Skip to navigation

Security Advisory Moderate: kernel security and bug fix update

Advisory: RHSA-2012:1541-2
Type: Security Advisory
Severity: Moderate
Issued on: 2012-12-04
Last updated on: 2012-12-04
Affected Products: Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
CVEs (cve.mitre.org): CVE-2011-4131
CVE-2012-2313

Details

Updated kernel packages that fix two security issues and several bugs are
now available for Red Hat Enterprise Linux 6.2 Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

These packages contain the Linux kernel.

Security fixes:

* A malicious NFSv4 server could return a crafted reply to a GETACL
request, causing a denial of service on the client. (CVE-2011-4131,
Moderate)

* A flaw in the dl2k driver could allow a local, unprivileged user to issue
potentially harmful IOCTLs, possibly causing Ethernet adapters using the
driver to malfunction (such as losing network connectivity).
(CVE-2012-2313, Low)

Red Hat would like to thank Andy Adamson for reporting CVE-2011-4131, and
Stephan Mueller for reporting CVE-2012-2313.

Bug fixes:

* A kernel oops occurred in the nf_nat code when a bogus pointer was
dereferenced in the nf_conn_nat structure. Consequently, if Source Network
Address Translation (SNAT) was performed, incorrect information could be
received by other CTS (Clear to Send) signals. A conntrack entry is now
placed in the source hash after SNAT has been completed, which prevents the
described problems. (BZ#865715)

* Previously, the ixgbe_setup_tc() function was called recursively when the
set_state() CEE (Convergence Enhanced Ethernet) API routine was called in
IEEE DCBX (Data Center Bridging eXchange) mode. This is considered unsafe
according to the IEEE standards. With this update, the ixgbe driver has
been modified to no longer call the set_state() routine in IEEE DCBX mode.
The driver now calls routines of the PFC (Priority-based Flow Control) and
ETS (Enhanced Transmission Selection) extensions instead of the CEE
extension routines in IEEE DCBX mode. (BZ#867859)

* A Symmetric Multi Processing (SMP) race condition between the munmap()
and exit() function could lead to false-positive triggering of the BUG_ON()
macro if Transparent Huge Pages (THP) were enabled. This update fixes the
race condition, which avoids false-positive triggering of the BUG_ON()
macro in this scenario. (BZ#875121)

* The kernel allows high priority real time tasks, such as tasks scheduled
with the SCHED_FIFO policy, to be throttled. Previously, the CPU stop tasks
were scheduled as high priority real time tasks and could be thus throttled
accordingly. However, the replenishment timer, which is responsible for
clearing a throttle flag on tasks, could be pending on the just disabled
CPU. This could lead to the situation that the throttled tasks were never
scheduled to run. Consequently, if any of such tasks was needed to complete
the CPU disabling, the system became unresponsive. This update introduces a
new scheduler class, which gives a task the highest possible system
priority and such a task cannot be throttled. The stop-task scheduling
class is now used for the CPU stop tasks, and the system shutdown completes
as expected in the scenario described. (BZ#876078)

* Previously, XFS log buffers were handled incorrectly so that XFS could,
in certain circumstances, incorrectly read metadata from the journal during
XFS log recovery. As a consequence, XFS log recovery terminated with an
error message and prevented the file system from being mounted. This
problem could result in a loss of data if the user forcibly emptied the log
to allow the file system to be mounted. This update ensures that metadata
is read correctly from the log and journal recovery thus completes
successfully, and the file system mounts as expected. (BZ#876498)

* Previously, kernel was allowed to reduce the number of unnecessary commit
calls by skipping the commit when there was a large number of outstanding
pages being written. However, a test on the number of commits (ncommit) did
not properly handle the edge case when ncommit was zero. Consequently,
inodes sometimes remained on the sb->s_dirty list and could not be freed by
the inode cache shrinker. As a result, the nfs_inode_cache structure grew
very large over time. With this update, the call to the nfs_write_inode()
function is immediately returned when commit == 0, thus fixing this bug.
(BZ#877394)


Solution

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kernel-2.6.32-220.30.1.el6.src.rpm
File outdated by:  RHBA-2014:0006
    MD5: cec3503e840c96ffec0b7c60ba341cdd
SHA-256: 777d07ada976634b84294a56e062fa4fb520cacc07cebd12373bdce9725d81da
 
x86_64:
kernel-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 79ebfdc0ce7f388e9eb39ed0a6c99003
SHA-256: 024d51a1c7365cc0c1e550214397e8794e2a39222888fa93086c98733e46c937
kernel-debug-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 5781c213da1484dffabc41b601acc95f
SHA-256: 21e6eaa61920fb845ec794fc5b054084de92cae510036db8225cff1effac7f8b
kernel-debug-debuginfo-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 02e4e51b05991cdd386c0d4c2e69fbcb
SHA-256: bf4bc11b4f5370c9a0df88ab897d7c835b74d8724239889bec17797a270a4a65
kernel-debug-devel-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 93bbe2e712aa1f83f09f7e55a2fd4988
SHA-256: 49d216fea1691d7f741585f553b49dd0f01298055500e724ba67d73348f9ef9e
kernel-debuginfo-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 54b3fda2b0297d80e3e7034a8f90a776
SHA-256: 8b6d893e0652cc1f5c3b24250b5624b456e95624e974dae4a576c76e0330ad74
kernel-debuginfo-common-x86_64-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 8d45e8ff10c4d499377fe87e4b654dd5
SHA-256: 9cee700b79b6c8600e11522b2005d07707e6e8cd134c766ebd5c53bdd148dda1
kernel-devel-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 9ea1a9f30a2305eba16ee5e54ca6f44d
SHA-256: 26219303bcd14dfb4ff5ea5f2b690232e1cc4b6e839ff862baac14f3c42a8591
kernel-doc-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0362
    MD5: c73636b24e813b65e402a8cb3946e17c
SHA-256: 61381c5b74a92d3239b2b63606d023f4bc9bfbd72cc3ad528e27f3a8f0fdaed6
kernel-firmware-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0362
    MD5: ceaaf75fc447c7b2f1135ab38ead6850
SHA-256: a4e7d8a6e2ca0a9dc964531b040a6e653c3c9697885c046b3517b7ebac656413
kernel-headers-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 09817ab308106fd0b55a4c3015fb8c1c
SHA-256: 030615b8dea738d94beac960a3923188bfa5c7888442dc35cb09e2794e74adaf
perf-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 5707372cce1cdba702a317754aef8256
SHA-256: b13b9e58046385ca94e0b10bfb655e0be681a90ac4bc0dfbcc7ace35c2eb7b62
perf-debuginfo-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 887cb9f75b1bc922c338b3138a33b103
SHA-256: 3b5360332c65eb9d3e416493bbc644928008338f4cf2ba6d11ff0341708bfada
python-perf-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: c662ef69162ce030c8a6d53c4064f898
SHA-256: d1687dd8487c71c9fdecd68a5418184f38166e28f9c79c5de07b8295f0bf37c7
python-perf-debuginfo-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0362
    MD5: 5cb69821b21734227c83c617a4eec4d6
SHA-256: 18b716ec97c27f214bf9f056a948c11ed9e64e77e36557b1b4962becad958031
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
kernel-2.6.32-220.30.1.el6.src.rpm
File outdated by:  RHBA-2014:0006
    MD5: cec3503e840c96ffec0b7c60ba341cdd
SHA-256: 777d07ada976634b84294a56e062fa4fb520cacc07cebd12373bdce9725d81da
 
IA-32:
kernel-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 64c117f42da54d5f0d765eff936e5da4
SHA-256: 2c5d9023f3c779630bbc343f48726eab2e348ccb0e78dad12e6e9bf3fe4e047e
kernel-debug-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 239a6bbf1184434f5ae4de2db1f03b6a
SHA-256: 3dac93e507641c95f48b34edac9f222ef16db94bf52035c97cb96c51a6515b0b
kernel-debug-debuginfo-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: dd610bb68dc2ece1c01f81598aede182
SHA-256: 2b8bf52e258f6344e1d09a34449f6bab323eecf3c266d6b3a3afc7dfb8ca311f
kernel-debug-devel-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 0ed32fa7be1dc773a0905416981b2b23
SHA-256: 3032c84a556fb4d69c110e0c48c03aff90c7277768a90203141bde6d1ce59d39
kernel-debuginfo-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: d15a7193e1a7a047f00165dc69902c2e
SHA-256: d4ea10bef2a8d60c6cd16565d6cf1d3f340db91613af0a12d7c6c276a8bc5ad3
kernel-debuginfo-common-i686-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: eb29f0ce3695f2aee68b3fe66df81a4e
SHA-256: ff736019a87ce36f8bbc123d72a6cf3bab9d11df67bac6907dd5d982a96468f4
kernel-devel-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 39bd7c2e6bc46765eb70d73bf1d48037
SHA-256: 69f7270f820898c47ae8a4785772dfc02cf3164be7f5a696e9403b310f339c09
kernel-doc-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: c73636b24e813b65e402a8cb3946e17c
SHA-256: 61381c5b74a92d3239b2b63606d023f4bc9bfbd72cc3ad528e27f3a8f0fdaed6
kernel-firmware-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: ceaaf75fc447c7b2f1135ab38ead6850
SHA-256: a4e7d8a6e2ca0a9dc964531b040a6e653c3c9697885c046b3517b7ebac656413
kernel-headers-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 88fa8fe22194f68682a119c7959cbcc7
SHA-256: 8dd0cf3c1d40dbac121c502b447be45b648f30f620e3321ad89ee399d3f19e15
perf-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9e4131f60ec64fc81c1639692bc1e4a1
SHA-256: 3d0384fa08bd7c705efe20e61c4e7061c66bb3c369325d20637af76a87d9474b
perf-debuginfo-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 66a444b69bf9471b655d27d19d6c9d1b
SHA-256: db8c25c837e06a863902b51ea735e40079f05119c1cc27ec4a49a19c4d679d19
python-perf-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: 62fc23181d5222096ec66671a6bb04a4
SHA-256: c3db7e40351c6ff93c0ad148af98ba9de430834a4427a2e73ec4c60bba744d5e
python-perf-debuginfo-2.6.32-220.30.1.el6.i686.rpm
File outdated by:  RHBA-2014:0006
    MD5: bb6b522c220b3c28b73ca7277e74c0d0
SHA-256: af5636086b0ca4fb43390d31a49b9e450592db063d47d59895aa7cc526af8edf
 
PPC:
kernel-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: bde6a8569e0befd6b9403c7e90c24af8
SHA-256: 8e7e17b3d488cc2040e46f89af215bec527303e4f3c8f86414df63b85f886843
kernel-bootwrapper-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 43ca21533a978b8f439593614f750678
SHA-256: dd9118407f222f5c01ee84009728d92470b434aaf17c2985075e796f61bec2d2
kernel-debug-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 01605b799931f27fdac98d1d8b513e52
SHA-256: b275070ba96fcbc0dcf6ecfba0f1d056e5153b0adaa8705e5c2e17fd4e3e4b39
kernel-debug-debuginfo-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 5bffb469908f8959e303224f9c980406
SHA-256: 810ac3ef822d6787544dc533ac9cf8fadf8c885cc82a188940b3f8979fbaa6ae
kernel-debug-devel-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: bb31472902983fa783ea46d5057db4f6
SHA-256: c9408152b0cf9394030d71b21a20c865e7149baced58b1a19a75331a98578643
kernel-debuginfo-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9f09ded3dd7752594bf976c4f48691b3
SHA-256: 68e2bd4840733790a7a19bc43d9a082cb8689bede103422851cdd31e2d4e6376
kernel-debuginfo-common-ppc64-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 1c4ae3710eb8222dfdcb932ac8b55025
SHA-256: 0fca7154d0975d7331a851b3c6853b25c40d3652094d85473c20d1086384936c
kernel-devel-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: a0c3ed4992ee6c42ee2ee456b247aef3
SHA-256: 7bab48ef42c749f848ef7c2a7e6a869b517afa1bf31162f5352964d5f9ee313f
kernel-doc-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: c73636b24e813b65e402a8cb3946e17c
SHA-256: 61381c5b74a92d3239b2b63606d023f4bc9bfbd72cc3ad528e27f3a8f0fdaed6
kernel-firmware-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: ceaaf75fc447c7b2f1135ab38ead6850
SHA-256: a4e7d8a6e2ca0a9dc964531b040a6e653c3c9697885c046b3517b7ebac656413
kernel-headers-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: d8bfcd6fca8fc8e385641a1072d7d030
SHA-256: 8b86c6de6888aa7a4c839a2e600a19080f06174ce27d2e95792ee9c3cbb7b114
perf-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: a18e98ae60e923330f6c9a68fb3334d8
SHA-256: a28740f1e6f7f4825881a8d4d4e9dd78c797fb0a3fa0f92b3e17f0071c6cbd2f
perf-debuginfo-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 68ca7685f8e97b2636cee8141255df2e
SHA-256: 1ea694fc4f12b459ad5682f359550eb633c72070069b55372f984d202f925e92
python-perf-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: e30ee5e5c5ef84dd66491eddf9b0db63
SHA-256: b380c2d609fa8214f8109ac53202d7be7d95e5581b8a9a412a58ea0d8f801d24
python-perf-debuginfo-2.6.32-220.30.1.el6.ppc64.rpm
File outdated by:  RHBA-2014:0006
    MD5: d0512658f22c356fd336e1b3378b736a
SHA-256: 6996ae7fb74ff9c70ec85a2fb89862db146e1afd59c4b623823c9ca0f73bd0dd
 
s390x:
kernel-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: b52811da1762bc5a7001b113ef37e66c
SHA-256: 6b3b66d85c8fd6618e1ceb1a7b1b4e5fd4aa0423ce4411e74ebc28b6ebb6233f
kernel-debug-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 86ac6690d0641270c5c16e6531feb26c
SHA-256: 10db1da9e5b6aacae01e9e8523b295be49bd6e0c80de38bc0a132dc21b588069
kernel-debug-debuginfo-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 91fe44bb2a5c9f511f078a0c072903c9
SHA-256: 82f900d8985404325042b69e2677d494ef21eadbba1529346f2cfd450b0571de
kernel-debug-devel-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 1bfe731f0328685bfb550d47f4ec55a9
SHA-256: a6f0cf18517adf8421851cf9e329355aeab4a83834b3744350fb7db5949db651
kernel-debuginfo-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 6d1488dcf5e49417ba2c5f6cbca5314a
SHA-256: df0de336d2c267618e625bb8daa730b9a3995157fabe8e065e8a32f8915279c9
kernel-debuginfo-common-s390x-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 6499f44cc20dabf6590b4ae4755789a3
SHA-256: f9869e2bab381c9c3fa67625982599512489913475f15d949acb0ff37fe31e17
kernel-devel-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 746cc0e4858b0cdda0926b9944194114
SHA-256: 7e7534b8bf98576d98cbac1e87552bd2006fac5f6318cd9922e0e35a87e41a53
kernel-doc-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: c73636b24e813b65e402a8cb3946e17c
SHA-256: 61381c5b74a92d3239b2b63606d023f4bc9bfbd72cc3ad528e27f3a8f0fdaed6
kernel-firmware-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: ceaaf75fc447c7b2f1135ab38ead6850
SHA-256: a4e7d8a6e2ca0a9dc964531b040a6e653c3c9697885c046b3517b7ebac656413
kernel-headers-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7ad9ca2cb556248cb9274d61a495a938
SHA-256: 07310b536fdf34e1260563fe4ff55537003a7d545c7cc57204aed763ab850c17
kernel-kdump-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 534b5c156abdb950ed436aa16defa76d
SHA-256: 16a3b4f5f90f6b82bfa52ebb82ccd8b91f5c2dac18b268ac07267fec3d208f02
kernel-kdump-debuginfo-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: ef1c2e8f1a2aed2cf777393be0372c93
SHA-256: aa67a19af2222036f0a3128070989375c640994b43ad168a5b307c083eb3024b
kernel-kdump-devel-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: bf8642bca9aa324352c020104cf141a6
SHA-256: e74b8fbbb338458799f09eb7d426af73d63206213e1317aa8045656340ad74ab
perf-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: a2d10ae419bd21e1f78421c2cfb3515a
SHA-256: 4383df5869749f43f95f36c7d1284064501d28c799244f021bf9f5f72fab5f29
perf-debuginfo-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 91e4eec7f68358efe48d4c3f3330afa3
SHA-256: ff6c99a3e004e6a1de7e08a07f3ecf7001621223ddbd7dbc93ed33842876ee2c
python-perf-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: d3d0ea3d09b1745d4b767a5bbba67fd7
SHA-256: e0c874600301d8f5c36d1f998122751a4a46312bc1d3223cd988ac26844ca8e9
python-perf-debuginfo-2.6.32-220.30.1.el6.s390x.rpm
File outdated by:  RHBA-2014:0006
    MD5: 7dc140511e519b692029eec1c165a1f9
SHA-256: d0850a75d6a2ad1569a88c1310fc3d53d66000d1286741fea762431f83a18db1
 
x86_64:
kernel-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 79ebfdc0ce7f388e9eb39ed0a6c99003
SHA-256: 024d51a1c7365cc0c1e550214397e8794e2a39222888fa93086c98733e46c937
kernel-debug-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 5781c213da1484dffabc41b601acc95f
SHA-256: 21e6eaa61920fb845ec794fc5b054084de92cae510036db8225cff1effac7f8b
kernel-debug-debuginfo-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 02e4e51b05991cdd386c0d4c2e69fbcb
SHA-256: bf4bc11b4f5370c9a0df88ab897d7c835b74d8724239889bec17797a270a4a65
kernel-debug-devel-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 93bbe2e712aa1f83f09f7e55a2fd4988
SHA-256: 49d216fea1691d7f741585f553b49dd0f01298055500e724ba67d73348f9ef9e
kernel-debuginfo-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 54b3fda2b0297d80e3e7034a8f90a776
SHA-256: 8b6d893e0652cc1f5c3b24250b5624b456e95624e974dae4a576c76e0330ad74
kernel-debuginfo-common-x86_64-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 8d45e8ff10c4d499377fe87e4b654dd5
SHA-256: 9cee700b79b6c8600e11522b2005d07707e6e8cd134c766ebd5c53bdd148dda1
kernel-devel-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 9ea1a9f30a2305eba16ee5e54ca6f44d
SHA-256: 26219303bcd14dfb4ff5ea5f2b690232e1cc4b6e839ff862baac14f3c42a8591
kernel-doc-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: c73636b24e813b65e402a8cb3946e17c
SHA-256: 61381c5b74a92d3239b2b63606d023f4bc9bfbd72cc3ad528e27f3a8f0fdaed6
kernel-firmware-2.6.32-220.30.1.el6.noarch.rpm
File outdated by:  RHBA-2014:0006
    MD5: ceaaf75fc447c7b2f1135ab38ead6850
SHA-256: a4e7d8a6e2ca0a9dc964531b040a6e653c3c9697885c046b3517b7ebac656413
kernel-headers-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 09817ab308106fd0b55a4c3015fb8c1c
SHA-256: 030615b8dea738d94beac960a3923188bfa5c7888442dc35cb09e2794e74adaf
perf-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 5707372cce1cdba702a317754aef8256
SHA-256: b13b9e58046385ca94e0b10bfb655e0be681a90ac4bc0dfbcc7ace35c2eb7b62
perf-debuginfo-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 887cb9f75b1bc922c338b3138a33b103
SHA-256: 3b5360332c65eb9d3e416493bbc644928008338f4cf2ba6d11ff0341708bfada
python-perf-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: c662ef69162ce030c8a6d53c4064f898
SHA-256: d1687dd8487c71c9fdecd68a5418184f38166e28f9c79c5de07b8295f0bf37c7
python-perf-debuginfo-2.6.32-220.30.1.el6.x86_64.rpm
File outdated by:  RHBA-2014:0006
    MD5: 5cb69821b21734227c83c617a4eec4d6
SHA-256: 18b716ec97c27f214bf9f056a948c11ed9e64e77e36557b1b4962becad958031
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

747106 - CVE-2011-4131 kernel: nfs4_getfacl decoding kernel oops
818820 - CVE-2012-2313 kernel: unfiltered netdev rio_ioctl access by users


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/