel-debug-devel-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: d4016873c9e5ffa9eab11a4889d5351df0513245f14c8756f7b5a19b9a869ee5
kernel-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: c59d9a1adf5ba31cd82ad156154547d70d13dbfe449cc56a5a5c3bcb5b44add7
kernel-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: c59d9a1adf5ba31cd82ad156154547d70d13dbfe449cc56a5a5c3bcb5b44add7
kernel-debuginfo-common-ppc64-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: d7e1dc1974d37a09bf38a99be2ed2373e1aefe264027da65edeac37cf2a06159
kernel-debuginfo-common-ppc64-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: d7e1dc1974d37a09bf38a99be2ed2373e1aefe264027da65edeac37cf2a06159
kernel-devel-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 7cf09bb07be656f27bf30303e8be16cf254ecbb6b8954fe3fa58b5cc0a61e31f
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 0406d2555f43484f535dc4f94b5aaadd12f491d5fa4d2a324181a172e51708ee
perf-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 054d56332d919c8e99383b88fbc3e00f3aff9acde2dbca6d1c635af4cf9db016
perf-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 72b9f476eb09b13c2ce1a42d9d0a7b45c7193ad0f71f1c788113b1ed0159408b
perf-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: 72b9f476eb09b13c2ce1a42d9d0a7b45c7193ad0f71f1c788113b1ed0159408b
python-perf-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: b747ad0678cbd24346c3fc76b2d2f8721c25110c0d5e107b3f556bd22267c84a
python-perf-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: ec3e47aad436576bc3425224525a2feec432b5ef4d4207853b239f5644595807
python-perf-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm SHA-256: ec3e47aad436576bc3425224525a2feec432b5ef4d4207853b239f5644595807

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3

SRPM
kernel-2.6.32-279.39.1.el6.src.rpm SHA-256: 77dd68b6c57a85193ee196714fb2f1cffbda329add9b65b19e134a083aa94ee8
x86_64
kernel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: d7d6e64fdc2a5e387f60c489efaa24ff1f7208fa21259183c778e0b745726dfd
kernel-debug-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: d0b3676d4ac24a0cdb1e858f4e9b017c6a2112038769d10a909e437ab949be2c
kernel-debug-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 9ab6ba9b553733a75a86148ffeb7bb6e31f22d3bf9efb3da370fa8209be47802
kernel-debug-devel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: afb7410cee881db8b79e88d8816365ab74a89c1a933d41ebb8d909fa05d64b5f
kernel-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: b9a17c771fd815aae6d4989fb84d06d859d1b4ff4ed9af27af8e789f714a01db
kernel-debuginfo-common-x86_64-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 94b4e0c55695fbce04cc834b68761578978f7c829f756af81402110eb442cd61
kernel-devel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: c74e65a1adeb990c49a48101317bd942c0fdb5f4e7ddf3a1c35cf64ab3627195
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 5f343db45b5ac2004d83e4f23ff814c270c5603f5fdd83bb5ac71dd134315fa5
perf-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: ed5dab017d548a2cbbdba2676b0f8b18bf602ab0de84332a76202b2ef644d0da
perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: da77e82791c4654890650ff309e529702f65bd57a67c4dc34a98123d48fbe9e1
python-perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 57c41ff5886ac5a28bce48d7038b2d0031762cd8ad83712e434a1e09af1db8a3
i386
kernel-2.6.32-279.39.1.el6.i686.rpm SHA-256: 2516ae92d3a7481b268ee6cf859eaff55e4b148c845031becabba7dce86e8af5
kernel-debug-2.6.32-279.39.1.el6.i686.rpm SHA-256: 2a96ac91722edda32834a4433890e79f2211947b52cc5b21c74885cdde74ae67
kernel-debug-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: f759645ec89f89b9c7195c11b029f2ac23afd0ae6567ff6ab0df34e0fff60ac0
kernel-debug-devel-2.6.32-279.39.1.el6.i686.rpm SHA-256: b4bed37bf1dc8d8d1ac0674725d153d3d3024c5f3f927638bc0fc8e738f11dcf
kernel-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 17331228d3062b87ebbbc84af5d04f4377246bf3efd6aef97432cb615b76b5d3
kernel-debuginfo-common-i686-2.6.32-279.39.1.el6.i686.rpm SHA-256: af53b4278e1a50d56216ea3e9a87de2fc30744d8c51fabdf3a625b47e1c7eee5
kernel-devel-2.6.32-279.39.1.el6.i686.rpm SHA-256: d9d325c3ce9abddd3a0a5301791b81e7877d99b034e503099da4233b39c3e33c
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.i686.rpm SHA-256: a72b27f00910efcf2dfb2e7c3f2837ee06a39cf84d22c1e2dc4d6b6521466c57
perf-2.6.32-279.39.1.el6.i686.rpm SHA-256: 4d99d3dfc8cf8c0832b50f3ef28d64ae149a192724ed1b6158b21a4ac86b1075
perf-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 0845f7aea104b050364df82b2cc97fef0dd9cdf2c425faaa51ca26e3a08b5b01
python-perf-debuginfo-2.6.32-279.39.1.el6.i686.rpm SHA-256: 4664416be224d9ac3f502a43a232770a6bc22710484b88f0b9ad8a0cf8381dd7

Red Hat Enterprise Linux EUS Compute Node 6.3

SRPM
kernel-2.6.32-279.39.1.el6.src.rpm SHA-256: 77dd68b6c57a85193ee196714fb2f1cffbda329add9b65b19e134a083aa94ee8
x86_64
kernel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: d7d6e64fdc2a5e387f60c489efaa24ff1f7208fa21259183c778e0b745726dfd
kernel-debug-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: d0b3676d4ac24a0cdb1e858f4e9b017c6a2112038769d10a909e437ab949be2c
kernel-debug-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 9ab6ba9b553733a75a86148ffeb7bb6e31f22d3bf9efb3da370fa8209be47802
kernel-debug-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 9ab6ba9b553733a75a86148ffeb7bb6e31f22d3bf9efb3da370fa8209be47802
kernel-debug-devel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: afb7410cee881db8b79e88d8816365ab74a89c1a933d41ebb8d909fa05d64b5f
kernel-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: b9a17c771fd815aae6d4989fb84d06d859d1b4ff4ed9af27af8e789f714a01db
kernel-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: b9a17c771fd815aae6d4989fb84d06d859d1b4ff4ed9af27af8e789f714a01db
kernel-debuginfo-common-x86_64-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 94b4e0c55695fbce04cc834b68761578978f7c829f756af81402110eb442cd61
kernel-debuginfo-common-x86_64-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 94b4e0c55695fbce04cc834b68761578978f7c829f756af81402110eb442cd61
kernel-devel-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: c74e65a1adeb990c49a48101317bd942c0fdb5f4e7ddf3a1c35cf64ab3627195
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 5f343db45b5ac2004d83e4f23ff814c270c5603f5fdd83bb5ac71dd134315fa5
perf-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: ed5dab017d548a2cbbdba2676b0f8b18bf602ab0de84332a76202b2ef644d0da
perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: da77e82791c4654890650ff309e529702f65bd57a67c4dc34a98123d48fbe9e1
perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: da77e82791c4654890650ff309e529702f65bd57a67c4dc34a98123d48fbe9e1
python-perf-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 036b754993c347ca938c50e48f06e98b98ac5e6e8d563be76c6159a5dfea9ce8
python-perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 57c41ff5886ac5a28bce48d7038b2d0031762cd8ad83712e434a1e09af1db8a3
python-perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm SHA-256: 57c41ff5886ac5a28bce48d7038b2d0031762cd8ad83712e434a1e09af1db8a3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility