Skip to navigation

Security Advisory Moderate: Red Hat Enterprise Linux 6 kernel security, bug fix and enhancement update

Advisory: RHSA-2011:1530-3
Type: Security Advisory
Severity: Moderate
Issued on: 2011-12-06
Last updated on: 2011-12-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2011-1020
CVE-2011-3347
CVE-2011-3638
CVE-2011-4110

Details

Updated kernel packages that fix multiple security issues, address several
hundred bugs and add numerous enhancements are now available as part of the
ongoing support and maintenance of Red Hat Enterprise Linux version 6. This
is the second regular update.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* The proc file system could allow a local, unprivileged user to obtain
sensitive information or possibly cause integrity issues. (CVE-2011-1020,
Moderate)

* Non-member VLAN (virtual LAN) packet handling for interfaces in
promiscuous mode and also using the be2net driver could allow an attacker
on the local network to cause a denial of service. (CVE-2011-3347,
Moderate)

* A flaw was found in the Linux kernel in the way splitting two extents in
ext4_ext_convert_to_initialized() worked. A local, unprivileged user with
access to mount and unmount ext4 file systems could use this flaw to cause
a denial of service. (CVE-2011-3638, Moderate)

* A NULL pointer dereference flaw was found in the way the Linux kernel's
key management facility handled user-defined key types. A local,
unprivileged user could use the keyctl utility to cause a denial of
service. (CVE-2011-4110, Moderate)

Red Hat would like to thank Kees Cook for reporting CVE-2011-1020; Somnath
Kotur for reporting CVE-2011-3347; and Zheng Liu for reporting
CVE-2011-3638.

This update also fixes several hundred bugs and adds enhancements. Refer to
the Red Hat Enterprise Linux 6.2 Release Notes for information on the most
significant of these changes, and the Technical Notes for further
information, both linked to in the References.

All Red Hat Enterprise Linux 6 users are advised to install these updated
packages, which correct these issues, and fix the bugs and add the
enhancements noted in the Red Hat Enterprise Linux 6.2 Release Notes and
Technical Notes. The system must be rebooted for this update to take
effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kernel-2.6.32-220.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6b9375d9f278e44fe70fe2495757830
SHA-256: 889178f6907a2e8adcba8a397bc9709e6c12cdeb1f05baa74b300c059b91c657
 
IA-32:
kernel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4072e45cfb76ba2339c225aeed1cdb71
SHA-256: 1e6fdde5f6b9d1deff743d89b4746b43e7061e94ff515d626fd5a0565569172d
kernel-debug-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ffdc424417f6869327dee14954493613
SHA-256: b9201391be582ff3c84307c1e1e21e8170e7d7bd1e459e8a14b39c36c92a3824
kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1db1e3e1d3881f00c5cc904f911accfb
SHA-256: 9bfea6607230d36f3df1f8b98d07d49dc313a4f5eb98546f595efef895490bf7
kernel-debug-devel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: e232cd608c4cf588c00b0e2ad27f5891
SHA-256: 09e2689167e91097da80e0cce85e9e49f1cdda968efab58d4fb4d307c5bb067a
kernel-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: d23ec92aaf74d9bb76da99ee2d04f694
SHA-256: 90b46c4f797fb69d97513929125e0e50b74007d5b2561d4f9bd57ad0eb3579bb
kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 91ab88ff0ad08fcedda8cdaea0141203
SHA-256: 4484c798741bd2ba4eaf5768abafe158df98deb415d5a178f2616d7cca362fd9
kernel-devel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26f6746fd5bf0b7334d6698d045cc0d7
SHA-256: fba6710439a30dbf552c88d00f490a497bf09f810f34c23d55b991ca91a73264
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: e972f7d2079bb643b6b7d9aeab0aa38c
SHA-256: 309bd9f73290902c56fa82ccc1d8b2e46d5753439b053b7c3a0857a2d9cc15d9
perf-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: a31c4b6ec1f63584524a110f0465de16
SHA-256: f2ebb0b5a0fce29a2625ab369e59253734dcc11229a4c7b20dc9f8f98afd1751
perf-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: cd010dafa0bd870bcd26afdbd5b6641d
SHA-256: 1f9a3897fc34e37923c4e3501e3a525c191065c7231b3014fb6d4ba24f9f9c4d
python-perf-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 99c6292f4785ed75f5f093edc0908e06
SHA-256: b72756dbb123fc53f621025ebcf5ff4f4065e7da64d7cc04de6da908ab7a3b84
 
x86_64:
kernel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0144038896daea374c9aca04b4c1654f
SHA-256: af029f9ab8cc88e67de3a6a7ed5af85f1ec486010fc32f853a345634bfc82508
kernel-debug-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c216f8f74ff7c9f7adefeab69333bc75
SHA-256: d48336d5fb8214d93d05740589db732656155e12d6b73bd78c3acafc48b489bf
kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a9e67ef2e4486fb11a06483f1e94efe5
SHA-256: 767521cb511a4046f4ac35a1e9b47866713c715b9515535e3762fc313fd3c337
kernel-debug-devel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f1e5c83e276e1a0ca94f6784ab84d83e
SHA-256: b831ee0e92a5dce1822a449738dfeaf1b425e29b206ef706752ff98d14890d2c
kernel-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6e03ed7c5a207d6272d7cd78300cb2a5
SHA-256: 3f468a16abf8ebf4c6d603a4497bab74ccfa96c8b64ffa4ca75c5ae03fb7946e
kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 80bfac1cce34b3171742fa75e43e343f
SHA-256: 076571b5335fd05ea2bb42bd787e39db37c7cb2ec063f6112364213a205324ae
kernel-devel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6706b4b4ba4467d62831a73433281d86
SHA-256: 1eb6c920ea19c8ae20ebf49b5dced059e582f025f6668fc8c3cf4d5075b1d8ad
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2bac978952b76b2ab990caac325f8293
SHA-256: c71688fef39a698022e0adad55f796a08820cfdf78d43809205d22e0c4e6db6d
perf-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2f043e03b3c9db01f92c7830fd958399
SHA-256: 63e8ed5e494db6baed5cb189137d35b657f5195cbe23022c45bf309e5eaa08e1
perf-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c3a61cbb5fe52706b1c593863d94a4bb
SHA-256: 7e5f78136eb2b10de2fe3be14e710866487afb7208b58ce9c5502e39e27291ce
python-perf-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 00598c4d59343864f6f29aad46054971
SHA-256: 1c5440a61e9ee741fdb37c3660d1b8107149e23c1663bb12c707955cbb65009b
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kernel-2.6.32-220.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6b9375d9f278e44fe70fe2495757830
SHA-256: 889178f6907a2e8adcba8a397bc9709e6c12cdeb1f05baa74b300c059b91c657
 
x86_64:
kernel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0144038896daea374c9aca04b4c1654f
SHA-256: af029f9ab8cc88e67de3a6a7ed5af85f1ec486010fc32f853a345634bfc82508
kernel-debug-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c216f8f74ff7c9f7adefeab69333bc75
SHA-256: d48336d5fb8214d93d05740589db732656155e12d6b73bd78c3acafc48b489bf
kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a9e67ef2e4486fb11a06483f1e94efe5
SHA-256: 767521cb511a4046f4ac35a1e9b47866713c715b9515535e3762fc313fd3c337
kernel-debug-devel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f1e5c83e276e1a0ca94f6784ab84d83e
SHA-256: b831ee0e92a5dce1822a449738dfeaf1b425e29b206ef706752ff98d14890d2c
kernel-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6e03ed7c5a207d6272d7cd78300cb2a5
SHA-256: 3f468a16abf8ebf4c6d603a4497bab74ccfa96c8b64ffa4ca75c5ae03fb7946e
kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 80bfac1cce34b3171742fa75e43e343f
SHA-256: 076571b5335fd05ea2bb42bd787e39db37c7cb2ec063f6112364213a205324ae
kernel-devel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6706b4b4ba4467d62831a73433281d86
SHA-256: 1eb6c920ea19c8ae20ebf49b5dced059e582f025f6668fc8c3cf4d5075b1d8ad
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2bac978952b76b2ab990caac325f8293
SHA-256: c71688fef39a698022e0adad55f796a08820cfdf78d43809205d22e0c4e6db6d
perf-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2f043e03b3c9db01f92c7830fd958399
SHA-256: 63e8ed5e494db6baed5cb189137d35b657f5195cbe23022c45bf309e5eaa08e1
perf-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c3a61cbb5fe52706b1c593863d94a4bb
SHA-256: 7e5f78136eb2b10de2fe3be14e710866487afb7208b58ce9c5502e39e27291ce
python-perf-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 00598c4d59343864f6f29aad46054971
SHA-256: 1c5440a61e9ee741fdb37c3660d1b8107149e23c1663bb12c707955cbb65009b
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kernel-2.6.32-220.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6b9375d9f278e44fe70fe2495757830
SHA-256: 889178f6907a2e8adcba8a397bc9709e6c12cdeb1f05baa74b300c059b91c657
 
IA-32:
kernel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4072e45cfb76ba2339c225aeed1cdb71
SHA-256: 1e6fdde5f6b9d1deff743d89b4746b43e7061e94ff515d626fd5a0565569172d
kernel-debug-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ffdc424417f6869327dee14954493613
SHA-256: b9201391be582ff3c84307c1e1e21e8170e7d7bd1e459e8a14b39c36c92a3824
kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1db1e3e1d3881f00c5cc904f911accfb
SHA-256: 9bfea6607230d36f3df1f8b98d07d49dc313a4f5eb98546f595efef895490bf7
kernel-debug-devel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: e232cd608c4cf588c00b0e2ad27f5891
SHA-256: 09e2689167e91097da80e0cce85e9e49f1cdda968efab58d4fb4d307c5bb067a
kernel-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: d23ec92aaf74d9bb76da99ee2d04f694
SHA-256: 90b46c4f797fb69d97513929125e0e50b74007d5b2561d4f9bd57ad0eb3579bb
kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 91ab88ff0ad08fcedda8cdaea0141203
SHA-256: 4484c798741bd2ba4eaf5768abafe158df98deb415d5a178f2616d7cca362fd9
kernel-devel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26f6746fd5bf0b7334d6698d045cc0d7
SHA-256: fba6710439a30dbf552c88d00f490a497bf09f810f34c23d55b991ca91a73264
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: e972f7d2079bb643b6b7d9aeab0aa38c
SHA-256: 309bd9f73290902c56fa82ccc1d8b2e46d5753439b053b7c3a0857a2d9cc15d9
perf-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: a31c4b6ec1f63584524a110f0465de16
SHA-256: f2ebb0b5a0fce29a2625ab369e59253734dcc11229a4c7b20dc9f8f98afd1751
perf-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: cd010dafa0bd870bcd26afdbd5b6641d
SHA-256: 1f9a3897fc34e37923c4e3501e3a525c191065c7231b3014fb6d4ba24f9f9c4d
python-perf-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 99c6292f4785ed75f5f093edc0908e06
SHA-256: b72756dbb123fc53f621025ebcf5ff4f4065e7da64d7cc04de6da908ab7a3b84
 
PPC:
kernel-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: e57825244a92b2b2ceb291bccb20b2f4
SHA-256: 0ba36266646018e0cb4dbe55c99a8bb23bf999b9a753072d79018b624c2dcb03
kernel-bootwrapper-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3cbf4dedf851c3c8b4d67e88e4fd4988
SHA-256: ac02aa1138e5ca91a399c518879e39a1a09a6bd1e59f16577cf02a53636a18b4
kernel-debug-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: db7b0c1a225379867a366eb4345b461c
SHA-256: 75511629b53677e76a18e89fe884f4ad4374afe778311145bec8b8c141868c88
kernel-debug-debuginfo-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: ca626f0ab2f4e8da2151f3127b81b0bf
SHA-256: f35927a5d83c3fcbbb21829b0e4c307bbd0bf5e12e0dc6de844f8028a0e2c2c8
kernel-debug-devel-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a3e5e2b641f159664fbb76af94aeaa33
SHA-256: 6cae0d51dab2c4023a473ed5845163851ecce7d996b66998477a1d18c5c75c34
kernel-debuginfo-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0f42b10d253062552c51beac23f9f847
SHA-256: b86685b0f367b3c41a15b5de466c5bf958ca61649d3886442b78332891624a8a
kernel-debuginfo-common-ppc64-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5d9bedae5b8a38ba7c9e85427907cf67
SHA-256: e9f3be561315a993680935d0cfd15878ae30fdb66113655c9644ce99299edcd1
kernel-devel-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 85c71c9389fc35b02e73d80f6db20185
SHA-256: 1e2d600431765a00965c1dbdfb05a43ad0595c0fffde73dd754b65d4be6e8da6
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: b6f1428741b2693732ffd041cc07e167
SHA-256: bc0545849dd0fecc1bea338c9b37b78dd38032c06df249205631749f3ac1f219
perf-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 15317089d4b6d6b73fc97962857f9ff3
SHA-256: fb3c8f51b1fe8a213a26f3afa4d9457a42d6d5bcf67e736618749c69745dcfdb
perf-debuginfo-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 206e0f70ed5a81d08a183c11c63e2fd1
SHA-256: 3a2292c120cbccdd0fddfc8dba86cd436be888a992fffa3b4c27d2e0f90c8905
python-perf-2.6.32-220.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: fa4580910fc8c53726d48d63863f482d
SHA-256: a0761e04d38a4d68b1c6ea9e48dbe6bee04c24d4396976167074479710c9d46f
 
s390x:
kernel-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 90726282b85682256bb691054e1dce28
SHA-256: 0464c9703544ecd5b0fb507e784144e01b982feb3ed1f7bdd1018292220d7704
kernel-debug-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: a8d54e74164bf88b962ca38879f0bf07
SHA-256: 9418d61bdd035e01f15af7f630429b7b8747c1f3740e56e261611116a278030f
kernel-debug-debuginfo-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1dc2b23c76c0ef2a274edfb5054d5263
SHA-256: e9481f8827be7119fccc75649791a06b730045080e55e70570db641337fdf7b7
kernel-debug-devel-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 301029cdff027d85803dd6bffde01868
SHA-256: e1cc23b305b24d7a2f6dc67f4cf916c3c11e91a9ba52eccde29e6b47818abb97
kernel-debuginfo-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4d9eef3b93fca14ae14d732440091b3c
SHA-256: 6b067809ee2a11c992f0ab79391a97fd3eaf10bd18227a8eca7f002078a4f3fb
kernel-debuginfo-common-s390x-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: a83c6ce5d0c75b8f51210ff2405f7681
SHA-256: 7cf9e72c3cdfa18886c7d90acd556a1157a0266cdd6882d9765846f2962eb60b
kernel-devel-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: a9ed3d786cc74414ab5c2eecb52efca4
SHA-256: dba33b7ad2321b16877bc22c63783be5fbde8d60b9a507a9834539effa986d33
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: cf36922dd9d909271218f08b2e6c6609
SHA-256: ee76c28afa9f50c173abacd6aac35dda6c8074061240aee001ecf1dda6fc097a
kernel-kdump-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0b110694e0117d6bf959cdb214706928
SHA-256: 0bbc3bf2f12c82d7c0971241bf824ed2a6a60beeae84b7fc0727a9a17e55ee7a
kernel-kdump-debuginfo-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 54ac6a4229dff02c9368c01f0274ec67
SHA-256: 1ffdef6d35227abfffebc75608a64623462b85ffbc15e8ee52fc24a5e7870fcb
kernel-kdump-devel-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8c95500495b88e2c0ea8a243bd510585
SHA-256: c681107c1fdb654ff4ca32031445ab3296aff15e047b01e9532632a5967e702b
perf-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5d0fca749e2480e4373202d64b5a813a
SHA-256: c0e02ace27dcc1da8c6992935f06dbaac3e9d0145a7bf15b6c2f4065de6b1091
perf-debuginfo-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: f0a1d3755df583e508592087c7d755c2
SHA-256: e7664bfdf67ab20f7c88d4f6ca007b517709a3d972cc04e52a0aa3a0f70a206c
python-perf-2.6.32-220.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 64344aeb262cbb0f652ee63434f56c80
SHA-256: 9ba1b5dd56a3f4c93070e9be0a0e98fd32d550d94cd08829f76ef2f5836da902
 
x86_64:
kernel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0144038896daea374c9aca04b4c1654f
SHA-256: af029f9ab8cc88e67de3a6a7ed5af85f1ec486010fc32f853a345634bfc82508
kernel-debug-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c216f8f74ff7c9f7adefeab69333bc75
SHA-256: d48336d5fb8214d93d05740589db732656155e12d6b73bd78c3acafc48b489bf
kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a9e67ef2e4486fb11a06483f1e94efe5
SHA-256: 767521cb511a4046f4ac35a1e9b47866713c715b9515535e3762fc313fd3c337
kernel-debug-devel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f1e5c83e276e1a0ca94f6784ab84d83e
SHA-256: b831ee0e92a5dce1822a449738dfeaf1b425e29b206ef706752ff98d14890d2c
kernel-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6e03ed7c5a207d6272d7cd78300cb2a5
SHA-256: 3f468a16abf8ebf4c6d603a4497bab74ccfa96c8b64ffa4ca75c5ae03fb7946e
kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 80bfac1cce34b3171742fa75e43e343f
SHA-256: 076571b5335fd05ea2bb42bd787e39db37c7cb2ec063f6112364213a205324ae
kernel-devel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6706b4b4ba4467d62831a73433281d86
SHA-256: 1eb6c920ea19c8ae20ebf49b5dced059e582f025f6668fc8c3cf4d5075b1d8ad
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2bac978952b76b2ab990caac325f8293
SHA-256: c71688fef39a698022e0adad55f796a08820cfdf78d43809205d22e0c4e6db6d
perf-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2f043e03b3c9db01f92c7830fd958399
SHA-256: 63e8ed5e494db6baed5cb189137d35b657f5195cbe23022c45bf309e5eaa08e1
perf-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c3a61cbb5fe52706b1c593863d94a4bb
SHA-256: 7e5f78136eb2b10de2fe3be14e710866487afb7208b58ce9c5502e39e27291ce
python-perf-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 00598c4d59343864f6f29aad46054971
SHA-256: 1c5440a61e9ee741fdb37c3660d1b8107149e23c1663bb12c707955cbb65009b
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kernel-2.6.32-220.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6b9375d9f278e44fe70fe2495757830
SHA-256: 889178f6907a2e8adcba8a397bc9709e6c12cdeb1f05baa74b300c059b91c657
 
IA-32:
kernel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4072e45cfb76ba2339c225aeed1cdb71
SHA-256: 1e6fdde5f6b9d1deff743d89b4746b43e7061e94ff515d626fd5a0565569172d
kernel-debug-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: ffdc424417f6869327dee14954493613
SHA-256: b9201391be582ff3c84307c1e1e21e8170e7d7bd1e459e8a14b39c36c92a3824
kernel-debug-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1db1e3e1d3881f00c5cc904f911accfb
SHA-256: 9bfea6607230d36f3df1f8b98d07d49dc313a4f5eb98546f595efef895490bf7
kernel-debug-devel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: e232cd608c4cf588c00b0e2ad27f5891
SHA-256: 09e2689167e91097da80e0cce85e9e49f1cdda968efab58d4fb4d307c5bb067a
kernel-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: d23ec92aaf74d9bb76da99ee2d04f694
SHA-256: 90b46c4f797fb69d97513929125e0e50b74007d5b2561d4f9bd57ad0eb3579bb
kernel-debuginfo-common-i686-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 91ab88ff0ad08fcedda8cdaea0141203
SHA-256: 4484c798741bd2ba4eaf5768abafe158df98deb415d5a178f2616d7cca362fd9
kernel-devel-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26f6746fd5bf0b7334d6698d045cc0d7
SHA-256: fba6710439a30dbf552c88d00f490a497bf09f810f34c23d55b991ca91a73264
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: e972f7d2079bb643b6b7d9aeab0aa38c
SHA-256: 309bd9f73290902c56fa82ccc1d8b2e46d5753439b053b7c3a0857a2d9cc15d9
perf-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: a31c4b6ec1f63584524a110f0465de16
SHA-256: f2ebb0b5a0fce29a2625ab369e59253734dcc11229a4c7b20dc9f8f98afd1751
perf-debuginfo-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: cd010dafa0bd870bcd26afdbd5b6641d
SHA-256: 1f9a3897fc34e37923c4e3501e3a525c191065c7231b3014fb6d4ba24f9f9c4d
python-perf-2.6.32-220.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 99c6292f4785ed75f5f093edc0908e06
SHA-256: b72756dbb123fc53f621025ebcf5ff4f4065e7da64d7cc04de6da908ab7a3b84
 
x86_64:
kernel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0144038896daea374c9aca04b4c1654f
SHA-256: af029f9ab8cc88e67de3a6a7ed5af85f1ec486010fc32f853a345634bfc82508
kernel-debug-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c216f8f74ff7c9f7adefeab69333bc75
SHA-256: d48336d5fb8214d93d05740589db732656155e12d6b73bd78c3acafc48b489bf
kernel-debug-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a9e67ef2e4486fb11a06483f1e94efe5
SHA-256: 767521cb511a4046f4ac35a1e9b47866713c715b9515535e3762fc313fd3c337
kernel-debug-devel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f1e5c83e276e1a0ca94f6784ab84d83e
SHA-256: b831ee0e92a5dce1822a449738dfeaf1b425e29b206ef706752ff98d14890d2c
kernel-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6e03ed7c5a207d6272d7cd78300cb2a5
SHA-256: 3f468a16abf8ebf4c6d603a4497bab74ccfa96c8b64ffa4ca75c5ae03fb7946e
kernel-debuginfo-common-x86_64-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 80bfac1cce34b3171742fa75e43e343f
SHA-256: 076571b5335fd05ea2bb42bd787e39db37c7cb2ec063f6112364213a205324ae
kernel-devel-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6706b4b4ba4467d62831a73433281d86
SHA-256: 1eb6c920ea19c8ae20ebf49b5dced059e582f025f6668fc8c3cf4d5075b1d8ad
kernel-doc-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 5c3d958dc7efc601c171c4e12cd31054
SHA-256: 6f0a81b2ec02aec5a6a9ffcbb0527b5ce30f7af06d0676639042a9ce135b33f0
kernel-firmware-2.6.32-220.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 82736eb60d5cf83375baef1bc56269b3
SHA-256: 95cdf3983a084e301f6706af1976da0fde976f798cbbf6fd3d1e04870280cbb0
kernel-headers-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2bac978952b76b2ab990caac325f8293
SHA-256: c71688fef39a698022e0adad55f796a08820cfdf78d43809205d22e0c4e6db6d
perf-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2f043e03b3c9db01f92c7830fd958399
SHA-256: 63e8ed5e494db6baed5cb189137d35b657f5195cbe23022c45bf309e5eaa08e1
perf-debuginfo-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c3a61cbb5fe52706b1c593863d94a4bb
SHA-256: 7e5f78136eb2b10de2fe3be14e710866487afb7208b58ce9c5502e39e27291ce
python-perf-2.6.32-220.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 00598c4d59343864f6f29aad46054971
SHA-256: 1c5440a61e9ee741fdb37c3660d1b8107149e23c1663bb12c707955cbb65009b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

523122 - [RHEL-6 Xen]: Cannot balloon a Xen domU guest above the initial starting memory
612608 - GFS2: kernel BUG at fs/gfs2/glock.c:173! running brawl w/flocks
635968 - Parallel port issue in RHEL 6.0 server
637520 - reboot(RB_AUTOBOOT) fails if kvm instance is running
645777 - [RHEL6][Kernel] BUG: MAX_STACK_TRACE_ENTRIES too low!
646224 - cifs: properly disable fscache support
652262 - Slow writes to ext4 partition - INFO: task flush-253:7:2137 blocked for more than 120 seconds.
654198 - CIFS needs to gracefully handle unresponsive server
656458 - inode used before security_d_instantiate
658291 - SELinux does context calculations even on mount labeled filesystems
662626 - cifs: update NTLMSSP authentication code
662666 - Cannot find the extended attribute of #11 inode after remount
667177 - cachefilesd fails to start with SELinux disabled on default config file
668775 - BKL (lock_kernel) in soft lockup during parallel IO discovery
668791 - disable CONFIG_CIFS_EXPERIMENTAL in RHEL6
669739 - bump domain memory limits
673629 - hugetlbfs fs interface should deal with minus value echoed to /proc/sys/vm/nr_hugepages gracefully
678102 - dlm: increase default hash table sizes
678794 - pktgen makes machine panic
679262 - [RFE] kernel: kptr_restrict for hiding kernel pointers from unprivileged users [rhel-6.2]
680358 - CVE-2011-1020 kernel: no access restrictions of /proc/pid/* after setuid program exec
681647 - Ext4 warnings are printed if a file size in indirect block map is extended to the maximum file size
682789 - Request to update existing thinkpad_acpi module to support newer thinkpads e.g. X100E
688410 - NUMA problems in transparent hugepages
688944 - Kernel Warnings when starting Mellanox 10Gb network
689223 - [RHEL-6] statvfs tries to stat unrelated mountpoints
690619 - pull in NETIF_F_RXHASH support
691267 - [RFE] kernel: add new syncfs syscall
691945 - Non-responsive scsi target leads to excessive scsi recovery and dm-mp failover time
692677 - RHEL6.1-20110316.1 dell-pe2800 NMI received for unknown reason
695377 - cio: prevent purging of CCW devices in the online state
696396 - UV: fscache taints kernel; NFS requires fscache; NFS taints kernel
696422 - [SGI 6.2 FEAT] UV: add smp_affinity_list
696998 - Check if PTE is already allocated during page fault
697403 - Patch file for RAID controller driver, arcmsr, at RHEL6 Update2
697659 - NFS4 problem using open() on exported urandom device
697868 - xenfv: 32-bit guest hangs on boot
698094 - NULL pointer dereference, IP: blkiocg_lookup_group+0x9/0x40
698506 - cont. Bonded interface doesn't issue IGMP report (join) on slave interface during failover
699151 - ext4_lookup: deleted inode referenced
700277 - [RHEL6] RFE : Enable SO_REUSEADDR support for rdma_cm
700343 - netjet - blacklist Digium TDM400P
700463 - qdio: reset error states immediately
700499 - [RHEL6] oom_kill.c : printk in __oom_kill_task no longer includes p->uid as it did in RHEL 5
700538 - MLS - cgconfigparser cannot search on /cgroup/ dirs
701373 - Bugfixes for the 2.6.37 NFS client
701825 - NFS4: Incorrect server behavior when using OPEN call with O_CREATE on a directory on which the process has no WRITE permissions.
701857 - hibernate cause kernel panic
701951 - System Hang when there is smart error on IBM platform
702183 - kernel panic when remove dccp_probe module
702508 - TCP traffic to IPv6 causes 32 bit Linux OS to reboot
702674 - powerpc: Only sleep in rtas_busy_delay if we have useful work to do
703055 - RHEL6.1 x86_64 HVM guest crashes on AMD host when guest memory size is larger than 8G
703474 - xen-kbdfront - advertise either absolute or relative coordinates
704128 - EDD module incorrectly checks validity of a BIOS provided data.
704511 - RHEL6.1 mm: hugepages can cause negative commitlimit
705082 - qemu-kvm takes lots of CPU resources due to _spin_lock_irqsave on a 64 cpu machine
705210 - [RFE] Provide support for Wacom cintiq (DTU-2231)
705441 - intel-iommu: missing flush prior to removing domains + avoid broken vm/si domain unlinking
706018 - miss xmit_hash_policy=layer2+3 in modinfo bonding output
706385 - pending THP improvements for RHEL6.2
707005 - dlm: fcntl F_SETLKW should be interruptible in GFS2
707142 - Can't change lacp_rate in bonding mode=802.3ad
707755 - blkio controller: Backport patches for per cgroup stats and lockless throttling for no rule group
707757 - cfq-iosched: Set group_isolation tunable 1 by default
707762 - blkio controller: Backport miscellaneous fixes and cleanups from upstream
708000 - cifs: asynchronous writepages support
708350 - nosegneg not used in 32-bit Xen guests
709856 - Kernel trace on m2.4xlarge or m2.2xlarge instances in EC2
710159 - ib_srp scan/rescan keep adding new scsi devices
710668 - using gdb to debug kernel causes crash
711317 - Mask dangerous features on xen hvm, even if the HV doesn't
711326 - xenpv: backport sched_clock change
711400 - panic in cifsd code after unexpected lookup error -88.
711600 - backport "sched: Next buddy hint on sleep and preempt path"
711636 - THP has a build error when !CONFIG_SMP
712000 - [bnx2x_extract_max_cfg:1079(ethxx)]Illegal configuration detected for Max BW - using 100 instead
712139 - GFS2: Update to rhel6.1 broke dovecot writing to a gfs2 filesystem
712252 - vmscan: correctly check if reclaimer should schedule during shrink_slab
712258 - mm: compaction: Ensure that the compaction free scanner does not move to the next zone
712260 - migrate: don't account swapcache as shmem
712653 - make guest mode entry to be rcu quiescent state
713337 - backport checksum optimization for virtio_net
713585 - RHEL 6.1 Xen paravirt guest is getting network outage during live migration
713620 - Bug for patches outside AGP/DRM required for AGP/DRM backport from 3.0-rc
713730 - enclosure fix
714183 - v4l app in Documentation fails to compile because it uses f15 kernel-headers
714325 - cxgb3i causing eeh on PPC64
714590 - Intel wireless broken on 11n for many users
714684 - RFE: command to clear scrollback buffer in linux terminal
714740 - pNFS Bakeathon Bug Fixes.
714883 - Solarflare network adapter not available during install
716263 - need to enable software bridge to do igmp snooping to receive/forward ipv6 router advertisements
716452 - Anaconda installer doesn't work with Xen virtual block devices.
716498 - bump domain memory limits
716520 - cfq-iosched: CFQ can get GPF at cfq_free_io_context()
717377 - Feature Request: Chelsio iw_cxgb4 driver updates for 6.2
718332 - ext4: WARNING: at fs/namei.c:1306 lookup_one_len during orphan inode recovery with quotas
719357 - dlm: increase hash table maximum allocatable size
719587 - Kernel: system hungs when remove bonding module with arp monitor
720712 - ls hangs for a specific directory (nfsv3) in kernels starting at -157
720918 - the block layer does't merge the requests sent from jbd/2.
721044 - jbd2: Improve scalability by not taking j_state_lock in jbd2_journal_stop() fix missing from RHEL6 kernel.
721205 - Expose RDWRGSFS new instructions to guest
722257 - NFS readdirs losing their cookies
722565 - using page_count(pfn_to_page(pfn)) on a random pfn is unsafe
723670 - Introduce "acpi_rsdp=" parameter for kdump
723849 - installation: kernel panic in EFI during restart of installer
724995 - xen mmu: fix a race window causing leave_mm BUG()
725007 - xen: off by one errors in multicalls.c
725041 - xen/hvc: only notify if we actually sent something
725234 - asix: fix setting mac address for AX88772
725370 - cifs: CIFSSMBQAllEAs parses xattr data wrongly
725435 - APEI: disable EINJ parameter support by default
725444 - (direct_io) __blockdev_direct_IO calls kzalloc for dio struct causes OLTP performance regression
725519 - revert of bug 716498 that causes x86_64 xen pv guest boot failure
725538 - RHEL 6 is missing upstream backport to remove prefetch instructions.
725580 - Improve sysfs performance when many block devices are created
725716 - need to fix previous ABI break in net_device struct
725812 - python-linux-perf: Create new package with the Linux perf subsystem python binding
725816 - AIM7 on redeye test bed loses up to 45% performance with barriers enabled
725855 - Avoid merging a VMA with another VMA which is cloned from the parent process.
726099 - __scsi_add_device+0xc8/0x170 has a problem when there is scsi enclosure
726437 - Disk write cache flushes are no longer logged in blktrace
728476 - machine panics with "DMAR hardware is malfunctioning"
729176 - ext4 regression: quota incorrect/orphan inodes on removal of (locked) files
729434 - nfs sillyrename can call d_move without holding the i_mutex
729437 - cifs: fix NTLMSSP based signing to samba
730077 - kdump: x86: Improve crashkernel=auto logic to take into account memory used by filtering utility
730144 - RHEL6.2: revert latest patchset from 587729
730503 - RHEL 6.1 xen guest crashes with kernel BUG at arch/x86/xen/mmu.c:1457!
730599 - qla4xxx: fix iscsi boot: export session iface name
730838 - radeon/kms regression in 6.2
731585 - ext3/ext4 mbcache causes high CPU load [RHEL6]
732986 - thp: fix tail page refcounting
733651 - netfront MTU drops to 1500 after domain migration
733672 - xen PV guest kernel 2.6.32 processes lock up in D state
734509 - APEI: set enable bit for OSC call
734732 - oom killer is killing more processes than is needed
735048 - USB3 device attached to a USB3 hub, fail to unregister when USB3 hub plug out.
735050 - USB3 device fail to register after a re-attach to USB3 hub
735124 - LVM --type raid1 create attempt panics system and leaves it unbootable
735263 - USB3 device can't be detected on USB2 hub
736425 - CVE-2011-3347 kernel: be2net: promiscuous mode and non-member VLAN packets DoS
738163 - [kdump] be2net 0000:04:00.0: mccq poll timed out
740312 - xfs: avoid synchronous transactions when deleting attr blocks
740465 - Host got crash when guest running netperf client with UDP_STREAM protocol with IPV6
742414 - serious SPECjbb regression in KVM guest due to cpu cgroups
743590 - x86_64 xen guest crash when booting with maxmem = 128Gb
744154 - khubd hungs
746254 - Kernel: dm-log-userspace not properly registering log devices
746861 - umount of RHEL 6.2 2.6.32-209.el6.x86_64 beta pNFS share can hang or cause Oops
747291 - booting latest kernel on radeon hd 6450 (CAICOS) results in corrupt screen/memory
747292 - booting latest kernel on llano system has wrong resolution and can cause memory corruption
747942 - CVE-2011-3638 kernel: ext4: ext4_ext_insert_extent() kernel oops
751297 - CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/