Skip to navigation

Security Advisory Important: kernel security, bug fix, and enhancement update

Advisory: RHSA-2011:0498-1
Type: Security Advisory
Severity: Important
Issued on: 2011-05-10
Last updated on: 2011-05-10
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.0.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2010-4250
CVE-2010-4565
CVE-2010-4649
CVE-2011-0006
CVE-2011-0711
CVE-2011-0712
CVE-2011-0726
CVE-2011-1013
CVE-2011-1016
CVE-2011-1019
CVE-2011-1044
CVE-2011-1079
CVE-2011-1080
CVE-2011-1093
CVE-2011-1573

Details

Updated kernel packages that fix several security issues, various bugs, and
add an enhancement are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* An integer overflow flaw in ib_uverbs_poll_cq() could allow a local,
unprivileged user to cause a denial of service or escalate their
privileges. (CVE-2010-4649, Important)

* An integer signedness flaw in drm_modeset_ctl() could allow a local,
unprivileged user to cause a denial of service or escalate their
privileges. (CVE-2011-1013, Important)

* The Radeon GPU drivers in the Linux kernel were missing sanity checks for
the Anti Aliasing (AA) resolve register values which could allow a local,
unprivileged user to cause a denial of service or escalate their privileges
on systems using a graphics card from the ATI Radeon R300, R400, or R500
family of cards. (CVE-2011-1016, Important)

* A flaw in dccp_rcv_state_process() could allow a remote attacker to
cause a denial of service, even when the socket was already closed.
(CVE-2011-1093, Important)

* A flaw in the Linux kernel's Stream Control Transmission Protocol (SCTP)
implementation could allow a remote attacker to cause a denial of service
if the sysctl "net.sctp.addip_enable" and "auth_enable" variables were
turned on (they are off by default). (CVE-2011-1573, Important)

* A memory leak in the inotify_init() system call. In some cases, it could
leak a group, which could allow a local, unprivileged user to eventually
cause a denial of service. (CVE-2010-4250, Moderate)

* A missing validation of a null-terminated string data structure element
in bnep_sock_ioctl() could allow a local user to cause an information leak
or a denial of service. (CVE-2011-1079, Moderate)

* An information leak in bcm_connect() in the Controller Area Network (CAN)
Broadcast Manager implementation could allow a local, unprivileged user to
leak kernel mode addresses in "/proc/net/can-bcm". (CVE-2010-4565, Low)

* A flaw was found in the Linux kernel's Integrity Measurement Architecture
(IMA) implementation. When SELinux was disabled, adding an IMA rule which
was supposed to be processed by SELinux would cause ima_match_rules() to
always succeed, ignoring any remaining rules. (CVE-2011-0006, Low)

* A missing initialization flaw in the XFS file system implementation could
lead to an information leak. (CVE-2011-0711, Low)

* Buffer overflow flaws in snd_usb_caiaq_audio_init() and
snd_usb_caiaq_midi_init() could allow a local, unprivileged user with
access to a Native Instruments USB audio device to cause a denial of
service or escalate their privileges. (CVE-2011-0712, Low)

* The start_code and end_code values in "/proc/[pid]/stat" were not
protected. In certain scenarios, this flaw could be used to defeat Address
Space Layout Randomization (ASLR). (CVE-2011-0726, Low)

* A flaw in dev_load() could allow a local user who has the CAP_NET_ADMIN
capability to load arbitrary modules from "/lib/modules/", instead of only
netdev modules. (CVE-2011-1019, Low)

* A flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to
cause an information leak. (CVE-2011-1044, Low)

* A missing validation of a null-terminated string data structure element
in do_replace() could allow a local user who has the CAP_NET_ADMIN
capability to cause an information leak. (CVE-2011-1080, Low)

Red Hat would like to thank Vegard Nossum for reporting CVE-2010-4250;
Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1019, and
CVE-2011-1080; Dan Rosenberg for reporting CVE-2010-4565 and CVE-2011-0711;
Rafael Dominguez Vega for reporting CVE-2011-0712; and Kees Cook for
reporting CVE-2011-0726.

This update also fixes various bugs and adds an enhancement. Documentation
for these changes will be available shortly from the Technical Notes
document linked to in the References section.

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues, and fix the bugs and add the enhancement
noted in the Technical Notes. The system must be rebooted for this update
to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kernel-2.6.32-71.29.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6acc88bbec2c6398ea195e8fb3b8458
SHA-256: cb0d78364d5a973c10852166261248157c82e15547d4a148993f88cd0274a945
 
IA-32:
kernel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c808cd036af5f7a3d0093665bbe8a3df
SHA-256: c09fd2efb43e4b87717c0ef4a7146576ec8f907d6366434d802f612b429dfde6
kernel-debug-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 616e9acf106da3bcd4d58637e15a0b49
SHA-256: d4391efb64487dde857fcb404cb4b67ceb1d70757afdeea0a7fdd905a813c274
kernel-debug-debuginfo-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3ee2a63e14110f448f6c5ecfa57fa75c
SHA-256: 4d261e90eb61e5ef545f4c1b174d8f009415a2e69efd29c88ab95826545dfc02
kernel-debug-devel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ea1a338fdbaa65660dc180aec1181f33
SHA-256: ae2c11b2462d6e5da868c97c62de0c40902a9dfd07922273067b06052630d37b
kernel-debuginfo-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0934f3c001e838e2181a36513be51052
SHA-256: a25aa40d2363ac00152ec4ff6f1b889889e50ae3bc8442a0ee0e0515b3d65a3e
kernel-debuginfo-common-i686-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 63c4ae0fa205baf684596fa0aebaf986
SHA-256: 15cd8c5b2283c924e63378fd8bda8dec767d2caaa09f914a69d65f5243fdbe21
kernel-devel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 62b53cadf545cf3d1c2dbec67ed335b6
SHA-256: ed1359721c18d246d56bdec20890216c8fa5a95fa3c0b11b71b49d081d2bbd82
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 48764798bdf03c708ac7876b64365c8e
SHA-256: 4e367f0a176caf3f3de989c9fdb8000247115af402973840b053fe9144124e72
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
x86_64:
kernel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 878102babd1f13fd78bd6523148e1b92
SHA-256: 2b8bda9d9db794cad93edd1dce4fa108110bc22c438cb344e581d64b2d2509e5
kernel-debug-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 60a9984cd56b89b5cec5952b1a8955b9
SHA-256: a45e07d53bf380282155c0def43bcf8fd372d2188cafb73995f9e9e1cde3267d
kernel-debug-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5bb70a54282bfe58778bebb7ad0c63cc
SHA-256: f1769cee7f808d7ff72f3de87fe93022835506d8d28bf90c10d6428e9812aba5
kernel-debug-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 98936b6c7097d578761dfd5671d97b17
SHA-256: 0e77b473a071aff04df4d9757b9a4560ff77633bf5e08b65dd5471aedd98823c
kernel-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9583e22dd7de79470d9018af3d3a100b
SHA-256: d6b38f4fc957484e17ba8b81d9d6cc340fcc060b776290606b73e663ed492b5b
kernel-debuginfo-common-x86_64-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6dd09e40faf2b919fe15c5ae8f89bbe5
SHA-256: 713fdb88f4917a9a0391eaf19262658d68b2942cfd542a9df6525a5d77d7b9bb
kernel-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 30dc11be229f4f1798512f70628c1ee1
SHA-256: dbef5dd4d32b7f66ce3854151c525dffd01e4087d1f2ae88ce2a29a5ba8019ff
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2128d1261090670cedac0a5ef2fa58d8
SHA-256: 1aebf9f684567abf55136f195a04a52891f26a78cf9b8e2a68f2ea1fdd9ddfad
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kernel-2.6.32-71.29.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6acc88bbec2c6398ea195e8fb3b8458
SHA-256: cb0d78364d5a973c10852166261248157c82e15547d4a148993f88cd0274a945
 
x86_64:
kernel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 878102babd1f13fd78bd6523148e1b92
SHA-256: 2b8bda9d9db794cad93edd1dce4fa108110bc22c438cb344e581d64b2d2509e5
kernel-debug-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 60a9984cd56b89b5cec5952b1a8955b9
SHA-256: a45e07d53bf380282155c0def43bcf8fd372d2188cafb73995f9e9e1cde3267d
kernel-debug-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5bb70a54282bfe58778bebb7ad0c63cc
SHA-256: f1769cee7f808d7ff72f3de87fe93022835506d8d28bf90c10d6428e9812aba5
kernel-debug-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 98936b6c7097d578761dfd5671d97b17
SHA-256: 0e77b473a071aff04df4d9757b9a4560ff77633bf5e08b65dd5471aedd98823c
kernel-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9583e22dd7de79470d9018af3d3a100b
SHA-256: d6b38f4fc957484e17ba8b81d9d6cc340fcc060b776290606b73e663ed492b5b
kernel-debuginfo-common-x86_64-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6dd09e40faf2b919fe15c5ae8f89bbe5
SHA-256: 713fdb88f4917a9a0391eaf19262658d68b2942cfd542a9df6525a5d77d7b9bb
kernel-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 30dc11be229f4f1798512f70628c1ee1
SHA-256: dbef5dd4d32b7f66ce3854151c525dffd01e4087d1f2ae88ce2a29a5ba8019ff
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2128d1261090670cedac0a5ef2fa58d8
SHA-256: 1aebf9f684567abf55136f195a04a52891f26a78cf9b8e2a68f2ea1fdd9ddfad
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kernel-2.6.32-71.29.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6acc88bbec2c6398ea195e8fb3b8458
SHA-256: cb0d78364d5a973c10852166261248157c82e15547d4a148993f88cd0274a945
 
IA-32:
kernel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c808cd036af5f7a3d0093665bbe8a3df
SHA-256: c09fd2efb43e4b87717c0ef4a7146576ec8f907d6366434d802f612b429dfde6
kernel-debug-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 616e9acf106da3bcd4d58637e15a0b49
SHA-256: d4391efb64487dde857fcb404cb4b67ceb1d70757afdeea0a7fdd905a813c274
kernel-debug-debuginfo-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3ee2a63e14110f448f6c5ecfa57fa75c
SHA-256: 4d261e90eb61e5ef545f4c1b174d8f009415a2e69efd29c88ab95826545dfc02
kernel-debug-devel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ea1a338fdbaa65660dc180aec1181f33
SHA-256: ae2c11b2462d6e5da868c97c62de0c40902a9dfd07922273067b06052630d37b
kernel-debuginfo-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0934f3c001e838e2181a36513be51052
SHA-256: a25aa40d2363ac00152ec4ff6f1b889889e50ae3bc8442a0ee0e0515b3d65a3e
kernel-debuginfo-common-i686-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 63c4ae0fa205baf684596fa0aebaf986
SHA-256: 15cd8c5b2283c924e63378fd8bda8dec767d2caaa09f914a69d65f5243fdbe21
kernel-devel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 62b53cadf545cf3d1c2dbec67ed335b6
SHA-256: ed1359721c18d246d56bdec20890216c8fa5a95fa3c0b11b71b49d081d2bbd82
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 48764798bdf03c708ac7876b64365c8e
SHA-256: 4e367f0a176caf3f3de989c9fdb8000247115af402973840b053fe9144124e72
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
PPC:
kernel-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8f719cf076f1b6d81dfa38824dfc1d76
SHA-256: 387337dc1717692a3bc69900186520a56c8eb2ef0c88bb801c51209cacb57e2d
kernel-bootwrapper-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 7b39f99a3781042fedca58391d234a6d
SHA-256: aaeda2a1f2131e5c45780674a2312ca87b68e6ac27fb6c7925e6c3b8e3b00b5f
kernel-debug-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: ea394f6d57eb226fe37ab20690cb09c8
SHA-256: 2b59bea0c61ec1b39ba96b271fbc26ceaf00ba20fecc407b649302ba5a3c6f14
kernel-debug-debuginfo-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8b5da545a50dbdb066b2a92f21430ba0
SHA-256: bcae9827cd60ef4d2537d317ad75f617c19aab58c5e0285976fb046193b91dd3
kernel-debug-devel-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9a3543bc0e9986ffe669c37ff3402ac6
SHA-256: 1520e25f41a6ebd9ebcce8b7c377ea74ea5b88b8cc961f50544ec23123df168a
kernel-debuginfo-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3fdd7a453250c1cd3ba946c8ccfa6771
SHA-256: bb123843eb2850aa0db934fe3de15d298d9b0ded5a328aad52fd22a50cfdec43
kernel-debuginfo-common-ppc64-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4bc6ffdbedd18484ad99d66e25da6425
SHA-256: 57564d8ddc3d2ef53e5b2254bd539854653adbb2fae673b620dd27683f6f97d2
kernel-devel-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5db1b7b917bd9a99a175d4aa9dc836b5
SHA-256: 39e87ad0bf5c7d47dbf5ce09f8314ddd9b3d77165a09527bf135227dd1c112d6
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f968c4d6f2f743b9daab2b6bcf158f1b
SHA-256: 8c87eb4a51b57a9bf5dbc20b655c199fd0b46335e403c8a6ced8150d1ecaef81
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
s390x:
kernel-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 156155f0abc6c5b8eb3e8943d2416619
SHA-256: 6178a064f48a7db299940397eeee125228122eeb8629334b03f46e11d38e6a83
kernel-debug-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 94c0443dd78456001780b56daf3d2dde
SHA-256: e3c3c03cc07e1332e0c62bc46e94f3367f4ad6203ee3b816ab83f9af6a53039a
kernel-debug-debuginfo-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 33974cfdeaf57b843540fb46352d0ee1
SHA-256: 68ce8a921f8d3baaa362c4d6cb5b7f006737cc7051f0764e14b61f0b7bbad5d9
kernel-debug-devel-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 80ae6910f0a6004194c0353aeac965f8
SHA-256: e58e5d55109e158139bfea4743601ec0577a8cd3378b6e31e5f544d351de1661
kernel-debuginfo-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 33f5fe47004bb316f06f2d0241267d44
SHA-256: 3aa7633180bc235a6e85b4b99a819f253e4f6b9537a8a7e3ab4cdedc1f03ef8c
kernel-debuginfo-common-s390x-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6c5edb23c9f899a7478024c557a906f7
SHA-256: 172831baee17373a4db777f1c661eabd76547603ac797b43d204ccacf121d6f9
kernel-devel-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 14cc2eb99fdf168e0166a8ca30db16e1
SHA-256: 34d60abb1585fdf96b377666a9494c8b73666f2a363c7751e7d1e1a7e3aadfec
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 02457b33f2f6fdc804bb70c59eaa2d1e
SHA-256: 90bdb16ae4e52f4c2b54d457ac47b9f56dab12f97a33b9313eae32931adca4ea
kernel-kdump-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: a8ab4de3738e7063e3ca7ad57943b235
SHA-256: d12a38e0c974e820488ed17ef5f60d7e923a497a000f6446dd54d58d4e22c102
kernel-kdump-debuginfo-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: c4925392d97097bf7da640b2e5da6321
SHA-256: a75b22a0894a380d251b753a0538e407ebfda755bef2b962f46b3db10455abec
kernel-kdump-devel-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 40ed7061911a44eea7ddd56bd0d77273
SHA-256: 58e459582722af631df53f8b619344dadc216d8e6129d40898d64229253b2d44
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
x86_64:
kernel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 878102babd1f13fd78bd6523148e1b92
SHA-256: 2b8bda9d9db794cad93edd1dce4fa108110bc22c438cb344e581d64b2d2509e5
kernel-debug-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 60a9984cd56b89b5cec5952b1a8955b9
SHA-256: a45e07d53bf380282155c0def43bcf8fd372d2188cafb73995f9e9e1cde3267d
kernel-debug-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5bb70a54282bfe58778bebb7ad0c63cc
SHA-256: f1769cee7f808d7ff72f3de87fe93022835506d8d28bf90c10d6428e9812aba5
kernel-debug-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 98936b6c7097d578761dfd5671d97b17
SHA-256: 0e77b473a071aff04df4d9757b9a4560ff77633bf5e08b65dd5471aedd98823c
kernel-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9583e22dd7de79470d9018af3d3a100b
SHA-256: d6b38f4fc957484e17ba8b81d9d6cc340fcc060b776290606b73e663ed492b5b
kernel-debuginfo-common-x86_64-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6dd09e40faf2b919fe15c5ae8f89bbe5
SHA-256: 713fdb88f4917a9a0391eaf19262658d68b2942cfd542a9df6525a5d77d7b9bb
kernel-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 30dc11be229f4f1798512f70628c1ee1
SHA-256: dbef5dd4d32b7f66ce3854151c525dffd01e4087d1f2ae88ce2a29a5ba8019ff
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2128d1261090670cedac0a5ef2fa58d8
SHA-256: 1aebf9f684567abf55136f195a04a52891f26a78cf9b8e2a68f2ea1fdd9ddfad
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
Red Hat Enterprise Linux Server EUS (v. 6.0.z)

SRPMS:
kernel-2.6.32-71.29.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6acc88bbec2c6398ea195e8fb3b8458
SHA-256: cb0d78364d5a973c10852166261248157c82e15547d4a148993f88cd0274a945
 
IA-32:
kernel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: c808cd036af5f7a3d0093665bbe8a3df
SHA-256: c09fd2efb43e4b87717c0ef4a7146576ec8f907d6366434d802f612b429dfde6
kernel-debug-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 616e9acf106da3bcd4d58637e15a0b49
SHA-256: d4391efb64487dde857fcb404cb4b67ceb1d70757afdeea0a7fdd905a813c274
kernel-debug-debuginfo-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 3ee2a63e14110f448f6c5ecfa57fa75c
SHA-256: 4d261e90eb61e5ef545f4c1b174d8f009415a2e69efd29c88ab95826545dfc02
kernel-debug-devel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: ea1a338fdbaa65660dc180aec1181f33
SHA-256: ae2c11b2462d6e5da868c97c62de0c40902a9dfd07922273067b06052630d37b
kernel-debuginfo-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 0934f3c001e838e2181a36513be51052
SHA-256: a25aa40d2363ac00152ec4ff6f1b889889e50ae3bc8442a0ee0e0515b3d65a3e
kernel-debuginfo-common-i686-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 63c4ae0fa205baf684596fa0aebaf986
SHA-256: 15cd8c5b2283c924e63378fd8bda8dec767d2caaa09f914a69d65f5243fdbe21
kernel-devel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 62b53cadf545cf3d1c2dbec67ed335b6
SHA-256: ed1359721c18d246d56bdec20890216c8fa5a95fa3c0b11b71b49d081d2bbd82
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 48764798bdf03c708ac7876b64365c8e
SHA-256: 4e367f0a176caf3f3de989c9fdb8000247115af402973840b053fe9144124e72
perf-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
PPC:
kernel-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 8f719cf076f1b6d81dfa38824dfc1d76
SHA-256: 387337dc1717692a3bc69900186520a56c8eb2ef0c88bb801c51209cacb57e2d
kernel-bootwrapper-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 7b39f99a3781042fedca58391d234a6d
SHA-256: aaeda2a1f2131e5c45780674a2312ca87b68e6ac27fb6c7925e6c3b8e3b00b5f
kernel-debug-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: ea394f6d57eb226fe37ab20690cb09c8
SHA-256: 2b59bea0c61ec1b39ba96b271fbc26ceaf00ba20fecc407b649302ba5a3c6f14
kernel-debug-debuginfo-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 8b5da545a50dbdb066b2a92f21430ba0
SHA-256: bcae9827cd60ef4d2537d317ad75f617c19aab58c5e0285976fb046193b91dd3
kernel-debug-devel-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 9a3543bc0e9986ffe669c37ff3402ac6
SHA-256: 1520e25f41a6ebd9ebcce8b7c377ea74ea5b88b8cc961f50544ec23123df168a
kernel-debuginfo-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 3fdd7a453250c1cd3ba946c8ccfa6771
SHA-256: bb123843eb2850aa0db934fe3de15d298d9b0ded5a328aad52fd22a50cfdec43
kernel-debuginfo-common-ppc64-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 4bc6ffdbedd18484ad99d66e25da6425
SHA-256: 57564d8ddc3d2ef53e5b2254bd539854653adbb2fae673b620dd27683f6f97d2
kernel-devel-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 5db1b7b917bd9a99a175d4aa9dc836b5
SHA-256: 39e87ad0bf5c7d47dbf5ce09f8314ddd9b3d77165a09527bf135227dd1c112d6
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: f968c4d6f2f743b9daab2b6bcf158f1b
SHA-256: 8c87eb4a51b57a9bf5dbc20b655c199fd0b46335e403c8a6ced8150d1ecaef81
perf-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
s390x:
kernel-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 156155f0abc6c5b8eb3e8943d2416619
SHA-256: 6178a064f48a7db299940397eeee125228122eeb8629334b03f46e11d38e6a83
kernel-debug-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 94c0443dd78456001780b56daf3d2dde
SHA-256: e3c3c03cc07e1332e0c62bc46e94f3367f4ad6203ee3b816ab83f9af6a53039a
kernel-debug-debuginfo-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 33974cfdeaf57b843540fb46352d0ee1
SHA-256: 68ce8a921f8d3baaa362c4d6cb5b7f006737cc7051f0764e14b61f0b7bbad5d9
kernel-debug-devel-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 80ae6910f0a6004194c0353aeac965f8
SHA-256: e58e5d55109e158139bfea4743601ec0577a8cd3378b6e31e5f544d351de1661
kernel-debuginfo-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 33f5fe47004bb316f06f2d0241267d44
SHA-256: 3aa7633180bc235a6e85b4b99a819f253e4f6b9537a8a7e3ab4cdedc1f03ef8c
kernel-debuginfo-common-s390x-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 6c5edb23c9f899a7478024c557a906f7
SHA-256: 172831baee17373a4db777f1c661eabd76547603ac797b43d204ccacf121d6f9
kernel-devel-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 14cc2eb99fdf168e0166a8ca30db16e1
SHA-256: 34d60abb1585fdf96b377666a9494c8b73666f2a363c7751e7d1e1a7e3aadfec
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 02457b33f2f6fdc804bb70c59eaa2d1e
SHA-256: 90bdb16ae4e52f4c2b54d457ac47b9f56dab12f97a33b9313eae32931adca4ea
kernel-kdump-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: a8ab4de3738e7063e3ca7ad57943b235
SHA-256: d12a38e0c974e820488ed17ef5f60d7e923a497a000f6446dd54d58d4e22c102
kernel-kdump-debuginfo-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: c4925392d97097bf7da640b2e5da6321
SHA-256: a75b22a0894a380d251b753a0538e407ebfda755bef2b962f46b3db10455abec
kernel-kdump-devel-2.6.32-71.29.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 40ed7061911a44eea7ddd56bd0d77273
SHA-256: 58e459582722af631df53f8b619344dadc216d8e6129d40898d64229253b2d44
perf-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
x86_64:
kernel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 878102babd1f13fd78bd6523148e1b92
SHA-256: 2b8bda9d9db794cad93edd1dce4fa108110bc22c438cb344e581d64b2d2509e5
kernel-debug-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 60a9984cd56b89b5cec5952b1a8955b9
SHA-256: a45e07d53bf380282155c0def43bcf8fd372d2188cafb73995f9e9e1cde3267d
kernel-debug-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 5bb70a54282bfe58778bebb7ad0c63cc
SHA-256: f1769cee7f808d7ff72f3de87fe93022835506d8d28bf90c10d6428e9812aba5
kernel-debug-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 98936b6c7097d578761dfd5671d97b17
SHA-256: 0e77b473a071aff04df4d9757b9a4560ff77633bf5e08b65dd5471aedd98823c
kernel-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 9583e22dd7de79470d9018af3d3a100b
SHA-256: d6b38f4fc957484e17ba8b81d9d6cc340fcc060b776290606b73e663ed492b5b
kernel-debuginfo-common-x86_64-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 6dd09e40faf2b919fe15c5ae8f89bbe5
SHA-256: 713fdb88f4917a9a0391eaf19262658d68b2942cfd542a9df6525a5d77d7b9bb
kernel-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 30dc11be229f4f1798512f70628c1ee1
SHA-256: dbef5dd4d32b7f66ce3854151c525dffd01e4087d1f2ae88ce2a29a5ba8019ff
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 2128d1261090670cedac0a5ef2fa58d8
SHA-256: 1aebf9f684567abf55136f195a04a52891f26a78cf9b8e2a68f2ea1fdd9ddfad
perf-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kernel-2.6.32-71.29.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6acc88bbec2c6398ea195e8fb3b8458
SHA-256: cb0d78364d5a973c10852166261248157c82e15547d4a148993f88cd0274a945
 
IA-32:
kernel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c808cd036af5f7a3d0093665bbe8a3df
SHA-256: c09fd2efb43e4b87717c0ef4a7146576ec8f907d6366434d802f612b429dfde6
kernel-debug-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 616e9acf106da3bcd4d58637e15a0b49
SHA-256: d4391efb64487dde857fcb404cb4b67ceb1d70757afdeea0a7fdd905a813c274
kernel-debug-debuginfo-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3ee2a63e14110f448f6c5ecfa57fa75c
SHA-256: 4d261e90eb61e5ef545f4c1b174d8f009415a2e69efd29c88ab95826545dfc02
kernel-debug-devel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ea1a338fdbaa65660dc180aec1181f33
SHA-256: ae2c11b2462d6e5da868c97c62de0c40902a9dfd07922273067b06052630d37b
kernel-debuginfo-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0934f3c001e838e2181a36513be51052
SHA-256: a25aa40d2363ac00152ec4ff6f1b889889e50ae3bc8442a0ee0e0515b3d65a3e
kernel-debuginfo-common-i686-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 63c4ae0fa205baf684596fa0aebaf986
SHA-256: 15cd8c5b2283c924e63378fd8bda8dec767d2caaa09f914a69d65f5243fdbe21
kernel-devel-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 62b53cadf545cf3d1c2dbec67ed335b6
SHA-256: ed1359721c18d246d56bdec20890216c8fa5a95fa3c0b11b71b49d081d2bbd82
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 48764798bdf03c708ac7876b64365c8e
SHA-256: 4e367f0a176caf3f3de989c9fdb8000247115af402973840b053fe9144124e72
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
x86_64:
kernel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 878102babd1f13fd78bd6523148e1b92
SHA-256: 2b8bda9d9db794cad93edd1dce4fa108110bc22c438cb344e581d64b2d2509e5
kernel-debug-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 60a9984cd56b89b5cec5952b1a8955b9
SHA-256: a45e07d53bf380282155c0def43bcf8fd372d2188cafb73995f9e9e1cde3267d
kernel-debug-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5bb70a54282bfe58778bebb7ad0c63cc
SHA-256: f1769cee7f808d7ff72f3de87fe93022835506d8d28bf90c10d6428e9812aba5
kernel-debug-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 98936b6c7097d578761dfd5671d97b17
SHA-256: 0e77b473a071aff04df4d9757b9a4560ff77633bf5e08b65dd5471aedd98823c
kernel-debuginfo-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9583e22dd7de79470d9018af3d3a100b
SHA-256: d6b38f4fc957484e17ba8b81d9d6cc340fcc060b776290606b73e663ed492b5b
kernel-debuginfo-common-x86_64-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6dd09e40faf2b919fe15c5ae8f89bbe5
SHA-256: 713fdb88f4917a9a0391eaf19262658d68b2942cfd542a9df6525a5d77d7b9bb
kernel-devel-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 30dc11be229f4f1798512f70628c1ee1
SHA-256: dbef5dd4d32b7f66ce3854151c525dffd01e4087d1f2ae88ce2a29a5ba8019ff
kernel-doc-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f096d072e0a2d8fd1babce65496a751e
SHA-256: 7bfdced6d8af9432cb627e8a7c44d73d066ca54553eccd58b5ebc54f430ccec3
kernel-firmware-2.6.32-71.29.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6ba97dd3026866f6b4e0aea95b243620
SHA-256: 0bd93b4366d7cfc0835c61f11ae055d8af35aacb9f43c06c06a20d0b9b5928fc
kernel-headers-2.6.32-71.29.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2128d1261090670cedac0a5ef2fa58d8
SHA-256: 1aebf9f684567abf55136f195a04a52891f26a78cf9b8e2a68f2ea1fdd9ddfad
perf-2.6.32-71.29.1.el6.noarch.rpm     MD5: 94bd37c68d4c3390df32339736e1b5ef
SHA-256: 03ea387a741068300019c8230dd12c3ea3c034ea74861b87cd58054b080ba182
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

656830 - CVE-2010-4250 kernel: inotify memory leak
664544 - CVE-2010-4565 kernel: CAN info leak
667912 - CVE-2011-0006 kernel: ima: fix add LSM rule bug
667916 - CVE-2010-4649 CVE-2011-1044 kernel: IB/uverbs: Handle large number of entries in poll CQ
670850 - [6.0] System reset when changing EFI variable on large memory system [rhel-6.0.z]
677260 - CVE-2011-0711 kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1
677881 - CVE-2011-0712 kernel: ALSA: caiaq - Fix possible string-buffer overflow
679925 - CVE-2011-1013 kernel: drm_modeset_ctl signedness issue
680000 - CVE-2011-1016 kernel: drm/radeon/kms: check AA resolve registers on r300
680360 - CVE-2011-1019 kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN
681260 - CVE-2011-1079 kernel: bnep device field missing NULL terminator
681262 - CVE-2011-1080 kernel: ebtables stack infoleak
682954 - CVE-2011-1093 kernel: dccp: fix oops on Reset after close
683810 - [6.1] Common code infrastructure for VLAN null tagging [rhel-6.0.z]
684275 - kernel: BUG: warning at drivers/char/tty_audit.c:55/tty_audit_buf_free() [rhel-6.0.z]
684569 - CVE-2011-0726 kernel: proc: protect mm start_code/end_code in /proc/pid/stat
691777 - Bonded and vlan tagged network does not work in KVM guest [rhel-6.0.z]
694073 - 82576 stuck after PCI AER error [rhel-6.0.z]
694186 - kswapd0 100% [rhel-6.0.z]
695383 - CVE-2011-1573 kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set
696889 - emc_clariion error handler panics with multiple failures [rhel-6.0.z]
698109 - Bond interface flapping and increasing rx_missed_errors [rhel-6.0.z]


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/