Updated kernel packages that fix one security issue and several bugs arenow available for Red Hat Enterprise Linux 6.4 Extended Update Support.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* A flaw was found in the way the Linux kernel’s futex subsystem handledreference counting when requeuing futexes during futex_wait(). A local,unprivileged user could use this flaw to zero out the reference counter ofan inode or an mm struct that backs up the memory area of the futex, whichcould lead to a use-after-free flaw, resulting in a system crash or,potentially, privilege escalation. (CVE-2014-0205, Important)The security impact of this issue was discovered by Mateusz Guzik ofRed Hat.This update also fixes the following bugs:* A rare race between the file system unmount code and the file systemnotification code could lead to a kernel panic. With this update, a seriesof patches has been applied to the kernel to prevent this problem.(BZ#1130628)* Previously, recovery of a double-degraded RAID6 array could, undercertain circumstances, result in data corruption. This could happen becausethe md driver was using an optimization that is safe to use only forsingle-degraded arrays. This update ensures that this optimization isskipped during the recovery of double-degraded RAID6 arrays. (BZ#1131410)* Later Intel CPUs added a new “Condition Changed” bit to theMSR_CORE_PERF_GLOBAL_STATUS register. Previously, the kernel falselyassumed that this bit indicates a performance interrupt, which preventedother NMI handlers from running and executing. To fix this problem, apatch has been applied to the kernel to ignore this bit in the perf code,enabling other NMI handlers to run. (BZ#1134695)* Previously, certain network device drivers did not accept ethtoolcommands right after they were mounted. As a consequence, the currentsetting of the specified device driver was not applied and an error messagewas returned. The ETHTOOL_DELAY variable has been added, which makes surethe ethtool utility waits for some time before it tries to apply theoptions settings, thus fixing the bug. (BZ#1138300)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/articles/11258To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
kernel-2.6.32-358.49.1.el6.src.rpm
    MD5: 1e626244cece52480d4efe285ca33750SHA-256: fb5128706ff3d85c93d64e21beaf545c7f69a1f2a506a17fe977fe2d767891dd
 
x86_64:
kernel-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 6c340de98427a9ac95c4061b37f38365SHA-256: 70f7676e2e54d30e042af668cec6e444e65cc5f8b0f00b40c97dc37c9b6f941f
kernel-debug-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: db18aa39ff465020150f10e6c99c121bSHA-256: a025945a765ddf40e43fc76f0df4929aa995dbd5a65b6faf11321ab39ca26f56
kernel-debug-debuginfo-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 3b56136480c32c5d4551f9849c201c36SHA-256: 659ba3dc03dbe756923f24a1fbc20a048174cf6e6ba7331ae1edff564fa5b1c5
kernel-debug-devel-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 1cf6f2ba39cf0e0959d481244761bee7SHA-256: 277ba346de4d600a7ebb8c1abf1436e4d6b8015f3523b469c08e9c162cc47709
kernel-debuginfo-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 06445afff0cedbd5dbbd35e06abacecaSHA-256: abd1fc9aa9ac5ef2c01fd49388267c9260feb488b1b1d30cb969433c1c0e3ba7
kernel-debuginfo-common-x86_64-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 37bb9e6ae243ff7f030a2e13e402ecdbSHA-256: 0b77bef31c5c0a4e821af83067d472ccf95e454a37cc1b7f137bdd8417a3e399
kernel-devel-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: be1f53a512614070054182b370ef4bdaSHA-256: b7c8a406d6c7cf76674017387ee3a8131d08f1413385cb97a756ea82b5c5705e
kernel-doc-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 6b523ec5dd37223eaea4253fd1d51c82SHA-256: 2397c388e7a8c558d2326833ae8d9b971ed0150319538a836f6aadb2a7638a59
kernel-firmware-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 5b4dda36c3b9b0ee84658adab93f7b67SHA-256: b1b83c9d0ab2629406e0577853bba0ebf2ed04a7926fb34fb8a73004192d5996
kernel-headers-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 4cbb5b83b2ac1624d675404520b8e7beSHA-256: ed2a16f39d32e527b3f36782ebd54fe312d2757f701ee16aed3086321af218da
perf-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 268fc0ca830368f167c810dc98a70fa9SHA-256: a9641ebd5a206a27090b0ae44f44ed02531840730a700eec8bcab6b3965d7fc5
perf-debuginfo-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 013988275deb1ea847d0d26f1ba03961SHA-256: 08e987124bf4299559b3defb2f03c54316abe35e44d834cc070c075629d385cb
python-perf-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: d323da882bca4e41efc3bc2c4f5e88abSHA-256: 80a0f97ad552b71cd5cd758132685f17c7bcb0ef58def5ee9eb6cbe3f8f9c7a6
python-perf-debuginfo-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 8e4d0e70e0017f6a23899a4ad5694e0aSHA-256: 6aac4b159fc31da3940a97f5f796d37d12540e7967c29b5e6ec53d873db11af2
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
kernel-2.6.32-358.49.1.el6.src.rpm
    MD5: 1e626244cece52480d4efe285ca33750SHA-256: fb5128706ff3d85c93d64e21beaf545c7f69a1f2a506a17fe977fe2d767891dd
 
IA-32:
kernel-2.6.32-358.49.1.el6.i686.rpm
    MD5: 9ea42cdcd56be33f899f0bb1b2e56cc2SHA-256: a3dcecfdb67582440a5b894af37134987a06ece241cdd15fdd37f3a5ffc947d2
kernel-debug-2.6.32-358.49.1.el6.i686.rpm
    MD5: c25447178c8fc6b267d2d57dfed6ca30SHA-256: 68b74076fa0d764f32f45471d582e933a80749e8d7792ced4a206299e227e0d9
kernel-debug-debuginfo-2.6.32-358.49.1.el6.i686.rpm
    MD5: 0d73e9c7625bd3e302702b36f8c7fb49SHA-256: 02a8b68ae903ee5f4dcc34e5bcf0c1eb981ef88bec266c65558af7912a9ad2b2
kernel-debug-devel-2.6.32-358.49.1.el6.i686.rpm
    MD5: f0066c8ea7277dc4786699a8a9b206bbSHA-256: 761b32830f717ce6a3f56d6c6253a54ab270fd352a1fae156fa493f26ff84bb9
kernel-debuginfo-2.6.32-358.49.1.el6.i686.rpm
    MD5: 84b6ce6a40d3a96806ec962092f2b8b5SHA-256: e3a046b62a85a0736a578129b8391711902fc89b46518d10bc6b86becc5aedde
kernel-debuginfo-common-i686-2.6.32-358.49.1.el6.i686.rpm
    MD5: d2ed56a6b87764ded9ae2d793b0c1feaSHA-256: 052f55845befb4c529ce463166a76297736b39ac1f97b36fe62059fa503d3527
kernel-devel-2.6.32-358.49.1.el6.i686.rpm
    MD5: 5a639f1ad11f3553bad21c1f25b16686SHA-256: b9cdf6807fd4afa8955579e20ffef04d97d34871c3d3f066e083e140c85d1776
kernel-doc-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 6b523ec5dd37223eaea4253fd1d51c82SHA-256: 2397c388e7a8c558d2326833ae8d9b971ed0150319538a836f6aadb2a7638a59
kernel-firmware-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 5b4dda36c3b9b0ee84658adab93f7b67SHA-256: b1b83c9d0ab2629406e0577853bba0ebf2ed04a7926fb34fb8a73004192d5996
kernel-headers-2.6.32-358.49.1.el6.i686.rpm
    MD5: 845feda0bc3235e3c8bca27139efd0afSHA-256: edf65df1081d9c56e91e7fe87da11eed4261924743be9e85933b60ccc91c8127
perf-2.6.32-358.49.1.el6.i686.rpm
    MD5: de4e5338ad6dd90399ec22bee7fb3853SHA-256: 477626d28ac933e66b210f45360ac6f2f5fdbe70cd482fc3504db6be6f25dcf0
perf-debuginfo-2.6.32-358.49.1.el6.i686.rpm
    MD5: 2cd28616d8219dcf55e5dfd7914233d1SHA-256: 076da5a7a5ebd9e3275486ac4494f852563d7310c0a8a59391738ba5ea19fa5a
python-perf-2.6.32-358.49.1.el6.i686.rpm
    MD5: 84afeccf37871064a930b78bc80f6eefSHA-256: 0655217b45666023660d1eb7cf1f99bc140ad3fde42e87d376fc359dddafc17b
python-perf-debuginfo-2.6.32-358.49.1.el6.i686.rpm
    MD5: 6fc810796c5c71f416074af88d9acab4SHA-256: 274418a9f811091017d705d1c57ebc50d711faad5fbfdc6e991ce0d00fc020b3
 
PPC:
kernel-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: d73b92796ad5228d253e06a78e0c0d28SHA-256: a6b64193f025c5c1d7dcae14675ec6f691fbdd4371789df2e27c79680c53fbf9
kernel-bootwrapper-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: d61d58fe280626724b81a73e9f434d3dSHA-256: 4476d1ca47dafcb9e09f2f3d822fc33365a32d0485e0a1c1fa87a557841b4041
kernel-debug-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: cffbe5a4ab60b05562402799e2dbe1f1SHA-256: 053dc81f51a72c0a520fe159795c791193011fbe75c4ba3756d7c95766386944
kernel-debug-debuginfo-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: 27b389e3604ae438eb9dfc72a5a796cdSHA-256: c685a25be0066a2b585108ad87c53903c326cb620247ca36bfba411237d2373e
kernel-debug-devel-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: 3e5816be704b535f386c574a1aa8850aSHA-256: 08a0d573b3b6172cf61f25367e09aa58d872a8bd127ced249ba3206a9bbfa19e
kernel-debuginfo-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: b11153b6979e7b4f2066efdd2752b838SHA-256: 9af58a75a61086c593289cfafbc5b9047ccece77c2e67b81404a4bff0efbd1d6
kernel-debuginfo-common-ppc64-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: 5533428042d0645dbecf90ca968fce71SHA-256: 12c41937fbe58288cf0225646af0476d934e4dea92b49d9a6dc0cc96341f184c
kernel-devel-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: 627e099d6f49fe47cb66fe3edce5b139SHA-256: 57f49bc34892ff317dcb7e5b41e5c7a865b940e54349d231b2b6d0780d40e0b7
kernel-doc-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 6b523ec5dd37223eaea4253fd1d51c82SHA-256: 2397c388e7a8c558d2326833ae8d9b971ed0150319538a836f6aadb2a7638a59
kernel-firmware-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 5b4dda36c3b9b0ee84658adab93f7b67SHA-256: b1b83c9d0ab2629406e0577853bba0ebf2ed04a7926fb34fb8a73004192d5996
kernel-headers-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: 0f739cd2f8becf14f2f9a8396665c2f3SHA-256: 46347bd2bca1c4ab25d8951bb37f2d2b9e2602fb74b86ef2d443327462c88184
perf-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: 58839514f40f624b0637b484cd1b338eSHA-256: 5a5abfdd36fd1bb874cd4592b4cf67f25d0d900c9becad45ecce37091461ef7c
perf-debuginfo-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: aab73306fdcc5d2877e8ef96940cfc7dSHA-256: e648c2a0f87c6084d46127049ce84b33d7b8142835eb70b1aed5a94fb8bf5459
python-perf-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: 70f8c20f8390534a5e262c35c26f197bSHA-256: 9ac5f9116c5a25dc8eabce56b5cfd885fd8ff00eb431c429e38a8891f7f585e2
python-perf-debuginfo-2.6.32-358.49.1.el6.ppc64.rpm
    MD5: 4c6b4fb2ad4283a4c23409267687249bSHA-256: 5fd3c234a3967aff2332c9461d47c477ff133617b02ae2c9cb1fd6d44e5847de
 
s390x:
kernel-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 6a9eb02f7859a674965571ce59ee0df7SHA-256: 6b5165cd0ab9a6969e53eacdccf583082e9f5fa45f9532f7cd0d98daf0a68900
kernel-debug-2.6.32-358.49.1.el6.s390x.rpm
    MD5: c66f52bf119eb6cd4aee6f0f0e0a07c0SHA-256: 2f2836ef7fe81b5174001e9dbd4c437954362b6e2c85f5cc3c607d4892c69fd4
kernel-debug-debuginfo-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 9b8d48327e66b054288f1aabb9ece328SHA-256: 24f43d6fd95bd1598f7b41799a88bf761f045768d4d5379afaa47de2e1bb16e7
kernel-debug-devel-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 585f88ff5e681743715e6c3f947467c0SHA-256: af16c368363b7a9e1205656fa30235e5ed21bfd80e2ced81c417d961420102b5
kernel-debuginfo-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 6d8b1ce4a17aa22a2f7ad78d2b86626dSHA-256: 9a28bed39ed9c9e9b3332f022e9a143260793de31e82bc63ca6e46e927477597
kernel-debuginfo-common-s390x-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 094526a7a508f60e61c9d5a03f1d00ceSHA-256: 401bbda735508743bb154c6f6b81c406562dd2dbe3d4a5dcab29609cd700aaa9
kernel-devel-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 6ea12c36ec98b17f6296d1d4e98c2b1dSHA-256: 88ee4c13a3ff363ef00f75d36a18cceb074094bb59b10d4d5fa30e0d82e19d9a
kernel-doc-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 6b523ec5dd37223eaea4253fd1d51c82SHA-256: 2397c388e7a8c558d2326833ae8d9b971ed0150319538a836f6aadb2a7638a59
kernel-firmware-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 5b4dda36c3b9b0ee84658adab93f7b67SHA-256: b1b83c9d0ab2629406e0577853bba0ebf2ed04a7926fb34fb8a73004192d5996
kernel-headers-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 536ddae0a4ef00a198fa2ddde4a086ccSHA-256: 4c94ce4925cefc3d6dd48a5b6bde19745fb30e94b215e5549892985b291312b4
kernel-kdump-2.6.32-358.49.1.el6.s390x.rpm
    MD5: b88afc99ef3a83645e6449c7fc61c323SHA-256: ab0abf77fa2c95fda412673bcaca4ed565e24964753d6086325d2b31ac2fbfba
kernel-kdump-debuginfo-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 5b0cbcee9b65594d2d0f9b75545adc0cSHA-256: 5a1b144444543bc27f6fb10d09fd580e3e231416f3083005a0a1a6db9af34884
kernel-kdump-devel-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 799a124ae3dd64a0ed8f1a2bae17c6c9SHA-256: 7e5fb4a192c2778ff655b780929ef5656bcd71692b62086f350b9af796fa4778
perf-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 33523c6a0d9bc04e0a1c7df647693ddfSHA-256: 128ab76eb18d780c57a85b14824335eafd8053d80a04a22147189057602298ec
perf-debuginfo-2.6.32-358.49.1.el6.s390x.rpm
    MD5: a8cf76277afcfc5bb3db5d0296189863SHA-256: d530ae250ad8d6481eb012cf0c42c35b0976e61c4a96d313357de39524d72360
python-perf-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 2d194f8c6b2ebe0ce87237b7f2aa0080SHA-256: 72cb718a9e7b87f9daf9f04d2a79c911ffc3fa19da82f45692b065f2fef1964a
python-perf-debuginfo-2.6.32-358.49.1.el6.s390x.rpm
    MD5: 50bb8abfecd7b1fe59f057d3546d0845SHA-256: ed02bc1d946479763f0ce9dd7bf18c92a61bc047f2ecd9c87625c2b79d5fca6d
 
x86_64:
kernel-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 6c340de98427a9ac95c4061b37f38365SHA-256: 70f7676e2e54d30e042af668cec6e444e65cc5f8b0f00b40c97dc37c9b6f941f
kernel-debug-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: db18aa39ff465020150f10e6c99c121bSHA-256: a025945a765ddf40e43fc76f0df4929aa995dbd5a65b6faf11321ab39ca26f56
kernel-debug-debuginfo-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 3b56136480c32c5d4551f9849c201c36SHA-256: 659ba3dc03dbe756923f24a1fbc20a048174cf6e6ba7331ae1edff564fa5b1c5
kernel-debug-devel-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 1cf6f2ba39cf0e0959d481244761bee7SHA-256: 277ba346de4d600a7ebb8c1abf1436e4d6b8015f3523b469c08e9c162cc47709
kernel-debuginfo-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 06445afff0cedbd5dbbd35e06abacecaSHA-256: abd1fc9aa9ac5ef2c01fd49388267c9260feb488b1b1d30cb969433c1c0e3ba7
kernel-debuginfo-common-x86_64-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 37bb9e6ae243ff7f030a2e13e402ecdbSHA-256: 0b77bef31c5c0a4e821af83067d472ccf95e454a37cc1b7f137bdd8417a3e399
kernel-devel-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: be1f53a512614070054182b370ef4bdaSHA-256: b7c8a406d6c7cf76674017387ee3a8131d08f1413385cb97a756ea82b5c5705e
kernel-doc-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 6b523ec5dd37223eaea4253fd1d51c82SHA-256: 2397c388e7a8c558d2326833ae8d9b971ed0150319538a836f6aadb2a7638a59
kernel-firmware-2.6.32-358.49.1.el6.noarch.rpm
    MD5: 5b4dda36c3b9b0ee84658adab93f7b67SHA-256: b1b83c9d0ab2629406e0577853bba0ebf2ed04a7926fb34fb8a73004192d5996
kernel-headers-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 4cbb5b83b2ac1624d675404520b8e7beSHA-256: ed2a16f39d32e527b3f36782ebd54fe312d2757f701ee16aed3086321af218da
perf-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 268fc0ca830368f167c810dc98a70fa9SHA-256: a9641ebd5a206a27090b0ae44f44ed02531840730a700eec8bcab6b3965d7fc5
perf-debuginfo-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 013988275deb1ea847d0d26f1ba03961SHA-256: 08e987124bf4299559b3defb2f03c54316abe35e44d834cc070c075629d385cb
python-perf-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: d323da882bca4e41efc3bc2c4f5e88abSHA-256: 80a0f97ad552b71cd5cd758132685f17c7bcb0ef58def5ee9eb6cbe3f8f9c7a6
python-perf-debuginfo-2.6.32-358.49.1.el6.x86_64.rpm
    MD5: 8e4d0e70e0017f6a23899a4ad5694e0aSHA-256: 6aac4b159fc31da3940a97f5f796d37d12540e7967c29b5e6ec53d873db11af2
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply