Updated kernel packages that fix two bugs are now available for Red HatEnterprise Linux 6.2 Advanced Update Support.

The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.This update fixes the following bugs:* Previously, the open() system call in some cases failed with an EBUSY error ifthe opened file was also being renamed at the same time. With this update, thekernel automatically retries open() when this failure occurs, and if the retryis not successful either, open() now fails with an ESTALE error. (BZ#1207812)* When repeating a Coordinated Universal Time (UTC) value during a leap second(when the UTC time should be 23:59:60), the International Atomic Time (TAI)timescale previously stopped as the kernel NTP code incremented the TAI offsetone second too late. A patch has been provided, which fixes the bug byincrementing the offset during the leap second itself. Now, the correct TAI isset during the leap second. (BZ#1201670)Users of kernel are advised to upgrade to these updated packages, which fixthese bugs. The system must be rebooted for this update to take effect.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kernel-2.6.32-220.62.1.el6.src.rpm
    MD5: c12ca34fb57e915579ace667bf00c4b5SHA-256: b3925e60924a2a99b4dc9f8b784055c9b1e5967eeef92cfcae263ab04cbe3b04
 
x86_64:
kernel-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: c490dc96b7a54b982b320da0c80267d3SHA-256: 008c2dd719a2551b46a91af547fac39ff1d57f976c7bc46c68862817f857b6d2
kernel-debug-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: fa45a7546c2e5f9e022c20d714b8656aSHA-256: e2740b384dca8dc05c68c0a5623a39593dc4aae42780350bcdc83d280011492f
kernel-debug-debuginfo-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: dcc56a31e60cc6543b06fccb0b0fc046SHA-256: b80a20ccc116618c71cf5c93eef271f45289a8994b60ee1081036e89868874ac
kernel-debug-devel-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: 047b3fa8460a975d4355dfcf170591daSHA-256: 6757d9d1de4e1a5c21903834c2047b21aa38f2fd76ce9605a572b63517ee1bed
kernel-debuginfo-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: 97a71aa8b3c9c952e44726fb058b8862SHA-256: 865eabbafec41ee09332ced4dc693a92282800e35d13088484b7c3adda260664
kernel-debuginfo-common-x86_64-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: 912f6a461af137e16692682647f0d44aSHA-256: be60711d326885b54ac50467aadca98d9798ff377b8e50bd33265e1caea36918
kernel-devel-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: b5d1e1bac0ba2752e21f5b08caffc0a1SHA-256: fc6ae656cfdd964c961917dbc34b0dcfd5a8b3ffb02f080be9ec931cce76472b
kernel-doc-2.6.32-220.62.1.el6.noarch.rpm
    MD5: c076f9fbf83fb4534f9b11beefbec058SHA-256: f86f7b7732f5462d0ee890736a8e99b798e42ef0b29e284411853f79788aeede
kernel-firmware-2.6.32-220.62.1.el6.noarch.rpm
    MD5: 6131c9be63da65ba3ebf651aceab7061SHA-256: b49c9d62aee06c5efe362908eea89e26b9532954747ca7596f87acdff85f2645
kernel-headers-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: 7d1577f9f9f9198e7853a037f8eb7b82SHA-256: acfbe00be0d92c771dabdc596990b6c061e735273d993a5e6b2778e970efd1dc
perf-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: f8fd1db2db59bd2c7e7c9f6bcd7deb3fSHA-256: def128434b0c1e430ff818303beed5a483a3da7c67e3b4d7d3cf0002f35f4363
perf-debuginfo-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: 35f4729f837edea225a955df28a8f924SHA-256: a88495cfa8466f2aaf80846fbec17c27f54064edc949b43a86b3199e3c4a2b5c
python-perf-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: f30b3322137db0b332a0b87bb4f3dec5SHA-256: 473b854395c55d4599fc86c0b62c70ff8147b59a540ad30b4337117bddf8f1be
python-perf-debuginfo-2.6.32-220.62.1.el6.x86_64.rpm
    MD5: 7c4c9392a018862db0ef20cd1f35b627SHA-256: c7003ce22450550dffb2c299b53a90bbdc469ee8dd30f9005fa8d227ab8ddf73
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply