Updated kernel packages that fix two security issues and three bugs are nowavailable for Red Hat Enterprise Linux 6.5 Extended Update Support.Red Hat Product Security has rated this update as having Important securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* It was found that the Linux kernel’s implementation of vectored pipe readand write functionality did not take into account the I/O vectors that werealready processed when retrying after a failed atomic access operation,potentially resulting in memory corruption due to an I/O vector arrayoverrun. A local, unprivileged user could use this flaw to crash the systemor, potentially, escalate their privileges on the system. (CVE-2015-1805,Important)* A buffer overflow flaw was found in the way the Linux kernel’s IntelAES-NI instructions optimized version of the RFC4106 GCM mode decryptionfunctionality handled fragmented packets. A remote attacker could use thisflaw to crash, or potentially escalate their privileges on, a system over aconnection with an active AES-GCM mode IPSec security association.(CVE-2015-3331, Important)The security impact of the CVE-2015-1805 issue was discovered by Red Hat.This update also fixes the following bugs:* Parallel extending direct I/O writes to a file could previously race to updatethe size of the file. If executed in an incorrect order, the file size couldmove backwards and push a previously completed write beyond the end of the file,which resulted in losing the write. With this update, file size updates alwaysexecute in appropriate order, thus fixing this bug. (BZ#1218498) * When the load rose and run queues were busy due to the effects of theenqueue_entity() function, tasks with large sched_entity.vruntime values couldpreviously be prevented from using the CPU time. A patch eliminating theentity_key() function in the sched_fair.c latency value has been backported fromupstream, and all tasks are now provided with fair CPU runtime. (BZ#1219121) * Previously, running the clock_gettime() function quickly in a loop couldresult in a jump back in time. Consequently, programs could behave unexpectedlywhen they assumed that clock_getime() returned an equal or greater time insubsequent calls. With this update, if the time delta between calls is negative,the clock is no longer updated. As a result, a subsequent call toclock_gettime() is guaranteed to return a time greater than or equal to aprevious call. (BZ#1219500)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
kernel-2.6.32-431.59.1.el6.src.rpm
    MD5: 2d48720a65ca49b7f3317d86482e9b83SHA-256: 648e74b55de47900eeac83b7d5031ca7107c60406bddf3523d27e9adaec6ef82
 
x86_64:
kernel-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 31f6fcb6ee466d727fcb49957327ff94SHA-256: 709458dc8083927ea161bfc8fb9886699eb71e8779103d5b7922cf751298565f
kernel-abi-whitelists-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 2874437dd6328b43275047b7c9a7a651SHA-256: d99bce69b7040d21c7ac0481ad71c97892f8fa83be61c2fb9f4949389b255fd4
kernel-debug-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: bdabda4d30e979e25c8762b903b6ae09SHA-256: 616a5302626f86924806e24e35e1994dd8139cb46a49e4342e5827a928071383
