Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2013:1519-1
Type: Security Advisory
Severity: Important
Issued on: 2013-11-13
Last updated on: 2013-11-13
Affected Products: Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
CVEs (cve.mitre.org): CVE-2012-4508
CVE-2013-4299

Details

Updated kernel packages that fix two security issues and several bugs are
now available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A race condition was found in the way asynchronous I/O and fallocate()
interacted when using the ext4 file system. A local, unprivileged user
could use this flaw to expose random data from an extent whose data blocks
have not yet been written, and thus contain data from a deleted file.
(CVE-2012-4508, Important)

* An information leak flaw was found in the way Linux kernel's device
mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data from
disk blocks in free space, which are normally inaccessible. (CVE-2013-4299,
Moderate)

Red Hat would like to thank Theodore Ts'o for reporting CVE-2012-4508, and
Fujitsu for reporting CVE-2013-4299. Upstream acknowledges Dmitry Monakhov
as the original reporter of CVE-2012-4508.

This update also fixes the following bugs:

* When the Audit subsystem was under heavy load, it could loop infinitely
in the audit_log_start() function instead of failing over to the error
recovery code. This would cause soft lockups in the kernel. With this
update, the timeout condition in the audit_log_start() function has been
modified to properly fail over when necessary. (BZ#1017898)

* When handling Memory Type Range Registers (MTRRs), the
stop_one_cpu_nowait() function could potentially be executed in parallel
with the stop_machine() function, which resulted in a deadlock. The MTRR
handling logic now uses the stop_machine() function and makes use of mutual
exclusion to avoid the aforementioned deadlock. (BZ#1017902)

* Power-limit notification interrupts were enabled by default. This could
lead to degradation of system performance or even render the system
unusable on certain platforms, such as Dell PowerEdge servers. Power-limit
notification interrupts have been disabled by default and a new kernel
command line parameter "int_pln_enable" has been added to allow users to
observe these events using the existing system counters. Power-limit
notification messages are also no longer displayed on the console.
The affected platforms no longer suffer from degraded system performance
due to this problem. (BZ#1020519)

* Package level thermal and power limit events are not defined as MCE
errors for the x86 architecture. However, the mcelog utility erroneously
reported these events as MCE errors with the following message:

kernel: [Hardware Error]: Machine check events logged

Package level thermal and power limit events are no longer reported as MCE
errors by mcelog. When these events are triggered, they are now reported
only in the respective counters in sysfs (specifically,
/sys/devices/system/cpu/cpu<number>/thermal_throttle/). (BZ#1021950)

* An insufficiently designed calculation in the CPU accelerator could cause
an arithmetic overflow in the set_cyc2ns_scale() function if the system
uptime exceeded 208 days prior to using kexec to boot into a new kernel.
This overflow led to a kernel panic on systems using the Time Stamp Counter
(TSC) clock source, primarily systems using Intel Xeon E5 processors that
do not reset TSC on soft power cycles. A patch has been applied to modify
the calculation so that this arithmetic overflow and kernel panic can no
longer occur under these circumstances. (BZ#1024453)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kernel-2.6.32-220.45.1.el6.src.rpm
File outdated by:  RHBA-2014:0006
    MD5: 0daf6f19961d93c6a9eceb7a4d6b0b71
SHA-256: fab8672488f5fb0cfce247b5178c24a35345cc7c868126f2352dedb530abb6f0
 
x86_64:
kernel-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 648566136422dd24c69dc26bc21f716a
SHA-256: 6ac3b3c00cbcc15d8d7a9805efdaa52944bfded047b6f2cc3526f43dcea0080e
kernel-debug-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 652a6c926c1766500752b55373e70722
SHA-256: c79b622cb4f366dd0ea85bed2efaf54c1dded289c2fccc4c483724fed4c33ae4
kernel-debug-debuginfo-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 867347a055541818589ac81b97c9330e
SHA-256: 535b3db7bee8777cb3e9f3d3a7fbdff4dffe1eb82bdcaab46a0280b9d96a3333
kernel-debug-devel-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 1ca92d373d2eb798a7985bda7e0ccce0
SHA-256: 93b536454c593a761fcfc3169c7c8c9b136de14bc4c2735daa4145adbbc8122c
kernel-debuginfo-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 78ce108f9552207be41d64923660a2e4
SHA-256: 67c0010df9b4446b41a6021e2d1e405c44d87564cecf8bd99c8b39eb588169d0
kernel-debuginfo-common-x86_64-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 874cba51fe061423aada0ee5f65531ac
SHA-256: 1560cc661d8710599f7ebfa9ffa14272d2c6fafbec3ad6bd0c6343688a01d12d
kernel-devel-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 7fce1c3673b43779509b43f76dd7805a
SHA-256: a3038710b14aa35caff485defb33c1866824119e14c2f549ce5704591bf46453
kernel-doc-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0362
    MD5: 9cd3101a0b5b5d65fa2ed378e84773eb
SHA-256: c846fb00c33b346d0e26440e1c269fd164b7bcb938fba80368adb0acd05de05e
kernel-firmware-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0362
    MD5: 572d7688ff119c9fcfd5be9bc2e1b173
SHA-256: f03d1971c02cc84f5aab3d35636db9e59175cb92f45d7422e77fff1ad8475862
kernel-headers-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 8c19e6faa24cdb81a1efb859a745549a
SHA-256: 221148be62c1b9e4469c69e913758390b0075547f4fba40353abf7ddf0d113ee
perf-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 7000cbe9aab05f0a3d2aadeeac06a90b
SHA-256: ad17e80ec437172119c9b4ba23f71f6a7c24ab9d434ebb90b6e3d661d473db31
perf-debuginfo-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: a41f674e2b6fc75736b5b3bde80216b4
SHA-256: e52cdc4412fa683b40a5c1ec1c7a8906058404d9995b8414acefd9c5636f18dd
python-perf-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 7796c9d25d5bc6b1e058ecf705a310c6
SHA-256: 6560afa02fca8c6a7ce77dbf4cf9a584c12dc9dd9b0b04494bc8991e9211eecd
python-perf-debuginfo-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 8dfb85c8eb64176c49e5af72e8a7bada
SHA-256: cd79078820f2387d85e2f84816104dda431bf183caedba40c3372a5f89726d1c
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
kernel-2.6.32-220.45.1.el6.src.rpm
File outdated by:  RHBA-2014:0006
    MD5: 0daf6f19961d93c6a9eceb7a4d6b0b71
SHA-256: fab8672488f5fb0cfce247b5178c24a35345cc7c868126f2352dedb530abb6f0
 
IA-32:
kernel-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: cf098a5998cf64b4d00c45693c16173e
SHA-256: 99c3fe53a2520d55ab3289caf80c61faf24c6fee454c5fde6262891b881929ab
kernel-debug-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 346efd1e1cb2be7cd91ba88f3fcff5b3
SHA-256: 56c0bd3b2e7af9ec7fff124315cb457bb072b990529adfa83ad0dee1dc1f16e9
kernel-debug-debuginfo-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: a5d3719069277544ff62b0c242a054f4
SHA-256: 34391434a7683ebc4beb5444388e5c1bb606c40531c19d6ad4da8607cf67d853
kernel-debug-devel-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: d79becc98db3b38d6dca46305627626f
SHA-256: e2b8ceb3dcf751ad46e761a3d82f3b090d2748ec49b004b74851d940585686d1
kernel-debuginfo-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 4402dbf5ac9beeb976393162a91bfa05
SHA-256: 66a466f2db5cd0ea59c2da564ea6f2fc9160bebc54876bd00fd7904639e62f95
kernel-debuginfo-common-i686-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7929256e745de31c5bfa0a345c52508c
SHA-256: 74bf0b727060ec140a07a635af32436a5cc8170edaa9d297272054f5ee7459c7
kernel-devel-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: d8898666f2380e5950f14f535b0aa846
SHA-256: 4454280079a79ac8ed9529bd6e98f9acf6a89d3f4597dc64e940f7c6161233fd
kernel-doc-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9cd3101a0b5b5d65fa2ed378e84773eb
SHA-256: c846fb00c33b346d0e26440e1c269fd164b7bcb938fba80368adb0acd05de05e
kernel-firmware-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 572d7688ff119c9fcfd5be9bc2e1b173
SHA-256: f03d1971c02cc84f5aab3d35636db9e59175cb92f45d7422e77fff1ad8475862
kernel-headers-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 49603f878854d5d9b9b0d7d6f6c6fd49
SHA-256: 5802bd8fc084ba76f0590a9ba164e692ad67477ddf68dbb9eff01fc557c6ccdb
perf-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: bff848453ea7e171454f688a5f9e46d0
SHA-256: 0ee80f495ed0ce6ce590b4d06f85c9316b9897f0e15fb772b76959f6615a85df
perf-debuginfo-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: ead65e6c19ca3f653a8a5c22b21c34a5
SHA-256: 641637b42c590752b446592efa21ff551eeb6a30e8919b052d8c9d5ba660d329
python-perf-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 88ae7e53a6c9726c3f844a065761e95b
SHA-256: e2c01b49a71ecb8c1be330baae51e33ba6e66ffb5f050f2126662bc48ab79bbf
python-perf-debuginfo-2.6.32-220.45.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 2f95803fb5fd20c12f893cdcad875d58
SHA-256: 3d5eb24d5387c7998674f3a10a73623fff1f3c5c77e1ffd98b5fa86095d8f5af
 
PPC:
kernel-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9dc4e409498f9c21bbec67f19614c453
SHA-256: 3761e0f2f59e8fefe7f877bd05a6aedb01521d6f8d16bb10c4ae5c37618a82c2
kernel-bootwrapper-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 539c470f69be77d575b87e114a7574c2
SHA-256: b9c734459eb6deae0f2ab2519943c4030ad9faed33eb677fb1adcab33771f892
kernel-debug-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: e3c7a6dae8b5a6a6d9f8bfeb4cd6f901
SHA-256: e1113548e6736a34190591bef5bdaf52606699846c6278bf4245ad1ac76ceba1
kernel-debug-debuginfo-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 03e6bef8a7954f72f3cb4f1571749572
SHA-256: c49ad59270c4ab75407f9c033c2788ce462458130e500c8695feee223fad0463
kernel-debug-devel-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: cf1ed0ab1bda31cf80208df7f0bd4ffa
SHA-256: a785a34b1017161c59394f00e2aa2a9908c37d03fa154c783bb0416e4a7acb40
kernel-debuginfo-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: c6e0030b9b77579089cb52d01c416e5e
SHA-256: f596f81f48a31249a6ee753ad931a09da205a14dc9f71521712150f0bb76a37d
kernel-debuginfo-common-ppc64-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 552efa19452994431715d12409e7bff8
SHA-256: 94516d6d7c230e49da9a5f673510c839c0e3898b68a06cfbca8b33030d637fdf
kernel-devel-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9a454ebf41f473f5649db91bceaf873d
SHA-256: c3c5c0d6e528fc068e1333c3dd3528037b4881e165383a76e7f44626fa339b84
kernel-doc-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9cd3101a0b5b5d65fa2ed378e84773eb
SHA-256: c846fb00c33b346d0e26440e1c269fd164b7bcb938fba80368adb0acd05de05e
kernel-firmware-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 572d7688ff119c9fcfd5be9bc2e1b173
SHA-256: f03d1971c02cc84f5aab3d35636db9e59175cb92f45d7422e77fff1ad8475862
kernel-headers-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 54e56cec93c06d637d8478e79d810a83
SHA-256: e08504d8b9afcf686aa29f88908d05b369dcc430f928389a7d8439b06fc08acd
perf-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 1a7fdae1a19bc6c8933c2d32cd162f0f
SHA-256: f6853edc5e457e3b3a2e6227da810e4208f8c4ebed37101f0acf9780087655d2
perf-debuginfo-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 6f4bbc311e27ae71901885de0740c57f
SHA-256: 74e11b9905ef821afd0244a0a04e997193a367873c0e61cbfc3b968ed3c7da4d
python-perf-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7291251749726a044dda31a72ece85af
SHA-256: 8df6a401d271a3470d87c3d4447d4c82064c2b95e7d8b6e161b0ab8d9a23e201
python-perf-debuginfo-2.6.32-220.45.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: a50f7179be13066d1e233cd146177147
SHA-256: 100762ae6a3d845aedcc2e36596d0dab78d2d36b03d908bd7fe384368108b35b
 
s390x:
kernel-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: d1fd623ed81ee1988190ef0539ff0538
SHA-256: ff4a5a9e36bcb3c2f91552ff1254088a508079726d2ab91c5a463d215a0a7726
kernel-debug-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: bd6f11981ffed85d3474f92efa12d1a6
SHA-256: 885129dbe38b7c8927e0b3dd60554775a0cb04214522435643fedbf7e4d33dff
kernel-debug-debuginfo-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: eaa6a2691cf5b6b3ee7ba5df64ea92eb
SHA-256: 8e67158cc71897a0924fd4868b4328e5c8e7cd40cf05df793c9f92e330e31e24
kernel-debug-devel-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: b5cbf1976378bad08c1bdcc264258d68
SHA-256: 9b688446928deb14ddb4ca0bd5fbcf744916c26b63e186f7e77678361b2e8745
kernel-debuginfo-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: a7baf9003bd6702e5f6208304c40059f
SHA-256: 7437b6d23e72162138be4fc420600f6ce0f03b332be8474e46dcea5ca5ec26fb
kernel-debuginfo-common-s390x-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 6d79bb945161253ae9592eb7988f12f1
SHA-256: 7e2660f549107dbe493a69291b32bde4dfff78573f15844df938b9d25ae16ac7
kernel-devel-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 37816ef37728454751c18e584c84718c
SHA-256: aad3f877a217b626fce6d2aa4ae67c6be34a730dee1bb313a7abe1062abd9bfe
kernel-doc-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9cd3101a0b5b5d65fa2ed378e84773eb
SHA-256: c846fb00c33b346d0e26440e1c269fd164b7bcb938fba80368adb0acd05de05e
kernel-firmware-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 572d7688ff119c9fcfd5be9bc2e1b173
SHA-256: f03d1971c02cc84f5aab3d35636db9e59175cb92f45d7422e77fff1ad8475862
kernel-headers-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 760a6ef298f5b500fe8d284cbca25472
SHA-256: a7f05de81afb9b557f04cd0f8b9f7495496d553b3130989cd53ac49211b8a9dc
kernel-kdump-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: fb8bbb2d7a66938c5199d42cedb2ceea
SHA-256: 927d69218a84520003580a973befe6eca3ba087b42f8924b530bd0cfe3d16d95
kernel-kdump-debuginfo-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 30c79ac2ff878dc6b38e83609a1b3f75
SHA-256: 5b922e889e6616c2ceb5138eff69a758a62fab912e9936b3a0a7a42f3277c862
kernel-kdump-devel-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 064a978363fd0f9e1ca53dc2adf3721a
SHA-256: d28208a3402af39ead667d4d15d467dc339e468d53829a1abbc59c7e3e2234a0
perf-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: ea3b35dbed89187429df820f96cc5e35
SHA-256: 39d9d54e470e67b612457c39822429be2d138f079e66e770219a06f175d59149
perf-debuginfo-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 32e67cf1b33fb2dd0d19b5dd5485fab3
SHA-256: 75ae5625aaedbb4ba9b5767103288e76698d44cd87815c648a29bd425eb1cb38
python-perf-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 432b762dd131faf5d003a67a78f3d6f3
SHA-256: 2e86ba356ee7e7eef63c02775fd17419d70d1a38b22428a207339c6d94151d91
python-perf-debuginfo-2.6.32-220.45.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 6549c85a30e7ef86a41f933ceec91880
SHA-256: bbeffb0ad33d7b0118adc5ee7f57e67adfe8a6f8824fc49af283a07a9d07b72f
 
x86_64:
kernel-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 648566136422dd24c69dc26bc21f716a
SHA-256: 6ac3b3c00cbcc15d8d7a9805efdaa52944bfded047b6f2cc3526f43dcea0080e
kernel-debug-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 652a6c926c1766500752b55373e70722
SHA-256: c79b622cb4f366dd0ea85bed2efaf54c1dded289c2fccc4c483724fed4c33ae4
kernel-debug-debuginfo-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 867347a055541818589ac81b97c9330e
SHA-256: 535b3db7bee8777cb3e9f3d3a7fbdff4dffe1eb82bdcaab46a0280b9d96a3333
kernel-debug-devel-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 1ca92d373d2eb798a7985bda7e0ccce0
SHA-256: 93b536454c593a761fcfc3169c7c8c9b136de14bc4c2735daa4145adbbc8122c
kernel-debuginfo-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 78ce108f9552207be41d64923660a2e4
SHA-256: 67c0010df9b4446b41a6021e2d1e405c44d87564cecf8bd99c8b39eb588169d0
kernel-debuginfo-common-x86_64-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 874cba51fe061423aada0ee5f65531ac
SHA-256: 1560cc661d8710599f7ebfa9ffa14272d2c6fafbec3ad6bd0c6343688a01d12d
kernel-devel-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7fce1c3673b43779509b43f76dd7805a
SHA-256: a3038710b14aa35caff485defb33c1866824119e14c2f549ce5704591bf46453
kernel-doc-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9cd3101a0b5b5d65fa2ed378e84773eb
SHA-256: c846fb00c33b346d0e26440e1c269fd164b7bcb938fba80368adb0acd05de05e
kernel-firmware-2.6.32-220.45.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: 572d7688ff119c9fcfd5be9bc2e1b173
SHA-256: f03d1971c02cc84f5aab3d35636db9e59175cb92f45d7422e77fff1ad8475862
kernel-headers-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 8c19e6faa24cdb81a1efb859a745549a
SHA-256: 221148be62c1b9e4469c69e913758390b0075547f4fba40353abf7ddf0d113ee
perf-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7000cbe9aab05f0a3d2aadeeac06a90b
SHA-256: ad17e80ec437172119c9b4ba23f71f6a7c24ab9d434ebb90b6e3d661d473db31
perf-debuginfo-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: a41f674e2b6fc75736b5b3bde80216b4
SHA-256: e52cdc4412fa683b40a5c1ec1c7a8906058404d9995b8414acefd9c5636f18dd
python-perf-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7796c9d25d5bc6b1e058ecf705a310c6
SHA-256: 6560afa02fca8c6a7ce77dbf4cf9a584c12dc9dd9b0b04494bc8991e9211eecd
python-perf-debuginfo-2.6.32-220.45.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 8dfb85c8eb64176c49e5af72e8a7bada
SHA-256: cd79078820f2387d85e2f84816104dda431bf183caedba40c3372a5f89726d1c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1004233 - CVE-2013-4299 kernel: dm: dm-snapshot data leak
869904 - CVE-2012-4508 kernel: ext4: AIO vs fallocate stale data exposure


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/