Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2011:0007-1
Type: Security Advisory
Severity: Important
Issued on: 2011-01-11
Last updated on: 2011-01-11
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.0.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2010-2492
CVE-2010-3067
CVE-2010-3078
CVE-2010-3080
CVE-2010-3298
CVE-2010-3477
CVE-2010-3861
CVE-2010-3865
CVE-2010-3874
CVE-2010-3876
CVE-2010-3880
CVE-2010-4072
CVE-2010-4073
CVE-2010-4074
CVE-2010-4075
CVE-2010-4077
CVE-2010-4079
CVE-2010-4080
CVE-2010-4081
CVE-2010-4082
CVE-2010-4083
CVE-2010-4158
CVE-2010-4160
CVE-2010-4162
CVE-2010-4163
CVE-2010-4242
CVE-2010-4248
CVE-2010-4249
CVE-2010-4263
CVE-2010-4525
CVE-2010-4668

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

* Buffer overflow in eCryptfs. When /dev/ecryptfs has world writable
permissions (which it does not, by default, on Red Hat Enterprise Linux 6),
a local, unprivileged user could use this flaw to cause a denial of service
or possibly escalate their privileges. (CVE-2010-2492, Important)

* Integer overflow in the RDS protocol implementation could allow a local,
unprivileged user to cause a denial of service or escalate their
privileges. (CVE-2010-3865, Important)

* Missing boundary checks in the PPP over L2TP sockets implementation could
allow a local, unprivileged user to cause a denial of service or escalate
their privileges. (CVE-2010-4160, Important)

* NULL pointer dereference in the igb driver. If both Single Root I/O
Virtualization (SR-IOV) and promiscuous mode were enabled on an interface
using igb, it could result in a denial of service when a tagged VLAN packet
is received on that interface. (CVE-2010-4263, Important)

* Missing initialization flaw in the XFS file system implementation, and in
the network traffic policing implementation, could allow a local,
unprivileged user to cause an information leak. (CVE-2010-3078,
CVE-2010-3477, Moderate)

* NULL pointer dereference in the Open Sound System compatible sequencer
driver could allow a local, unprivileged user with access to /dev/sequencer
to cause a denial of service. /dev/sequencer is only accessible to root and
users in the audio group by default. (CVE-2010-3080, Moderate)

* Flaw in the ethtool IOCTL handler could allow a local user to cause an
information leak. (CVE-2010-3861, Moderate)

* Flaw in bcm_connect() in the Controller Area Network (CAN) Broadcast
Manager. On 64-bit systems, writing the socket address may overflow the
procname character array. (CVE-2010-3874, Moderate)

* Flaw in the module for monitoring the sockets of INET transport
protocols could allow a local, unprivileged user to cause a denial of
service. (CVE-2010-3880, Moderate)

* Missing boundary checks in the block layer implementation could allow a
local, unprivileged user to cause a denial of service. (CVE-2010-4162,
CVE-2010-4163, CVE-2010-4668, Moderate)

* NULL pointer dereference in the Bluetooth HCI UART driver could allow a
local, unprivileged user to cause a denial of service. (CVE-2010-4242,
Moderate)

* Flaw in the Linux kernel CPU time clocks implementation for the POSIX
clock interface could allow a local, unprivileged user to cause a denial of
service. (CVE-2010-4248, Moderate)

* Flaw in the garbage collector for AF_UNIX sockets could allow a local,
unprivileged user to trigger a denial of service. (CVE-2010-4249, Moderate)

* Missing upper bound integer check in the AIO implementation could allow a
local, unprivileged user to cause an information leak. (CVE-2010-3067, Low)

* Missing initialization flaws could lead to information leaks.
(CVE-2010-3298, CVE-2010-3876, CVE-2010-4072, CVE-2010-4073, CVE-2010-4074,
CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4081,
CVE-2010-4082, CVE-2010-4083, CVE-2010-4158, Low)

* Missing initialization flaw in KVM could allow a privileged host user
with access to /dev/kvm to cause an information leak. (CVE-2010-4525, Low)

Red Hat would like to thank Andre Osterhues for reporting CVE-2010-2492;
Thomas Pollet for reporting CVE-2010-3865; Dan Rosenberg for reporting
CVE-2010-4160, CVE-2010-3078, CVE-2010-3874, CVE-2010-4162, CVE-2010-4163,
CVE-2010-3298, CVE-2010-4073, CVE-2010-4074, CVE-2010-4075, CVE-2010-4077,
CVE-2010-4079, CVE-2010-4080, CVE-2010-4081, CVE-2010-4082, CVE-2010-4083,
and CVE-2010-4158; Kosuke Tatsukawa for reporting CVE-2010-4263; Tavis
Ormandy for reporting CVE-2010-3080 and CVE-2010-3067; Kees Cook for
reporting CVE-2010-3861 and CVE-2010-4072; Nelson Elhage for reporting
CVE-2010-3880; Alan Cox for reporting CVE-2010-4242; Vegard Nossum for
reporting CVE-2010-4249; Vasiliy Kulikov for reporting CVE-2010-3876; and
Stephan Mueller of atsec information security for reporting CVE-2010-4525.


Solution

Users should upgrade to these updated packages, which contain
backported patches to correct these issues. Documentation for the bugs
fixed by this update will be available shortly from the Technical
Notes document, linked to in the References section. The system must
be rebooted for this update to take effect.

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kernel-2.6.32-71.14.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: a94bb9f0c4274b96e03a367b40a77613
SHA-256: 4661e2547672412275319425d98b9d16b0228c134de0afec84fce26aa7ee2a7f
 
IA-32:
kernel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2eee388a08d31a231ffbf1de844838d4
SHA-256: ed01989b2c15c215cd08c05a734c3fd030367c3acd26c7d9e63d0cddd10e8324
kernel-debug-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ebb181c8b33e39e5e3e9660eb24770ce
SHA-256: cf12d1347101340e6fa957f1dfc673ee2d4fb6e94c5f6dab7ad6141ea2b031d1
kernel-debug-debuginfo-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9215ab8626eb26d1aaf319db63eaf7f5
SHA-256: 71b428cb6120d4f12acfc4b5c3505068550ba11032a2c146282c6e4c7da3701e
kernel-debug-devel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26ff1fdbda747ca63c44ab8ce821be0a
SHA-256: 92d73d48c11a82f56650b179439a66423a04500787788046fdfcc4aa77cfba1c
kernel-debuginfo-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3755e3885a60fc05b9a4bb08f4c72eff
SHA-256: aaf30d92c69947d466d898c1405ccc1124df6645c9e3fb02bb3e60ca86cbbdf0
kernel-debuginfo-common-i686-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: dafaa817689cd3040cf89b590df6bafb
SHA-256: 8d219df347a03a82dc2041b53746fb50aa589c24e6ff08fd728f2853ff5689ee
kernel-devel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ff1ed86df6cac0cdc847efa0da72dc89
SHA-256: 1b2c2a1b956c8ed9708342ee1ac7a8437a673ce39b3676b9139bc1728043a58e
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 14cba618d57458ed7cc5a920b3bb9bf1
SHA-256: 7e5f236c2854867acd27dfdc6759fa5cb6b7dccf34898bc46980811356420945
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
x86_64:
kernel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cc5efdeb85be1cfc6d95f71ba142916
SHA-256: 193d277abd203bd5d8e10773363e7796c48869e329e6bc7b98ba020459cb354b
kernel-debug-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56be83d45b006083c5621b2c17eb2c4a
SHA-256: 51974e9cefcf8a5673f8aca663b4e14b4a0f148e32c14598d103bb33502a2e7b
kernel-debug-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: de0dba115e0a803435f9c171cd2cd82b
SHA-256: 8d7d75ceaf7f8b1e38282a65868596cf2ec2792780e45fa6bb94cfe5b736b273
kernel-debug-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 52382e5f4a78ff2d0c3bcef9f9d104cf
SHA-256: 92f3db5347ef16aad46f3e81392ce1f05a6f63b5c370af444d4a70202de270ab
kernel-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1723b4b6711d325fc3bbd76610acf26a
SHA-256: 826cf096df8ac59ad697ced3cb07ebcedf869ff6c862982c08aa95bc60a57741
kernel-debuginfo-common-x86_64-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56474f1461744aa663caa594b368c9f2
SHA-256: 0605be4481054b78133c92f5f4c69f2ab691d9799c1871f3de54f15132ab1ff7
kernel-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 004419e13206a260c797e3e194179126
SHA-256: e65d5191e585cac034cacd7d6810ff8cc6eed770cdf67ab75387dab2f0f3c594
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 39192b84d45957893a9847cacc7cd55b
SHA-256: 52641cdb673baea19a2757310c92426085237e820727844e08bcfe1de3e3cc00
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kernel-2.6.32-71.14.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: a94bb9f0c4274b96e03a367b40a77613
SHA-256: 4661e2547672412275319425d98b9d16b0228c134de0afec84fce26aa7ee2a7f
 
x86_64:
kernel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cc5efdeb85be1cfc6d95f71ba142916
SHA-256: 193d277abd203bd5d8e10773363e7796c48869e329e6bc7b98ba020459cb354b
kernel-debug-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56be83d45b006083c5621b2c17eb2c4a
SHA-256: 51974e9cefcf8a5673f8aca663b4e14b4a0f148e32c14598d103bb33502a2e7b
kernel-debug-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: de0dba115e0a803435f9c171cd2cd82b
SHA-256: 8d7d75ceaf7f8b1e38282a65868596cf2ec2792780e45fa6bb94cfe5b736b273
kernel-debug-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 52382e5f4a78ff2d0c3bcef9f9d104cf
SHA-256: 92f3db5347ef16aad46f3e81392ce1f05a6f63b5c370af444d4a70202de270ab
kernel-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1723b4b6711d325fc3bbd76610acf26a
SHA-256: 826cf096df8ac59ad697ced3cb07ebcedf869ff6c862982c08aa95bc60a57741
kernel-debuginfo-common-x86_64-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56474f1461744aa663caa594b368c9f2
SHA-256: 0605be4481054b78133c92f5f4c69f2ab691d9799c1871f3de54f15132ab1ff7
kernel-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 004419e13206a260c797e3e194179126
SHA-256: e65d5191e585cac034cacd7d6810ff8cc6eed770cdf67ab75387dab2f0f3c594
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 39192b84d45957893a9847cacc7cd55b
SHA-256: 52641cdb673baea19a2757310c92426085237e820727844e08bcfe1de3e3cc00
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kernel-2.6.32-71.14.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: a94bb9f0c4274b96e03a367b40a77613
SHA-256: 4661e2547672412275319425d98b9d16b0228c134de0afec84fce26aa7ee2a7f
 
IA-32:
kernel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2eee388a08d31a231ffbf1de844838d4
SHA-256: ed01989b2c15c215cd08c05a734c3fd030367c3acd26c7d9e63d0cddd10e8324
kernel-debug-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ebb181c8b33e39e5e3e9660eb24770ce
SHA-256: cf12d1347101340e6fa957f1dfc673ee2d4fb6e94c5f6dab7ad6141ea2b031d1
kernel-debug-debuginfo-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9215ab8626eb26d1aaf319db63eaf7f5
SHA-256: 71b428cb6120d4f12acfc4b5c3505068550ba11032a2c146282c6e4c7da3701e
kernel-debug-devel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26ff1fdbda747ca63c44ab8ce821be0a
SHA-256: 92d73d48c11a82f56650b179439a66423a04500787788046fdfcc4aa77cfba1c
kernel-debuginfo-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3755e3885a60fc05b9a4bb08f4c72eff
SHA-256: aaf30d92c69947d466d898c1405ccc1124df6645c9e3fb02bb3e60ca86cbbdf0
kernel-debuginfo-common-i686-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: dafaa817689cd3040cf89b590df6bafb
SHA-256: 8d219df347a03a82dc2041b53746fb50aa589c24e6ff08fd728f2853ff5689ee
kernel-devel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ff1ed86df6cac0cdc847efa0da72dc89
SHA-256: 1b2c2a1b956c8ed9708342ee1ac7a8437a673ce39b3676b9139bc1728043a58e
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 14cba618d57458ed7cc5a920b3bb9bf1
SHA-256: 7e5f236c2854867acd27dfdc6759fa5cb6b7dccf34898bc46980811356420945
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
PPC:
kernel-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3c9e5654ca0c4f4319fabcd7342d1d76
SHA-256: bf14793b1d1d2a4a2a2dd45dbdb3a5e9b385570de5216e174d4cb66e9c373f44
kernel-bootwrapper-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 7832b2e3b917856f59e2df0b8480bc68
SHA-256: 40d70b7da5db1999b4b8e12e5d5db6cd35085a2c2fd0c5f42fa7c3ce76b45083
kernel-debug-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8d56eb1fcaba34d631a0c84be216686a
SHA-256: 2b4583abc0335fe38a8cb3459d706944a3f21713e040f74cdbef3ed48564596b
kernel-debug-debuginfo-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 526305789c32e88eea8278aad5d5e857
SHA-256: f44071e06df47067b00615f1e61519dd4fe6268e9bef70333f52d184a88f3d65
kernel-debug-devel-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f4d68098f578df4c2775aa2562026c8a
SHA-256: 2722a901105f802fd1e43b03a4d84f550bad2a0ace22cb9d724cfa1fcf1a8085
kernel-debuginfo-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5d6b101337240720e192577d9954659b
SHA-256: 015c58f32d6c4138ec72994d68300dfa9454f055edf78033b0f22f9c93aa634f
kernel-debuginfo-common-ppc64-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f02f1741c71faed39b49b3cb8844c9c4
SHA-256: efce787e7863366ece4d3443cc1812b59ab0c6b0f20d28400cc6337544a96661
kernel-devel-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 12909be0c9ba4e91a88d6d6557aba242
SHA-256: 534390091ef8d4047212869593950094cdc6c153a87352827aa124aea164a286
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6f1efb3408d3ef04276ec5d452abf2f8
SHA-256: f343916f2034c6844a06cd8b8b6cbd3c5937d92f39ad991ee0402376c808eefc
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
s390x:
kernel-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 32bb62e505e27d1aff2688711d77a27a
SHA-256: 3ca1016f0c00f55f874ff82177a45678e0d85eac321ba742b399e7ed127bd127
kernel-debug-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: eeadbf0dc9a816024e12cd17becc0782
SHA-256: dc485ae36f33ed437723107b135604a72c25e53cf82df903f271ae69486c5375
kernel-debug-debuginfo-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 06622b8198d8e69b25d2b69d1c48acae
SHA-256: a3a091dbf1926d79bb39379850dd2c08758889285f246d87c45684edca9d19e5
kernel-debug-devel-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: e41175dd23a1584eddb580634f05e43c
SHA-256: ebead92d8e48e12731747adbe1714e016c73a6ec9e138064e25c0861cf4be7c5
kernel-debuginfo-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4e8031860db8d4157195caf3967abecb
SHA-256: 3bcf0f765ec883f7edf0d05e467ca9a57158f6103463f4290f791f964235cb67
kernel-debuginfo-common-s390x-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: dd29588487d848c6d6d3bf5a5c6fcea8
SHA-256: a22e2061d2ba37f168c56148682865ae8001faaae2b24553d30665b1af682bd2
kernel-devel-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1f28ffd5edb1cb42f2d7a6536eceaf17
SHA-256: 7e535035d4f16a14a5b40eab0babf4a9d4ea667de70affb91793d536ad2b7051
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 35bdb3b0152bfc101b0f9f654dee00f2
SHA-256: 07087622a859bf499eee279cec7283bbc270a37e9a7d18218463abef259f21c7
kernel-kdump-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 237c9e9600851b9b08c8570bb3a6baf8
SHA-256: 9de6e714b5670fa9a6f8d888d9e06742d5b930ee2017f640595ad5f762b8269a
kernel-kdump-debuginfo-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4596e2fa28bd337e5a4fd41fee61615d
SHA-256: e6204d3a094ac1325d0cd41fceef4137e186c9bdf4af49e3b0379b13ef02a3c3
kernel-kdump-devel-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 403fa53dc8d38abecfeba42b05cc115c
SHA-256: 06bc960d06a8fc2e30bc5805d39b06311275e727f40af061e5b50a2610a88301
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
x86_64:
kernel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cc5efdeb85be1cfc6d95f71ba142916
SHA-256: 193d277abd203bd5d8e10773363e7796c48869e329e6bc7b98ba020459cb354b
kernel-debug-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56be83d45b006083c5621b2c17eb2c4a
SHA-256: 51974e9cefcf8a5673f8aca663b4e14b4a0f148e32c14598d103bb33502a2e7b
kernel-debug-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: de0dba115e0a803435f9c171cd2cd82b
SHA-256: 8d7d75ceaf7f8b1e38282a65868596cf2ec2792780e45fa6bb94cfe5b736b273
kernel-debug-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 52382e5f4a78ff2d0c3bcef9f9d104cf
SHA-256: 92f3db5347ef16aad46f3e81392ce1f05a6f63b5c370af444d4a70202de270ab
kernel-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1723b4b6711d325fc3bbd76610acf26a
SHA-256: 826cf096df8ac59ad697ced3cb07ebcedf869ff6c862982c08aa95bc60a57741
kernel-debuginfo-common-x86_64-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56474f1461744aa663caa594b368c9f2
SHA-256: 0605be4481054b78133c92f5f4c69f2ab691d9799c1871f3de54f15132ab1ff7
kernel-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 004419e13206a260c797e3e194179126
SHA-256: e65d5191e585cac034cacd7d6810ff8cc6eed770cdf67ab75387dab2f0f3c594
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 39192b84d45957893a9847cacc7cd55b
SHA-256: 52641cdb673baea19a2757310c92426085237e820727844e08bcfe1de3e3cc00
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
Red Hat Enterprise Linux Server EUS (v. 6.0.z)

SRPMS:
kernel-2.6.32-71.14.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: a94bb9f0c4274b96e03a367b40a77613
SHA-256: 4661e2547672412275319425d98b9d16b0228c134de0afec84fce26aa7ee2a7f
 
IA-32:
kernel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 2eee388a08d31a231ffbf1de844838d4
SHA-256: ed01989b2c15c215cd08c05a734c3fd030367c3acd26c7d9e63d0cddd10e8324
kernel-debug-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: ebb181c8b33e39e5e3e9660eb24770ce
SHA-256: cf12d1347101340e6fa957f1dfc673ee2d4fb6e94c5f6dab7ad6141ea2b031d1
kernel-debug-debuginfo-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 9215ab8626eb26d1aaf319db63eaf7f5
SHA-256: 71b428cb6120d4f12acfc4b5c3505068550ba11032a2c146282c6e4c7da3701e
kernel-debug-devel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 26ff1fdbda747ca63c44ab8ce821be0a
SHA-256: 92d73d48c11a82f56650b179439a66423a04500787788046fdfcc4aa77cfba1c
kernel-debuginfo-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 3755e3885a60fc05b9a4bb08f4c72eff
SHA-256: aaf30d92c69947d466d898c1405ccc1124df6645c9e3fb02bb3e60ca86cbbdf0
kernel-debuginfo-common-i686-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: dafaa817689cd3040cf89b590df6bafb
SHA-256: 8d219df347a03a82dc2041b53746fb50aa589c24e6ff08fd728f2853ff5689ee
kernel-devel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: ff1ed86df6cac0cdc847efa0da72dc89
SHA-256: 1b2c2a1b956c8ed9708342ee1ac7a8437a673ce39b3676b9139bc1728043a58e
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2012:1114
    MD5: 14cba618d57458ed7cc5a920b3bb9bf1
SHA-256: 7e5f236c2854867acd27dfdc6759fa5cb6b7dccf34898bc46980811356420945
perf-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
PPC:
kernel-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 3c9e5654ca0c4f4319fabcd7342d1d76
SHA-256: bf14793b1d1d2a4a2a2dd45dbdb3a5e9b385570de5216e174d4cb66e9c373f44
kernel-bootwrapper-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 7832b2e3b917856f59e2df0b8480bc68
SHA-256: 40d70b7da5db1999b4b8e12e5d5db6cd35085a2c2fd0c5f42fa7c3ce76b45083
kernel-debug-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 8d56eb1fcaba34d631a0c84be216686a
SHA-256: 2b4583abc0335fe38a8cb3459d706944a3f21713e040f74cdbef3ed48564596b
kernel-debug-debuginfo-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 526305789c32e88eea8278aad5d5e857
SHA-256: f44071e06df47067b00615f1e61519dd4fe6268e9bef70333f52d184a88f3d65
kernel-debug-devel-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: f4d68098f578df4c2775aa2562026c8a
SHA-256: 2722a901105f802fd1e43b03a4d84f550bad2a0ace22cb9d724cfa1fcf1a8085
kernel-debuginfo-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 5d6b101337240720e192577d9954659b
SHA-256: 015c58f32d6c4138ec72994d68300dfa9454f055edf78033b0f22f9c93aa634f
kernel-debuginfo-common-ppc64-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: f02f1741c71faed39b49b3cb8844c9c4
SHA-256: efce787e7863366ece4d3443cc1812b59ab0c6b0f20d28400cc6337544a96661
kernel-devel-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 12909be0c9ba4e91a88d6d6557aba242
SHA-256: 534390091ef8d4047212869593950094cdc6c153a87352827aa124aea164a286
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.ppc64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 6f1efb3408d3ef04276ec5d452abf2f8
SHA-256: f343916f2034c6844a06cd8b8b6cbd3c5937d92f39ad991ee0402376c808eefc
perf-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
s390x:
kernel-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 32bb62e505e27d1aff2688711d77a27a
SHA-256: 3ca1016f0c00f55f874ff82177a45678e0d85eac321ba742b399e7ed127bd127
kernel-debug-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: eeadbf0dc9a816024e12cd17becc0782
SHA-256: dc485ae36f33ed437723107b135604a72c25e53cf82df903f271ae69486c5375
kernel-debug-debuginfo-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 06622b8198d8e69b25d2b69d1c48acae
SHA-256: a3a091dbf1926d79bb39379850dd2c08758889285f246d87c45684edca9d19e5
kernel-debug-devel-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: e41175dd23a1584eddb580634f05e43c
SHA-256: ebead92d8e48e12731747adbe1714e016c73a6ec9e138064e25c0861cf4be7c5
kernel-debuginfo-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 4e8031860db8d4157195caf3967abecb
SHA-256: 3bcf0f765ec883f7edf0d05e467ca9a57158f6103463f4290f791f964235cb67
kernel-debuginfo-common-s390x-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: dd29588487d848c6d6d3bf5a5c6fcea8
SHA-256: a22e2061d2ba37f168c56148682865ae8001faaae2b24553d30665b1af682bd2
kernel-devel-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 1f28ffd5edb1cb42f2d7a6536eceaf17
SHA-256: 7e535035d4f16a14a5b40eab0babf4a9d4ea667de70affb91793d536ad2b7051
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 35bdb3b0152bfc101b0f9f654dee00f2
SHA-256: 07087622a859bf499eee279cec7283bbc270a37e9a7d18218463abef259f21c7
kernel-kdump-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 237c9e9600851b9b08c8570bb3a6baf8
SHA-256: 9de6e714b5670fa9a6f8d888d9e06742d5b930ee2017f640595ad5f762b8269a
kernel-kdump-debuginfo-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 4596e2fa28bd337e5a4fd41fee61615d
SHA-256: e6204d3a094ac1325d0cd41fceef4137e186c9bdf4af49e3b0379b13ef02a3c3
kernel-kdump-devel-2.6.32-71.14.1.el6.s390x.rpm
File outdated by:  RHSA-2012:1114
    MD5: 403fa53dc8d38abecfeba42b05cc115c
SHA-256: 06bc960d06a8fc2e30bc5805d39b06311275e727f40af061e5b50a2610a88301
perf-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
x86_64:
kernel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 9cc5efdeb85be1cfc6d95f71ba142916
SHA-256: 193d277abd203bd5d8e10773363e7796c48869e329e6bc7b98ba020459cb354b
kernel-debug-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 56be83d45b006083c5621b2c17eb2c4a
SHA-256: 51974e9cefcf8a5673f8aca663b4e14b4a0f148e32c14598d103bb33502a2e7b
kernel-debug-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: de0dba115e0a803435f9c171cd2cd82b
SHA-256: 8d7d75ceaf7f8b1e38282a65868596cf2ec2792780e45fa6bb94cfe5b736b273
kernel-debug-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 52382e5f4a78ff2d0c3bcef9f9d104cf
SHA-256: 92f3db5347ef16aad46f3e81392ce1f05a6f63b5c370af444d4a70202de270ab
kernel-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 1723b4b6711d325fc3bbd76610acf26a
SHA-256: 826cf096df8ac59ad697ced3cb07ebcedf869ff6c862982c08aa95bc60a57741
kernel-debuginfo-common-x86_64-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 56474f1461744aa663caa594b368c9f2
SHA-256: 0605be4481054b78133c92f5f4c69f2ab691d9799c1871f3de54f15132ab1ff7
kernel-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 004419e13206a260c797e3e194179126
SHA-256: e65d5191e585cac034cacd7d6810ff8cc6eed770cdf67ab75387dab2f0f3c594
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2012:1114
    MD5: 39192b84d45957893a9847cacc7cd55b
SHA-256: 52641cdb673baea19a2757310c92426085237e820727844e08bcfe1de3e3cc00
perf-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2012:1114
    MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kernel-2.6.32-71.14.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: a94bb9f0c4274b96e03a367b40a77613
SHA-256: 4661e2547672412275319425d98b9d16b0228c134de0afec84fce26aa7ee2a7f
 
IA-32:
kernel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2eee388a08d31a231ffbf1de844838d4
SHA-256: ed01989b2c15c215cd08c05a734c3fd030367c3acd26c7d9e63d0cddd10e8324
kernel-debug-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ebb181c8b33e39e5e3e9660eb24770ce
SHA-256: cf12d1347101340e6fa957f1dfc673ee2d4fb6e94c5f6dab7ad6141ea2b031d1
kernel-debug-debuginfo-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9215ab8626eb26d1aaf319db63eaf7f5
SHA-256: 71b428cb6120d4f12acfc4b5c3505068550ba11032a2c146282c6e4c7da3701e
kernel-debug-devel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26ff1fdbda747ca63c44ab8ce821be0a
SHA-256: 92d73d48c11a82f56650b179439a66423a04500787788046fdfcc4aa77cfba1c
kernel-debuginfo-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3755e3885a60fc05b9a4bb08f4c72eff
SHA-256: aaf30d92c69947d466d898c1405ccc1124df6645c9e3fb02bb3e60ca86cbbdf0
kernel-debuginfo-common-i686-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: dafaa817689cd3040cf89b590df6bafb
SHA-256: 8d219df347a03a82dc2041b53746fb50aa589c24e6ff08fd728f2853ff5689ee
kernel-devel-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ff1ed86df6cac0cdc847efa0da72dc89
SHA-256: 1b2c2a1b956c8ed9708342ee1ac7a8437a673ce39b3676b9139bc1728043a58e
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 14cba618d57458ed7cc5a920b3bb9bf1
SHA-256: 7e5f236c2854867acd27dfdc6759fa5cb6b7dccf34898bc46980811356420945
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
x86_64:
kernel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cc5efdeb85be1cfc6d95f71ba142916
SHA-256: 193d277abd203bd5d8e10773363e7796c48869e329e6bc7b98ba020459cb354b
kernel-debug-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56be83d45b006083c5621b2c17eb2c4a
SHA-256: 51974e9cefcf8a5673f8aca663b4e14b4a0f148e32c14598d103bb33502a2e7b
kernel-debug-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: de0dba115e0a803435f9c171cd2cd82b
SHA-256: 8d7d75ceaf7f8b1e38282a65868596cf2ec2792780e45fa6bb94cfe5b736b273
kernel-debug-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 52382e5f4a78ff2d0c3bcef9f9d104cf
SHA-256: 92f3db5347ef16aad46f3e81392ce1f05a6f63b5c370af444d4a70202de270ab
kernel-debuginfo-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1723b4b6711d325fc3bbd76610acf26a
SHA-256: 826cf096df8ac59ad697ced3cb07ebcedf869ff6c862982c08aa95bc60a57741
kernel-debuginfo-common-x86_64-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56474f1461744aa663caa594b368c9f2
SHA-256: 0605be4481054b78133c92f5f4c69f2ab691d9799c1871f3de54f15132ab1ff7
kernel-devel-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 004419e13206a260c797e3e194179126
SHA-256: e65d5191e585cac034cacd7d6810ff8cc6eed770cdf67ab75387dab2f0f3c594
kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: f232955afc2959327bcfa7675ab8a75b
SHA-256: b5a14be0c60bb64081faa0d60e5bc54f19de694d689ffc058cb0677ea3510477
kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: efdfc75cd0f18580dd356624d2be489e
SHA-256: 22f09cd2f778700e8a3513ab3913fc2f3f7c72ed0c7e5503fa12e7162c28ed18
kernel-headers-2.6.32-71.14.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 39192b84d45957893a9847cacc7cd55b
SHA-256: 52641cdb673baea19a2757310c92426085237e820727844e08bcfe1de3e3cc00
perf-2.6.32-71.14.1.el6.noarch.rpm     MD5: 979f669105a7b3bc239cfbcc7dfb326b
SHA-256: b63e7707b914cbd8bd537b9145204e0916bbe03e35a0775922fc8783f785cca2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

611385 - CVE-2010-2492 kernel: ecryptfs_uid_hash() buffer overflow
629441 - CVE-2010-3067 kernel: do_io_submit() infoleak
630551 - CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly
630804 - CVE-2010-3078 kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
633140 - CVE-2010-3298 kernel: drivers/net/usb/hso.c: prevent reading uninitialized memory
636386 - CVE-2010-3477 kernel: net/sched/act_police.c infoleak
641410 - CVE-2010-4242 kernel: missing tty ops write function presence check in hci_uart_tty_open()
646725 - CVE-2010-3861 kernel: heap contents leak from ETHTOOL_GRXCLSRLALL
647391 - kernel BUG at mm/migrate.c:113! [rhel-6.0.z]
647416 - CVE-2010-3865 kernel: iovec integer overflow in net/rds/rdma.c
648408 - Do not mix FMODE_ and O_ flags with break_lease() and may_open() [rhel-6.0.z]
648656 - CVE-2010-4072 kernel: ipc/shm.c: reading uninitialized stack memory
648658 - CVE-2010-4073 kernel: ipc/compat*.c: reading uninitialized stack memory
648659 - CVE-2010-4074 kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory
648660 - CVE-2010-4075 kernel: drivers/serial/serial_core.c: reading uninitialized stack memory
648663 - CVE-2010-4077 kernel: drivers/char/nozomi.c: reading uninitialized stack memory
648666 - CVE-2010-4079 kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory
648669 - CVE-2010-4080 kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory
648670 - CVE-2010-4081 kernel: drivers/sound/pci/rme9652/hdspm.c: reading uninitialized stack memory
648671 - CVE-2010-4082 kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory
648673 - CVE-2010-4083 kernel: ipc/sem.c: reading uninitialized stack memory
649695 - CVE-2010-3874 kernel: CAN minor heap overflow
649715 - CVE-2010-3876 kernel: net/packet/af_packet.c: reading uninitialized stack memory
651264 - CVE-2010-3880 kernel: logic error in INET_DIAG bytecode auditing
651698 - CVE-2010-4158 kernel: socket filters infoleak
651892 - CVE-2010-4160 kernel: L2TP send buffer allocation size overflows
652529 - CVE-2010-4162 kernel: bio: integer overflow page count when mapping/copying user data
652957 - CVE-2010-4163 CVE-2010-4668 kernel: panic when submitting certain 0-length I/O requests
653340 - [kvm] VIRT-IO NIC state is reported as 'unknown' on vm running over RHEL6 host [rhel-6.0.z]
656264 - CVE-2010-4248 kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
656756 - CVE-2010-4249 kernel: unix socket local dos
658879 - kernel 2.6.32-84.el6 breaks systemtap [rhel-6.0.z]
659611 - lpfc: Fixed crashes for BUG_ONs hit in the lpfc_abort_handler [rhel-6.0.z]
660188 - CVE-2010-4263 kernel: igb panics when receiving tag vlan packet
660244 - lpfc: Set heartbeat timer off by default [rhel-6.0.z]
660591 - neighbour update causes an Oops when using tunnel device [rhel-6.0.z]
665470 - CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak


References

https://www.redhat.com/security/data/cve/CVE-2010-2492.html
https://www.redhat.com/security/data/cve/CVE-2010-3067.html
https://www.redhat.com/security/data/cve/CVE-2010-3078.html
https://www.redhat.com/security/data/cve/CVE-2010-3080.html
https://www.redhat.com/security/data/cve/CVE-2010-3298.html
https://www.redhat.com/security/data/cve/CVE-2010-3477.html
https://www.redhat.com/security/data/cve/CVE-2010-3861.html
https://www.redhat.com/security/data/cve/CVE-2010-3865.html
https://www.redhat.com/security/data/cve/CVE-2010-3874.html
https://www.redhat.com/security/data/cve/CVE-2010-3876.html
https://www.redhat.com/security/data/cve/CVE-2010-3880.html
https://www.redhat.com/security/data/cve/CVE-2010-4072.html
https://www.redhat.com/security/data/cve/CVE-2010-4073.html
https://www.redhat.com/security/data/cve/CVE-2010-4074.html
https://www.redhat.com/security/data/cve/CVE-2010-4075.html
https://www.redhat.com/security/data/cve/CVE-2010-4077.html
https://www.redhat.com/security/data/cve/CVE-2010-4079.html
https://www.redhat.com/security/data/cve/CVE-2010-4080.html
https://www.redhat.com/security/data/cve/CVE-2010-4081.html
https://www.redhat.com/security/data/cve/CVE-2010-4082.html
https://www.redhat.com/security/data/cve/CVE-2010-4083.html
https://www.redhat.com/security/data/cve/CVE-2010-4158.html
https://www.redhat.com/security/data/cve/CVE-2010-4160.html
https://www.redhat.com/security/data/cve/CVE-2010-4162.html
https://www.redhat.com/security/data/cve/CVE-2010-4163.html
https://www.redhat.com/security/data/cve/CVE-2010-4242.html
https://www.redhat.com/security/data/cve/CVE-2010-4248.html
https://www.redhat.com/security/data/cve/CVE-2010-4249.html
https://www.redhat.com/security/data/cve/CVE-2010-4263.html
https://www.redhat.com/security/data/cve/CVE-2010-4525.html
https://www.redhat.com/security/data/cve/CVE-2010-4668.html
https://access.redhat.com/security/updates/classification/#important
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0007


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/