Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2014:1392 - Security Advisory
Issued:
2014-10-14
Updated:
2014-10-14

RHSA-2014:1392 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix multiple security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 6.
This is the sixth regular update.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A NULL pointer dereference flaw was found in the way the Linux kernel's
    Stream Control Transmission Protocol (SCTP) implementation handled
    simultaneous connections between the same hosts. A remote attacker could
    use this flaw to crash the system. (CVE-2014-5077, Important)
  • An integer overflow flaw was found in the way the Linux kernel's Frame
    Buffer device implementation mapped kernel memory to user space via the
    mmap syscall. A local user able to access a frame buffer device file
    (/dev/fb*) could possibly use this flaw to escalate their privileges on the
    system. (CVE-2013-2596, Important)
  • A flaw was found in the way the ipc_rcu_putref() function in the Linux
    kernel's IPC implementation handled reference counter decrementing.
    A local, unprivileged user could use this flaw to trigger an Out of Memory
    (OOM) condition and, potentially, crash the system. (CVE-2013-4483,
    Moderate)
  • It was found that the permission checks performed by the Linux kernel
    when a netlink message was received were not sufficient. A local,
    unprivileged user could potentially bypass these restrictions by passing a
    netlink socket as stdout or stderr to a more privileged process and
    altering the output of this process. (CVE-2014-0181, Moderate)
  • It was found that the try_to_unmap_cluster() function in the Linux
    kernel's Memory Managment subsystem did not properly handle page locking in
    certain cases, which could potentially trigger the BUG_ON() macro in the
    mlock_vma_page() function. A local, unprivileged user could use this flaw
    to crash the system. (CVE-2014-3122, Moderate)
  • A flaw was found in the way the Linux kernel's kvm_iommu_map_pages()
    function handled IOMMU mapping failures. A privileged user in a guest with
    an assigned host device could use this flaw to crash the host.
    (CVE-2014-3601, Moderate)
  • Multiple use-after-free flaws were found in the way the Linux kernel's
    Advanced Linux Sound Architecture (ALSA) implementation handled user
    controls. A local, privileged user could use either of these flaws to crash
    the system. (CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, Moderate)
  • A flaw was found in the way the Linux kernel's VFS subsystem handled
    reference counting when performing unmount operations on symbolic links.
    A local, unprivileged user could use this flaw to exhaust all available
    memory on the system or, potentially, trigger a use-after-free error,
    resulting in a system crash or privilege escalation. (CVE-2014-5045,
    Moderate)
  • An integer overflow flaw was found in the way the lzo1x_decompress_safe()
    function of the Linux kernel's LZO implementation processed Literal Runs.
    A local attacker could, in extremely rare cases, use this flaw to crash the
    system or, potentially, escalate their privileges on the system.
    (CVE-2014-4608, Low)

Red Hat would like to thank Vladimir Davydov of Parallels for reporting
CVE-2013-4483, Jack Morgenstein of Mellanox for reporting CVE-2014-3601,
Vasily Averin of Parallels for reporting CVE-2014-5045, and Don A.
Bailey from Lab Mouse Security for reporting CVE-2014-4608. The security
impact of the CVE-2014-3601 issue was discovered by Michael Tsirkin of
Red Hat.

This update also fixes several hundred bugs and adds numerous enhancements.
Refer to the Red Hat Enterprise Linux 6.6 Release Notes for information on
the most significant of these changes, and the Technical Notes for further
information, both linked to in the References.

All Red Hat Enterprise Linux 6 users are advised to install these updated
packages, which correct these issues, and fix the bugs and add the
enhancements noted in the Red Hat Enterprise Linux 6.6 Release Notes and
Technical Notes. The system must be rebooted for this update to
take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386

Fixes

  • BZ - 739866 - checkpolicy cannot parse /selinux/policy on ppc64 and s390x
  • BZ - 786463 - nfs mount hangs when kerberos ticket expires
  • BZ - 889471 - [Btrfs] BUG: unable to handle kernel NULL pointer dereference at (null) btrfs_get_sb should return error when open_ctree failed
  • BZ - 915862 - The sync mount option does not work for NFSv4 mounts in RHEL6
  • BZ - 997651 - possible recursive locking detected
  • BZ - 998024 - nfsd sometimes grants delegations too soon following conflicting open requests
  • BZ - 1010882 - kvm: backport "Improve create VCPU parameter"
  • BZ - 1024854 - CVE-2013-4483 kernel: ipc: ipc_rcu_putref refcount races
  • BZ - 1027480 - alb_send_learning_packets using an obsolete EtherType
  • BZ - 1030411 - resizing thin-snapshot with external origin should return zeros behind origin's end
  • BZ - 1031488 - Restore the mask bit correctly in eoi_ioapic_irq()
  • BZ - 1034490 - CVE-2013-2596 kernel: integer overflow in fb_mmap
  • BZ - 1036972 - use after free in new nfsd DRC code
  • BZ - 1044438 - cifs: Unable to append to an existing file in cache=none mode.
  • BZ - 1059496 - KVM: x86 emulator: Implement jmp far opcode ff/5
  • BZ - 1063836 - kvm: 23090: cpu0 unhandled wrmsr 0x391 data 2000000f
  • BZ - 1065304 - kernel/sched: incorrect setup of sched_group->cpu_power for NUMA systems
  • BZ - 1069028 - ixgbevf prematurely strips VLAN tags
  • BZ - 1072373 - Along with the increase of vCPUs in guest, and guest OS will spend more time to boot up in specified machine.
  • BZ - 1077463 - gfs2: quotas not refreshed in gfs2_adjust_quota
  • BZ - 1090423 - Data integrity issue on rebuilding RAID 6 with 100MB resync speed
  • BZ - 1093076 - CVE-2014-3122 Kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking
  • BZ - 1094265 - CVE-2014-0181 kernel: net: insufficient permision checks of netlink messages
  • BZ - 1095627 - missing vhost schedule causing thread starvation
  • BZ - 1100523 - ext4 filesystem option 'max_batch_time' actually displays 'min_batch_time' in /proc/mounts
  • BZ - 1113409 - CVE-2014-4653 Kernel: ALSA: control: do not access controls outside of protected regions
  • BZ - 1113445 - CVE-2014-4654 CVE-2014-4655 Kernel: ALSA: control: use-after-free in replacing user controls
  • BZ - 1113899 - CVE-2014-4608 kernel: lzo1x_decompress_safe() integer overflow
  • BZ - 1118123 - [Hyper-V][REHL 6.6] fcopy large file from host to guest failed
  • BZ - 1122472 - CVE-2014-5045 kernel: vfs: refcount issues during unmount on symlink
  • BZ - 1122982 - CVE-2014-5077 Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
  • BZ - 1124351 - raid1 Data corruption after recovery with bitmap
  • BZ - 1127231 - dmeventd hanging while handling lost leg in RAID1 LV
  • BZ - 1131951 - CVE-2014-3601 kernel: kvm: invalid parameter passing in kvm_iommu_map_pages()

CVEs

  • CVE-2013-4483
  • CVE-2014-3122
  • CVE-2014-0181
  • CVE-2014-4655
  • CVE-2014-4654
  • CVE-2014-5077
  • CVE-2014-4653
  • CVE-2014-5045
  • CVE-2014-4608
  • CVE-2013-2596
  • CVE-2014-3601

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.6_Technical_Notes/kernel.html#RHSA-2014-1392
  • https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.6_Release_Notes/index.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
kernel-2.6.32-504.el6.src.rpm SHA-256: 9df80ab2b3a6917ba57a70f921b479d29e484f6d52eedd0665ca77f1ad2363bc
x86_64
kernel-2.6.32-504.el6.x86_64.rpm SHA-256: a5b3f58b5a368cbd8bd9cae1433b763bed15d6c329f081a0859f3acb438ed664
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.x86_64.rpm SHA-256: 02009f1d7ba8167c4adf99986939305020ee49ce9b2df901ad542bc904b84cab
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-devel-2.6.32-504.el6.x86_64.rpm SHA-256: 8c20b203d21aabf050b5b9b36560e5920ecda85954f849e10029b392a18f0c37
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-devel-2.6.32-504.el6.x86_64.rpm SHA-256: aa6de4f408385efd1f3c4994bbec78139b94df89fa5a38e17f42c6cb07dc0ea4
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.x86_64.rpm SHA-256: fa522f484eed65544fa4ad02132c266843cd1e547e3fcb0c38205891c53dcd05
perf-2.6.32-504.el6.x86_64.rpm SHA-256: d394f28c020d8b78b07d498b9830eb610eab79a35905e06148bef7b71521b6e1
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
python-perf-2.6.32-504.el6.x86_64.rpm SHA-256: 0c4c1494b6d69a1570aff63e8396b43608944f34fba97ca60347abcb3d92c593
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
i386
kernel-2.6.32-504.el6.i686.rpm SHA-256: 3d49946ed505fca980771d7f7ac8b57039b6f88773519686e7e5a8b78a314e14
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.i686.rpm SHA-256: 68c335853cd1b4a829b134e58c821598be74e4137ffb6bc7aeb9075c01e6d5d4
kernel-debug-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 90695ed8dff768a85c9a25e3ebf882dfca6b5893143c04db19bc2a82b897db16
kernel-debug-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 90695ed8dff768a85c9a25e3ebf882dfca6b5893143c04db19bc2a82b897db16
kernel-debug-devel-2.6.32-504.el6.i686.rpm SHA-256: 97498b9fae88e92f67080c36ce19aed1a4010f7ce49b8433b4ef9046198e8d84
kernel-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: b989ccd90267c32627bb6f9bcd639a1dc1d519300304f4473dc2d1f12762386b
kernel-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: b989ccd90267c32627bb6f9bcd639a1dc1d519300304f4473dc2d1f12762386b
kernel-debuginfo-common-i686-2.6.32-504.el6.i686.rpm SHA-256: ad4962fe2cb2054924412b7179609dc7913ca923ae5dce32f65af199e3075dbc
kernel-debuginfo-common-i686-2.6.32-504.el6.i686.rpm SHA-256: ad4962fe2cb2054924412b7179609dc7913ca923ae5dce32f65af199e3075dbc
kernel-devel-2.6.32-504.el6.i686.rpm SHA-256: 21f4cd58f25b2ebafb5ce35a37bfb7d109f4dfbbeff545322e4ec558154a5d48
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.i686.rpm SHA-256: 04af937ca9c509ff0dd101540086fa4c09212f31d5c9b4f51223aef10e04dc30
perf-2.6.32-504.el6.i686.rpm SHA-256: 33441c1d81b45b98b497893abdec260fc405016baf4a691b4f064aabf550c10a
perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 6afb8a4796b0ca01d0016a8270433fbe17914b1aeef6f7dae688697a9b1bd3d2
perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 6afb8a4796b0ca01d0016a8270433fbe17914b1aeef6f7dae688697a9b1bd3d2
python-perf-2.6.32-504.el6.i686.rpm SHA-256: 7305dda1fc5fb07e75d5c37403bf80477e897b5006795f5d04e1daa3d10ed939
python-perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 685217adbec7f47e25dec0b004d8f55c5e2ddf2b4f8af412b3ae950157e75891
python-perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 685217adbec7f47e25dec0b004d8f55c5e2ddf2b4f8af412b3ae950157e75891

Red Hat Enterprise Linux Workstation 6

SRPM
kernel-2.6.32-504.el6.src.rpm SHA-256: 9df80ab2b3a6917ba57a70f921b479d29e484f6d52eedd0665ca77f1ad2363bc
x86_64
kernel-2.6.32-504.el6.x86_64.rpm SHA-256: a5b3f58b5a368cbd8bd9cae1433b763bed15d6c329f081a0859f3acb438ed664
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.x86_64.rpm SHA-256: 02009f1d7ba8167c4adf99986939305020ee49ce9b2df901ad542bc904b84cab
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-devel-2.6.32-504.el6.x86_64.rpm SHA-256: 8c20b203d21aabf050b5b9b36560e5920ecda85954f849e10029b392a18f0c37
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-devel-2.6.32-504.el6.x86_64.rpm SHA-256: aa6de4f408385efd1f3c4994bbec78139b94df89fa5a38e17f42c6cb07dc0ea4
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.x86_64.rpm SHA-256: fa522f484eed65544fa4ad02132c266843cd1e547e3fcb0c38205891c53dcd05
perf-2.6.32-504.el6.x86_64.rpm SHA-256: d394f28c020d8b78b07d498b9830eb610eab79a35905e06148bef7b71521b6e1
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
python-perf-2.6.32-504.el6.x86_64.rpm SHA-256: 0c4c1494b6d69a1570aff63e8396b43608944f34fba97ca60347abcb3d92c593
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
i386
kernel-2.6.32-504.el6.i686.rpm SHA-256: 3d49946ed505fca980771d7f7ac8b57039b6f88773519686e7e5a8b78a314e14
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.i686.rpm SHA-256: 68c335853cd1b4a829b134e58c821598be74e4137ffb6bc7aeb9075c01e6d5d4
kernel-debug-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 90695ed8dff768a85c9a25e3ebf882dfca6b5893143c04db19bc2a82b897db16
kernel-debug-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 90695ed8dff768a85c9a25e3ebf882dfca6b5893143c04db19bc2a82b897db16
kernel-debug-devel-2.6.32-504.el6.i686.rpm SHA-256: 97498b9fae88e92f67080c36ce19aed1a4010f7ce49b8433b4ef9046198e8d84
kernel-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: b989ccd90267c32627bb6f9bcd639a1dc1d519300304f4473dc2d1f12762386b
kernel-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: b989ccd90267c32627bb6f9bcd639a1dc1d519300304f4473dc2d1f12762386b
kernel-debuginfo-common-i686-2.6.32-504.el6.i686.rpm SHA-256: ad4962fe2cb2054924412b7179609dc7913ca923ae5dce32f65af199e3075dbc
kernel-debuginfo-common-i686-2.6.32-504.el6.i686.rpm SHA-256: ad4962fe2cb2054924412b7179609dc7913ca923ae5dce32f65af199e3075dbc
kernel-devel-2.6.32-504.el6.i686.rpm SHA-256: 21f4cd58f25b2ebafb5ce35a37bfb7d109f4dfbbeff545322e4ec558154a5d48
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.i686.rpm SHA-256: 04af937ca9c509ff0dd101540086fa4c09212f31d5c9b4f51223aef10e04dc30
perf-2.6.32-504.el6.i686.rpm SHA-256: 33441c1d81b45b98b497893abdec260fc405016baf4a691b4f064aabf550c10a
perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 6afb8a4796b0ca01d0016a8270433fbe17914b1aeef6f7dae688697a9b1bd3d2
perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 6afb8a4796b0ca01d0016a8270433fbe17914b1aeef6f7dae688697a9b1bd3d2
python-perf-2.6.32-504.el6.i686.rpm SHA-256: 7305dda1fc5fb07e75d5c37403bf80477e897b5006795f5d04e1daa3d10ed939
python-perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 685217adbec7f47e25dec0b004d8f55c5e2ddf2b4f8af412b3ae950157e75891
python-perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 685217adbec7f47e25dec0b004d8f55c5e2ddf2b4f8af412b3ae950157e75891

Red Hat Enterprise Linux Desktop 6

SRPM
kernel-2.6.32-504.el6.src.rpm SHA-256: 9df80ab2b3a6917ba57a70f921b479d29e484f6d52eedd0665ca77f1ad2363bc
x86_64
kernel-2.6.32-504.el6.x86_64.rpm SHA-256: a5b3f58b5a368cbd8bd9cae1433b763bed15d6c329f081a0859f3acb438ed664
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.x86_64.rpm SHA-256: 02009f1d7ba8167c4adf99986939305020ee49ce9b2df901ad542bc904b84cab
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-devel-2.6.32-504.el6.x86_64.rpm SHA-256: 8c20b203d21aabf050b5b9b36560e5920ecda85954f849e10029b392a18f0c37
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-devel-2.6.32-504.el6.x86_64.rpm SHA-256: aa6de4f408385efd1f3c4994bbec78139b94df89fa5a38e17f42c6cb07dc0ea4
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.x86_64.rpm SHA-256: fa522f484eed65544fa4ad02132c266843cd1e547e3fcb0c38205891c53dcd05
perf-2.6.32-504.el6.x86_64.rpm SHA-256: d394f28c020d8b78b07d498b9830eb610eab79a35905e06148bef7b71521b6e1
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
python-perf-2.6.32-504.el6.x86_64.rpm SHA-256: 0c4c1494b6d69a1570aff63e8396b43608944f34fba97ca60347abcb3d92c593
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
i386
kernel-2.6.32-504.el6.i686.rpm SHA-256: 3d49946ed505fca980771d7f7ac8b57039b6f88773519686e7e5a8b78a314e14
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.i686.rpm SHA-256: 68c335853cd1b4a829b134e58c821598be74e4137ffb6bc7aeb9075c01e6d5d4
kernel-debug-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 90695ed8dff768a85c9a25e3ebf882dfca6b5893143c04db19bc2a82b897db16
kernel-debug-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 90695ed8dff768a85c9a25e3ebf882dfca6b5893143c04db19bc2a82b897db16
kernel-debug-devel-2.6.32-504.el6.i686.rpm SHA-256: 97498b9fae88e92f67080c36ce19aed1a4010f7ce49b8433b4ef9046198e8d84
kernel-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: b989ccd90267c32627bb6f9bcd639a1dc1d519300304f4473dc2d1f12762386b
kernel-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: b989ccd90267c32627bb6f9bcd639a1dc1d519300304f4473dc2d1f12762386b
kernel-debuginfo-common-i686-2.6.32-504.el6.i686.rpm SHA-256: ad4962fe2cb2054924412b7179609dc7913ca923ae5dce32f65af199e3075dbc
kernel-debuginfo-common-i686-2.6.32-504.el6.i686.rpm SHA-256: ad4962fe2cb2054924412b7179609dc7913ca923ae5dce32f65af199e3075dbc
kernel-devel-2.6.32-504.el6.i686.rpm SHA-256: 21f4cd58f25b2ebafb5ce35a37bfb7d109f4dfbbeff545322e4ec558154a5d48
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.i686.rpm SHA-256: 04af937ca9c509ff0dd101540086fa4c09212f31d5c9b4f51223aef10e04dc30
perf-2.6.32-504.el6.i686.rpm SHA-256: 33441c1d81b45b98b497893abdec260fc405016baf4a691b4f064aabf550c10a
perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 6afb8a4796b0ca01d0016a8270433fbe17914b1aeef6f7dae688697a9b1bd3d2
perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 6afb8a4796b0ca01d0016a8270433fbe17914b1aeef6f7dae688697a9b1bd3d2
python-perf-2.6.32-504.el6.i686.rpm SHA-256: 7305dda1fc5fb07e75d5c37403bf80477e897b5006795f5d04e1daa3d10ed939
python-perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 685217adbec7f47e25dec0b004d8f55c5e2ddf2b4f8af412b3ae950157e75891
python-perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 685217adbec7f47e25dec0b004d8f55c5e2ddf2b4f8af412b3ae950157e75891

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
kernel-2.6.32-504.el6.src.rpm SHA-256: 9df80ab2b3a6917ba57a70f921b479d29e484f6d52eedd0665ca77f1ad2363bc
s390x
kernel-2.6.32-504.el6.s390x.rpm SHA-256: 3d50699e4bef4d2c71807c30f4d224a2291cb4fd1a2982312994f8f0f100b071
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.s390x.rpm SHA-256: 1cacbfa95c415ab3ba8ccf2cbefacb687a6df86f5d67efec59720db51a6e8502
kernel-debug-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: 20d5b910abc6c80e505e4c6e9b2cab02630feba424a7dde729c9888c800a152b
kernel-debug-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: 20d5b910abc6c80e505e4c6e9b2cab02630feba424a7dde729c9888c800a152b
kernel-debug-devel-2.6.32-504.el6.s390x.rpm SHA-256: 29e7d4f946b77910fe46b2a02a5a1d60331ec77f16f5f28ddffa3238929c677e
kernel-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: e9ce3ae98d2a3377df01428c1e9c5fe354ef328cef31bd8ff11b036ea580f0c8
kernel-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: e9ce3ae98d2a3377df01428c1e9c5fe354ef328cef31bd8ff11b036ea580f0c8
kernel-debuginfo-common-s390x-2.6.32-504.el6.s390x.rpm SHA-256: 41e0b9b07bf32c2bf63083b27e6b53982079ae1817431282a6ae03165a9ea5c2
kernel-debuginfo-common-s390x-2.6.32-504.el6.s390x.rpm SHA-256: 41e0b9b07bf32c2bf63083b27e6b53982079ae1817431282a6ae03165a9ea5c2
kernel-devel-2.6.32-504.el6.s390x.rpm SHA-256: 36350776316caf9e06f0c2ce241eb080eae8313bd3e6415e028dbad105c2eb38
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.s390x.rpm SHA-256: 3489c718b8b9a2d9c9e20a5d68c30dd968a7b35798d5cea49fde413fed07fb9c
kernel-kdump-2.6.32-504.el6.s390x.rpm SHA-256: 62b0a6f539bbca88d1be4e3950a391ded8872b1c1be6d3b295ca0cc3ef02f716
kernel-kdump-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: c4ed3f89ece51bd13e224257fd5c6d6bee69d9f9872c3d3bad5cdd23f4918afd
kernel-kdump-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: c4ed3f89ece51bd13e224257fd5c6d6bee69d9f9872c3d3bad5cdd23f4918afd
kernel-kdump-devel-2.6.32-504.el6.s390x.rpm SHA-256: 5b3bfba11ae67ddf360101a3247db9cebfb641639dd7bae3681de3d58e3247c1
perf-2.6.32-504.el6.s390x.rpm SHA-256: 26d0afb398a490ab92290dee99d0adcf6357751b0f93a4df0721f3a3a9ec031f
perf-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: 7bc2eaf4c8c1ad69a100c8c1eca7d1c000f5efd5a97b1ad4725d25bec235cbf2
perf-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: 7bc2eaf4c8c1ad69a100c8c1eca7d1c000f5efd5a97b1ad4725d25bec235cbf2
python-perf-2.6.32-504.el6.s390x.rpm SHA-256: 9021b1a1b8786005ab7f263ea0234c4dff469ab5040b27f5a8d84814230a47d6
python-perf-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: d006d54298da12db680dad6e759a2710d2e3c9f89f9042733bb7367aae979d69
python-perf-debuginfo-2.6.32-504.el6.s390x.rpm SHA-256: d006d54298da12db680dad6e759a2710d2e3c9f89f9042733bb7367aae979d69

Red Hat Enterprise Linux for Power, big endian 6

SRPM
kernel-2.6.32-504.el6.src.rpm SHA-256: 9df80ab2b3a6917ba57a70f921b479d29e484f6d52eedd0665ca77f1ad2363bc
ppc64
kernel-2.6.32-504.el6.ppc64.rpm SHA-256: 97f3228ca95da6a731f012ca432e2a09f3ab3915f7b399613a8abec5bf6f6352
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-bootwrapper-2.6.32-504.el6.ppc64.rpm SHA-256: 101f8efe6200d9e7ddb59f5532a131df92051553da57697b76cc8ebb873679d1
kernel-debug-2.6.32-504.el6.ppc64.rpm SHA-256: fc7d784b20c7ba654ad52f374c2e4b079c11492ff4155e03e6d66244fd94de1a
kernel-debug-debuginfo-2.6.32-504.el6.ppc64.rpm SHA-256: 2f6912f080e3308d4f24a8a43e9c94c71bc74bd063bcf893ab45bb3e7f491a1a
kernel-debug-debuginfo-2.6.32-504.el6.ppc64.rpm SHA-256: 2f6912f080e3308d4f24a8a43e9c94c71bc74bd063bcf893ab45bb3e7f491a1a
kernel-debug-devel-2.6.32-504.el6.ppc64.rpm SHA-256: 18767a5377cf970f788d82152f577c24f4ad8c03236da60859871a14cf856587
kernel-debuginfo-2.6.32-504.el6.ppc64.rpm SHA-256: a59d790813db5f4ee1d460c6ae1239a93fa2586e78e9e29b26ebecfd6a6add68
kernel-debuginfo-2.6.32-504.el6.ppc64.rpm SHA-256: a59d790813db5f4ee1d460c6ae1239a93fa2586e78e9e29b26ebecfd6a6add68
kernel-debuginfo-common-ppc64-2.6.32-504.el6.ppc64.rpm SHA-256: f360ca4252792540065c874b41ef8fdebf97ea5f8371d2847f0568af2d8aa077
kernel-debuginfo-common-ppc64-2.6.32-504.el6.ppc64.rpm SHA-256: f360ca4252792540065c874b41ef8fdebf97ea5f8371d2847f0568af2d8aa077
kernel-devel-2.6.32-504.el6.ppc64.rpm SHA-256: b8233b0d8d466489fd5a1f2b28c91c85fed896663665033350aa39a41d4f14aa
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.ppc64.rpm SHA-256: a30743f4968e78ed15f6d13f193f24307fa4f2982fa4a3f00e5a31cb2ea0cb4e
perf-2.6.32-504.el6.ppc64.rpm SHA-256: 158c3a37867b579b11547011efb91e6733a3e845fa41265f8b3c0b58e9c96083
perf-debuginfo-2.6.32-504.el6.ppc64.rpm SHA-256: f0d5aec5ce9719a6d60822661ce53077375cb61d59a0120fba993658a98af379
perf-debuginfo-2.6.32-504.el6.ppc64.rpm SHA-256: f0d5aec5ce9719a6d60822661ce53077375cb61d59a0120fba993658a98af379
python-perf-2.6.32-504.el6.ppc64.rpm SHA-256: c8c57ac3d1d2bb525bffeeee1a4d8da0eee87346c5a41e612995146516f9a93e
python-perf-debuginfo-2.6.32-504.el6.ppc64.rpm SHA-256: 9b1bda4b168bda346907ba079aeb5116a09d115d3284b65e7f4f719a463d99a0
python-perf-debuginfo-2.6.32-504.el6.ppc64.rpm SHA-256: 9b1bda4b168bda346907ba079aeb5116a09d115d3284b65e7f4f719a463d99a0

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
kernel-2.6.32-504.el6.src.rpm SHA-256: 9df80ab2b3a6917ba57a70f921b479d29e484f6d52eedd0665ca77f1ad2363bc
x86_64
kernel-2.6.32-504.el6.x86_64.rpm SHA-256: a5b3f58b5a368cbd8bd9cae1433b763bed15d6c329f081a0859f3acb438ed664
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.x86_64.rpm SHA-256: 02009f1d7ba8167c4adf99986939305020ee49ce9b2df901ad542bc904b84cab
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-devel-2.6.32-504.el6.x86_64.rpm SHA-256: 8c20b203d21aabf050b5b9b36560e5920ecda85954f849e10029b392a18f0c37
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-devel-2.6.32-504.el6.x86_64.rpm SHA-256: aa6de4f408385efd1f3c4994bbec78139b94df89fa5a38e17f42c6cb07dc0ea4
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.x86_64.rpm SHA-256: fa522f484eed65544fa4ad02132c266843cd1e547e3fcb0c38205891c53dcd05
perf-2.6.32-504.el6.x86_64.rpm SHA-256: d394f28c020d8b78b07d498b9830eb610eab79a35905e06148bef7b71521b6e1
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
python-perf-2.6.32-504.el6.x86_64.rpm SHA-256: 0c4c1494b6d69a1570aff63e8396b43608944f34fba97ca60347abcb3d92c593
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68

Red Hat Enterprise Linux Server from RHUI 6

SRPM
kernel-2.6.32-504.el6.src.rpm SHA-256: 9df80ab2b3a6917ba57a70f921b479d29e484f6d52eedd0665ca77f1ad2363bc
x86_64
kernel-2.6.32-504.el6.x86_64.rpm SHA-256: a5b3f58b5a368cbd8bd9cae1433b763bed15d6c329f081a0859f3acb438ed664
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.x86_64.rpm SHA-256: 02009f1d7ba8167c4adf99986939305020ee49ce9b2df901ad542bc904b84cab
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 640d9e2cea07eb775e1032ddfbd46c7a0901e4d1f2c90388a4404118f9e83fb7
kernel-debug-devel-2.6.32-504.el6.x86_64.rpm SHA-256: 8c20b203d21aabf050b5b9b36560e5920ecda85954f849e10029b392a18f0c37
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: de6aad7b99150307a3bb1fbb514953eb24f01937f17bfea753fa0349d6385116
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-debuginfo-common-x86_64-2.6.32-504.el6.x86_64.rpm SHA-256: c7f5fb0b7b7e507812a39954b455d4f1b356246d4d27a477bd180c318c08b236
kernel-devel-2.6.32-504.el6.x86_64.rpm SHA-256: aa6de4f408385efd1f3c4994bbec78139b94df89fa5a38e17f42c6cb07dc0ea4
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.x86_64.rpm SHA-256: fa522f484eed65544fa4ad02132c266843cd1e547e3fcb0c38205891c53dcd05
perf-2.6.32-504.el6.x86_64.rpm SHA-256: d394f28c020d8b78b07d498b9830eb610eab79a35905e06148bef7b71521b6e1
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 68693b0b13d3fa03664a7bd04d748560af7b99a751cd6b7f0e2b616880d2dbd3
python-perf-2.6.32-504.el6.x86_64.rpm SHA-256: 0c4c1494b6d69a1570aff63e8396b43608944f34fba97ca60347abcb3d92c593
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
python-perf-debuginfo-2.6.32-504.el6.x86_64.rpm SHA-256: 6354df447d328402d6c271b8d86e8bfbfe437b2e65db24778b2ad4b41b1c9b68
i386
kernel-2.6.32-504.el6.i686.rpm SHA-256: 3d49946ed505fca980771d7f7ac8b57039b6f88773519686e7e5a8b78a314e14
kernel-abi-whitelists-2.6.32-504.el6.noarch.rpm SHA-256: 877f6973f9c7bbe56079e9dbdad0c6e10ddb1781a7d93287297c7e3ebb286f48
kernel-debug-2.6.32-504.el6.i686.rpm SHA-256: 68c335853cd1b4a829b134e58c821598be74e4137ffb6bc7aeb9075c01e6d5d4
kernel-debug-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 90695ed8dff768a85c9a25e3ebf882dfca6b5893143c04db19bc2a82b897db16
kernel-debug-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 90695ed8dff768a85c9a25e3ebf882dfca6b5893143c04db19bc2a82b897db16
kernel-debug-devel-2.6.32-504.el6.i686.rpm SHA-256: 97498b9fae88e92f67080c36ce19aed1a4010f7ce49b8433b4ef9046198e8d84
kernel-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: b989ccd90267c32627bb6f9bcd639a1dc1d519300304f4473dc2d1f12762386b
kernel-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: b989ccd90267c32627bb6f9bcd639a1dc1d519300304f4473dc2d1f12762386b
kernel-debuginfo-common-i686-2.6.32-504.el6.i686.rpm SHA-256: ad4962fe2cb2054924412b7179609dc7913ca923ae5dce32f65af199e3075dbc
kernel-debuginfo-common-i686-2.6.32-504.el6.i686.rpm SHA-256: ad4962fe2cb2054924412b7179609dc7913ca923ae5dce32f65af199e3075dbc
kernel-devel-2.6.32-504.el6.i686.rpm SHA-256: 21f4cd58f25b2ebafb5ce35a37bfb7d109f4dfbbeff545322e4ec558154a5d48
kernel-doc-2.6.32-504.el6.noarch.rpm SHA-256: 9349ca4d6bb322087f799037e4e4458d9c8a43785981bf58a9dd1ce29bc84976
kernel-firmware-2.6.32-504.el6.noarch.rpm SHA-256: 7aab0cda02fc2a123a69ec49ff7b02a18acd711c424f9003f455b123ccc98048
kernel-headers-2.6.32-504.el6.i686.rpm SHA-256: 04af937ca9c509ff0dd101540086fa4c09212f31d5c9b4f51223aef10e04dc30
perf-2.6.32-504.el6.i686.rpm SHA-256: 33441c1d81b45b98b497893abdec260fc405016baf4a691b4f064aabf550c10a
perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 6afb8a4796b0ca01d0016a8270433fbe17914b1aeef6f7dae688697a9b1bd3d2
perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 6afb8a4796b0ca01d0016a8270433fbe17914b1aeef6f7dae688697a9b1bd3d2
python-perf-2.6.32-504.el6.i686.rpm SHA-256: 7305dda1fc5fb07e75d5c37403bf80477e897b5006795f5d04e1daa3d10ed939
python-perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 685217adbec7f47e25dec0b004d8f55c5e2ddf2b4f8af412b3ae950157e75891
python-perf-debuginfo-2.6.32-504.el6.i686.rpm SHA-256: 685217adbec7f47e25dec0b004d8f55c5e2ddf2b4f8af412b3ae950157e75891

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+