Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2013:1026-1
Type: Security Advisory
Severity: Important
Issued on: 2013-07-09
Last updated on: 2013-07-09
Affected Products: Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
CVEs (cve.mitre.org): CVE-2013-1773
CVE-2013-1796
CVE-2013-1797
CVE-2013-1798
CVE-2013-1848

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A buffer overflow flaw was found in the way UTF-8 characters were
converted to UTF-16 in the utf8s_to_utf16s() function of the Linux kernel's
FAT file system implementation. A local user able to mount a FAT file
system with the "utf8=1" option could use this flaw to crash the system or,
potentially, to escalate their privileges. (CVE-2013-1773, Important)

* A flaw was found in the way KVM (Kernel-based Virtual Machine) handled
guest time updates when the buffer the guest registered by writing to the
MSR_KVM_SYSTEM_TIME machine state register (MSR) crossed a page boundary. A
privileged guest user could use this flaw to crash the host or,
potentially, escalate their privileges, allowing them to execute arbitrary
code at the host kernel level. (CVE-2013-1796, Important)

* A potential use-after-free flaw was found in the way KVM handled guest
time updates when the GPA (guest physical address) the guest registered by
writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) fell into a
movable or removable memory region of the hosting user-space process (by
default, QEMU-KVM) on the host. If that memory region is deregistered from
KVM using KVM_SET_USER_MEMORY_REGION and the allocated virtual memory
reused, a privileged guest user could potentially use this flaw to escalate
their privileges on the host. (CVE-2013-1797, Important)

* A flaw was found in the way KVM emulated IOAPIC (I/O Advanced
Programmable Interrupt Controller). A missing validation check in the
ioapic_read_indirect() function could allow a privileged guest user to
crash the host, or read a substantial portion of host kernel memory.
(CVE-2013-1798, Important)

* A format string flaw was found in the ext3_msg() function in the Linux
kernel's ext3 file system implementation. A local user who is able to mount
an ext3 file system could use this flaw to cause a denial of service or,
potentially, escalate their privileges. (CVE-2013-1848, Low)

Red Hat would like to thank Andrew Honig of Google for reporting
CVE-2013-1796, CVE-2013-1797, and CVE-2013-1798.

This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kernel-2.6.32-220.39.1.el6.src.rpm
File outdated by:  RHBA-2014:0006
    MD5: 574c22f914ad06ab8f55fd6ac1c8e575
SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
 
x86_64:
kernel-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 09f7d1b0fa36af02f525e97fb4fc42d4
SHA-256: 5031fe6f72f12d7f6217e8e28c4647ce1118c1435ff0ea79cc811df1df90c0a2
kernel-debug-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 0ba5400cfe15fec4b06a2f4ce682c541
SHA-256: ab70ac75cb7e1eba98bcee437304cb748283d8f772271f93d66d419733927d72
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: d464a46429d1c2cdc6a6ae6c7b8477fc
SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-devel-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 96cf0fb2305741356638118877f5c3d9
SHA-256: 15d8e93a42b851f025e5098ae1b2ec477de956c848d3f19dbce8fb18a8999a2c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 7f878b92491ef5ac3b62bc7bf9bdddc6
SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 285ba8d7cc69299bc1a3279138efc852
SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-devel-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: ef90c3c2bc67741c991bbbeb446edc6a
SHA-256: 93dd2a18138730b6ff58dde7e6210dedfeb3d6a91f101a1bed06a3a9bf502d5e
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0362
    MD5: 2170b459f3504cdbc5730cb9469bc96a
SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0362
    MD5: 4330baa33a2467506d2139510719d163
SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 05584df750b6724b3c302245eb50387d
SHA-256: cdcc5487c1efda48a4b28c293327a400607a5e8d60ecb6c0c3ad888c052e9ab2
perf-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: f7cd8b8247ac5cbb35e84192eee74d66
SHA-256: f1b8cbc00394736e854cc5b850f6f4a2bc152ed054bc3424ee0fecb5dab73b76
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: c4a8ea652768dff5aba8a723ed5d0b2b
SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
python-perf-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 34aaedbcd391575f53dcd1700c5399fa
SHA-256: cfc333fa84bb7e1c751b75b144e4305df5cf25495a3f455903d015363428bd08
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: e157f0be65ad90d283d949d53f7da207
SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
kernel-2.6.32-220.39.1.el6.src.rpm
File outdated by:  RHBA-2014:0006
    MD5: 574c22f914ad06ab8f55fd6ac1c8e575
SHA-256: dc458d69a13ce543b08b83a1d9998b526cda469b35d6ecd2e52a3d3771e2b0a8
 
IA-32:
kernel-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 2ddcd240deab04d0d91113352ee13a32
SHA-256: ca259d737ccdcb9ad33f20d8b25b569557849c50585a00769878d8d1659ee592
kernel-debug-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 13e54b1d51de30b597589ae5c30d0a34
SHA-256: db465394456e3ab41b550764457d9fa60a6abe62c824b60636e9faf6ad8d2951
kernel-debug-debuginfo-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: f1f7f289184678dedfb4538b59c6e2b4
SHA-256: cc7d312496065d80f18583a72eec0eced42fb73f4a3bf208f5565923b50175a7
kernel-debug-devel-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 52131bb321e4049b3626dd684b5b7dc6
SHA-256: 51d7388bf50480a979fbe84a50f71c67a9deabce811bc04ac6e66446affc26c5
kernel-debuginfo-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9928a5b7230842a9d1be4a5095b1ff42
SHA-256: ddf64341750f8e1bbeb762f5eafe09b23624bfbb15c8d6c612ab08834f89c4ec
kernel-debuginfo-common-i686-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 8ad83bd5ea4647c64ab08912d4ebe57f
SHA-256: 8e0c3b90416769a5a559d389de46ca4a4f7e38ecc999862e3d6bc2f963dcf1da
kernel-devel-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 0e1785706f63a18b9bcb79f6f81409dd
SHA-256: 1adebd5983dbb65ac915bc0898bd8b5d139bcbfc64439630240d156d9bf8f10a
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 2170b459f3504cdbc5730cb9469bc96a
SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 4330baa33a2467506d2139510719d163
SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 77c81a95af2bdc097eb7696cdda0853e
SHA-256: 51b06d1d53215540997d23bf850a3297ce5e452a2b70ed647a5ae7cece80087f
perf-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: d71a0dbde0d02fed9665bfa51b3049e5
SHA-256: 33b2c099f5dba9d4778ea14fb46e1a062d18f9a1fbeee898caba4fc28db1f2bf
perf-debuginfo-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: d8229c8d2485fa333499d2100427186f
SHA-256: 49501eab40ad292a4fe11b836efc0b847b09846a279ec9ac29a6b929893df88a
python-perf-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 720171f2c871a13c3d9c9404ae149855
SHA-256: 10c31b66092c48b9719fabab9505212126c5c2aa9b4dcd81ee5bd7c6176b1c36
python-perf-debuginfo-2.6.32-220.39.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 6d324558257c3270ede07d877c51d481
SHA-256: 82d90f2e49182750749916146090b3ba702f5cd0a1e6726fde27469040a31b8b
 
PPC:
kernel-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 0706fbb3c00c14d07cd4761923d6ee42
SHA-256: 7a37bfea46cbd1b4079f1b4e9c3804af41e25550e19d0cc4a92c0b11b47f1545
kernel-bootwrapper-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9c1dc4e62459b5741f96a08d42e1bf8e
SHA-256: 666e9484abad411a41564879bb51edfb37e75f176dcfe45e8783d9d0c43b20e0
kernel-debug-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9bd83ce86252777f65542dfccf77ad7f
SHA-256: 04f991cf2b1234286b8b2a00b156529ed107ca4d6755324d46c1192c3a8f04be
kernel-debug-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: e94517b9f0e206ceebd815bc46c6c868
SHA-256: c4323e9fb009a7edecf22dc4cf03d454443532d86fda88defc338f4680c0d8bd
kernel-debug-devel-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 11e8884b59d0c3aac9b2d88f203150ff
SHA-256: 90514f0419272bb7130d1945298332187ee593a01725882208ed240003665741
kernel-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 2d89a11d7cc45db1887eba36bc649035
SHA-256: 3a8af521d6b46cdb406d12c0ec4d4e3806b1bfbedc234cc170613a09b931780e
kernel-debuginfo-common-ppc64-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9242df8d36327ac6d3660b3dd3e7eb0a
SHA-256: b5b340bdab73f46076183c60ac8216d218b5deed8647cbbfc1c424dcc3d0059c
kernel-devel-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 8b47db2e716fffbf6d45b2369aef277e
SHA-256: 8b1af4c22affccbb34602dcb3be3b23063d0d6619790d8fa0d7bb13b4ab2b3fc
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 2170b459f3504cdbc5730cb9469bc96a
SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 4330baa33a2467506d2139510719d163
SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: ca91eb790215a4a5ee992a76609cd606
SHA-256: b992a0a7b3893f0e431e74383d1dc72ee775f16974bfa2eb8239eff8bc334767
perf-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: a2fa6a30eb89cbb004a661166f058000
SHA-256: 657e0cdaa4e99574af5399fb535da9d7b80437631311d36cd77ce8432da7b01f
perf-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: f51f791d29d7015c80555a15e9d67d65
SHA-256: 04a688308f882739dac05e5d56cb698f26ce1587226866e15904bd663a9e4052
python-perf-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 1aa96d9d2c7314e7ee11e4eb0a4221ea
SHA-256: ac3f42564bb8b47031b0948017c73d97a7a1dcf7956b2c2086fae6095bb4df2f
python-perf-debuginfo-2.6.32-220.39.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 22489cdbf82c896cb3b6c5f6a5386fbb
SHA-256: 630a6b33924c946db949567e160a68f66cd4cbec7c29761d42f5381a24ab7455
 
s390x:
kernel-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 0a289b0ca86f73819175ee8e511cf6fd
SHA-256: 72055b8e9a388f6f213c7ad4db688112c09c6c7c974e6b0eef48cfaef9d58f03
kernel-debug-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: a3355b72b15fc20c8ee66838cb5124af
SHA-256: 880b5eee78b358953494e880c673bf30c77fcc78ed86f68b52f8e2075cd21048
kernel-debug-debuginfo-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7aeb7fc9bf695c16d1e1c37750e3a6c2
SHA-256: ed5212d31da4288f21b027871c871f67f7e8b1b109e4d4d79879ce7f42e36e09
kernel-debug-devel-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 345b93a4f38e8d3c0e51ae1a70fa5d4f
SHA-256: 0e630eb4c11d59725a73b3ebed75b44444cf73de621cf68ff92c7081cf7621eb
kernel-debuginfo-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 597d2cb6db996f53d658bfdc7cea500f
SHA-256: 49ef8f207b05c79b37454b22a863e98cd18d16d337d457b7b63363dfb1b110bf
kernel-debuginfo-common-s390x-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: f30d9dadd104313b8acf3fea6a764fc0
SHA-256: ddb94fa3364347f1f4ce0f0de005efba47356948a68c76b4e10b34a1b1244575
kernel-devel-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: e8c3e7d9dcda1fc7ca6b61aedc8736b7
SHA-256: 51fa239423ac157f80d57b945d1e166457bc37449389334ac72af7b26cf8f1ec
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 2170b459f3504cdbc5730cb9469bc96a
SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 4330baa33a2467506d2139510719d163
SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 8d63507eafa5e0bb1706ab3675b9bff1
SHA-256: fac43cc5bbb0ea214dd71293c7d195782bc1953d4bcd0da34a469bffe13a4ef8
kernel-kdump-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 758f8f4ced1ea06cf3734b48dbf68571
SHA-256: f98c27750d456a6f48dcf3de92cec27e2dffc9d610a4de24cc79c85f8a0a5c03
kernel-kdump-debuginfo-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 49461d2c9e7ff353fc9eca2b7913216a
SHA-256: a6a1ca25e240b86d820ef9e344fa2633be9ee13091477906ca62e22756a80e84
kernel-kdump-devel-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 3426e785129d25ae179a2ec38fdf13a2
SHA-256: 8da543c03f0784d5b45fc32e33f577e2fa77226ebf6e04cacd62d9228b510c42
perf-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 4990f5306b4988cff7c75a2837917d5b
SHA-256: 6f486526abd5698ccda055dbf6e44775d111a93c725767af9dd8623d65a5d78c
perf-debuginfo-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 74b59ba82ab191d19eee1fbcb14d7858
SHA-256: 127542e74fa49d446ade0fe29e518f0f9370f66587a1a98ac7a30ac1f526ed21
python-perf-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7b94d789cd8e39c4f63bd7841216f6d4
SHA-256: 1d9928f5d82ba2df4548de71b3be1a56aee969afe1a7b9e2d7d0f72f3bab5b21
python-perf-debuginfo-2.6.32-220.39.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: ae8cdd56d8f9bf5a15ba15af797bbd07
SHA-256: 4e3890056e5fe79085fceb8cc32628e68db93bd4fea209ae418dbb82215b9fa9
 
x86_64:
kernel-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 09f7d1b0fa36af02f525e97fb4fc42d4
SHA-256: 5031fe6f72f12d7f6217e8e28c4647ce1118c1435ff0ea79cc811df1df90c0a2
kernel-debug-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 0ba5400cfe15fec4b06a2f4ce682c541
SHA-256: ab70ac75cb7e1eba98bcee437304cb748283d8f772271f93d66d419733927d72
kernel-debug-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: d464a46429d1c2cdc6a6ae6c7b8477fc
SHA-256: fd1fdcba911d1ea91e74f916b275e3061ba3f625bba66f5c8d1e3dc833e85059
kernel-debug-devel-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 96cf0fb2305741356638118877f5c3d9
SHA-256: 15d8e93a42b851f025e5098ae1b2ec477de956c848d3f19dbce8fb18a8999a2c
kernel-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7f878b92491ef5ac3b62bc7bf9bdddc6
SHA-256: ec21fb0af25519d823e65816b1252f984343ab343d76dbe8192807a202b7000c
kernel-debuginfo-common-x86_64-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 285ba8d7cc69299bc1a3279138efc852
SHA-256: f6d883dd6dfdf3a1ed3e5daeb05ccb3d3997ec8cc9a35a37719c81e91c1215aa
kernel-devel-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: ef90c3c2bc67741c991bbbeb446edc6a
SHA-256: 93dd2a18138730b6ff58dde7e6210dedfeb3d6a91f101a1bed06a3a9bf502d5e
kernel-doc-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 2170b459f3504cdbc5730cb9469bc96a
SHA-256: 2174026e997ef60f549b44409fb482a1a8f3716fd1cafdac8ca3753e54c4a61d
kernel-firmware-2.6.32-220.39.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 4330baa33a2467506d2139510719d163
SHA-256: 5dabe819d61058d333d25118463ff94e49c80a13d43bf198ea4c433d17fca947
kernel-headers-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 05584df750b6724b3c302245eb50387d
SHA-256: cdcc5487c1efda48a4b28c293327a400607a5e8d60ecb6c0c3ad888c052e9ab2
perf-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: f7cd8b8247ac5cbb35e84192eee74d66
SHA-256: f1b8cbc00394736e854cc5b850f6f4a2bc152ed054bc3424ee0fecb5dab73b76
perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: c4a8ea652768dff5aba8a723ed5d0b2b
SHA-256: 154ddb46edad47d59223715c9483367dda1a9b1cf4c00ff184babba18a770d54
python-perf-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 34aaedbcd391575f53dcd1700c5399fa
SHA-256: cfc333fa84bb7e1c751b75b144e4305df5cf25495a3f455903d015363428bd08
python-perf-debuginfo-2.6.32-220.39.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: e157f0be65ad90d283d949d53f7da207
SHA-256: b9899d3b693add9444d463f8f910125c96563add66e6d841f88b043e90bc6ea2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

916115 - CVE-2013-1773 kernel: VFAT slab-based buffer overflow
917012 - CVE-2013-1796 kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME
917013 - CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME
917017 - CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads
920783 - CVE-2013-1848 kernel: ext3: format string issues


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/