kernel-debug-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: f29a5b8e843899e9e485f86852d6ebc7SHA-256: ee3f75eac476276f823ba21eafafedb362519f98388d6ca5b39335a2583be548
kernel-debug-devel-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: b9304aaf7061a56c87e9a5793d4d592aSHA-256: 09e89ec56ef63495689d300189dc6d7eb25fc2d154ee18310c29a44ee3258312
kernel-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 1e591af6e5d5ca40638653cf22b679ceSHA-256: cd61bf220245682feedd0892eaf410b6bfd0654d4cf03e83b8613987f01a7305
kernel-debuginfo-common-x86_64-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: e6394af5e5b306f1bfe2218d83f3e541SHA-256: a73a341ea43b7238d2808776b8cd4ac426552eec521e2c45c610592341d6a742
kernel-devel-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: babd9bae3183aada09d89ea43466bd6cSHA-256: 290699846867fe4bbfc2cb5944f657f43cbba52cca78d7e66d63842e22d89031
kernel-doc-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 58e628b44b830c267d3ef671cbeefaeeSHA-256: 1083e12598afe3809230573bd4e5afe2d6daa9a37a0c9bfd8040d2ef28ab9285
kernel-firmware-2.6.32-431.59.1.el6.noarch.rpm
    MD5: e458dc0aa343e40968b5da603ce7692bSHA-256: 3add6e3d834cc8ec985bb6b6bf373621a54e1d2d072a73f8737b628e121ee8e3
kernel-headers-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 53240590ac5fbfc6225371358f51c237SHA-256: 64d42eb3fca720986717a399060a759210bc447ced18677199e889c385a41599
perf-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 8725d8efa3ceeb4576c706a029eee153SHA-256: 7627a7c5974e39be234b5a1c18b84be373dda2788a5bd449a04a080e70f17a73
perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 69bebc4782c7f785e06e49f98f796c17SHA-256: 0d5298a16e20c8b7737038409c4b518b65ded112b1edb9ea7d9e8ba6a1b9e884
python-perf-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: c6ac1fbe319a3257aaa09d1f16c79317SHA-256: 8e96dbd5be7006af9f802a4645342ab427f1d79926102ec05158051264d37fc4
python-perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: c5f6a13975232e771711153617f73ab6SHA-256: fb47a85d6e2fdb360dc5994b81db35d3d4ad49a83e4bfea6c1c746fe425a2da2
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
kernel-2.6.32-431.59.1.el6.src.rpm
    MD5: 2d48720a65ca49b7f3317d86482e9b83SHA-256: 648e74b55de47900eeac83b7d5031ca7107c60406bddf3523d27e9adaec6ef82
 
IA-32:
kernel-2.6.32-431.59.1.el6.i686.rpm
    MD5: 936c9ef5575606c96da81ac70bff2f27SHA-256: d4faa675e47a489f91c2557ff73f33219ce8c87dc587dd89d7f76e6daf2762e6
kernel-abi-whitelists-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 2874437dd6328b43275047b7c9a7a651SHA-256: d99bce69b7040d21c7ac0481ad71c97892f8fa83be61c2fb9f4949389b255fd4
kernel-debug-2.6.32-431.59.1.el6.i686.rpm
    MD5: c77c9f8d3be1cb8abd5772f82e2b0257SHA-256: 04e4128522917182c0c5e25d0145a6a3bb3bf12f51917a1800369f93152e5328
kernel-debug-debuginfo-2.6.32-431.59.1.el6.i686.rpm
    MD5: 54b78ca4aa42e13fe00dc313ce470f77SHA-256: 5909e37db0bf5a785b94a116e07a82fb436585ee16517055247bb37cd4147563
kernel-debug-devel-2.6.32-431.59.1.el6.i686.rpm
    MD5: c35dac5c5c31ba6cc6aaebc773d55250SHA-256: bc5c5d993f1311c8df39f8a0d9353415e44f6391767425e827cacc2e993fb8cb
kernel-debuginfo-2.6.32-431.59.1.el6.i686.rpm
    MD5: 599c14d0ebc731c074812c4eb40a6608SHA-256: c06f2dec9a9348713c58a02384fa2550731ca4ce55b68cc7bf33704ecab48d58
kernel-debuginfo-common-i686-2.6.32-431.59.1.el6.i686.rpm
    MD5: 10ce233b931c1721f00559641f81314fSHA-256: 033516b5d0bd8cccf530738cac53080caedd823942dcb2cf8870d88ec88e6774
kernel-devel-2.6.32-431.59.1.el6.i686.rpm
    MD5: bb7d0b166cef1bf787bda4c1e4662989SHA-256: 01416736d992ca8f84dd01aa6dceb30c29fbdb47185e7dcc01ef4f34a093b137
kernel-doc-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 58e628b44b830c267d3ef671cbeefaeeSHA-256: 1083e12598afe3809230573bd4e5afe2d6daa9a37a0c9bfd8040d2ef28ab9285
kernel-firmware-2.6.32-431.59.1.el6.noarch.rpm
    MD5: e458dc0aa343e40968b5da603ce7692bSHA-256: 3add6e3d834cc8ec985bb6b6bf373621a54e1d2d072a73f8737b628e121ee8e3
kernel-headers-2.6.32-431.59.1.el6.i686.rpm
    MD5: 7a15a7ff0bcd94045ca7605eaeb9611dSHA-256: 903ae249f7e0a2eb1d73f6181acd2ffcffd7b8647836e6710842cf269cde7dcd
perf-2.6.32-431.59.1.el6.i686.rpm
    MD5: fb8076fc70ee80b1a64a7fad2d5bc8f4SHA-256: 72211131b2670f2b5fac8fc719814df14033f18d2a80f38a95ad5d0ed0716f0b
perf-debuginfo-2.6.32-431.59.1.el6.i686.rpm
    MD5: 867d146e2d0345d0a38262592e8b01f9SHA-256: c7e30e4a4e656847b89dcaad8f068e46a30787c938bb6034fe7611a2bbe756b7
python-perf-2.6.32-431.59.1.el6.i686.rpm
    MD5: be06fafe53587fd627603f16324108dcSHA-256: 7dc6cfc3e21193f9692182863e3eac9b90a5b2055154f769ba611f7fbbdc02af
python-perf-debuginfo-2.6.32-431.59.1.el6.i686.rpm
    MD5: 51e231df4dca70281a608388465231e3SHA-256: 512710805ca3232b30080567264f6ef40c622ebb2a62e650d4e8d1b83f84fc4e
 
PPC:
kernel-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: ebb072286fd95c7cc637f72d8bb6b2a4SHA-256: dcacf8a9cf13759f44b3de834d99a17e31007f1b78b4c7c3a11ae1ae4a845402
kernel-abi-whitelists-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 2874437dd6328b43275047b7c9a7a651SHA-256: d99bce69b7040d21c7ac0481ad71c97892f8fa83be61c2fb9f4949389b255fd4
kernel-bootwrapper-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: b745de1d1eb16afcc866b858a38bc3baSHA-256: cdec52062a8ccbb0f9c358ab0eec43515752ca3310a169b705a69cc9e5867ba6
kernel-debug-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: 4fb77f0330c3dc27f2301bd94d253f8cSHA-256: bde3defc586bb737bdac3433ec01ca556612663470a8c5262e12c3d476d20ac7
kernel-debug-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: 9346019c5f3a270af4d6ffd7e0bace6fSHA-256: 7879de4dadf49f8a97b95bf5d2008673dbb348aaebf422898f3d046405252ab1
kernel-debug-devel-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: 7f971ce6d32843b9a3a3301b47fa4ba6SHA-256: b4da2408f8db36ba489e09d04d7b1c1332478657ca83810c63ebda6aea7dfd16
kernel-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: 5fc2187feb8b13e05a578aa3278f18faSHA-256: b6c73df025d43c04028fc08c3761e95dd80064442cc4ed4764a630af5ba5263b
kernel-debuginfo-common-ppc64-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: 6d52583b5736a26ec516777641ff34faSHA-256: d2ade812891bfd1d35170bc404951d8a5340bf62ec23b78c3740da7662d64c76
kernel-devel-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: edfcf22b910a99649fcc804306b1b98cSHA-256: da67b0c732e05623814eff96c912275a9fdff9f13395555fda34fba5e8912d24
kernel-doc-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 58e628b44b830c267d3ef671cbeefaeeSHA-256: 1083e12598afe3809230573bd4e5afe2d6daa9a37a0c9bfd8040d2ef28ab9285
kernel-firmware-2.6.32-431.59.1.el6.noarch.rpm
    MD5: e458dc0aa343e40968b5da603ce7692bSHA-256: 3add6e3d834cc8ec985bb6b6bf373621a54e1d2d072a73f8737b628e121ee8e3
kernel-headers-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: 50978155c49b0e27af15638300a946d2SHA-256: 0bb96b828f803dfc6d40b410f0582b45765ea5b0d29f0d1ec86c5c50514cbf0f
perf-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: 3f5b2bf93860f38e4597620669c785c8SHA-256: 1798e65ca5e58abf2178133fd85cf03e5550ab1c2e74908f741a0d5fce5ab13d
perf-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: f0a2b105cff30ee0fe7d18d012389228SHA-256: 6d2eeb65de6c71fd54d4fccaea033a2c15284ee69023f65e046423d0b11fd32f
python-perf-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: e376e5e3c68aeb2b0a8a68bf0773c84dSHA-256: 1ac2219f9f3b66693980fa3fb4fe55904fc59abc07e1c0b88904c96cff4f7075
python-perf-debuginfo-2.6.32-431.59.1.el6.ppc64.rpm
    MD5: 41966646a310b983f2cbc2b36b83764cSHA-256: c710d9fe34fda15e51d6b08bbd346d8502a25df1b514549d78d43aefc1020d2e
 
s390x:
kernel-2.6.32-431.59.1.el6.s390x.rpm
    MD5: b3cd1024d2e9fd06fd881282ca710c43SHA-256: 772cf57894bfbc5d2a1e64e47c1a217fafee6ea49957b9e6a15a3cf3ed956e53
kernel-abi-whitelists-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 2874437dd6328b43275047b7c9a7a651SHA-256: d99bce69b7040d21c7ac0481ad71c97892f8fa83be61c2fb9f4949389b255fd4
kernel-debug-2.6.32-431.59.1.el6.s390x.rpm
    MD5: e2d35b0ba0d60548edcf0e281c93bf03SHA-256: 7a41d5f160540efa59c4e7d657b7c687d96a359d07b6dd3db4322c0b6367c025
kernel-debug-debuginfo-2.6.32-431.59.1.el6.s390x.rpm
    MD5: 9f04899d57fe169f653dd90a6d303087SHA-256: 7f2fadb12e17154b3cbbed703759e852e03fb5bb6f7a69268df5ef449fbc4ea6
kernel-debug-devel-2.6.32-431.59.1.el6.s390x.rpm
    MD5: 0a23f7af0f75723e5e4757cedb409371SHA-256: cd631ce29a1aeb0952f0b2c5193ba0971a958a4dafc306f8e9134d76fde3895d
kernel-debuginfo-2.6.32-431.59.1.el6.s390x.rpm
    MD5: 6f2361b7eec29017f3e9626ae03cbf73SHA-256: e20488aab7f3accf0bc6f99ce43357cd1c565942228f110ea5d36fc13059374f
kernel-debuginfo-common-s390x-2.6.32-431.59.1.el6.s390x.rpm
    MD5: 82a4239ea74c868dfd690b706dec9f26SHA-256: 3df09411e45e0e47aa69bd986194b350d3f92cdfdbf1933c55390210345c56d4
kernel-devel-2.6.32-431.59.1.el6.s390x.rpm
    MD5: 1a343a5ee406a465a4a5c729c3b9a8e1SHA-256: 6d0522e719975587ef9f2b7241700d4f13296f8d3baaf149d37165f6ba7e51a8
kernel-doc-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 58e628b44b830c267d3ef671cbeefaeeSHA-256: 1083e12598afe3809230573bd4e5afe2d6daa9a37a0c9bfd8040d2ef28ab9285
kernel-firmware-2.6.32-431.59.1.el6.noarch.rpm
    MD5: e458dc0aa343e40968b5da603ce7692bSHA-256: 3add6e3d834cc8ec985bb6b6bf373621a54e1d2d072a73f8737b628e121ee8e3
kernel-headers-2.6.32-431.59.1.el6.s390x.rpm
    MD5: 8232a04584b2a338a2e82c6b9fbf40dbSHA-256: a729811234dc134f55cb82c6e40bb7e72af654c298c84044217fe62498f9cb39
kernel-kdump-2.6.32-431.59.1.el6.s390x.rpm
    MD5: 05fee18788408960f7c22c1bb46626acSHA-256: ff5338dc83b6a8a5141b0c5f859df9ffa2c5e0877f6fdffb3eef9414cd8d5e6d
kernel-kdump-debuginfo-2.6.32-431.59.1.el6.s390x.rpm
    MD5: d8ea4e0b443ad0b84ef4667d37aba5a9SHA-256: f0d5c2cb862460eff0e0b03353e88079ad3cd85e1a7ad0822cb45401bb0e1698
kernel-kdump-devel-2.6.32-431.59.1.el6.s390x.rpm
    MD5: aab41b6161e06809de67c8ff46014a17SHA-256: dd8c7b3f71f3a4e3b0b700de8e46540bdba3327521f842fa59aebec7bd30e9a4
perf-2.6.32-431.59.1.el6.s390x.rpm
    MD5: b75714c8c98984c7c6a40f15926603abSHA-256: 913cb9d4cb03e1b2a45f4f4c95ae011e2ad03d33a84b7e05108b6ca627ec8d32
perf-debuginfo-2.6.32-431.59.1.el6.s390x.rpm
    MD5: a54ac9474fb26c545e21757ce0b1bca7SHA-256: 1fef60882489e664f7b54ab4e3948ff8f65b6ea661d165bd7eb64690550d37ea
python-perf-2.6.32-431.59.1.el6.s390x.rpm
    MD5: b3a87f4c8e3dbf00cc4f89d95de1c284SHA-256: f43786fe15c8fe9ccca091d24d9953a820e672f2bcc4ad2bdd8ffe5946857e47
python-perf-debuginfo-2.6.32-431.59.1.el6.s390x.rpm
    MD5: 09fdb3a53f1ab2fd789c015333cc22bcSHA-256: ee3cf64f94e7d484a4e817cb897c3f9ded319f45153aa5213605909fac1794f3
 
x86_64:
kernel-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 31f6fcb6ee466d727fcb49957327ff94SHA-256: 709458dc8083927ea161bfc8fb9886699eb71e8779103d5b7922cf751298565f
kernel-abi-whitelists-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 2874437dd6328b43275047b7c9a7a651SHA-256: d99bce69b7040d21c7ac0481ad71c97892f8fa83be61c2fb9f4949389b255fd4
kernel-debug-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: bdabda4d30e979e25c8762b903b6ae09SHA-256: 616a5302626f86924806e24e35e1994dd8139cb46a49e4342e5827a928071383
kernel-debug-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: f29a5b8e843899e9e485f86852d6ebc7SHA-256: ee3f75eac476276f823ba21eafafedb362519f98388d6ca5b39335a2583be548
kernel-debug-devel-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: b9304aaf7061a56c87e9a5793d4d592aSHA-256: 09e89ec56ef63495689d300189dc6d7eb25fc2d154ee18310c29a44ee3258312
kernel-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 1e591af6e5d5ca40638653cf22b679ceSHA-256: cd61bf220245682feedd0892eaf410b6bfd0654d4cf03e83b8613987f01a7305
kernel-debuginfo-common-x86_64-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: e6394af5e5b306f1bfe2218d83f3e541SHA-256: a73a341ea43b7238d2808776b8cd4ac426552eec521e2c45c610592341d6a742
kernel-devel-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: babd9bae3183aada09d89ea43466bd6cSHA-256: 290699846867fe4bbfc2cb5944f657f43cbba52cca78d7e66d63842e22d89031
kernel-doc-2.6.32-431.59.1.el6.noarch.rpm
    MD5: 58e628b44b830c267d3ef671cbeefaeeSHA-256: 1083e12598afe3809230573bd4e5afe2d6daa9a37a0c9bfd8040d2ef28ab9285
kernel-firmware-2.6.32-431.59.1.el6.noarch.rpm
    MD5: e458dc0aa343e40968b5da603ce7692bSHA-256: 3add6e3d834cc8ec985bb6b6bf373621a54e1d2d072a73f8737b628e121ee8e3
kernel-headers-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 53240590ac5fbfc6225371358f51c237SHA-256: 64d42eb3fca720986717a399060a759210bc447ced18677199e889c385a41599
perf-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 8725d8efa3ceeb4576c706a029eee153SHA-256: 7627a7c5974e39be234b5a1c18b84be373dda2788a5bd449a04a080e70f17a73
perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: 69bebc4782c7f785e06e49f98f796c17SHA-256: 0d5298a16e20c8b7737038409c4b518b65ded112b1edb9ea7d9e8ba6a1b9e884
python-perf-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: c6ac1fbe319a3257aaa09d1f16c79317SHA-256: 8e96dbd5be7006af9f802a4645342ab427f1d79926102ec05158051264d37fc4
python-perf-debuginfo-2.6.32-431.59.1.el6.x86_64.rpm
    MD5: c5f6a13975232e771711153617f73ab6SHA-256: fb47a85d6e2fdb360dc5994b81db35d3d4ad49a83e4bfea6c1c746fe425a2da2
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply