Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2014:1101 - Security Advisory
Issued:
2014-08-27
Updated:
2014-08-27

RHSA-2014:1101 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.4 Extended Update Support.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A use-after-free flaw was found in the way the ping_init_sock() function

of the Linux kernel handled the group_info reference counter. A local,
unprivileged user could use this flaw to crash the system or, potentially,
escalate their privileges on the system. (CVE-2014-2851, Important)

  • A NULL pointer dereference flaw was found in the rds_ib_laddr_check()

function in the Linux kernel's implementation of Reliable Datagram Sockets
(RDS). A local, unprivileged user could use this flaw to crash the system.
(CVE-2013-7339, Moderate)

  • It was found that a remote attacker could use a race condition flaw in

the ath_tx_aggr_sleep() function to crash the system by creating large
network traffic on the system's Atheros 9k wireless network adapter.
(CVE-2014-2672, Moderate)

  • A NULL pointer dereference flaw was found in the rds_iw_laddr_check()

function in the Linux kernel's implementation of Reliable Datagram Sockets
(RDS). A local, unprivileged user could use this flaw to crash the system.
(CVE-2014-2678, Moderate)

  • A race condition flaw was found in the way the Linux kernel's mac80211

subsystem implementation handled synchronization between TX and STA wake-up
code paths. A remote attacker could use this flaw to crash the system.
(CVE-2014-2706, Moderate)

This update also fixes the following bugs:

  • The Completely Fair Scheduler (CFS) did not verify whether the CFS

period timer is running while throttling tasks on the CFS run queue.
Therefore under certain circumstances, the CFS run queue became stuck
because the CFS period timer was inactive and could not be restarted. To
fix this problem, the CFS now restarts the CFS period timer inside the
throttling function if it is inactive. (BZ#1120666)

  • A previous change to the SCSI code fixed a race condition that could

occur when removing a SCSI device. However, that change caused performance
degradation because it used a certain function from the block layer code
that was returning different values compared with later versions of the
kernel. This update alters the SCSI code to properly utilize the values
returned by the block layer code. (BZ#1117581)

  • If a statically defined gateway became unreachable and its corresponding

neighbor entry entered a FAILED state, the gateway stayed in the FAILED
state even after it became reachable again. This prevented routing of the
traffic through that gateway. This update allows probing such a gateway
automatically and routing the traffic through the gateway again once it
becomes reachable. (BZ#1115262)

  • A miscalculation in the "radix_tree" swap encoding corrupted swap area

indexes bigger than 8 by truncating lower bits of swap entries.
Consequently, systems with more than 8 swap areas could trigger a bogus
OOM scenario when swapping out to such a swap area. This update fixes this
problem by reducing a return value of the SWP_TYPE_SHIFT() function and
removing a broken function call from the read_swap_header() function.
(BZ#1099727)

  • The automatic route cache rebuilding feature could incorrectly compute

the length of a route hash chain if the cache contained multiple entries
with the same key but a different TOS, mark, or OIF bit. Consequently, the
feature could reach the rebuild limit and disable the routing cache on the
system. This problem is fixed by using a helper function that avoids
counting such duplicate routes. (BZ#1113823)

  • When booting a guest in the Hyper-V environment and enough of

Programmable Interval Timer (PIT) interrupts were lost or not injected
into the guest on time, the kernel panicked and the guest failed to boot.
This problem has been fixed by bypassing the relevant PIT check when the
guest is running under the Hyper-V environment. (BZ#1112225)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 i386
  • Red Hat Storage for Public Cloud (via RHUI) 2.1 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 6.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 6.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4 ppc64
  • Red Hat Gluster Storage Server for On-premise 2.1 x86_64

Fixes

  • BZ - 1079214 - CVE-2013-7339 kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check()
  • BZ - 1083246 - CVE-2014-2672 kernel: ath9k: tid->sched race in ath_tx_aggr_sleep()
  • BZ - 1083274 - CVE-2014-2678 kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check()
  • BZ - 1083512 - CVE-2014-2706 Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race
  • BZ - 1086730 - CVE-2014-2851 kernel: net: ping: refcount issue in ping_init_sock() function

CVEs

  • CVE-2013-7339
  • CVE-2014-2672
  • CVE-2014-2678
  • CVE-2014-2706
  • CVE-2014-2851

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4

SRPM
kernel-2.6.32-358.48.1.el6.src.rpm SHA-256: 70595b5e047b8b9441f5c4d9b16b691129f2d589f08e5e777d219367b30b8e41
x86_64
kernel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: e07a285e57c51e420420997bcfbf0f8b402348ab37dfdbae97f97c315e49b87b
kernel-debug-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2bc34c115c389408f0335c4c36621fb05b751c2cc3ecf4cfa0f25aa29a2c39de
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: a4b911c70cf78479630d9a423f90f886dc6e0916690c6cfd9e9129d748694315
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 931262250513655b26003245786897f9281b85f543f496cd478c29c3f2fe6905
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 0b4f28bf003dfb346abd69a2e391767b64b07e69767dabdb355efc1dc4c5da09
perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ed984b5dc7340bb55675d6e192474cf3fb3b8197b7cd0d8cd12f8b0dc8b6f167
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
python-perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 99eebc348d63641d0963f9eaa4bd9596f92eea3b6df22a358499912676af8f4a
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d
i386
kernel-2.6.32-358.48.1.el6.i686.rpm SHA-256: c54edf19d3b5a0bec6fe9ca2a15310e05f7010bcc5515e426bedbd080faae163
kernel-debug-2.6.32-358.48.1.el6.i686.rpm SHA-256: 39a98eca97e24bfda7b08026b2aafc13dff3b0763f832b14cd0724d73801191b
kernel-debug-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 520a2fdc233ffb4da34d84663ca22b1e78cab6b67942dad962386be5e9782be3
kernel-debug-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 520a2fdc233ffb4da34d84663ca22b1e78cab6b67942dad962386be5e9782be3
kernel-debug-devel-2.6.32-358.48.1.el6.i686.rpm SHA-256: 2ee721be204da4f94e0845a9d9ddfa64985aeadea5c7bb75a97ba8c58ea65e96
kernel-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 232c94fa2de65ae35644b4ab979f51d8db274810e59fc217d0fb42f5ee5517e9
kernel-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 232c94fa2de65ae35644b4ab979f51d8db274810e59fc217d0fb42f5ee5517e9
kernel-debuginfo-common-i686-2.6.32-358.48.1.el6.i686.rpm SHA-256: 34c806b66067f77be0e8b5f16d4d6cddfc27bbe53a35c2d075e181b71a4d07e3
kernel-debuginfo-common-i686-2.6.32-358.48.1.el6.i686.rpm SHA-256: 34c806b66067f77be0e8b5f16d4d6cddfc27bbe53a35c2d075e181b71a4d07e3
kernel-devel-2.6.32-358.48.1.el6.i686.rpm SHA-256: 6cdaee4857ad4c19b9efb2fdeb5bdd1b95b9ee38320cd1b595b810623169b2ec
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.i686.rpm SHA-256: d3877a598aed9e76e79cb306f3a4f51d80685a0d5f893d6333afd41b00d5ecda
perf-2.6.32-358.48.1.el6.i686.rpm SHA-256: 9067d60071d877f87ea12c5d4936ab1c1e9e4ddfc74849ad82baa1884a863d39
perf-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 3c3c302132f7424efd9d7af3362f0a8f688fbd3337289f7942fa3998612e34f6
perf-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 3c3c302132f7424efd9d7af3362f0a8f688fbd3337289f7942fa3998612e34f6
python-perf-2.6.32-358.48.1.el6.i686.rpm SHA-256: dff722bd83ac2a43ec7eeff8f08bb01c796b0bdd4dbce9d1c9f2ffe0ec232b99
python-perf-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: e1e4709838cd6610edf8cf16193bfe9d936a73d442d61d40f5599e20adb7e725
python-perf-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: e1e4709838cd6610edf8cf16193bfe9d936a73d442d61d40f5599e20adb7e725

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4

SRPM
kernel-2.6.32-358.48.1.el6.src.rpm SHA-256: 70595b5e047b8b9441f5c4d9b16b691129f2d589f08e5e777d219367b30b8e41
s390x
kernel-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 01e5b6c73ea66c066b3f74ced1d33ff4a0296e8b0957e1ba868c029d41da6777
kernel-debug-2.6.32-358.48.1.el6.s390x.rpm SHA-256: c36f2565fc52f74ef34f1635c9e94cbc3d0eb49a136a1cd5bf0819d3e21be652
kernel-debug-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: afb3e04b12ae6889fba725a17e925d51cfa4079487f824b5a3998a7871c3dc0c
kernel-debug-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: afb3e04b12ae6889fba725a17e925d51cfa4079487f824b5a3998a7871c3dc0c
kernel-debug-devel-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 866237376f3d4e8ea110633e2ef95b9c5c70aaf41855e5d611596c72fdee17be
kernel-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 6c14dfed1d65a4fed90ed5cba8a41c2a4bb6eee12d66e00b8e84a12b0a66e8b9
kernel-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 6c14dfed1d65a4fed90ed5cba8a41c2a4bb6eee12d66e00b8e84a12b0a66e8b9
kernel-debuginfo-common-s390x-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 385533a192eeaa26a7d87069863e0cd9f72d8727ffe9e8ae697fe9df118cd3ac
kernel-debuginfo-common-s390x-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 385533a192eeaa26a7d87069863e0cd9f72d8727ffe9e8ae697fe9df118cd3ac
kernel-devel-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 59cf9291ddb66c90783b0b7944be7666b66a915e3b40eaca48476528786fdb54
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 967b7822c7da8370303f23f92b68b03945888d51f40d15fc656263eb309e7243
kernel-kdump-2.6.32-358.48.1.el6.s390x.rpm SHA-256: b66556163d7d594ec3d91434a4fbbaa0640fa6b1adf054ebdc8fa7c77a73b921
kernel-kdump-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: ee2146c7ea5e7a41e1c608e4c8899e48c68c02987cc5cae28c3cf01b8c6b7352
kernel-kdump-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: ee2146c7ea5e7a41e1c608e4c8899e48c68c02987cc5cae28c3cf01b8c6b7352
kernel-kdump-devel-2.6.32-358.48.1.el6.s390x.rpm SHA-256: bcbea63cc4c32e0400c47e802afe894d02dbdce83fe73fcd029d78dcfeb54a8a
perf-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 1fdcf21fd57c392915496b1a4f48d07132641232af0f0319bab3bf04391415b1
perf-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 804e9ee5ed34b2cb6f4312fdc8c4094d76399b572dcd9b720628b9de87d8060c
perf-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: 804e9ee5ed34b2cb6f4312fdc8c4094d76399b572dcd9b720628b9de87d8060c
python-perf-2.6.32-358.48.1.el6.s390x.rpm SHA-256: acd5b2d635e9e0f1438d1031262ab934c04e18f23e134822d3db187f317d8ac6
python-perf-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: b63f09a6281cffafd35275fc4ee3ca5ac46bd8aa9525ddd2a694799eee5941ba
python-perf-debuginfo-2.6.32-358.48.1.el6.s390x.rpm SHA-256: b63f09a6281cffafd35275fc4ee3ca5ac46bd8aa9525ddd2a694799eee5941ba

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4

SRPM
kernel-2.6.32-358.48.1.el6.src.rpm SHA-256: 70595b5e047b8b9441f5c4d9b16b691129f2d589f08e5e777d219367b30b8e41
ppc64
kernel-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: cddfb3303666675af813b95aa0f4da1627c51df0d4b9399f8634410610adaf96
kernel-bootwrapper-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: f1f4e0733d8676e40fbc7722fd5121a8bd777f7a028aa26263dda707e185afd7
kernel-debug-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 6257d29555367d836428e49b36ac9166bb59deeedad1241693bba5e21ef34088
kernel-debug-debuginfo-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 7bbc42cd5432c17b960e2df91e5ace6fa238bd10683e8e860e93800c2cbe31d4
kernel-debug-debuginfo-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 7bbc42cd5432c17b960e2df91e5ace6fa238bd10683e8e860e93800c2cbe31d4
kernel-debug-devel-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 208ed0aaf1fd275fc0442c947a19745f6566dab3bef746c2b22a0411de924911
kernel-debuginfo-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: b687b0a69f183df471aea49a986047766626726dc52d69b549964ef19641c6df
kernel-debuginfo-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: b687b0a69f183df471aea49a986047766626726dc52d69b549964ef19641c6df
kernel-debuginfo-common-ppc64-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 8c4c2addd279b2ef444f73d6c27a5b7d1f27b26e34843498bdab2b6dea464b87
kernel-debuginfo-common-ppc64-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 8c4c2addd279b2ef444f73d6c27a5b7d1f27b26e34843498bdab2b6dea464b87
kernel-devel-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 0ab4f5cc264e7ce7c8ad367acd65061880303c564513092c592ea3acecad32ee
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 4b1f1e19e859191826181a35c5cba751aa249c28fee24a70759c372a7558ffa9
perf-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 988e951b4045543f4af7b3b0676992eb22fede548b2fab34260c00e1d3a0c98d
perf-debuginfo-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: ea247a1581082b9822e55f31eb69efa870e7650181f441f13f955e46e76459ab
perf-debuginfo-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: ea247a1581082b9822e55f31eb69efa870e7650181f441f13f955e46e76459ab
python-perf-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 4d84913affa3e4d46d87fc7ee55ff59300bebbea22beff058fd4983f678aa855
python-perf-debuginfo-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 524aaa4c4f6874cc112e59c9a812e3a571ac6bfb64fd8066dc7805591256a3ec
python-perf-debuginfo-2.6.32-358.48.1.el6.ppc64.rpm SHA-256: 524aaa4c4f6874cc112e59c9a812e3a571ac6bfb64fd8066dc7805591256a3ec

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4

SRPM
kernel-2.6.32-358.48.1.el6.src.rpm SHA-256: 70595b5e047b8b9441f5c4d9b16b691129f2d589f08e5e777d219367b30b8e41
x86_64
kernel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: e07a285e57c51e420420997bcfbf0f8b402348ab37dfdbae97f97c315e49b87b
kernel-debug-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2bc34c115c389408f0335c4c36621fb05b751c2cc3ecf4cfa0f25aa29a2c39de
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: a4b911c70cf78479630d9a423f90f886dc6e0916690c6cfd9e9129d748694315
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 931262250513655b26003245786897f9281b85f543f496cd478c29c3f2fe6905
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 0b4f28bf003dfb346abd69a2e391767b64b07e69767dabdb355efc1dc4c5da09
perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ed984b5dc7340bb55675d6e192474cf3fb3b8197b7cd0d8cd12f8b0dc8b6f167
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d
i386
kernel-2.6.32-358.48.1.el6.i686.rpm SHA-256: c54edf19d3b5a0bec6fe9ca2a15310e05f7010bcc5515e426bedbd080faae163
kernel-debug-2.6.32-358.48.1.el6.i686.rpm SHA-256: 39a98eca97e24bfda7b08026b2aafc13dff3b0763f832b14cd0724d73801191b
kernel-debug-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 520a2fdc233ffb4da34d84663ca22b1e78cab6b67942dad962386be5e9782be3
kernel-debug-devel-2.6.32-358.48.1.el6.i686.rpm SHA-256: 2ee721be204da4f94e0845a9d9ddfa64985aeadea5c7bb75a97ba8c58ea65e96
kernel-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 232c94fa2de65ae35644b4ab979f51d8db274810e59fc217d0fb42f5ee5517e9
kernel-debuginfo-common-i686-2.6.32-358.48.1.el6.i686.rpm SHA-256: 34c806b66067f77be0e8b5f16d4d6cddfc27bbe53a35c2d075e181b71a4d07e3
kernel-devel-2.6.32-358.48.1.el6.i686.rpm SHA-256: 6cdaee4857ad4c19b9efb2fdeb5bdd1b95b9ee38320cd1b595b810623169b2ec
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.i686.rpm SHA-256: d3877a598aed9e76e79cb306f3a4f51d80685a0d5f893d6333afd41b00d5ecda
perf-2.6.32-358.48.1.el6.i686.rpm SHA-256: 9067d60071d877f87ea12c5d4936ab1c1e9e4ddfc74849ad82baa1884a863d39
perf-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: 3c3c302132f7424efd9d7af3362f0a8f688fbd3337289f7942fa3998612e34f6
python-perf-debuginfo-2.6.32-358.48.1.el6.i686.rpm SHA-256: e1e4709838cd6610edf8cf16193bfe9d936a73d442d61d40f5599e20adb7e725

Red Hat Gluster Storage Server for On-premise 2.1

SRPM
kernel-2.6.32-358.48.1.el6.src.rpm SHA-256: 70595b5e047b8b9441f5c4d9b16b691129f2d589f08e5e777d219367b30b8e41
x86_64
kernel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: e07a285e57c51e420420997bcfbf0f8b402348ab37dfdbae97f97c315e49b87b
kernel-debug-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2bc34c115c389408f0335c4c36621fb05b751c2cc3ecf4cfa0f25aa29a2c39de
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: a4b911c70cf78479630d9a423f90f886dc6e0916690c6cfd9e9129d748694315
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 931262250513655b26003245786897f9281b85f543f496cd478c29c3f2fe6905
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 0b4f28bf003dfb346abd69a2e391767b64b07e69767dabdb355efc1dc4c5da09
perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ed984b5dc7340bb55675d6e192474cf3fb3b8197b7cd0d8cd12f8b0dc8b6f167
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d

Red Hat Storage for Public Cloud (via RHUI) 2.1

SRPM
kernel-2.6.32-358.48.1.el6.src.rpm SHA-256: 70595b5e047b8b9441f5c4d9b16b691129f2d589f08e5e777d219367b30b8e41
x86_64
kernel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: e07a285e57c51e420420997bcfbf0f8b402348ab37dfdbae97f97c315e49b87b
kernel-debug-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2bc34c115c389408f0335c4c36621fb05b751c2cc3ecf4cfa0f25aa29a2c39de
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: a4b911c70cf78479630d9a423f90f886dc6e0916690c6cfd9e9129d748694315
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 931262250513655b26003245786897f9281b85f543f496cd478c29c3f2fe6905
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 0b4f28bf003dfb346abd69a2e391767b64b07e69767dabdb355efc1dc4c5da09
perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ed984b5dc7340bb55675d6e192474cf3fb3b8197b7cd0d8cd12f8b0dc8b6f167
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d

Red Hat Enterprise Linux EUS Compute Node 6.4

SRPM
kernel-2.6.32-358.48.1.el6.src.rpm SHA-256: 70595b5e047b8b9441f5c4d9b16b691129f2d589f08e5e777d219367b30b8e41
x86_64
kernel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: e07a285e57c51e420420997bcfbf0f8b402348ab37dfdbae97f97c315e49b87b
kernel-debug-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2bc34c115c389408f0335c4c36621fb05b751c2cc3ecf4cfa0f25aa29a2c39de
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: a4b911c70cf78479630d9a423f90f886dc6e0916690c6cfd9e9129d748694315
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 931262250513655b26003245786897f9281b85f543f496cd478c29c3f2fe6905
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 0b4f28bf003dfb346abd69a2e391767b64b07e69767dabdb355efc1dc4c5da09
perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ed984b5dc7340bb55675d6e192474cf3fb3b8197b7cd0d8cd12f8b0dc8b6f167
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
python-perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 99eebc348d63641d0963f9eaa4bd9596f92eea3b6df22a358499912676af8f4a
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d

Red Hat Enterprise Linux Server - AUS 6.4

SRPM
kernel-2.6.32-358.48.1.el6.src.rpm SHA-256: 70595b5e047b8b9441f5c4d9b16b691129f2d589f08e5e777d219367b30b8e41
x86_64
kernel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: e07a285e57c51e420420997bcfbf0f8b402348ab37dfdbae97f97c315e49b87b
kernel-debug-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2bc34c115c389408f0335c4c36621fb05b751c2cc3ecf4cfa0f25aa29a2c39de
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 2479774a9d798b634a7d899ce7e2ee70079000b2669c12b639e1c9a64241997a
kernel-debug-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: a4b911c70cf78479630d9a423f90f886dc6e0916690c6cfd9e9129d748694315
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 82b069c14222c8b50f80bcd94f3823fdfa094b9a4d308db5db2f1a7b7946afeb
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-debuginfo-common-x86_64-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: f89fbb78b423b45a67a57767bfb5cb9e6e73170f1ff3516a3254f5b2e58eefc9
kernel-devel-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 931262250513655b26003245786897f9281b85f543f496cd478c29c3f2fe6905
kernel-doc-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 66cbeca505f9548403934278fdb9dc0a4213a57ce7d8f7dc5f1f63869efc7b79
kernel-firmware-2.6.32-358.48.1.el6.noarch.rpm SHA-256: 3c3370fe84265e03e269962f1f7a5a7c7595318b95459dbe1a8fd4d1dbbeb5d0
kernel-headers-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 0b4f28bf003dfb346abd69a2e391767b64b07e69767dabdb355efc1dc4c5da09
perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ed984b5dc7340bb55675d6e192474cf3fb3b8197b7cd0d8cd12f8b0dc8b6f167
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: ec31c03546cacbe3f78476c0183bb5baf98546db3523fb0b73a89f63d5648e21
python-perf-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: 99eebc348d63641d0963f9eaa4bd9596f92eea3b6df22a358499912676af8f4a
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d
python-perf-debuginfo-2.6.32-358.48.1.el6.x86_64.rpm SHA-256: bb66c4bc99f20b7b09d44f6019505ed10f77ce136ba04cb340b10b623b66009d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter