Risks
Advisories
Browse
or
or
CentOS Errata and Security Advisory - Important CentOS 6 kernel Update (CESA-2013:0830)
CentOS Errata and Security Advisory 2013:0830 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0830.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
d6c94ff701e9d6772f164e87df48073eb7fc3ccbc5ec23bf27d59d084066b912 
kernel-2.6.32-358.6.2.el6.i686.rpm
68728b5f77c56b745477478fe9decc6245a9015cbf1d9a2c54c868606be9d010 
kernel-debug-2.6.32-358.6.2.el6.i686.rpm
c862327110fa5efb09031a4618347d0a78d117c1482bf69c50423464e7d351d7 
kernel-debug-devel-2.6.32-358.6.2.el6.i686.rpm
60d3d223fd5185bd7f9ee24bb8492dfef3cfe07bb6751542f240c351855c11d8 
kernel-devel-2.6.32-358.6.2.el6.i686.rpm
e1fc1dd9210cda92fd773c05a796008ed481b61d3e99bdef601e87c1d0451ef2 
kernel-doc-2.6.32-358.6.2.el6.noarch.rpm
59f2d900bce7aeb443f72f00b9a8febed3a6e53f05e7668ef8cb42df5a03ac7f 
kernel-firmware-2.6.32-358.6.2.el6.noarch.rpm
e4b4d7e137ff7ee822cacc67d4e01bdbbdd0e87ce8688564274f1a2df361e419 
kernel-headers-2.6.32-358.6.2.el6.i686.rpm
c30d700ed6271a2d88d261c5002b1185beeeffb10cbc44c740d89f19e9b37231 
perf-2.6.32-358.6.2.el6.i686.rpm
cf4da5b6bac241b0836ba8330845d04a2d498982e1f294c3c403d962930f9fc7 
python-perf-2.6.32-358.6.2.el6.i686.rpm

x86_64:
edc9ee434ce217fcca48ccfc6fa6a0378bd39f531da1ca3a0be7fef8f0373ffb 
kernel-2.6.32-358.6.2.el6.x86_64.rpm
355e8fadb8450359940a9008ac7700a3aebf8984bd7f1516fb7f68b6f1c33a04 
kernel-debug-2.6.32-358.6.2.el6.x86_64.rpm
d9c0ccfc888ac4a922ca8b59418b75c588bddad145e030b3dd31924db3e6d576 
kernel-debug-devel-2.6.32-358.6.2.el6.x86_64.rpm
a97cff3f2aa6d5169cca4464eeea5d0efd14c9d57fd65175a5ce91450f1d1448 
kernel-devel-2.6.32-358.6.2.el6.x86_64.rpm
e1fc1dd9210cda92fd773c05a796008ed481b61d3e99bdef601e87c1d0451ef2 
kernel-doc-2.6.32-358.6.2.el6.noarch.rpm
59f2d900bce7aeb443f72f00b9a8febed3a6e53f05e7668ef8cb42df5a03ac7f 
kernel-firmware-2.6.32-358.6.2.el6.noarch.rpm
a6d5cba3af49028f5dab732ce29d618b49e4d9191e948febe8dfca6b83d5d821 
kernel-headers-2.6.32-358.6.2.el6.x86_64.rpm
3ce8c55f629e5e40033c5b34ab22eea770124df86050de7920fb4e7ac02dd4d6 
perf-2.6.32-358.6.2.el6.x86_64.rpm
94965c8a82fc3330fa572bff243ff20513446d4a2daabc8314f8f5e69b3e7d4b 
python-perf-2.6.32-358.6.2.el6.x86_64.rpm

Source:
c36c02aa994327cf9d0724117240ddb5b4b89073f19b2ed83f78336c98552310 
kernel-2.6.32-358.6.2.el6.src.rpm




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //