An update for mcelog is now available for Red Hat Enterprise Linux 6.8.

The mcelog packages contain a daemon that collects and decodes Machine CheckException (MCE) data on AMD64 and Intel 64 machines.For detailed information on changes in this release, see the Red Hat EnterpriseLinux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linkedfrom the References section.Users of mcelog are advised to upgrade to these updated packages.
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
mcelog-128-1.c83713fd.el6.src.rpm
    MD5: 1175524d02e077f1a44215c479600dd9SHA-256: 10ab1e11a4d3057f4cf43362fb3181675d6b63ba16c5ed7fa6ebfbab8aef09f9
 
x86_64:
mcelog-128-1.c83713fd.el6.x86_64.rpm
    MD5: a0dc0c08202a3711cfdd5d5376624e2cSHA-256: 65df8160522287cf01826a0611a89b0fe7431fa09c49f3c6db07a814eafd33e7
mcelog-debuginfo-128-1.c83713fd.el6.x86_64.rpm
    MD5: 9d0f633834e182e2edee83f941baa0b1SHA-256: 1c4b33f3d71f2652f1a228bf65a10ef625beb7ffb38aa21f1c4e242d3c0ee4b0
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
mcelog-128-1.c83713fd.el6.src.rpm
    MD5: 1175524d02e077f1a44215c479600dd9SHA-256: 10ab1e11a4d3057f4cf43362fb3181675d6b63ba16c5ed7fa6ebfbab8aef09f9
 
x86_64:
mcelog-128-1.c83713fd.el6.x86_64.rpm
    MD5: a0dc0c08202a3711cfdd5d5376624e2cSHA-256: 65df8160522287cf01826a0611a89b0fe7431fa09c49f3c6db07a814eafd33e7
mcelog-debuginfo-128-1.c83713fd.el6.x86_64.rpm
    MD5: 9d0f633834e182e2edee83f941baa0b1SHA-256: 1c4b33f3d71f2652f1a228bf65a10ef625beb7ffb38aa21f1c4e242d3c0ee4b0
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
mcelog-128-1.c83713fd.el6.src.rpm
    MD5: 1175524d02e077f1a44215c479600dd9SHA-256: 10ab1e11a4d3057f4cf43362fb3181675d6b63ba16c5ed7fa6ebfbab8aef09f9
 
x86_64:
mcelog-128-1.c83713fd.el6.x86_64.rpm
    MD5: a0dc0c08202a3711cfdd5d5376624e2cSHA-256: 65df8160522287cf01826a0611a89b0fe7431fa09c49f3c6db07a814eafd33e7
mcelog-debuginfo-128-1.c83713fd.el6.x86_64.rpm
    MD5: 9d0f633834e182e2edee83f941baa0b1SHA-256: 1c4b33f3d71f2652f1a228bf65a10ef625beb7ffb38aa21f1c4e242d3c0ee4b0
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from: