Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 6.5 Extended Update Support.Red Hat Product Security has rated this update as having Important securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* A race condition flaw was found in the way the Linux kernel’s KVMsubsystem handled PIT (Programmable Interval Timer) emulation. A guest userwho has access to the PIT I/O ports could use this flaw to crash the host.(CVE-2014-3611, Important)* A flaw was found in the way the Linux kernel’s SCTP implementationvalidated INIT chunks when performing Address Configuration Change(ASCONF). A remote attacker could use this flaw to crash the system bysending a specially crafted SCTP packet to trigger a NULL pointerdereference on the system. (CVE-2014-7841, Important)* A flaw was found in the way the ipc_rcu_putref() function in the Linuxkernel’s IPC implementation handled reference counter decrementing.A local, unprivileged user could use this flaw to trigger an Out of Memory(OOM) condition and, potentially, crash the system. (CVE-2013-4483,Moderate)* A memory corruption flaw was found in the way the USB ConnectTechWhiteHEAT serial driver processed completion commands sent via USB RequestBlocks buffers. An attacker with physical access to the system could usethis flaw to crash the system or, potentially, escalate their privileges onthe system. (CVE-2014-3185, Moderate)* It was found that the Linux kernel’s KVM subsystem did not handle the VMexits gracefully for the invept (Invalidate Translations Derived from EPT)and invvpid (Invalidate Translations Based on VPID) instructions. On hostswith an Intel processor and invept/invppid VM exit support, an unprivilegedguest user could use these instructions to crash the guest. (CVE-2014-3645,CVE-2014-3646, Moderate)* A flaw was found in the way the Linux kernel’s netfilter subsystemhandled generic protocol tracking. As demonstrated in the Stream ControlTransmission Protocol (SCTP) case, a remote attacker could use this flaw tobypass intended iptables rule restrictions when the associated connectiontracking module was not loaded on the system. (CVE-2014-8160, Moderate)Red Hat would like to thank Lars Bull of Google for reportingCVE-2014-3611, Vladimir Davydov (Parallels) for reporting CVE-2013-4483,and the Advanced Threat Research team at Intel Security for reportingCVE-2014-3645 and CVE-2014-3646. The CVE-2014-7841 issue was discovered byLiu Wei of Red Hat.Bug fixes:* When forwarding a packet, the iptables target TCPOPTSTRIP used thetcp_hdr() function to locate the option space. Consequently, TCPOPTSTRIPlocated the incorrect place in the packet, and therefore did not matchoptions for stripping. TCPOPTSTRIP now uses the TCP header itself to locatethe option space, and the options are now properly stripped. (BZ#1172026)* The ipset utility computed incorrect values of timeouts from an old IPset, and these values were then supplied to a new IP set. A resize on an IPset with a timeouts option enabled could then supply corrupted data from anold IP set. This bug has been fixed by properly reading timeout values froman old set before supplying them to a new set. (BZ#1172763)* Incorrect processing of errors from the BCM5719 LAN controller couldresult in incoming packets being dropped. Now, received errors are handledproperly, and incoming packets are no longer randomly dropped. (BZ#1180405)* When the NVMe driver allocated a name-space queue, it was recognized as arequest-based driver, whereas it was a BIO-based driver. While trying toaccess data during the loading of NVMe along with a request-based DMdevice, the system could terminate unexpectedly or become unresponsive.Now, NVMe does not set the QUEUE_FLAG_STACKABLE flag during the allocationof a name-space queue, and the system no longer attempts to insert arequest into the queue, preventing a crash. (BZ#1180554)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
kernel-2.6.32-431.50.1.el6.src.rpm
    MD5: 79d9bca49309ed2b057bbc54afbaba3cSHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
 
x86_64:
kernel-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: a5057b12bac60f37e8378f461c27008bSHA-256: bea03eb02f1da436d3cc499d809102c2d10c24cee5454069cf0ef9298812e6eb
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 4e0db18a1c7cdaca96dfb4704b1f608aSHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 6d9247c4d1f0d0473f4716a64aea8dd3SHA-256: d416942163414e237223ab27c2d2d530666ba5e723d891da43a22ce9a0a24b87
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 3480ffaebac288875faaeeb3d170ada4SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-devel-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 57ff0e7ae0a3d95627ddb4e6e77c4f4cSHA-256: 0d0f00a76e4618002e8fbcd30233ad47bf12fda8b7df2a276c174fe43a6012a3
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 529602b9f9e347cc70637c66536aa445SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: a58416b82939a6b14c830d0edc3026d5SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-devel-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: f9efbc176621ec66c730690e750ea896SHA-256: dfc043f01a793d02a9d59472c5a8938d925fabd68e75fab8d3367b16e304824e
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm
    MD5: bea5078dacb0e7b0b18e5cba6e9f2dc2SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 3646a92a44d72c7f40df4e7d24117356SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: e46c56b36142b60a992ef8cfb56b8721SHA-256: 48b9a1815be762c738bc9996bd204a2a21d0d3180f95275d40189fae3390c4fe
perf-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: f15fc4cc84ae07187198712a9204d5b2SHA-256: 102059d1fec5c7a936f9ea5eb61ebe5c7d4e0526cfa4fd0c6ea7d876f14b13ee
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 0d363ef04aa6f580bc09a9ae4803b408SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
python-perf-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 68dcddc5ed0d1424718e4fe448a6f48fSHA-256: 84afff691daeaa32cb380d468dd9aa8d6e2aa3c1098c7e4023fbc2444f91cc1b
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 632b387cba9100c52ab8f51110610c4eSHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
kernel-2.6.32-431.50.1.el6.src.rpm
    MD5: 79d9bca49309ed2b057bbc54afbaba3cSHA-256: c246d4c2bc0ef29e38e2932d22b7d35b75de696e5db4b0c3114f2eced530db8a
 
IA-32:
kernel-2.6.32-431.50.1.el6.i686.rpm
    MD5: 2dd92263460fdb47de87058883c2c58fSHA-256: f58955ce0d8b626eee069b6e2b70e8e865976191d92cbbc0fce573781f327a60
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 4e0db18a1c7cdaca96dfb4704b1f608aSHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.i686.rpm
    MD5: fb7ad7b655d73cd771b4a17c2d41b36aSHA-256: a390135facefccb54a949132e23386fa53dd1891f8cd62b41fa3f0786f802f10
kernel-debug-debuginfo-2.6.32-431.50.1.el6.i686.rpm
    MD5: b45976dab058f8ca0b92ccd63e414334SHA-256: 59762ca0aacdd05e2ab268ed7055b85a092e47e877a7a9483bce482c55818703
kernel-debug-devel-2.6.32-431.50.1.el6.i686.rpm
    MD5: bd07eed5ad7cb31ff9cf3a1420bca995SHA-256: 70deb1c46bb990ba9dadf0bb602eec5333778eea7749aef3874233041a0eb8f0
kernel-debuginfo-2.6.32-431.50.1.el6.i686.rpm
    MD5: 92e876eb515c06ff3d373f0427aa8db7SHA-256: 31948ac256c31a522e81c41ade929d6aa9d7b22eb78b15ce3376269134e18765
kernel-debuginfo-common-i686-2.6.32-431.50.1.el6.i686.rpm
    MD5: f56d9c2b7c6c0e559f31134cb0640307SHA-256: 0a0844adee810b5795e0816b42434a0174e5ee8f73b5c198563fc3124e722e2d
kernel-devel-2.6.32-431.50.1.el6.i686.rpm
    MD5: d7274b31070ac55aed4109fecaf26cf5SHA-256: 64f0139b5333dd995ba27da27709f392b28abadc13be95faeebd636df23a3a3b
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm
    MD5: bea5078dacb0e7b0b18e5cba6e9f2dc2SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 3646a92a44d72c7f40df4e7d24117356SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.i686.rpm
    MD5: a415c680b515fe94d2f71152fc27db9fSHA-256: 7fae4e5674154409bc252bc57eee1abc04505b6ab26e3af133d233eb32ba83b7
perf-2.6.32-431.50.1.el6.i686.rpm
    MD5: 37779d2def790e0d6a94970c12aa70daSHA-256: 2b7f9fe69cde113a3806df95224fd2f1b2d424aae48863c48b99fbc7abbc0b0a
perf-debuginfo-2.6.32-431.50.1.el6.i686.rpm
    MD5: 81ac6ab5d714aa18704822005702b3fcSHA-256: 48464741bc4e2636224fd7097d6ba0874d39342059772a756693772cca86af4b
python-perf-2.6.32-431.50.1.el6.i686.rpm
    MD5: af0353958a99d3b97fc3cace90fc18e2SHA-256: da280201513864cf7d0b3bea412210f679a3eec7aa38d15fcf07799c0535dd43
python-perf-debuginfo-2.6.32-431.50.1.el6.i686.rpm
    MD5: e54fbb67bb28f1d2f7a2e7850c8e35d3SHA-256: f80356247538434d1bd3dad77ff2b42c4eb6e3eb53763b329c77545818b9d61a
 
PPC:
kernel-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 9e7ebed958d544d236036e7310b6cddcSHA-256: 2b0a276911638b70867ff6ac008b74d2d1d4926128dab0912593c244dae785a7
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 4e0db18a1c7cdaca96dfb4704b1f608aSHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-bootwrapper-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: bec45b95c3507ec31c6097849d8adf1fSHA-256: 271afb3816f3c4038b8e9d34701eec8e789afeed05cb4c57ef9117f7169d7c98
kernel-debug-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 3bff74cda2164051e0769bddcba0249fSHA-256: 002dbba4676ca611e8ceaf0364d25f39c908c28a858c06268d4e1c46634c2dab
kernel-debug-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 07bf8f4ed62a6f7f25c3c4001404d7edSHA-256: 19b72c633b31b3e30b8fbca1374e953e1ede4b7f58fddef4a8c963aef0a135bf
kernel-debug-devel-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 46f3bf5e1deb49f6f1bb4f279cba54a7SHA-256: 9c6fb3e550444500dab20617674970262a2ad7976f3b14a56a0aa09b5667544e
kernel-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: ca0f71c12fb345c88ff5192c92f236adSHA-256: c48e42d4430c8628d750d44c7119cf015f36d8ab1f28935f7556fadf12329a7d
kernel-debuginfo-common-ppc64-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 17cb4d73b5ea3d4376f0a2f66baf915fSHA-256: 7f10ef19f63ada48cace4f6af0f1a15ca80eaff00c28fe86521993e701765e71
kernel-devel-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 5738839dc8ab75ee445ca5172aab2eb7SHA-256: c57fb942db62091715f52a2904a12706321aae6a24dc3458dfb3e935b9bb9f54
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm
    MD5: bea5078dacb0e7b0b18e5cba6e9f2dc2SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 3646a92a44d72c7f40df4e7d24117356SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 9274802e2bb27981f5e6c555bdaa85d4SHA-256: 9f8d1f1098aa507c8f6463ec5da18221372757b072a1dd01a19dc9620b6d41a9
perf-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 7de5b65eb402f22c0571064cf7c09a82SHA-256: 030484fb32233a3709b323eec75cd246248ee7eb87189af1efe63dc23945b94e
perf-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: 009a72b9d1c210fc90d561d13c804e75SHA-256: c4bd974dca7b5228bbffe094650ade99d651dca6e18b4b85f75b3c8072e9edaf
python-perf-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: aee869f80f504a2f44a67855ceec1f46SHA-256: 01377f7f7b6b30d40d6398c0056e434e809f45283f67187749b7dbaea86aaa8d
python-perf-debuginfo-2.6.32-431.50.1.el6.ppc64.rpm
    MD5: f61a0e042bd82498586bc2aec567e461SHA-256: 2aa2c7d1c44771534f432f24f89b9e37206b8833c78486b426f601f6d99a334c
 
s390x:
kernel-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 664a4acfe3f97d861c5d94059b18fc50SHA-256: 63be24c98c5df90df259e44de161567ac658ecf2afb3b1e7462c7537304e772e
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 4e0db18a1c7cdaca96dfb4704b1f608aSHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 1f0440eb3278b2cdd274c315e6ab6078SHA-256: 4827ce9e42176f950a4995278579b2d23f040193699820629b261470a81cc8db
kernel-debug-debuginfo-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 8e9d808de5eb8552998219c240590480SHA-256: 5290d69c67d29498791c127216abc9438d5d939608d28aaffbdaa73095311ddd
kernel-debug-devel-2.6.32-431.50.1.el6.s390x.rpm
    MD5: fc296501b9cf0693079ac5ae9da6f182SHA-256: 83105d8c5d159e22362fecd57981618e86fad3108850d67a0659bf9e4e670805
kernel-debuginfo-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 739e84d3a80cf53cfd3b4fe2f038ee0dSHA-256: 904b0c119b1506ed3359226a8f1aa6c3d0c33d48e9b6f6d2d16f9974c2d1d519
kernel-debuginfo-common-s390x-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 3f74546dc4f776c82a9cad402c86776aSHA-256: 305fac5bac559dd834606758bbcf7e894dc756f188e79e05d9a37e86e429f201
kernel-devel-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 368e47f5cf22e9a5870d95d3f9f0a255SHA-256: 05ea4ece0f6663728073ea43e4c3dbb3ca9f438d00ea24646bb768077112b3f1
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm
    MD5: bea5078dacb0e7b0b18e5cba6e9f2dc2SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 3646a92a44d72c7f40df4e7d24117356SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 0475e716f930362287a82221a4a52128SHA-256: 84574fcdec58c9aaeef8166e983006fdb06edd3d9ca52e6cc32b80cba6431b57
kernel-kdump-2.6.32-431.50.1.el6.s390x.rpm
    MD5: f7c86d64f4b1720d6163a0f3d8eeefc4SHA-256: 3faa3cc8feb8924bc1077b8e41c2813d30bc237dc3223d776d124de2e203de0c
kernel-kdump-debuginfo-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 859a263cdc32f0e23a0556378b0e8f8fSHA-256: 3d1859b2e4a9a37c0e12baeee2f0b814708abea2f921819f024ef77e5c037e61
kernel-kdump-devel-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 66eb0878e5b3ac2b7f924ef462ab230eSHA-256: 776ad766e4b0e628b35fdaac1e17a92bb7b923003bb9b4869427fec2d9e97b9f
perf-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 8850614c8d228bc56574b4dcff1f7613SHA-256: 993fefb151bed07d5bfa8e898bad6b400e45063f0117970ca2429fb233efc748
perf-debuginfo-2.6.32-431.50.1.el6.s390x.rpm
    MD5: cb4c4449a9afd5b2f4752d756a83c31bSHA-256: aa0b16e9a4a21d5b00f22756dc9f8fd59a74bc0d24895382c1450e039e3609cb
python-perf-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 5ee283c3f758b6b1b7f4a8558d008aa5SHA-256: 63a45cfffba1cf3c75d29f9a14109a182df3fbdac6e5d9c08989c2f7eb606a19
python-perf-debuginfo-2.6.32-431.50.1.el6.s390x.rpm
    MD5: 3be8398a0eb612e86569301185ebd3fbSHA-256: fbe964f11a15d23feb06a79d3b31bd6cc1b412d05fdef947e67bec43dcfffda8
 
x86_64:
kernel-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: a5057b12bac60f37e8378f461c27008bSHA-256: bea03eb02f1da436d3cc499d809102c2d10c24cee5454069cf0ef9298812e6eb
kernel-abi-whitelists-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 4e0db18a1c7cdaca96dfb4704b1f608aSHA-256: 39752634590f06f9582baa9b6259473f162892d1284315b41d1c5e6a0fdaf3b5
kernel-debug-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 6d9247c4d1f0d0473f4716a64aea8dd3SHA-256: d416942163414e237223ab27c2d2d530666ba5e723d891da43a22ce9a0a24b87
kernel-debug-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 3480ffaebac288875faaeeb3d170ada4SHA-256: 80670168be84888416a5c2109dd3aedea5a79f006fdfced9d1fccab1fcc628a5
kernel-debug-devel-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 57ff0e7ae0a3d95627ddb4e6e77c4f4cSHA-256: 0d0f00a76e4618002e8fbcd30233ad47bf12fda8b7df2a276c174fe43a6012a3
kernel-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 529602b9f9e347cc70637c66536aa445SHA-256: 22a8b88055a8fc35aa814585eb78eb3d123e8a66bd4ba087956e10497a14fa84
kernel-debuginfo-common-x86_64-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: a58416b82939a6b14c830d0edc3026d5SHA-256: 9a3a2dc03886885f39bc8ec4049fb615351efbe94891bb102649f8edcd6c1813
kernel-devel-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: f9efbc176621ec66c730690e750ea896SHA-256: dfc043f01a793d02a9d59472c5a8938d925fabd68e75fab8d3367b16e304824e
kernel-doc-2.6.32-431.50.1.el6.noarch.rpm
    MD5: bea5078dacb0e7b0b18e5cba6e9f2dc2SHA-256: 307752a507ebd6a8ab81c80aa75b0acc15884f767a3d470aea7987edd9100d4f
kernel-firmware-2.6.32-431.50.1.el6.noarch.rpm
    MD5: 3646a92a44d72c7f40df4e7d24117356SHA-256: 2f503cec917b8fe7cac94909bdfda9c3df5b0d8753ab5789318282b247db9454
kernel-headers-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: e46c56b36142b60a992ef8cfb56b8721SHA-256: 48b9a1815be762c738bc9996bd204a2a21d0d3180f95275d40189fae3390c4fe
perf-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: f15fc4cc84ae07187198712a9204d5b2SHA-256: 102059d1fec5c7a936f9ea5eb61ebe5c7d4e0526cfa4fd0c6ea7d876f14b13ee
perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 0d363ef04aa6f580bc09a9ae4803b408SHA-256: 6e355ebb1bebe6b34348a6f3e7dc8bc4025bedf555acd9dfa11ab6abb0e9041d
python-perf-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 68dcddc5ed0d1424718e4fe448a6f48fSHA-256: 84afff691daeaa32cb380d468dd9aa8d6e2aa3c1098c7e4023fbc2444f91cc1b
python-perf-debuginfo-2.6.32-431.50.1.el6.x86_64.rpm
    MD5: 632b387cba9100c52ab8f51110610c4eSHA-256: 9e39b2a2cb8d4f517b9f308bab6475dd0256afaff8509de0fad79166b3205f75
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply