Skip to navigation

Security Advisory Important: kernel security, bug fix, and enhancement update

Advisory: RHSA-2011:1189-1
Type: Security Advisory
Severity: Important
Issued on: 2011-08-23
Last updated on: 2011-08-23
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.1.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2011-1182
CVE-2011-1576
CVE-2011-1593
CVE-2011-1776
CVE-2011-1898
CVE-2011-2183
CVE-2011-2213
CVE-2011-2491
CVE-2011-2492
CVE-2011-2495
CVE-2011-2497
CVE-2011-2517
CVE-2011-2689
CVE-2011-2695

Details

Updated kernel packages that fix several security issues, various bugs, and
add two enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Security issues:

* Using PCI passthrough without interrupt remapping support allowed KVM
guests to generate MSI interrupts and thus potentially inject traps. A
privileged guest user could use this flaw to crash the host or possibly
escalate their privileges on the host. The fix for this issue can prevent
PCI passthrough working and guests starting. Refer to Red Hat Bugzilla bug
715555 for details. (CVE-2011-1898, Important)

* Flaw in the client-side NLM implementation could allow a local,
unprivileged user to cause a denial of service. (CVE-2011-2491, Important)

* Integer underflow in the Bluetooth implementation could allow a remote
attacker to cause a denial of service or escalate their privileges by
sending a specially-crafted request to a target system via Bluetooth.
(CVE-2011-2497, Important)

* Buffer overflows in the netlink-based wireless configuration interface
implementation could allow a local user, who has the CAP_NET_ADMIN
capability, to cause a denial of service or escalate their privileges on
systems that have an active wireless interface. (CVE-2011-2517, Important)

* Flaw in the way the maximum file offset was handled for ext4 file systems
could allow a local, unprivileged user to cause a denial of service.
(CVE-2011-2695, Important)

* Flaw allowed napi_reuse_skb() to be called on VLAN packets. An attacker
on the local network could use this flaw to send crafted packets to a
target, possibly causing a denial of service. (CVE-2011-1576, Moderate)

* Integer signedness error in next_pidmap() could allow a local,
unprivileged user to cause a denial of service. (CVE-2011-1593, Moderate)

* Race condition in the memory merging support (KSM) could allow a local,
unprivileged user to cause a denial of service. KSM is off by default, but
on systems running VDSM, or on KVM hosts, it is likely turned on by the
ksm/ksmtuned services. (CVE-2011-2183, Moderate)

* Flaw in inet_diag_bc_audit() could allow a local, unprivileged user to
cause a denial of service. (CVE-2011-2213, Moderate)

* Flaw in the way space was allocated in the Global File System 2 (GFS2)
implementation. If the file system was almost full, and a local,
unprivileged user made an fallocate() request, it could result in a denial
of service. Setting quotas to prevent users from using all available disk
space would prevent exploitation of this flaw. (CVE-2011-2689, Moderate)

* Local, unprivileged users could send signals via the sigqueueinfo system
call, with si_code set to SI_TKILL and with spoofed process and user IDs,
to other processes. This flaw does not allow existing permission checks to
be bypassed; signals can only be sent if your privileges allow you to
already do so. (CVE-2011-1182, Low)

* Heap overflow in the EFI GUID Partition Table (GPT) implementation could
allow a local attacker to cause a denial of service by mounting a disk
containing crafted partition tables. (CVE-2011-1776, Low)

* Structure padding in two structures in the Bluetooth implementation was
not initialized properly before being copied to user-space, possibly
allowing local, unprivileged users to leak kernel stack memory to
user-space. (CVE-2011-2492, Low)

* /proc/[PID]/io is world-readable by default. Previously, these files
could be read without any further restrictions. A local, unprivileged user
could read these files, belonging to other, possibly privileged processes
to gather confidential information, such as the length of a password used
in a process. (CVE-2011-2495, Low)

Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491; Dan
Rosenberg for reporting CVE-2011-2497 and CVE-2011-2213; Ryan Sweat for
reporting CVE-2011-1576; Robert Swiecki for reporting CVE-2011-1593; Andrea
Righi for reporting CVE-2011-2183; Julien Tinnes of the Google Security
Team for reporting CVE-2011-1182; Timo Warns for reporting CVE-2011-1776;
Marek Kroemeke and Filip Palian for reporting CVE-2011-2492; and Vasiliy
Kulikov of Openwall for reporting CVE-2011-2495.


Solution

Refer to the Technical Notes, available shortly from the link in the
References, for bug fix and enhancement details.

Users should upgrade to these updated packages, which contain
backported patches to correct these issues, and fix the bugs and add
the enhancements noted in the Technical Notes. The system must be
rebooted for this update to take effect.

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kernel-2.6.32-131.12.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2a69f7e2d63cd79455febb1f5e9d1b9d
SHA-256: 3c8c5136a74ee75c328d85c06418e92a69541d45f97ff00eb742b77849b2b1a2
 
IA-32:
kernel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: bd0c31c11534a02f3eb4da0734e2775e
SHA-256: 906f19fb0a531fbc3346a28675588fc1a718a28d11c5c612560e3f485446da3b
kernel-debug-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5940b5d25c420dbb4299a75745c897c5
SHA-256: a6b9bdde7a9756539b3027affa20ac0796f7d712bbe765b5f7102b2de2b386a2
kernel-debug-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 36a72ad0da968f455fe8e8ec3030dfe8
SHA-256: 1a7765991511ed1021c6568ed342f70b9f6dbc616c305621acbfd23111749599
kernel-debug-devel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: cadaf3276c29e992cda843db2d62134d
SHA-256: fea5ffbb9dddd7f2c93e17482dca3741568bd298e84c762b2bf71624b7fa9a42
kernel-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 7428b14050862687f9eed017704ac8eb
SHA-256: 359e7db1769320cf5e4572b287c755c0a221899fb1ba932dc2e06d683f5c9de6
kernel-debuginfo-common-i686-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8909ecaaa23d7738ea9d4febcb316cbe
SHA-256: 11efddf15491829211f8b26fb5679c630529d2cbf75b44443b0ea6a1ae972333
kernel-devel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c1f3e07665324bab836f2ebe1788c26c
SHA-256: b41c4b6dba6aa8e019513d73e6cb1e520882f5028b0ecc17be187ede6b96a33f
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 61c4659e4a169533cdd8c8ff69f2c923
SHA-256: 0c0a532299f25d073accf371fcea487dfccd2efcd747733534c3898ba7620e48
perf-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0a68e68dda44f8f5aa0bb7d2e2161902
SHA-256: b7877765eff87cb662cdaa75f48d22aa5c1970283a1730769db72f7d8378bffa
perf-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4fcb4f1e805e2f715478e61279b69bd4
SHA-256: 307fa574e53f655ebfbbedd1b7d6780afc9c383d0621f84a4e6c422daf8116e2
 
x86_64:
kernel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4be2d4beba43f01955410d688ce45a28
SHA-256: 21b7c1b0b6db0bbe369bced75ebaa42e420e7392852495e9a781a4eafffbb05a
kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: b9a68486ec7bd22a3bc2f5b9b48ce861
SHA-256: ac824b01f9fb38faf4ab63cdb07b339fcba5b8bc43b3cdd916912e93ae5a8ca8
kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1f5a0da1decd03ddb590dd1c87cc84f1
SHA-256: 444b10567791bf1299c46a9bae00ab0a1a9dbcd4bfbb92d0f677bab19b491469
kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4730c902f16880cae5659c04e706c38a
SHA-256: 55fadf5382b25472d98e695a3d19d3501ced218d77f533fe333a5d603583cbaa
kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 99c07d2de5b3c10ebb544112ead1fadf
SHA-256: 2d770c6052935d577c194b596c6039f37fc41b07a9073ef55b20b8b349d8a616
kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0cb1c2b968ab28d0f70f3d8fd4da3f54
SHA-256: d50b361039e90be83b6bdeecdd90fa92a9f6fc1b5cdd1cefc16afd41efb2ae9c
kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3f96909ed14443671c41b058dab1ed60
SHA-256: d15a5f654af1c2e2a844abfd981f4ea8df03b48782df735c651b5e59e7b61b46
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: dd51b9aebeeae066bf08d781381987a2
SHA-256: 19a4a85085e68739f224ecba0a5bfc8b12ed2bf61f4a64a57f248c65ee1b4745
perf-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: af3d1d725ded962bda4017cf211df321
SHA-256: 2757a65ad256fedfc03828d3539c460faa9d941618eaf02e8ede584e01b02cb3
perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1963c8f8a4e543ef85b72e90d2c8beb8
SHA-256: 42eb3399d14e50496891169ebe1678fddc78b1381c3dac354fc3055a6799dd2f
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kernel-2.6.32-131.12.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2a69f7e2d63cd79455febb1f5e9d1b9d
SHA-256: 3c8c5136a74ee75c328d85c06418e92a69541d45f97ff00eb742b77849b2b1a2
 
x86_64:
kernel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4be2d4beba43f01955410d688ce45a28
SHA-256: 21b7c1b0b6db0bbe369bced75ebaa42e420e7392852495e9a781a4eafffbb05a
kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: b9a68486ec7bd22a3bc2f5b9b48ce861
SHA-256: ac824b01f9fb38faf4ab63cdb07b339fcba5b8bc43b3cdd916912e93ae5a8ca8
kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1f5a0da1decd03ddb590dd1c87cc84f1
SHA-256: 444b10567791bf1299c46a9bae00ab0a1a9dbcd4bfbb92d0f677bab19b491469
kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4730c902f16880cae5659c04e706c38a
SHA-256: 55fadf5382b25472d98e695a3d19d3501ced218d77f533fe333a5d603583cbaa
kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 99c07d2de5b3c10ebb544112ead1fadf
SHA-256: 2d770c6052935d577c194b596c6039f37fc41b07a9073ef55b20b8b349d8a616
kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0cb1c2b968ab28d0f70f3d8fd4da3f54
SHA-256: d50b361039e90be83b6bdeecdd90fa92a9f6fc1b5cdd1cefc16afd41efb2ae9c
kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3f96909ed14443671c41b058dab1ed60
SHA-256: d15a5f654af1c2e2a844abfd981f4ea8df03b48782df735c651b5e59e7b61b46
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: dd51b9aebeeae066bf08d781381987a2
SHA-256: 19a4a85085e68739f224ecba0a5bfc8b12ed2bf61f4a64a57f248c65ee1b4745
perf-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: af3d1d725ded962bda4017cf211df321
SHA-256: 2757a65ad256fedfc03828d3539c460faa9d941618eaf02e8ede584e01b02cb3
perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1963c8f8a4e543ef85b72e90d2c8beb8
SHA-256: 42eb3399d14e50496891169ebe1678fddc78b1381c3dac354fc3055a6799dd2f
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kernel-2.6.32-131.12.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2a69f7e2d63cd79455febb1f5e9d1b9d
SHA-256: 3c8c5136a74ee75c328d85c06418e92a69541d45f97ff00eb742b77849b2b1a2
 
IA-32:
kernel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: bd0c31c11534a02f3eb4da0734e2775e
SHA-256: 906f19fb0a531fbc3346a28675588fc1a718a28d11c5c612560e3f485446da3b
kernel-debug-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5940b5d25c420dbb4299a75745c897c5
SHA-256: a6b9bdde7a9756539b3027affa20ac0796f7d712bbe765b5f7102b2de2b386a2
kernel-debug-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 36a72ad0da968f455fe8e8ec3030dfe8
SHA-256: 1a7765991511ed1021c6568ed342f70b9f6dbc616c305621acbfd23111749599
kernel-debug-devel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: cadaf3276c29e992cda843db2d62134d
SHA-256: fea5ffbb9dddd7f2c93e17482dca3741568bd298e84c762b2bf71624b7fa9a42
kernel-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 7428b14050862687f9eed017704ac8eb
SHA-256: 359e7db1769320cf5e4572b287c755c0a221899fb1ba932dc2e06d683f5c9de6
kernel-debuginfo-common-i686-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8909ecaaa23d7738ea9d4febcb316cbe
SHA-256: 11efddf15491829211f8b26fb5679c630529d2cbf75b44443b0ea6a1ae972333
kernel-devel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c1f3e07665324bab836f2ebe1788c26c
SHA-256: b41c4b6dba6aa8e019513d73e6cb1e520882f5028b0ecc17be187ede6b96a33f
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 61c4659e4a169533cdd8c8ff69f2c923
SHA-256: 0c0a532299f25d073accf371fcea487dfccd2efcd747733534c3898ba7620e48
perf-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0a68e68dda44f8f5aa0bb7d2e2161902
SHA-256: b7877765eff87cb662cdaa75f48d22aa5c1970283a1730769db72f7d8378bffa
perf-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4fcb4f1e805e2f715478e61279b69bd4
SHA-256: 307fa574e53f655ebfbbedd1b7d6780afc9c383d0621f84a4e6c422daf8116e2
 
PPC:
kernel-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8bab4edee1ec62d8b072495a6abb6674
SHA-256: 0dbbd175da699f40b32b33e4903e3e6461f14d97da5eb72ffd5993fdc05adad4
kernel-bootwrapper-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 12acdae9ddf31025727be9d4ca488dd8
SHA-256: aeed39a30e1519b1049f48fe8be7fb820c3422c3c1bbac8bb47cb2cac2d962fd
kernel-debug-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f122b0b8bbbc5aff0eeae998ed39bb08
SHA-256: fb92711caea5883326ee491770d266cdc76235060b6196516db2795eea6ee214
kernel-debug-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a4747dc6f12883b5c1187a0d867b1a5f
SHA-256: c2c453649d76f0887f3477df15108c8b95212214296f660875f388cff3c8e3de
kernel-debug-devel-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: e924d0ddc8fba246c09873ef1778eda4
SHA-256: c9fc1e311a14c378f1c29cb1f5c0bc298c454aec04c48c5241474a203ea307f5
kernel-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: b8b3b77ec8343ff218344b06237cea6c
SHA-256: 923f839cfc74f5cdcc5e39946111aa3842296cc47374ff7fd9d962ed83c7c34e
kernel-debuginfo-common-ppc64-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 91777bf569e6c40011a6f84fa0a9295d
SHA-256: 649e289fd55deeae6cd84ff827b4f1ebad05e57212a9a5991643d67afd419849
kernel-devel-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: eb875ac2e43d931ad3eba142cd25bdbc
SHA-256: 1502253c43f9c45afa426b044e07bd156eea78a5fea5d6b1e687e9e649ccce50
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5f5da82f42661754ea6eda589d61d5a5
SHA-256: 2751cbbf00dd3e49bdc771ccc5b65f6e3a8905d1f58556b799a799ced689e8f0
perf-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 92d3beb6d738b49d62c6733291df2554
SHA-256: a9b8ae927cc540b9b7f1313cbf9e05e8da070eb94193a66b615e9bc20ea01361
perf-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9717080078a04dcb55c1d0a0de241f64
SHA-256: af086a87b1e5d685c5f31ca963c8d2847297b03d0692b7ce1bf0c00fce7fd40c
 
s390x:
kernel-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 728b897079bdf0f0fbcbd62a38d86045
SHA-256: 8d71cd303d647c9e9d2f95d847b651773f08aba051b2ce207e675739fd25d009
kernel-debug-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: c68b3bd3c1a2ed90e9bd526e4c1b1d9d
SHA-256: 24d2fc752135d6af7207f3b02e85fca216a9fd9fd2a3184f20af909e59ec463d
kernel-debug-debuginfo-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: a84b06c40007e18bd9e9e4ec9b4f086d
SHA-256: c268384e35a759c362077a053b0220f1c23da706f10bf568a62035dc3ec73c2a
kernel-debug-devel-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6a9724cdddbc72a09fe3c14fda171bea
SHA-256: d1fb9f816e2c57f42937b85c8afe03aa8e14780ba0126932693dc14346916ccd
kernel-debuginfo-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 820c9e2640a52475659d7fcc7ec69de0
SHA-256: e7341776868dea5f315246f567d4440d6242660c6d97c6100ea0127b91984ab1
kernel-debuginfo-common-s390x-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: a64585bd031b9de1986e1d7c7f21bd0f
SHA-256: bd40b676bb869950b6eb42dd5ad1b7946c2809b3e141f3953ecf8b3b271123e1
kernel-devel-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 076245db63102130303bc404c700b143
SHA-256: 48b1e4f1a6fc3e51079b422aace5c93f62b88609fdb3adfed976de773602c21b
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 043c93397e12dd1e70b71cfb2539561b
SHA-256: 0598dcf098d237ed1038a89f6783e4cf59b2795c2697d5b4e3623870c9b4bc64
kernel-kdump-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3ab07a934508b0a017604b4eb5d2d531
SHA-256: b74b86ad3bde6d277acf58fa0184655d1a38b337d54da7e8f1aee1ec1df1bb9f
kernel-kdump-debuginfo-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3b079108be7be4c988558ead01614271
SHA-256: 451fedc3917d145280f89c682c336c5a726d8a3b7e5014d21760db3bbedc6249
kernel-kdump-devel-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cde996201ded348599afb0ad5e36aff
SHA-256: 66df8c4a457ee84a9b37611af519eac57d4abbe90627b82939b2263b9288d52c
perf-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0cc50a1cc67fb0e657295bc798acbf1b
SHA-256: 3e477eead918dd0fb6d4ddce915f59ca787d0935ff2fb1b0ea80212d0cf7bf0b
perf-debuginfo-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: ce1f193ccb1acff92e725fb339a106e8
SHA-256: 1c2810479e7e1abbfe6da0743bed706cf9b89718d7217239d4b37ba553c41405
 
x86_64:
kernel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4be2d4beba43f01955410d688ce45a28
SHA-256: 21b7c1b0b6db0bbe369bced75ebaa42e420e7392852495e9a781a4eafffbb05a
kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: b9a68486ec7bd22a3bc2f5b9b48ce861
SHA-256: ac824b01f9fb38faf4ab63cdb07b339fcba5b8bc43b3cdd916912e93ae5a8ca8
kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1f5a0da1decd03ddb590dd1c87cc84f1
SHA-256: 444b10567791bf1299c46a9bae00ab0a1a9dbcd4bfbb92d0f677bab19b491469
kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4730c902f16880cae5659c04e706c38a
SHA-256: 55fadf5382b25472d98e695a3d19d3501ced218d77f533fe333a5d603583cbaa
kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 99c07d2de5b3c10ebb544112ead1fadf
SHA-256: 2d770c6052935d577c194b596c6039f37fc41b07a9073ef55b20b8b349d8a616
kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0cb1c2b968ab28d0f70f3d8fd4da3f54
SHA-256: d50b361039e90be83b6bdeecdd90fa92a9f6fc1b5cdd1cefc16afd41efb2ae9c
kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3f96909ed14443671c41b058dab1ed60
SHA-256: d15a5f654af1c2e2a844abfd981f4ea8df03b48782df735c651b5e59e7b61b46
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: dd51b9aebeeae066bf08d781381987a2
SHA-256: 19a4a85085e68739f224ecba0a5bfc8b12ed2bf61f4a64a57f248c65ee1b4745
perf-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: af3d1d725ded962bda4017cf211df321
SHA-256: 2757a65ad256fedfc03828d3539c460faa9d941618eaf02e8ede584e01b02cb3
perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1963c8f8a4e543ef85b72e90d2c8beb8
SHA-256: 42eb3399d14e50496891169ebe1678fddc78b1381c3dac354fc3055a6799dd2f
 
Red Hat Enterprise Linux Server EUS (v. 6.1.z)

SRPMS:
kernel-2.6.32-131.12.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2a69f7e2d63cd79455febb1f5e9d1b9d
SHA-256: 3c8c5136a74ee75c328d85c06418e92a69541d45f97ff00eb742b77849b2b1a2
 
IA-32:
kernel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: bd0c31c11534a02f3eb4da0734e2775e
SHA-256: 906f19fb0a531fbc3346a28675588fc1a718a28d11c5c612560e3f485446da3b
kernel-debug-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 5940b5d25c420dbb4299a75745c897c5
SHA-256: a6b9bdde7a9756539b3027affa20ac0796f7d712bbe765b5f7102b2de2b386a2
kernel-debug-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 36a72ad0da968f455fe8e8ec3030dfe8
SHA-256: 1a7765991511ed1021c6568ed342f70b9f6dbc616c305621acbfd23111749599
kernel-debug-devel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: cadaf3276c29e992cda843db2d62134d
SHA-256: fea5ffbb9dddd7f2c93e17482dca3741568bd298e84c762b2bf71624b7fa9a42
kernel-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 7428b14050862687f9eed017704ac8eb
SHA-256: 359e7db1769320cf5e4572b287c755c0a221899fb1ba932dc2e06d683f5c9de6
kernel-debuginfo-common-i686-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 8909ecaaa23d7738ea9d4febcb316cbe
SHA-256: 11efddf15491829211f8b26fb5679c630529d2cbf75b44443b0ea6a1ae972333
kernel-devel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: c1f3e07665324bab836f2ebe1788c26c
SHA-256: b41c4b6dba6aa8e019513d73e6cb1e520882f5028b0ecc17be187ede6b96a33f
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 61c4659e4a169533cdd8c8ff69f2c923
SHA-256: 0c0a532299f25d073accf371fcea487dfccd2efcd747733534c3898ba7620e48
perf-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 0a68e68dda44f8f5aa0bb7d2e2161902
SHA-256: b7877765eff87cb662cdaa75f48d22aa5c1970283a1730769db72f7d8378bffa
perf-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4fcb4f1e805e2f715478e61279b69bd4
SHA-256: 307fa574e53f655ebfbbedd1b7d6780afc9c383d0621f84a4e6c422daf8116e2
 
PPC:
kernel-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 8bab4edee1ec62d8b072495a6abb6674
SHA-256: 0dbbd175da699f40b32b33e4903e3e6461f14d97da5eb72ffd5993fdc05adad4
kernel-bootwrapper-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 12acdae9ddf31025727be9d4ca488dd8
SHA-256: aeed39a30e1519b1049f48fe8be7fb820c3422c3c1bbac8bb47cb2cac2d962fd
kernel-debug-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: f122b0b8bbbc5aff0eeae998ed39bb08
SHA-256: fb92711caea5883326ee491770d266cdc76235060b6196516db2795eea6ee214
kernel-debug-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: a4747dc6f12883b5c1187a0d867b1a5f
SHA-256: c2c453649d76f0887f3477df15108c8b95212214296f660875f388cff3c8e3de
kernel-debug-devel-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: e924d0ddc8fba246c09873ef1778eda4
SHA-256: c9fc1e311a14c378f1c29cb1f5c0bc298c454aec04c48c5241474a203ea307f5
kernel-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: b8b3b77ec8343ff218344b06237cea6c
SHA-256: 923f839cfc74f5cdcc5e39946111aa3842296cc47374ff7fd9d962ed83c7c34e
kernel-debuginfo-common-ppc64-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 91777bf569e6c40011a6f84fa0a9295d
SHA-256: 649e289fd55deeae6cd84ff827b4f1ebad05e57212a9a5991643d67afd419849
kernel-devel-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: eb875ac2e43d931ad3eba142cd25bdbc
SHA-256: 1502253c43f9c45afa426b044e07bd156eea78a5fea5d6b1e687e9e649ccce50
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 5f5da82f42661754ea6eda589d61d5a5
SHA-256: 2751cbbf00dd3e49bdc771ccc5b65f6e3a8905d1f58556b799a799ced689e8f0
perf-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 92d3beb6d738b49d62c6733291df2554
SHA-256: a9b8ae927cc540b9b7f1313cbf9e05e8da070eb94193a66b615e9bc20ea01361
perf-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 9717080078a04dcb55c1d0a0de241f64
SHA-256: af086a87b1e5d685c5f31ca963c8d2847297b03d0692b7ce1bf0c00fce7fd40c
 
s390x:
kernel-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 728b897079bdf0f0fbcbd62a38d86045
SHA-256: 8d71cd303d647c9e9d2f95d847b651773f08aba051b2ce207e675739fd25d009
kernel-debug-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: c68b3bd3c1a2ed90e9bd526e4c1b1d9d
SHA-256: 24d2fc752135d6af7207f3b02e85fca216a9fd9fd2a3184f20af909e59ec463d
kernel-debug-debuginfo-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: a84b06c40007e18bd9e9e4ec9b4f086d
SHA-256: c268384e35a759c362077a053b0220f1c23da706f10bf568a62035dc3ec73c2a
kernel-debug-devel-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 6a9724cdddbc72a09fe3c14fda171bea
SHA-256: d1fb9f816e2c57f42937b85c8afe03aa8e14780ba0126932693dc14346916ccd
kernel-debuginfo-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 820c9e2640a52475659d7fcc7ec69de0
SHA-256: e7341776868dea5f315246f567d4440d6242660c6d97c6100ea0127b91984ab1
kernel-debuginfo-common-s390x-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: a64585bd031b9de1986e1d7c7f21bd0f
SHA-256: bd40b676bb869950b6eb42dd5ad1b7946c2809b3e141f3953ecf8b3b271123e1
kernel-devel-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 076245db63102130303bc404c700b143
SHA-256: 48b1e4f1a6fc3e51079b422aace5c93f62b88609fdb3adfed976de773602c21b
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 043c93397e12dd1e70b71cfb2539561b
SHA-256: 0598dcf098d237ed1038a89f6783e4cf59b2795c2697d5b4e3623870c9b4bc64
kernel-kdump-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 3ab07a934508b0a017604b4eb5d2d531
SHA-256: b74b86ad3bde6d277acf58fa0184655d1a38b337d54da7e8f1aee1ec1df1bb9f
kernel-kdump-debuginfo-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 3b079108be7be4c988558ead01614271
SHA-256: 451fedc3917d145280f89c682c336c5a726d8a3b7e5014d21760db3bbedc6249
kernel-kdump-devel-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 9cde996201ded348599afb0ad5e36aff
SHA-256: 66df8c4a457ee84a9b37611af519eac57d4abbe90627b82939b2263b9288d52c
perf-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 0cc50a1cc67fb0e657295bc798acbf1b
SHA-256: 3e477eead918dd0fb6d4ddce915f59ca787d0935ff2fb1b0ea80212d0cf7bf0b
perf-debuginfo-2.6.32-131.12.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: ce1f193ccb1acff92e725fb339a106e8
SHA-256: 1c2810479e7e1abbfe6da0743bed706cf9b89718d7217239d4b37ba553c41405
 
x86_64:
kernel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4be2d4beba43f01955410d688ce45a28
SHA-256: 21b7c1b0b6db0bbe369bced75ebaa42e420e7392852495e9a781a4eafffbb05a
kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: b9a68486ec7bd22a3bc2f5b9b48ce861
SHA-256: ac824b01f9fb38faf4ab63cdb07b339fcba5b8bc43b3cdd916912e93ae5a8ca8
kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 1f5a0da1decd03ddb590dd1c87cc84f1
SHA-256: 444b10567791bf1299c46a9bae00ab0a1a9dbcd4bfbb92d0f677bab19b491469
kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4730c902f16880cae5659c04e706c38a
SHA-256: 55fadf5382b25472d98e695a3d19d3501ced218d77f533fe333a5d603583cbaa
kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 99c07d2de5b3c10ebb544112ead1fadf
SHA-256: 2d770c6052935d577c194b596c6039f37fc41b07a9073ef55b20b8b349d8a616
kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 0cb1c2b968ab28d0f70f3d8fd4da3f54
SHA-256: d50b361039e90be83b6bdeecdd90fa92a9f6fc1b5cdd1cefc16afd41efb2ae9c
kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 3f96909ed14443671c41b058dab1ed60
SHA-256: d15a5f654af1c2e2a844abfd981f4ea8df03b48782df735c651b5e59e7b61b46
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: dd51b9aebeeae066bf08d781381987a2
SHA-256: 19a4a85085e68739f224ecba0a5bfc8b12ed2bf61f4a64a57f248c65ee1b4745
perf-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: af3d1d725ded962bda4017cf211df321
SHA-256: 2757a65ad256fedfc03828d3539c460faa9d941618eaf02e8ede584e01b02cb3
perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 1963c8f8a4e543ef85b72e90d2c8beb8
SHA-256: 42eb3399d14e50496891169ebe1678fddc78b1381c3dac354fc3055a6799dd2f
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kernel-2.6.32-131.12.1.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2a69f7e2d63cd79455febb1f5e9d1b9d
SHA-256: 3c8c5136a74ee75c328d85c06418e92a69541d45f97ff00eb742b77849b2b1a2
 
IA-32:
kernel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: bd0c31c11534a02f3eb4da0734e2775e
SHA-256: 906f19fb0a531fbc3346a28675588fc1a718a28d11c5c612560e3f485446da3b
kernel-debug-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5940b5d25c420dbb4299a75745c897c5
SHA-256: a6b9bdde7a9756539b3027affa20ac0796f7d712bbe765b5f7102b2de2b386a2
kernel-debug-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 36a72ad0da968f455fe8e8ec3030dfe8
SHA-256: 1a7765991511ed1021c6568ed342f70b9f6dbc616c305621acbfd23111749599
kernel-debug-devel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: cadaf3276c29e992cda843db2d62134d
SHA-256: fea5ffbb9dddd7f2c93e17482dca3741568bd298e84c762b2bf71624b7fa9a42
kernel-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 7428b14050862687f9eed017704ac8eb
SHA-256: 359e7db1769320cf5e4572b287c755c0a221899fb1ba932dc2e06d683f5c9de6
kernel-debuginfo-common-i686-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8909ecaaa23d7738ea9d4febcb316cbe
SHA-256: 11efddf15491829211f8b26fb5679c630529d2cbf75b44443b0ea6a1ae972333
kernel-devel-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c1f3e07665324bab836f2ebe1788c26c
SHA-256: b41c4b6dba6aa8e019513d73e6cb1e520882f5028b0ecc17be187ede6b96a33f
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 61c4659e4a169533cdd8c8ff69f2c923
SHA-256: 0c0a532299f25d073accf371fcea487dfccd2efcd747733534c3898ba7620e48
perf-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0a68e68dda44f8f5aa0bb7d2e2161902
SHA-256: b7877765eff87cb662cdaa75f48d22aa5c1970283a1730769db72f7d8378bffa
perf-debuginfo-2.6.32-131.12.1.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4fcb4f1e805e2f715478e61279b69bd4
SHA-256: 307fa574e53f655ebfbbedd1b7d6780afc9c383d0621f84a4e6c422daf8116e2
 
x86_64:
kernel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4be2d4beba43f01955410d688ce45a28
SHA-256: 21b7c1b0b6db0bbe369bced75ebaa42e420e7392852495e9a781a4eafffbb05a
kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: b9a68486ec7bd22a3bc2f5b9b48ce861
SHA-256: ac824b01f9fb38faf4ab63cdb07b339fcba5b8bc43b3cdd916912e93ae5a8ca8
kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1f5a0da1decd03ddb590dd1c87cc84f1
SHA-256: 444b10567791bf1299c46a9bae00ab0a1a9dbcd4bfbb92d0f677bab19b491469
kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4730c902f16880cae5659c04e706c38a
SHA-256: 55fadf5382b25472d98e695a3d19d3501ced218d77f533fe333a5d603583cbaa
kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 99c07d2de5b3c10ebb544112ead1fadf
SHA-256: 2d770c6052935d577c194b596c6039f37fc41b07a9073ef55b20b8b349d8a616
kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0cb1c2b968ab28d0f70f3d8fd4da3f54
SHA-256: d50b361039e90be83b6bdeecdd90fa92a9f6fc1b5cdd1cefc16afd41efb2ae9c
kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3f96909ed14443671c41b058dab1ed60
SHA-256: d15a5f654af1c2e2a844abfd981f4ea8df03b48782df735c651b5e59e7b61b46
kernel-doc-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4c79ffdd8b60b6658c830db2f524ce92
SHA-256: 85513b010caa958c0036d9907039a0c9a6513d8b4266fc0a8b00f11bcbbd74fa
kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 9cdb7b7f2914c6983b3020984a8ea2cc
SHA-256: 3d5dc181ad41f5f1899c6077f19c03bedb8d7b9329dfdee9484181b56b45aabc
kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: dd51b9aebeeae066bf08d781381987a2
SHA-256: 19a4a85085e68739f224ecba0a5bfc8b12ed2bf61f4a64a57f248c65ee1b4745
perf-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: af3d1d725ded962bda4017cf211df321
SHA-256: 2757a65ad256fedfc03828d3539c460faa9d941618eaf02e8ede584e01b02cb3
perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1963c8f8a4e543ef85b72e90d2c8beb8
SHA-256: 42eb3399d14e50496891169ebe1678fddc78b1381c3dac354fc3055a6799dd2f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

690028 - CVE-2011-1182 kernel signal spoofing issue
695173 - CVE-2011-1576 kernel: net: Fix memory leak/corruption on VLAN GRO_DROP
697822 - CVE-2011-1593 kernel: proc: signedness issue in next_pidmap()
703019 - CVE-2011-2492 kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace
703026 - CVE-2011-1776 kernel: validate size of EFI GUID partition entries
709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share
710338 - CVE-2011-2183 kernel: ksm: race between ksmd and exiting task
713827 - Parallel port issue in RHEL 6.0 server
714536 - CVE-2011-2213 kernel: inet_diag: insufficient validation
714982 - GFS2: Update to rhel6.1 broke dovecot writing to a gfs2 filesystem
715555 - CVE-2011-1898 virt: VT-d (PCI passthrough) MSI trap injection
716539 - bump domain memory limits [6.1.z]
716805 - CVE-2011-2497 kernel: bluetooth: buffer overflow in l2cap config request
716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak
718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations
720861 - CVE-2011-2689 kernel: gfs2: make sure fallocate bytes is a multiple of blksize
722557 - CVE-2011-2695 kernel: ext4: kernel panic when writing data to the last block of sparse file


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/