Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2015:0284 - Security Advisory
Issued:
2015-03-03
Updated:
2015-03-03

RHSA-2015:0284 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.5 Extended Update Support.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A race condition flaw was found in the way the Linux kernel's KVM

subsystem handled PIT (Programmable Interval Timer) emulation. A guest user
who has access to the PIT I/O ports could use this flaw to crash the host.
(CVE-2014-3611, Important)

  • A flaw was found in the way the Linux kernel's SCTP implementation

validated INIT chunks when performing Address Configuration Change
(ASCONF). A remote attacker could use this flaw to crash the system by
sending a specially crafted SCTP packet to trigger a NULL pointer
dereference on the system. (CVE-2014-7841, Important)

  • A flaw was found in the way the ipc_rcu_putref() function in the Linux

kernel's IPC implementation handled reference counter decrementing.
A local, unprivileged user could use this flaw to trigger an Out of Memory
(OOM) condition and, potentially, crash the system. (CVE-2013-4483,
Moderate)

  • A memory corruption flaw was found in the way the USB ConnectTech

WhiteHEAT serial driver processed completion commands sent via USB Request
Blocks buffers. An attacker with physical access to the system could use
this flaw to crash the system or, potentially, escalate their privileges on
the system. (CVE-2014-3185, Moderate)

  • It was found that the Linux kernel's KVM subsystem did not handle the VM

exits gracefully for the invept (Invalidate Translations Derived from EPT)
and invvpid (Invalidate Translations Based on VPID) instructions. On hosts
with an Intel processor and invept/invppid VM exit support, an unprivileged
guest user could use these instructions to crash the guest. (CVE-2014-3645,
CVE-2014-3646, Moderate)

  • A flaw was found in the way the Linux kernel's netfilter subsystem

handled generic protocol tracking. As demonstrated in the Stream Control
Transmission Protocol (SCTP) case, a remote attacker could use this flaw to
bypass intended iptables rule restrictions when the associated connection
tracking module was not loaded on the system. (CVE-2014-8160, Moderate)

Red Hat would like to thank Lars Bull of Google for reporting
CVE-2014-3611, Vladimir Davydov (Parallels) for reporting CVE-2013-4483,
and the Advanced Threat Research team at Intel Security for reporting
CVE-2014-3645 and CVE-2014-3646. The CVE-2014-7841 issue was discovered by
Liu Wei of Red Hat.

Bug fixes:

  • When forwarding a packet, the iptables target TCPOPTSTRIP used the

tcp_hdr() function to locate the option space. Consequently, TCPOPTSTRIP
located the incorrect place in the packet, and therefore did not match
options for stripping. TCPOPTSTRIP now uses the TCP header itself to locate
the option space, and the options are now properly stripped. (BZ#1172026)

  • The ipset utility computed incorrect values of timeouts from an old IP

set, and these values were then supplied to a new IP set. A resize on an IP
set with a timeouts option enabled could then supply corrupted data from an
old IP set. This bug has been fixed by properly reading timeout values from
an old set before supplying them to a new set. (BZ#1172763)

  • Incorrect processing of errors from the BCM5719 LAN controller could

result in incoming packets being dropped. Now, received errors are handled
properly, and incoming packets are no longer randomly dropped. (BZ#1180405)

  • When the NVMe driver allocated a name-space queue, it was recognized as a

request-based driver, whereas it was a BIO-based driver. While trying to
access data during the loading of NVMe along with a request-based DM
device, the system could terminate unexpectedly or become unresponsive.
Now, NVMe does not set the QUEUE_FLAG_STACKABLE flag during the allocation
of a name-space queue, and the system no longer attempts to insert a
request into the queue, preventing a crash. (BZ#1180554)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 i386
  • Red Hat Enterprise Linux EUS Compute Node 6.5 x86_64
  • Red Hat Enterprise Linux Server - AUS 6.5 x86_64
  • Red Hat Enterprise Linux Server - TUS 6.5 x86_64

Fixes

  • BZ - 1024854 - CVE-2013-4483 kernel: ipc: ipc_rcu_putref refcount races
  • BZ - 1141400 - CVE-2014-3185 Kernel: USB serial: memory corruption flaw
  • BZ - 1144825 - CVE-2014-3646 kernel: kvm: vmx: invvpid vm exit not handled
  • BZ - 1144835 - CVE-2014-3645 kernel: kvm: vmx: invept vm exit not handled
  • BZ - 1144878 - CVE-2014-3611 kernel: kvm: PIT timer race condition
  • BZ - 1163087 - CVE-2014-7841 kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
  • BZ - 1182059 - CVE-2014-8160 kernel: iptables restriction bypass if a protocol handler kernel module not loaded

CVEs

  • CVE-2013-4483
  • CVE-2014-3185
  • CVE-2014-3611
  • CVE-2014-3646
  • CVE-2014-3645
  • CVE-2014-7841
  • CVE-2014-8160

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5

SRPM
kernel-2.6.32-431.50.1.el6.src.rpm SHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
x86_64
kernel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: bea03eb02f1da436d3cc499d809102c2d10c24cee5454069cf0ef9298812e6eb
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: d416942163414e237223ab27c2d2d530666ba5e723d891da43a22ce9a0a24b87
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 0d0f00a76e4618002e8fbcd30233ad47bf12fda8b7df2a276c174fe43a6012a3
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: dfc043f01a793d02a9d59472c5a8938d925fabd68e75fab8d3367b16e304824e
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 48b9a1815be762c738bc9996bd204a2a21d0d3180f95275d40189fae3390c4fe
perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 102059d1fec5c7a936f9ea5eb61ebe5c7d4e0526cfa4fd0c6ea7d876f14b13ee
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
python-perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 84afff691daeaa32cb380d468dd9aa8d6e2aa3c1098c7e4023fbc2444f91cc1b
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75
i386
kernel-2.6.32-431.50.1.el6.i686.rpm SHA-256: f58955ce0d8b626eee069b6e2b70e8e865976191d92cbbc0fce573781f327a60
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.i686.rpm SHA-256: a390135facefccb54a949132e23386fa53dd1891f8cd62b41fa3f0786f802f10
kernel-debug-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 59762ca0aacdd05e2ab268ed7055b85a092e47e877a7a9483bce482c55818703
kernel-debug-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 59762ca0aacdd05e2ab268ed7055b85a092e47e877a7a9483bce482c55818703
kernel-debug-devel-2.6.32-431.50.1.el6.i686.rpm SHA-256: 70deb1c46bb990ba9dadf0bb602eec5333778eea7749aef3874233041a0eb8f0
kernel-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 31948ac256c31a522e81c41ade929d6aa9d7b22eb78b15ce3376269134e18765
kernel-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 31948ac256c31a522e81c41ade929d6aa9d7b22eb78b15ce3376269134e18765
kernel-debuginfo-common-i686-2.6.32-431.50.1.el6.i686.rpm SHA-256: 0a0844adee810b5795e0816b42434a0174e5ee8f73b5c198563fc3124e722e2d
kernel-debuginfo-common-i686-2.6.32-431.50.1.el6.i686.rpm SHA-256: 0a0844adee810b5795e0816b42434a0174e5ee8f73b5c198563fc3124e722e2d
kernel-devel-2.6.32-431.50.1.el6.i686.rpm SHA-256: 64f0139b5333dd995ba27da27709f392b28abadc13be95faeebd636df23a3a3b
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.i686.rpm SHA-256: 7fae4e5674154409bc252bc57eee1abc04505b6ab26e3af133d233eb32ba83b7
perf-2.6.32-431.50.1.el6.i686.rpm SHA-256: 2b7f9fe69cde113a3806df95224fd2f1b2d424aae48863c48b99fbc7abbc0b0a
perf-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 48464741bc4e2636224fd7097d6ba0874d39342059772a756693772cca86af4b
perf-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 48464741bc4e2636224fd7097d6ba0874d39342059772a756693772cca86af4b
python-perf-2.6.32-431.50.1.el6.i686.rpm SHA-256: da280201513864cf7d0b3bea412210f679a3eec7aa38d15fcf07799c0535dd43
python-perf-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: f80356247538434d1bd3dad77ff2b42c4eb6e3eb53763b329c77545818b9d61a
python-perf-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: f80356247538434d1bd3dad77ff2b42c4eb6e3eb53763b329c77545818b9d61a

Red Hat Enterprise Linux Server - AUS 6.5

SRPM
kernel-2.6.32-431.50.1.el6.src.rpm SHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
x86_64
kernel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: bea03eb02f1da436d3cc499d809102c2d10c24cee5454069cf0ef9298812e6eb
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: d416942163414e237223ab27c2d2d530666ba5e723d891da43a22ce9a0a24b87
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 0d0f00a76e4618002e8fbcd30233ad47bf12fda8b7df2a276c174fe43a6012a3
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: dfc043f01a793d02a9d59472c5a8938d925fabd68e75fab8d3367b16e304824e
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 48b9a1815be762c738bc9996bd204a2a21d0d3180f95275d40189fae3390c4fe
perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 102059d1fec5c7a936f9ea5eb61ebe5c7d4e0526cfa4fd0c6ea7d876f14b13ee
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
python-perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 84afff691daeaa32cb380d468dd9aa8d6e2aa3c1098c7e4023fbc2444f91cc1b
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5

SRPM
kernel-2.6.32-431.50.1.el6.src.rpm SHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
s390x
kernel-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 63be24c98c5df90df259e44de161567ac658ecf2afb3b1e7462c7537304e772e
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 4827ce9e42176f950a4995278579b2d23f040193699820629b261470a81cc8db
kernel-debug-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 5290d69c67d29498791c127216abc9438d5d939608d28aaffbdaa73095311ddd
kernel-debug-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 5290d69c67d29498791c127216abc9438d5d939608d28aaffbdaa73095311ddd
kernel-debug-devel-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 83105d8c5d159e22362fecd57981618e86fad3108850d67a0659bf9e4e670805
kernel-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 904b0c119b1506ed3359226a8f1aa6c3d0c33d48e9b6f6d2d16f9974c2d1d519
kernel-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 904b0c119b1506ed3359226a8f1aa6c3d0c33d48e9b6f6d2d16f9974c2d1d519
kernel-debuginfo-common-s390x-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 305fac5bac559dd834606758bbcf7e894dc756f188e79e05d9a37e86e429f201
kernel-debuginfo-common-s390x-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 305fac5bac559dd834606758bbcf7e894dc756f188e79e05d9a37e86e429f201
kernel-devel-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 05ea4ece0f6663728073ea43e4c3dbb3ca9f438d00ea24646bb768077112b3f1
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 84574fcdec58c9aaeef8166e983006fdb06edd3d9ca52e6cc32b80cba6431b57
kernel-kdump-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 3faa3cc8feb8924bc1077b8e41c2813d30bc237dc3223d776d124de2e203de0c
kernel-kdump-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 3d1859b2e4a9a37c0e12baeee2f0b814708abea2f921819f024ef77e5c037e61
kernel-kdump-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 3d1859b2e4a9a37c0e12baeee2f0b814708abea2f921819f024ef77e5c037e61
kernel-kdump-devel-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 776ad766e4b0e628b35fdaac1e17a92bb7b923003bb9b4869427fec2d9e97b9f
perf-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 993fefb151bed07d5bfa8e898bad6b400e45063f0117970ca2429fb233efc748
perf-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: aa0b16e9a4a21d5b00f22756dc9f8fd59a74bc0d24895382c1450e039e3609cb
perf-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: aa0b16e9a4a21d5b00f22756dc9f8fd59a74bc0d24895382c1450e039e3609cb
python-perf-2.6.32-431.50.1.el6.s390x.rpm SHA-256: 63a45cfffba1cf3c75d29f9a14109a182df3fbdac6e5d9c08989c2f7eb606a19
python-perf-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: fbe964f11a15d23feb06a79d3b31bd6cc1b412d05fdef947e67bec43dcfffda8
python-perf-debuginfo-2.6.32-431.50.1.el6.s390x.rpm SHA-256: fbe964f11a15d23feb06a79d3b31bd6cc1b412d05fdef947e67bec43dcfffda8

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5

SRPM
kernel-2.6.32-431.50.1.el6.src.rpm SHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
ppc64
kernel-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 2b0a276911638b70867ff6ac008b74d2d1d4926128dab0912593c244dae785a7
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-bootwrapper-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 271afb3816f3c4038b8e9d34701eec8e789afeed05cb4c57ef9117f7169d7c98
kernel-debug-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 002dbba4676ca611e8ceaf0364d25f39c908c28a858c06268d4e1c46634c2dab
kernel-debug-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 19b72c633b31b3e30b8fbca1374e953e1ede4b7f58fddef4a8c963aef0a135bf
kernel-debug-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 19b72c633b31b3e30b8fbca1374e953e1ede4b7f58fddef4a8c963aef0a135bf
kernel-debug-devel-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 9c6fb3e550444500dab20617674970262a2ad7976f3b14a56a0aa09b5667544e
kernel-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: c48e42d4430c8628d750d44c7119cf015f36d8ab1f28935f7556fadf12329a7d
kernel-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: c48e42d4430c8628d750d44c7119cf015f36d8ab1f28935f7556fadf12329a7d
kernel-debuginfo-common-ppc64-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 7f10ef19f63ada48cace4f6af0f1a15ca80eaff00c28fe86521993e701765e71
kernel-debuginfo-common-ppc64-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 7f10ef19f63ada48cace4f6af0f1a15ca80eaff00c28fe86521993e701765e71
kernel-devel-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: c57fb942db62091715f52a2904a12706321aae6a24dc3458dfb3e935b9bb9f54
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 9f8d1f1098aa507c8f6463ec5da18221372757b072a1dd01a19dc9620b6d41a9
perf-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 030484fb32233a3709b323eec75cd246248ee7eb87189af1efe63dc23945b94e
perf-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: c4bd974dca7b5228bbffe094650ade99d651dca6e18b4b85f75b3c8072e9edaf
perf-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: c4bd974dca7b5228bbffe094650ade99d651dca6e18b4b85f75b3c8072e9edaf
python-perf-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 01377f7f7b6b30d40d6398c0056e434e809f45283f67187749b7dbaea86aaa8d
python-perf-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 2aa2c7d1c44771534f432f24f89b9e37206b8833c78486b426f601f6d99a334c
python-perf-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm SHA-256: 2aa2c7d1c44771534f432f24f89b9e37206b8833c78486b426f601f6d99a334c

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5

SRPM
kernel-2.6.32-431.50.1.el6.src.rpm SHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
x86_64
kernel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: bea03eb02f1da436d3cc499d809102c2d10c24cee5454069cf0ef9298812e6eb
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: d416942163414e237223ab27c2d2d530666ba5e723d891da43a22ce9a0a24b87
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 0d0f00a76e4618002e8fbcd30233ad47bf12fda8b7df2a276c174fe43a6012a3
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: dfc043f01a793d02a9d59472c5a8938d925fabd68e75fab8d3367b16e304824e
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 48b9a1815be762c738bc9996bd204a2a21d0d3180f95275d40189fae3390c4fe
perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 102059d1fec5c7a936f9ea5eb61ebe5c7d4e0526cfa4fd0c6ea7d876f14b13ee
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75
i386
kernel-2.6.32-431.50.1.el6.i686.rpm SHA-256: f58955ce0d8b626eee069b6e2b70e8e865976191d92cbbc0fce573781f327a60
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.i686.rpm SHA-256: a390135facefccb54a949132e23386fa53dd1891f8cd62b41fa3f0786f802f10
kernel-debug-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 59762ca0aacdd05e2ab268ed7055b85a092e47e877a7a9483bce482c55818703
kernel-debug-devel-2.6.32-431.50.1.el6.i686.rpm SHA-256: 70deb1c46bb990ba9dadf0bb602eec5333778eea7749aef3874233041a0eb8f0
kernel-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 31948ac256c31a522e81c41ade929d6aa9d7b22eb78b15ce3376269134e18765
kernel-debuginfo-common-i686-2.6.32-431.50.1.el6.i686.rpm SHA-256: 0a0844adee810b5795e0816b42434a0174e5ee8f73b5c198563fc3124e722e2d
kernel-devel-2.6.32-431.50.1.el6.i686.rpm SHA-256: 64f0139b5333dd995ba27da27709f392b28abadc13be95faeebd636df23a3a3b
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.i686.rpm SHA-256: 7fae4e5674154409bc252bc57eee1abc04505b6ab26e3af133d233eb32ba83b7
perf-2.6.32-431.50.1.el6.i686.rpm SHA-256: 2b7f9fe69cde113a3806df95224fd2f1b2d424aae48863c48b99fbc7abbc0b0a
perf-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: 48464741bc4e2636224fd7097d6ba0874d39342059772a756693772cca86af4b
python-perf-debuginfo-2.6.32-431.50.1.el6.i686.rpm SHA-256: f80356247538434d1bd3dad77ff2b42c4eb6e3eb53763b329c77545818b9d61a

Red Hat Enterprise Linux EUS Compute Node 6.5

SRPM
kernel-2.6.32-431.50.1.el6.src.rpm SHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
x86_64
kernel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: bea03eb02f1da436d3cc499d809102c2d10c24cee5454069cf0ef9298812e6eb
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: d416942163414e237223ab27c2d2d530666ba5e723d891da43a22ce9a0a24b87
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 0d0f00a76e4618002e8fbcd30233ad47bf12fda8b7df2a276c174fe43a6012a3
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: dfc043f01a793d02a9d59472c5a8938d925fabd68e75fab8d3367b16e304824e
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 48b9a1815be762c738bc9996bd204a2a21d0d3180f95275d40189fae3390c4fe
perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 102059d1fec5c7a936f9ea5eb61ebe5c7d4e0526cfa4fd0c6ea7d876f14b13ee
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
python-perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 84afff691daeaa32cb380d468dd9aa8d6e2aa3c1098c7e4023fbc2444f91cc1b
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75

Red Hat Enterprise Linux Server - TUS 6.5

SRPM
kernel-2.6.32-431.50.1.el6.src.rpm SHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
x86_64
kernel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: bea03eb02f1da436d3cc499d809102c2d10c24cee5454069cf0ef9298812e6eb
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: d416942163414e237223ab27c2d2d530666ba5e723d891da43a22ce9a0a24b87
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 0d0f00a76e4618002e8fbcd30233ad47bf12fda8b7df2a276c174fe43a6012a3
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-devel-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: dfc043f01a793d02a9d59472c5a8938d925fabd68e75fab8d3367b16e304824e
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 48b9a1815be762c738bc9996bd204a2a21d0d3180f95275d40189fae3390c4fe
perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 102059d1fec5c7a936f9ea5eb61ebe5c7d4e0526cfa4fd0c6ea7d876f14b13ee
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
python-perf-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 84afff691daeaa32cb380d468dd9aa8d6e2aa3c1098c7e4023fbc2444f91cc1b
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm SHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter