Skip to navigation

Security Advisory Important: Red Hat Enterprise Linux 6 kernel update

Advisory: RHSA-2013:1645-2
Type: Security Advisory
Severity: Important
Issued on: 2013-11-21
Last updated on: 2013-11-21
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2012-6542
CVE-2012-6545
CVE-2013-0343
CVE-2013-1928
CVE-2013-1929
CVE-2013-2164
CVE-2013-2234
CVE-2013-2851
CVE-2013-2888
CVE-2013-2889
CVE-2013-2892
CVE-2013-3231
CVE-2013-4345
CVE-2013-4387
CVE-2013-4591
CVE-2013-4592

Details

Updated kernel packages that fix multiple security issues, address several
hundred bugs, and add numerous enhancements are now available as part of
the ongoing support and maintenance of Red Hat Enterprise Linux version 6.
This is the fifth regular update.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A flaw was found in the way the Linux kernel's IPv6 implementation
handled certain UDP packets when the UDP Fragmentation Offload (UFO)
feature was enabled. A remote attacker could use this flaw to crash the
system or, potentially, escalate their privileges on the system.
(CVE-2013-4387, Important)

* A flaw was found in the way the Linux kernel handled the creation of
temporary IPv6 addresses. If the IPv6 privacy extension was enabled
(/proc/sys/net/ipv6/conf/eth0/use_tempaddr set to '2'), an attacker on the
local network could disable IPv6 temporary address generation, leading to a
potential information disclosure. (CVE-2013-0343, Moderate)

* A flaw was found in the way the Linux kernel handled HID (Human Interface
Device) reports with an out-of-bounds Report ID. An attacker with physical
access to the system could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2013-2888,
Moderate)

* An off-by-one flaw was found in the way the ANSI CPRNG implementation in
the Linux kernel processed non-block size aligned requests. This could lead
to random numbers being generated with less bits of entropy than expected
when ANSI CPRNG was used. (CVE-2013-4345, Moderate)

* It was found that the fix for CVE-2012-2375 released via RHSA-2012:1580
accidentally removed a check for small-sized result buffers. A local,
unprivileged user with access to an NFSv4 mount with ACL support could use
this flaw to crash the system or, potentially, escalate their privileges on
the system . (CVE-2013-4591, Moderate)

* A flaw was found in the way IOMMU memory mappings were handled when
moving memory slots. A malicious user on a KVM host who has the ability to
assign a device to a guest could use this flaw to crash the host.
(CVE-2013-4592, Moderate)

* Heap-based buffer overflow flaws were found in the way the Zeroplus and
Pantherlord/GreenAsia game controllers handled HID reports. An attacker
with physical access to the system could use these flaws to crash the
system or, potentially, escalate their privileges on the system.
(CVE-2013-2889, CVE-2013-2892, Moderate)

* Two information leak flaws were found in the logical link control (LLC)
implementation in the Linux kernel. A local, unprivileged user could use
these flaws to leak kernel stack memory to user space. (CVE-2012-6542,
CVE-2013-3231, Low)

* A heap-based buffer overflow in the way the tg3 Ethernet driver parsed
the vital product data (VPD) of devices could allow an attacker with
physical access to a system to cause a denial of service or, potentially,
escalate their privileges. (CVE-2013-1929, Low)

* Information leak flaws in the Linux kernel could allow a privileged,
local user to leak kernel memory to user space. (CVE-2012-6545,
CVE-2013-1928, CVE-2013-2164, CVE-2013-2234, Low)

* A format string flaw was found in the Linux kernel's block layer.
A privileged, local user could potentially use this flaw to escalate their
privileges to kernel level (ring0). (CVE-2013-2851, Low)

Red Hat would like to thank Stephan Mueller for reporting CVE-2013-4345,
and Kees Cook for reporting CVE-2013-2851.

This update also fixes several hundred bugs and adds enhancements. Refer to
the Red Hat Enterprise Linux 6.5 Release Notes for information on the most
significant of these changes, and the Technical Notes for further
information, both linked to in the References.

All Red Hat Enterprise Linux 6 users are advised to install these updated
packages, which correct these issues, and fix the bugs and add the
enhancements noted in the Red Hat Enterprise Linux 6.5 Release Notes and
Technical Notes. The system must be rebooted for this update to take
effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kernel-2.6.32-431.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: c680feb20aea7825f872699f6d0ff708
SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
 
IA-32:
kernel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: b2d695caa36b80e53864d95fef442ab7
SHA-256: fafe931e3bfc3528d0927c717e5a7f5995b9d0c3084460fa9af84ee46010f0e8
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-debug-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: f988549c7805e724de4cc725e4823174
SHA-256: a40994bc1b2c2deb3662eedf4399816f9241e09cfe3df038da460f1d77af05b5
kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: fc4cd126e82400dd4b67c4b38f6a8460
SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
kernel-debug-devel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c465cd90fb8caf27c41c0e606d67ed8b
SHA-256: 39454ea7fb5dd4249153ff1a11c6a2f40e5d44fdb59fc1a30999cd921bc514c1
kernel-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c3d4d2248dbdae9cb8c987a4854f5af7
SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 27dc8748513d97a20129fd75212b7baf
SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
kernel-devel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8a88179c7ab964417b6aab3040f2d217
SHA-256: ad9701463405cd0f6379e7f57d16b7744d0f31e603d8507987a101140b74efa9
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: d3a4e6b8abf8644472267c428b5d8b0c
SHA-256: 3a961e94286f161bda90d235f78e3be0684c853b8cd411e3725169f1c95d8001
perf-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26d1f6f0257b4df5978cf7cd6f78b9d9
SHA-256: bdf02fcf3f44b267d51705cec35e7343dc9b4ae5e9fc4130a7eefac066949086
perf-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 94d58dde8ecceae2f8eafc147a624d7c
SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
python-perf-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 816dccaebd84a653feb902c207aec892
SHA-256: d6dbab0602c59a05cb2a091ef3c7def0498ee1f920ba21b0b6c74d5b91dcc879
python-perf-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 95704925103dc501d8cc563eded2b908
SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8
 
x86_64:
kernel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: fd771fdd2ef8b0ad04283bedabdf2249
SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-debug-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4dfb42a6d4115ef7341e2600d7e96e43
SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6d57637da415d4d7635c89fa13dcbc03
SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
kernel-debug-devel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 197b1e0753d882a21860518ecba0f28b
SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
kernel-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: e8936477b0e0ad4b15d444dac02c3d11
SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 165d8519d0a1c399f02d171ba2a43c0e
SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
kernel-devel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: aec19db21db0dd8dd1e2c19e9180c6fa
SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: bef8f980aaf0e656c7d9af3a5524a43b
SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
perf-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1e7c921b7b4b29a61a6e0ce6771631bd
SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
perf-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a48c0f56a6134a6953723ed2a46ff3c7
SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
python-perf-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0fbfa80bf2730895ede10156a600e9af
SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3decfdd6ad86b24159aafd1c873df9ed
SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kernel-2.6.32-431.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: c680feb20aea7825f872699f6d0ff708
SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
 
x86_64:
kernel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: fd771fdd2ef8b0ad04283bedabdf2249
SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-debug-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4dfb42a6d4115ef7341e2600d7e96e43
SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6d57637da415d4d7635c89fa13dcbc03
SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
kernel-debug-devel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 197b1e0753d882a21860518ecba0f28b
SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
kernel-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: e8936477b0e0ad4b15d444dac02c3d11
SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 165d8519d0a1c399f02d171ba2a43c0e
SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
kernel-devel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: aec19db21db0dd8dd1e2c19e9180c6fa
SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: bef8f980aaf0e656c7d9af3a5524a43b
SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
perf-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1e7c921b7b4b29a61a6e0ce6771631bd
SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
perf-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a48c0f56a6134a6953723ed2a46ff3c7
SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
python-perf-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0fbfa80bf2730895ede10156a600e9af
SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3decfdd6ad86b24159aafd1c873df9ed
SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kernel-2.6.32-431.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: c680feb20aea7825f872699f6d0ff708
SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
 
IA-32:
kernel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: b2d695caa36b80e53864d95fef442ab7
SHA-256: fafe931e3bfc3528d0927c717e5a7f5995b9d0c3084460fa9af84ee46010f0e8
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-debug-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: f988549c7805e724de4cc725e4823174
SHA-256: a40994bc1b2c2deb3662eedf4399816f9241e09cfe3df038da460f1d77af05b5
kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: fc4cd126e82400dd4b67c4b38f6a8460
SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
kernel-debug-devel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c465cd90fb8caf27c41c0e606d67ed8b
SHA-256: 39454ea7fb5dd4249153ff1a11c6a2f40e5d44fdb59fc1a30999cd921bc514c1
kernel-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c3d4d2248dbdae9cb8c987a4854f5af7
SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 27dc8748513d97a20129fd75212b7baf
SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
kernel-devel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8a88179c7ab964417b6aab3040f2d217
SHA-256: ad9701463405cd0f6379e7f57d16b7744d0f31e603d8507987a101140b74efa9
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: d3a4e6b8abf8644472267c428b5d8b0c
SHA-256: 3a961e94286f161bda90d235f78e3be0684c853b8cd411e3725169f1c95d8001
perf-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26d1f6f0257b4df5978cf7cd6f78b9d9
SHA-256: bdf02fcf3f44b267d51705cec35e7343dc9b4ae5e9fc4130a7eefac066949086
perf-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 94d58dde8ecceae2f8eafc147a624d7c
SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
python-perf-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 816dccaebd84a653feb902c207aec892
SHA-256: d6dbab0602c59a05cb2a091ef3c7def0498ee1f920ba21b0b6c74d5b91dcc879
python-perf-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 95704925103dc501d8cc563eded2b908
SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8
 
PPC:
kernel-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: b3c5fc441dc463b6021f40ebdf134e1f
SHA-256: e55a25ef9a1c2219d85acb986df20928ec856757c4343f70b2333fa644fa0b12
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-bootwrapper-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 65c86362ae50fb218b011ce123978ea4
SHA-256: 176814c7311532ae6a51bad7fb1f4343797208e5d4067a6b129a30e2808d235c
kernel-debug-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c08f95844ad05e94f7b77d705b4726c6
SHA-256: a32ff51dbc45fc96fa09477997a5782b5933fb7d4cf8444e56d655e2bd65aadf
kernel-debug-debuginfo-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: c5b140dacbf751730d9b539af77b2b27
SHA-256: 1b360879e26568509d1ba26dbfa607aed44567c44d7e5db9341ba17a02d6641c
kernel-debug-devel-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 49ccdacada701662e861d72bb581cff3
SHA-256: e0ebafc6c148703e83dd6235ddfe468c1044a0de7e20a600923f823dad946dd8
kernel-debuginfo-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: fb36ef2fddee48b16fa1d51eb6463689
SHA-256: 7877b3f5ad81da6bc692edc64c8eb6da53a21f9e418b96f4cd9456c3043b0740
kernel-debuginfo-common-ppc64-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: e196e7beb9fdfc21ccb4b32a9353dd70
SHA-256: f5d178da06567bde8d740ce6c9855e24d4af83a1b9a8080f7ac911adaaaabffe
kernel-devel-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 81f90eefb1428e9fb24ac713d9835f19
SHA-256: 5c692be08cf5e6232821b61e162be8c5df515dab7f8f702b9dbcfd1f36b50e11
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: ba1bfd9b200bb90c9a1ba46e999b2879
SHA-256: 3fbb432c946f2b513283ab995cb4f69fb56dafd20e1b9b8b474412c4f0bcf2ab
perf-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: f6220267e4e767b826604b3bfe8e19c2
SHA-256: 7119efd13d7e00c7e0a76f997fec4ed950cc44cd264ebb440b632beea17ab3e0
perf-debuginfo-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 89b570696b60509a6904e8990fb739ce
SHA-256: da8394381b28f8e73fe9301341934454876b97dc77d009e4a1a6f03852cedae4
python-perf-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: abf2f85c4c06e0c07ff665297b216135
SHA-256: 759d13e71e2357483835a0c73be4778c2f9c3a11c98778d17a5675ced67ecf2e
python-perf-debuginfo-2.6.32-431.el6.ppc64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2d69d2e1e2e38d692ab46c9a7bad2ac7
SHA-256: 63fcf717100b0ba90db6b7c9d6c67b9bd0a3dabdf94362c891d10b295bb01806
 
s390x:
kernel-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: eb30b0157aab2bdf87c3b9ccb6cf3383
SHA-256: 1ae5655e74f75a39e08f7c50eb7847ddfbd0afcf645abd17222b6c188a942910
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-debug-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 56758af12ca3f2fa34ac81f3047533ce
SHA-256: 968da00321ceadd265f2decebc4293a66409440ee83cf007f69eb911b4d28f74
kernel-debug-debuginfo-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 06f28041c79025ebd9792f368befa321
SHA-256: 243a286c6e9826f21e44ddaf2979f6977135a9cbb065cd55800d5ace68135f1f
kernel-debug-devel-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 63fc96dd31039d2a5da0340d690ee81b
SHA-256: fcca1e679e28065be4f2428deb80f0cd5773bcb19afe0fd82519fbc75032c55f
kernel-debuginfo-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: c8ebfe2a97a8fd7f17164a5af806da6a
SHA-256: 69d90408f1df33defc17b6460d59e84c9e1a4e7325ab92e19e93c7adce1c55bd
kernel-debuginfo-common-s390x-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: fb0169f8455e32fc75b822da23e0aac7
SHA-256: 5c6e87784f3c78f39eeb2c4b2bb9f7ee22104a9dd77b823fa8b0230f38da6157
kernel-devel-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 2b304061290dfc4a5c48b501daeda890
SHA-256: 6c292767e853d6b7d2d4535ed6afd1a6a5f3ccbfbcabaf5ccde9e1df2c09105b
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: fcdde64b3d0d187e7e9b30479dbd970c
SHA-256: 85693eef56459cfbe63cb9e9609e303dc40aacd75ce4c63ae097abf078db4e3b
kernel-kdump-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 400c75f2b9909e627d4bcf0cd4b92191
SHA-256: 1cf8f29c4d00b205df1acd02d99f4cdd5f4dba14fcf463d835e62c0e11d6de8b
kernel-kdump-debuginfo-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: d3c542d453227cb581d5af3d7ece801e
SHA-256: f2bd0b97370da255feb76a34779359175140317658b21176ed966c7d2f0be0bb
kernel-kdump-devel-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 14a4763f203e69ccd8cba65771ad6360
SHA-256: c5f91f715a9429b28afe96b4c14b4e9a210ad3aea74678960951fcf0a7f8b7fb
perf-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: c970ff1e3a9c1ba93d22e1a30dd3c192
SHA-256: e562b5600ea93841d70969d08cce2724908e927e9aa88ca13b7c696666bcd763
perf-debuginfo-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: abc811f376d46e29c117e4af1a831604
SHA-256: 58ba2acd83978bcaa0f8a5b65fdcda97764699fdafad7e5d1e1d392dabb85022
python-perf-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: 05e6a8e6ea1b22deda6545bd6b84cf61
SHA-256: d35dd43c2b4b6e3fbfdd99b62e2160f573efd650a7a97cf927ce679cc09eb056
python-perf-debuginfo-2.6.32-431.el6.s390x.rpm
File outdated by:  RHSA-2014:0328
    MD5: f818b565e9bdc3a9d8680c271602a39c
SHA-256: ea7d3ea3e4e822712bfe01d204a41e5b8451aed7d443e5facae6bf2cd543342a
 
x86_64:
kernel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: fd771fdd2ef8b0ad04283bedabdf2249
SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-debug-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4dfb42a6d4115ef7341e2600d7e96e43
SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6d57637da415d4d7635c89fa13dcbc03
SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
kernel-debug-devel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 197b1e0753d882a21860518ecba0f28b
SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
kernel-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: e8936477b0e0ad4b15d444dac02c3d11
SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 165d8519d0a1c399f02d171ba2a43c0e
SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
kernel-devel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: aec19db21db0dd8dd1e2c19e9180c6fa
SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: bef8f980aaf0e656c7d9af3a5524a43b
SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
perf-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1e7c921b7b4b29a61a6e0ce6771631bd
SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
perf-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a48c0f56a6134a6953723ed2a46ff3c7
SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
python-perf-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0fbfa80bf2730895ede10156a600e9af
SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3decfdd6ad86b24159aafd1c873df9ed
SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kernel-2.6.32-431.el6.src.rpm
File outdated by:  RHSA-2014:0328
    MD5: c680feb20aea7825f872699f6d0ff708
SHA-256: 1770948a9fa87e0395ea0a330a507bb31e82a8a6c48403cfbe4fb74738c2c175
 
IA-32:
kernel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: b2d695caa36b80e53864d95fef442ab7
SHA-256: fafe931e3bfc3528d0927c717e5a7f5995b9d0c3084460fa9af84ee46010f0e8
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-debug-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: f988549c7805e724de4cc725e4823174
SHA-256: a40994bc1b2c2deb3662eedf4399816f9241e09cfe3df038da460f1d77af05b5
kernel-debug-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: fc4cd126e82400dd4b67c4b38f6a8460
SHA-256: ef44c36083cfda3bebc5a92fa6c26a50fb9f96e01ed8201e48853a45d9b87abf
kernel-debug-devel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c465cd90fb8caf27c41c0e606d67ed8b
SHA-256: 39454ea7fb5dd4249153ff1a11c6a2f40e5d44fdb59fc1a30999cd921bc514c1
kernel-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: c3d4d2248dbdae9cb8c987a4854f5af7
SHA-256: 89ba9ae3e9811bf98d3067fd887c8bb38288127a783b1dd7c4e1f12b945704a5
kernel-debuginfo-common-i686-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 27dc8748513d97a20129fd75212b7baf
SHA-256: fb7bd594fbe02034fa1b20c2887bea9c26c165c8982a7817699fc2af277a741d
kernel-devel-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 8a88179c7ab964417b6aab3040f2d217
SHA-256: ad9701463405cd0f6379e7f57d16b7744d0f31e603d8507987a101140b74efa9
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: d3a4e6b8abf8644472267c428b5d8b0c
SHA-256: 3a961e94286f161bda90d235f78e3be0684c853b8cd411e3725169f1c95d8001
perf-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 26d1f6f0257b4df5978cf7cd6f78b9d9
SHA-256: bdf02fcf3f44b267d51705cec35e7343dc9b4ae5e9fc4130a7eefac066949086
perf-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 94d58dde8ecceae2f8eafc147a624d7c
SHA-256: 9b3636ab050504b7447f97e5d45c8e94faaf6863a3d7041bfeadf179f0009777
python-perf-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 816dccaebd84a653feb902c207aec892
SHA-256: d6dbab0602c59a05cb2a091ef3c7def0498ee1f920ba21b0b6c74d5b91dcc879
python-perf-debuginfo-2.6.32-431.el6.i686.rpm
File outdated by:  RHSA-2014:0328
    MD5: 95704925103dc501d8cc563eded2b908
SHA-256: 801624c21d65167d09710273c2ccb0cc14780b312f541f234a95435210b988e8
 
x86_64:
kernel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: fd771fdd2ef8b0ad04283bedabdf2249
SHA-256: c2ef1091167c81c2fbd2fb13aca2e03a96b8634806dddf885fcf35d34a34c1d5
kernel-abi-whitelists-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 454e2efed3677ce4d1e3bee1b1f5bd6f
SHA-256: cc6f8f1dd4406a0b75143206b57e6d1ce8d044aa077ec66fe5627aaa8dbfa283
kernel-debug-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 4dfb42a6d4115ef7341e2600d7e96e43
SHA-256: 2ecbd166a365ab93d2579cd29c55d193aa12988503c8c9db31c5e5a534d90ef9
kernel-debug-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 6d57637da415d4d7635c89fa13dcbc03
SHA-256: 4576c767e50777278e015c7a1f3c03e415cda5576f838fb43d5deca61734be5a
kernel-debug-devel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 197b1e0753d882a21860518ecba0f28b
SHA-256: f33f11dd344cbf2d2a8348bff597fa7498b1953ff7971eccd90422310d0f4c5e
kernel-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: e8936477b0e0ad4b15d444dac02c3d11
SHA-256: 1f6c55538f64aa12314beff0e17d1cef1e865c6f96b0551b3ac1382aab7d6735
kernel-debuginfo-common-x86_64-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 165d8519d0a1c399f02d171ba2a43c0e
SHA-256: b7de15771019d1f642df6eb6163a2512ac6c6059ca7743eb04148f46edaa754f
kernel-devel-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: aec19db21db0dd8dd1e2c19e9180c6fa
SHA-256: f55f6cfc7faf96c1dd7ff2b000332b16aec2117feb7574c0cadd827f4c7a8bcc
kernel-doc-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 46b6a8bf9ddd4f2d6e116d79c84dad68
SHA-256: 0d333efe8957ca1943da3ee7dab37c1f642c5e9328cfd347c1d71b1f3dcb697c
kernel-firmware-2.6.32-431.el6.noarch.rpm
File outdated by:  RHSA-2014:0328
    MD5: 69e8962d86b8739b3bcf112697ffa6ec
SHA-256: 91a8292f7ebc1452f8a6c74c1184b738f096c67ba9e0dbf02327b62a7d8a92b1
kernel-headers-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: bef8f980aaf0e656c7d9af3a5524a43b
SHA-256: 673c1554760076570c22b6efd59bbce22198f53ad9157d739979f071ebc70552
perf-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 1e7c921b7b4b29a61a6e0ce6771631bd
SHA-256: 89ec2c978c455699146f2bd2760e3f0dc065845e7062e1741b54b86be1598f00
perf-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: a48c0f56a6134a6953723ed2a46ff3c7
SHA-256: 4a5cd16146ac66f2aadd6bb557385c196c21d132711375310892b1d262fc1311
python-perf-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 0fbfa80bf2730895ede10156a600e9af
SHA-256: 66b9036eceb59f2aad128fa077fa52acf251275488ff66b078f1b464b8af03f5
python-perf-debuginfo-2.6.32-431.el6.x86_64.rpm
File outdated by:  RHSA-2014:0328
    MD5: 3decfdd6ad86b24159aafd1c873df9ed
SHA-256: de78a03efc47c5cc4af1c7e1c3e9cd66517d580fa42df35daca476b5c167603c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1000429 - CVE-2013-2892 Kernel: HID: pantherlord: heap overflow flaw
1000451 - CVE-2013-2888 Kernel: HID: memory corruption flaw
1007690 - CVE-2013-4345 kernel: ansi_cprng: off by one error in non-block size request
1011927 - CVE-2013-4387 Kernel: net: IPv6: panic when UFO=On for an interface
1014867 - xfssyncd and flush device threads hang in xlog_grant_head_wait
1031678 - CVE-2013-4591 kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached
1031702 - CVE-2013-4592 kernel: kvm: memory leak when memory slot is moved with assigned device
627128 - kernel spec: devel_post macro: hardlink fc typo
734728 - cifs: asynchronous readpages support
796364 - sbc_fitpc2_wdt NULL pointer dereference
815908 - NFSv4 server support for numeric IDs
831158 - dm-crypt: Fix possible mempool deadlock
834919 - JBD: Spotted dirty metadata buffer
851269 - kernel-debug: enable CONFIG_JBD_DEBUG
856764 - RHEL 6.5 Common Network Backports Tracker
859562 - DM RAID: 'sync' table argument is ineffective.
873659 - virt: Clocksource tsc unstable (delta = 474712882 ns). Enable clocksource failover by adding clocksource_failover kernel parameter.
876528 - Set-group-ID (SGID) bit not inherited on XFS file system with ACLs on directory
889973 - "kernel: device-mapper: table: 253:3: snapshot-origin: unknown target type"
903297 - FCoE target: backport drivers/target from upstream
908093 - gfs2: withdraw does not wait for gfs_controld
913660 - nfs client crashes during open
914664 - CVE-2013-0343 kernel: handling of IPv6 temporary addresses
918239 - kernel-2.6.32-358.0.1 doesn't boot at virtual machine on Xen Cloud Platform
920752 - cannot open device nodes for writing on RO filesystems
922322 - CVE-2012-6542 Kernel: llc: information leak via getsockname
922404 - CVE-2012-6545 Kernel: Bluetooth: RFCOMM - information leak
928207 - transfer data using two port from guest to host,guest hang and call trace
949567 - CVE-2013-1928 Kernel: information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE
949932 - CVE-2013-1929 Kernel: tg3: buffer overflow in VPD firmware parsing
953097 - virtio-rng, boot the guest with two rng device, cat /dev/hwrng in guest, guest will call trace
956094 - CVE-2013-3231 Kernel: llc: Fix missing msg_namelen update in llc_ui_recvmsg
969515 - CVE-2013-2851 kernel: block: passing disk names as format strings
973100 - CVE-2013-2164 Kernel: information leak in cdrom driver
980995 - CVE-2013-2234 Kernel: net: information leak in AF_KEY notify
990806 - BUG: soft lockup - CPU#0 stuck for 63s! [killall5:7385]
999890 - CVE-2013-2889 Kernel: HID: zeroplus: heap overflow flaw


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/