Risks
Advisories
Browse
or
or
CentOS Errata and Security Advisory - Moderate CentOS 6 kernel Update (CESA-2013:0223)
CentOS Errata and Security Advisory 2013:0223 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0223.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
cc3e84adc6534d1c2be2437bab5c9b6db74d1f3cceb4fa67efd3f8e664e75583 
kernel-2.6.32-279.22.1.el6.i686.rpm
492ca13ac771b0aaab6a99c9eb0b6c922983dc4690926f4c4ee786a4a8d9384b 
kernel-debug-2.6.32-279.22.1.el6.i686.rpm
f8ad1bb925c688b6ab7ee1d5bdd955ba5cbec8e6e4e2e31d95fdc3eec751acd7 
kernel-debug-devel-2.6.32-279.22.1.el6.i686.rpm
68033561c9ee9492362f35a6f78d93efe47b6cc60ca7240c73bea7b5aba8254e 
kernel-devel-2.6.32-279.22.1.el6.i686.rpm
a2e4fc9c727c8a97fd2da4719ffc706bae18f7c0cbe8aa162fe3fe1cdb40e1ce 
kernel-doc-2.6.32-279.22.1.el6.noarch.rpm
f2cd024d1f67e8cbedd822720c1124342e0476168efef404408276fe80b72f2c 
kernel-firmware-2.6.32-279.22.1.el6.noarch.rpm
b5f02cdd8511e46d528a9f9b0185d96a905ef85673c076465f55d1b1670ee103 
kernel-headers-2.6.32-279.22.1.el6.i686.rpm
91a42a2d6fd0d665bf22f95a47de971efa55479077529a3148b1eb49bb413c16 
perf-2.6.32-279.22.1.el6.i686.rpm
623fe84fc54775c3b3f6bf54b803f5b9555f7231dd2ee6144095dc55d920aad4 
python-perf-2.6.32-279.22.1.el6.i686.rpm

x86_64:
4a678b7af346bc1ea7ac66cf69fc0de8ecbec9cb91f05bd387303057d92dbed4 
kernel-2.6.32-279.22.1.el6.x86_64.rpm
56a6e487f8750a675b75764a08c37dfb8c8e966b5bf3dce295d4e8920104565e 
kernel-debug-2.6.32-279.22.1.el6.x86_64.rpm
a30a4b7c3656c3798ad7a9a663f1f16bc68bfcdf00e1b75bad16e8751c4260b6 
kernel-debug-devel-2.6.32-279.22.1.el6.x86_64.rpm
4b5c1bec03d23149032b7128be5908cea0039d0fc62838a6c894376f966d8622 
kernel-devel-2.6.32-279.22.1.el6.x86_64.rpm
a2e4fc9c727c8a97fd2da4719ffc706bae18f7c0cbe8aa162fe3fe1cdb40e1ce 
kernel-doc-2.6.32-279.22.1.el6.noarch.rpm
f2cd024d1f67e8cbedd822720c1124342e0476168efef404408276fe80b72f2c 
kernel-firmware-2.6.32-279.22.1.el6.noarch.rpm
425fbc5d75754ce9a3c70eb718771251da3b5745e2084d0712a01b5c062960c9 
kernel-headers-2.6.32-279.22.1.el6.x86_64.rpm
2164d64b74aa6ee15856ccb2682f82da0a3ce7966eb42876b4209e52d12cc610 
perf-2.6.32-279.22.1.el6.x86_64.rpm
3fdd58d226b974ea8e85e74f7eca6c3cd1954a5600a948c79f0ed659f52d6b2a 
python-perf-2.6.32-279.22.1.el6.x86_64.rpm

Source:
4882ec3b1227ea70e39e8e54dbe27746d1dd449f05a43395126e952a2378d149 
kernel-2.6.32-279.22.1.el6.src.rpm




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //