Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:1583 - Security Advisory
Issued:
2015-08-11
Updated:
2015-08-11

RHSA-2015:1583 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.5 Extended Update Support.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • It was found that the Linux kernel's ping socket implementation did not

properly handle socket unhashing during spurious disconnects, which could
lead to a use-after-free flaw. On x86-64 architecture systems, a local user
able to create ping sockets could use this flaw to crash the system.
On non-x86-64 architecture systems, a local user able to create ping
sockets could use this flaw to escalate their privileges on the system.
(CVE-2015-3636, Moderate)

This update also fixes the following bugs:

  • Previously, the bridge device did not propagate VLAN information to its

ports and Generic Receive Offload (GRO) information to devices that sit on
top. This resulted in lower receive performance of VLANs over bridge
devices because GRO was not enabled. An attempt to resolve this problem was
made with BZ#858198 by introducing a patch that allows VLANs to be
registered with the participating bridge ports and adds GRO to the bridge
device feature set, however, that attempt introduced a number of
regressions, which broke the vast majority of stacked setups involving
bridge devices and VLANs. This update reverts the patch provided by
BZ#858198 and removes support for this capability. (BZ#1131697)

  • The backlog data could previously not be consumed when the

audit_log_start() function was running even if audit_log_start() called the
wait_for_auditd() function to consume it. As only auditd could consume the
backlog data, audit_log_start() terminated unexpectedly. Consequently, the
system became unresponsive until the backlog timeout was up again.
With this update, audit_log_start() no longer terminates and the system
shuts down and reboots gracefully in a timely manner. (BZ#1140490)

  • This update introduces a set of patches with a new VLAN model to conform

to upstream standards. In addition, this set of patches fixes other issues
such as transmission of Internet Control Message Protocol (ICMP) fragments.
(BZ#1173560)

  • Due to a bug in the audit code, a kernel panic occurred in the

tasklist_lock variable if SELinux was in permissive or enforcing mode.
A patch has been applied to fix this bug, and the operating system now
continues to work normally. (BZ#1236103)

  • If a server returned an empty or malformed READDIR response, the NFS

client could previously terminate unexpectedly while attempting to decode
that response. This update uses the response size to determine if existing
pages of data are available for decoding, and the client only decodes the
responses if they exist. As a result, the NFS client no longer attempts to
decode pages of data that may not exist, and the aforementioned crash is
thus avoided. (BZ#1232133)

  • Previously, if a slave device had a receive handler registered, then an

error unwind of bonding device enslave function became broken, which led to
a kernel oops. This update detaches the slave in the unwind path, and the
aforementioned oops no longer occurs. (BZ#1222482)

  • Due to bad memory or memory corruption, an isolated BUG_ON(mm->nr_ptes)

was sometimes reported, indicating that not all the page tables allocated
could be found and freed when the exit_mmap() function cleared the user
address space. As a consequence, a kernel panic occurred. To fix this bug,
the BUG_ON() function has been replaced by WARN_ON(), which prevents the
kernel from panicking in the aforementioned situation. (BZ#1235930)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 i386
  • Red Hat Enterprise Linux Server - AUS 6.5 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5 ppc64
  • Red Hat Enterprise Linux Server - TUS 6.5 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 i386
  • Red Hat Enterprise Linux EUS Compute Node 6.5 x86_64

Fixes

  • BZ - 1218074 - CVE-2015-3636 kernel: ping sockets: use-after-free leading to local privilege escalation

CVEs

  • CVE-2015-3636

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5

SRPM
kernel-2.6.32-431.61.2.el6.src.rpm SHA-256: f94d6a6be89d4e385ccfc63ef1827c0254f50245f82dc7d68939288a14ca81c1
x86_64
kernel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 0d55249b7f4ab79c78acae75af7498cc294b5b55c612a01303323dc20ff8f7a6
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-debug-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 45eb46723c9ceb028c8a2624a08d15dc620db5aeb2e4d6227f5dc3571644aaf2
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: de397bcde4663b734bac7c278ce41383d9c6ea94f186da87b1e40b5591b51f90
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 1ea779748d6bce8064922b9a62a6668f3f281b22c144068791bc34a825269dda
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: c65821ef2d38c3c5980083e642323de4192e38e0adac10b4fde15dbde60253a7
perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 9b80a95218a2f3b1771dff2cbabf051e42c3e921803a061013203a522672d6c9
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
python-perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: abe46229fe997d442706ddc08e669dbfaf533a0d11e444fcb1c5aae3e7acd396
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77
i386
kernel-2.6.32-431.61.2.el6.i686.rpm SHA-256: d5b3a211badc0dfca68602c9ed4cbd33ab9e037456de764d61bb82f55f8a063c
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-debug-2.6.32-431.61.2.el6.i686.rpm SHA-256: 54aed6542a489b03c31fd7f8d1f624acd4d4a6f6e38165f24144c5ecb3d9dcee
kernel-debug-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 7db8e78bad92e0a2cd821ffc2c216d9721b4513a8226d30eb20c86e1d40529b5
kernel-debug-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 7db8e78bad92e0a2cd821ffc2c216d9721b4513a8226d30eb20c86e1d40529b5
kernel-debug-devel-2.6.32-431.61.2.el6.i686.rpm SHA-256: 09f191ef750fd5fe083a7181fcc06686cdbfc4f23ee4c25e996735e1d688d403
kernel-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 0d5df703e344e1793017ad4149c6f1c325cb1f52be4e698b47bdd9414fbd51cd
kernel-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 0d5df703e344e1793017ad4149c6f1c325cb1f52be4e698b47bdd9414fbd51cd
kernel-debuginfo-common-i686-2.6.32-431.61.2.el6.i686.rpm SHA-256: c720d08b9baa582e43b3e1565f2892f188f182ecb33524e67779d34a871a0808
kernel-debuginfo-common-i686-2.6.32-431.61.2.el6.i686.rpm SHA-256: c720d08b9baa582e43b3e1565f2892f188f182ecb33524e67779d34a871a0808
kernel-devel-2.6.32-431.61.2.el6.i686.rpm SHA-256: 3c21523c43da58fffeb624cd637be62658035d5c623174de13667ad1103602bb
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.i686.rpm SHA-256: 79e761750b85bc6e0b4fe0ce935704f5fe9e2e289b629c8c43c970f97e39a3f5
perf-2.6.32-431.61.2.el6.i686.rpm SHA-256: 93b17358189f161cd7566a4aedc9aa2a1cec743e9d24df5c6792634f10a4ac07
perf-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: cd57927a9f22b9e2f5984c51b464bf3685e30a4d34ec45fa591127023b49814b
perf-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: cd57927a9f22b9e2f5984c51b464bf3685e30a4d34ec45fa591127023b49814b
python-perf-2.6.32-431.61.2.el6.i686.rpm SHA-256: 3ca90db4a2ea550ca98ca39a06d860e04777f1e2c4f5cfbc483c247c797dabd9
python-perf-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 5d89bdd9e111bcb004700801510a92bcdf84c477f4e915216f5a21a7fb2cd05d
python-perf-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 5d89bdd9e111bcb004700801510a92bcdf84c477f4e915216f5a21a7fb2cd05d

Red Hat Enterprise Linux Server - AUS 6.5

SRPM
kernel-2.6.32-431.61.2.el6.src.rpm SHA-256: f94d6a6be89d4e385ccfc63ef1827c0254f50245f82dc7d68939288a14ca81c1
x86_64
kernel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 0d55249b7f4ab79c78acae75af7498cc294b5b55c612a01303323dc20ff8f7a6
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-debug-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 45eb46723c9ceb028c8a2624a08d15dc620db5aeb2e4d6227f5dc3571644aaf2
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: de397bcde4663b734bac7c278ce41383d9c6ea94f186da87b1e40b5591b51f90
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 1ea779748d6bce8064922b9a62a6668f3f281b22c144068791bc34a825269dda
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: c65821ef2d38c3c5980083e642323de4192e38e0adac10b4fde15dbde60253a7
perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 9b80a95218a2f3b1771dff2cbabf051e42c3e921803a061013203a522672d6c9
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
python-perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: abe46229fe997d442706ddc08e669dbfaf533a0d11e444fcb1c5aae3e7acd396
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5

SRPM
kernel-2.6.32-431.61.2.el6.src.rpm SHA-256: f94d6a6be89d4e385ccfc63ef1827c0254f50245f82dc7d68939288a14ca81c1
s390x
kernel-2.6.32-431.61.2.el6.s390x.rpm SHA-256: fee0979ae07bb2fbe92bbcf0c8c3061722f484075f5e5df9a21d638ebc1bb799
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-debug-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 8732d36501d1a4da10baa6155598e42c6f7b1a6a89ef9b3c326e36b326582770
kernel-debug-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: f2020003e0b2d810e667c492b3b7f2b31e45f8cdc0206cf2fd99d56c13e9042c
kernel-debug-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: f2020003e0b2d810e667c492b3b7f2b31e45f8cdc0206cf2fd99d56c13e9042c
kernel-debug-devel-2.6.32-431.61.2.el6.s390x.rpm SHA-256: ad134fc9e1eacfcbbf52eb36caa223e62b41fa2a97d9489e3fa5d5146f42e17e
kernel-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 9fbb748b17514c908ad0aa294099a9090e7773b568bba1141835d574fd50b631
kernel-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 9fbb748b17514c908ad0aa294099a9090e7773b568bba1141835d574fd50b631
kernel-debuginfo-common-s390x-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 31e057a00b0c0cdc4dca6cc5b2f3e713275ae5a993bd20e313df713bb9873246
kernel-debuginfo-common-s390x-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 31e057a00b0c0cdc4dca6cc5b2f3e713275ae5a993bd20e313df713bb9873246
kernel-devel-2.6.32-431.61.2.el6.s390x.rpm SHA-256: d20a7c2c193e3272e5e39ccf17796af984a498ce43f369921d2041fae16e5dd4
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 23382acf0041a5ecfc45f24f0811e08a695b5df16e3371ef165c0b7d7d76c7c9
kernel-kdump-2.6.32-431.61.2.el6.s390x.rpm SHA-256: f52b58c5f9ea5d6259bcdc3b9d0bb15a545d360b45e6fd2176e8c0b4e4a79e93
kernel-kdump-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 3f0e3309cce971335ebc1f4c683c5ff733b7992b68c51c000386062f587fdbc9
kernel-kdump-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 3f0e3309cce971335ebc1f4c683c5ff733b7992b68c51c000386062f587fdbc9
kernel-kdump-devel-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 40a144ea191b239860827ab527281d2a95ce41954b47f41e948bf0cdf0508093
perf-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 05dceeb2131479fb6d64d29b3a5e922a11c5db146f91445bf114ca9e2c7c5fc6
perf-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 65b18f020cfe5d0f05ece4ce04e068bb4deeb1ba1dfb69e39ebee70728b58e56
perf-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 65b18f020cfe5d0f05ece4ce04e068bb4deeb1ba1dfb69e39ebee70728b58e56
python-perf-2.6.32-431.61.2.el6.s390x.rpm SHA-256: d3974c83cacc6fbbd9128bff8cbf4c450e9a1f52124a6a97cb8408fa6f3d48f5
python-perf-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 971270a0d471a4ec41e24c2189a47e616c5c22c75bf0959e9ced8336c1297734
python-perf-debuginfo-2.6.32-431.61.2.el6.s390x.rpm SHA-256: 971270a0d471a4ec41e24c2189a47e616c5c22c75bf0959e9ced8336c1297734

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5

SRPM
kernel-2.6.32-431.61.2.el6.src.rpm SHA-256: f94d6a6be89d4e385ccfc63ef1827c0254f50245f82dc7d68939288a14ca81c1
ppc64
kernel-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: f6795235aeed2c3cefc85356ed6ee00a840cf58791762bae0235c32ac045246c
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-bootwrapper-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: e79ce1ff7f7368c1119dedb2f5b7303ec08807b887082895c557cde77e488b57
kernel-debug-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: b93b77060370aeabf3f481d811b0776911cf933ca2a77f58b8987e8e6f96d0d7
kernel-debug-debuginfo-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: 2751a41878109388d7069a04d65cffcc3ab1a4fcbfcec0a166f0ff9f3f3e6c26
kernel-debug-debuginfo-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: 2751a41878109388d7069a04d65cffcc3ab1a4fcbfcec0a166f0ff9f3f3e6c26
kernel-debug-devel-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: 0f42d445f85eab65a03252aefcc58237066f066f444284c2d3b0ee86627d449d
kernel-debuginfo-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: fc41c1edd4dbafb7ccac75442861cc7d30d1d24cdf2cef816058f7b1b7434810
kernel-debuginfo-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: fc41c1edd4dbafb7ccac75442861cc7d30d1d24cdf2cef816058f7b1b7434810
kernel-debuginfo-common-ppc64-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: 5bacbf3e92e8d664a3f83aa8bfc112df2a30dc2ee33934a724bc25a8b6de6272
kernel-debuginfo-common-ppc64-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: 5bacbf3e92e8d664a3f83aa8bfc112df2a30dc2ee33934a724bc25a8b6de6272
kernel-devel-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: 06371b5b60bb5ba7c716dd9300dbd339e3e7e908993590553bb7270429fbe313
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: 4a78d799ac7d1163416a299125fe06359adcee8138feb1e3719b23ebdf14c353
perf-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: e628fe103304515f3b7fe6a6a9c559f1ff7b521a4f17d6ff939edc1e85e215dd
perf-debuginfo-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: ad651a65b1486dfccd776469c5faec9ec44e83907befe4cb051e8598b70712ae
perf-debuginfo-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: ad651a65b1486dfccd776469c5faec9ec44e83907befe4cb051e8598b70712ae
python-perf-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: 44b93a79ac96046899eaaf65b5935bf6f0af1de42f5f8fed4f913451c91aefd4
python-perf-debuginfo-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: d9bb0e036c5a8dcdbb2ce00e421e6164bfc3666074402fa568e499b1d21fb088
python-perf-debuginfo-2.6.32-431.61.2.el6.ppc64.rpm SHA-256: d9bb0e036c5a8dcdbb2ce00e421e6164bfc3666074402fa568e499b1d21fb088

Red Hat Enterprise Linux Server - TUS 6.5

SRPM
kernel-2.6.32-431.61.2.el6.src.rpm SHA-256: f94d6a6be89d4e385ccfc63ef1827c0254f50245f82dc7d68939288a14ca81c1
x86_64
kernel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 0d55249b7f4ab79c78acae75af7498cc294b5b55c612a01303323dc20ff8f7a6
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-debug-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 45eb46723c9ceb028c8a2624a08d15dc620db5aeb2e4d6227f5dc3571644aaf2
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: de397bcde4663b734bac7c278ce41383d9c6ea94f186da87b1e40b5591b51f90
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 1ea779748d6bce8064922b9a62a6668f3f281b22c144068791bc34a825269dda
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: c65821ef2d38c3c5980083e642323de4192e38e0adac10b4fde15dbde60253a7
perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 9b80a95218a2f3b1771dff2cbabf051e42c3e921803a061013203a522672d6c9
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
python-perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: abe46229fe997d442706ddc08e669dbfaf533a0d11e444fcb1c5aae3e7acd396
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5

SRPM
kernel-2.6.32-431.61.2.el6.src.rpm SHA-256: f94d6a6be89d4e385ccfc63ef1827c0254f50245f82dc7d68939288a14ca81c1
x86_64
kernel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 0d55249b7f4ab79c78acae75af7498cc294b5b55c612a01303323dc20ff8f7a6
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-debug-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 45eb46723c9ceb028c8a2624a08d15dc620db5aeb2e4d6227f5dc3571644aaf2
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: de397bcde4663b734bac7c278ce41383d9c6ea94f186da87b1e40b5591b51f90
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 1ea779748d6bce8064922b9a62a6668f3f281b22c144068791bc34a825269dda
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: c65821ef2d38c3c5980083e642323de4192e38e0adac10b4fde15dbde60253a7
perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 9b80a95218a2f3b1771dff2cbabf051e42c3e921803a061013203a522672d6c9
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77
i386
kernel-2.6.32-431.61.2.el6.i686.rpm SHA-256: d5b3a211badc0dfca68602c9ed4cbd33ab9e037456de764d61bb82f55f8a063c
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-debug-2.6.32-431.61.2.el6.i686.rpm SHA-256: 54aed6542a489b03c31fd7f8d1f624acd4d4a6f6e38165f24144c5ecb3d9dcee
kernel-debug-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 7db8e78bad92e0a2cd821ffc2c216d9721b4513a8226d30eb20c86e1d40529b5
kernel-debug-devel-2.6.32-431.61.2.el6.i686.rpm SHA-256: 09f191ef750fd5fe083a7181fcc06686cdbfc4f23ee4c25e996735e1d688d403
kernel-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 0d5df703e344e1793017ad4149c6f1c325cb1f52be4e698b47bdd9414fbd51cd
kernel-debuginfo-common-i686-2.6.32-431.61.2.el6.i686.rpm SHA-256: c720d08b9baa582e43b3e1565f2892f188f182ecb33524e67779d34a871a0808
kernel-devel-2.6.32-431.61.2.el6.i686.rpm SHA-256: 3c21523c43da58fffeb624cd637be62658035d5c623174de13667ad1103602bb
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.i686.rpm SHA-256: 79e761750b85bc6e0b4fe0ce935704f5fe9e2e289b629c8c43c970f97e39a3f5
perf-2.6.32-431.61.2.el6.i686.rpm SHA-256: 93b17358189f161cd7566a4aedc9aa2a1cec743e9d24df5c6792634f10a4ac07
perf-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: cd57927a9f22b9e2f5984c51b464bf3685e30a4d34ec45fa591127023b49814b
python-perf-debuginfo-2.6.32-431.61.2.el6.i686.rpm SHA-256: 5d89bdd9e111bcb004700801510a92bcdf84c477f4e915216f5a21a7fb2cd05d

Red Hat Enterprise Linux EUS Compute Node 6.5

SRPM
kernel-2.6.32-431.61.2.el6.src.rpm SHA-256: f94d6a6be89d4e385ccfc63ef1827c0254f50245f82dc7d68939288a14ca81c1
x86_64
kernel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 0d55249b7f4ab79c78acae75af7498cc294b5b55c612a01303323dc20ff8f7a6
kernel-abi-whitelists-2.6.32-431.61.2.el6.noarch.rpm SHA-256: a7e5606ef3d3a7b50441b2f287506abc1ccc28445ea3bff7e61a2a151555e6d8
kernel-debug-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 45eb46723c9ceb028c8a2624a08d15dc620db5aeb2e4d6227f5dc3571644aaf2
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: fb9cd36acedaf344d3b522abcd4a8dc0c39ae21b3bf1c99af9348bc472006513
kernel-debug-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: de397bcde4663b734bac7c278ce41383d9c6ea94f186da87b1e40b5591b51f90
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: d686fd1044cdc1d574f39bd6a446ebad7cad83e18a91b1686320fa0a9d74cdcf
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-debuginfo-common-x86_64-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 33fa26c5aa5c71f430a007af0efffc072c33c223dba0902301101309fef1da7d
kernel-devel-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 1ea779748d6bce8064922b9a62a6668f3f281b22c144068791bc34a825269dda
kernel-doc-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 1a4b310cee10dd3a85244fdc16fe5b8923e05259704cca877855bda0740f705c
kernel-firmware-2.6.32-431.61.2.el6.noarch.rpm SHA-256: 94dc28549eb0bf6739e19fbe91ea2117421e248a0125829532a9d78c728016cc
kernel-headers-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: c65821ef2d38c3c5980083e642323de4192e38e0adac10b4fde15dbde60253a7
perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: 9b80a95218a2f3b1771dff2cbabf051e42c3e921803a061013203a522672d6c9
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: f8e5cc06ca8b162f81e4506f92ac1d3c967430521a040ff0309f6fe14c719c81
python-perf-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: abe46229fe997d442706ddc08e669dbfaf533a0d11e444fcb1c5aae3e7acd396
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77
python-perf-debuginfo-2.6.32-431.61.2.el6.x86_64.rpm SHA-256: a5f9259a4e570d2c642de27ec9e2262caa8c467db079ae176465a56b42e54d77

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility