Updated kernel packages that fix one bug are now available for Red HatEnterprise Linux 6.2 Advanced Update Support.

The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.This update fixes the following bug:* The backlog data could previously not be consumed when the audit_log_start()function was running even if audit_log_start() called the wait_for_auditd()function to consume it. As only auditd could consume the backlog data,audit_log_start() terminated unexpectedly. Consequently, the system becameunresponsive until the backlog timeout was up. With this update,audit_log_start() no longer terminates and the system shuts down and rebootsgracefully in a timely manner. (BZ#1140488)Users of kernel are advised to upgrade to these updated packages, which fixthese bugs. The system must be rebooted for this update to take effect.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kernel-2.6.32-220.64.1.el6.src.rpm
    MD5: 7f3c20637ffdbc5dd5f2df653a76a15cSHA-256: 13d2d0f8c6c35c593fc1088e219a3cb2df009eb507418ec54b634bf9a6fb6199
 
x86_64:
kernel-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: 0a3e3624a909f8100849bbdeeda5066eSHA-256: 9ac1e634a96c2cafa52063532b7b43ddf61db618e48352be08efbb95fa3ff674
kernel-debug-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: caa0be3cd6d293280326d93486711893SHA-256: 8c9076d0af2f92a579a21233ff56a4f17d14c4d150a76712720acab533ea1fe0
kernel-debug-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: 0c6cf7ecbf771ca4f4a4edc0d980cae5SHA-256: c7f79b69ba6057a89566e51f686abba4229ee718c74bb33d66c3ae3f16280158
kernel-debug-devel-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: 1b057565b82549e64b8aed8239979a83SHA-256: 15ef50120f2b464c608090009e0b4f57e1ba2e0583da75730d26ef95ef1e3f2d
kernel-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: 8d81c5d71d4190bd878313ea5d693733SHA-256: 50785f454cadd868d23b76cce9a8479e93282ceb10b8f27a652ca4c4c7a5936c
kernel-debuginfo-common-x86_64-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: 37eaffc0cda09ea7732b0a62d8552297SHA-256: 42d8468b6645f3e4bf9ae201d036e302fb26023dfad7816a1ace465e38e9f518
kernel-devel-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: 281d734f54e542ea592cb3f9bff666cdSHA-256: d1838c5334290edd15f7edfa07afb3d7ecf0fc47c485eacdfaf57d61d6afcf5a
kernel-doc-2.6.32-220.64.1.el6.noarch.rpm
    MD5: 2dac4d9985053364af2f07d6068ec3b7SHA-256: b5ea7a247a80d8b31fd7219e1738ee833ca7b1aed7adcbbfdca8007309013e2e
kernel-firmware-2.6.32-220.64.1.el6.noarch.rpm
    MD5: 8024d5f58d051320e1e4e1173045cecfSHA-256: 010823fa6bc14ef43e963408a91d880a8fa89c350a1029950c1b364a17acd825
kernel-headers-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: a867d5bdfc72b0694a33dff090070d42SHA-256: c1510d85de46def62332274abd6e28438c572478018e42599c5741c1e03d331a
perf-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: 4809153b854f440c1d34811129c94c93SHA-256: 9e5f2c69a64e4f76d1e40cf8e1f1d0fa4b2882b11ae6b36fdc51a089cc914b61
perf-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: b804a919e9f097eca5d7024ec4cafc44SHA-256: 705657df7e348e3fdccb2f1d1dc60de32ca3122be7b27fbcf9c4e0424c68a9f5
python-perf-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: 6ff7bf69ccbff820a7771e0c22fb92acSHA-256: 033c7efb01413f854d47d861f390c6c7178ef719b563b723d165a6274dee672a
python-perf-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm
    MD5: be5e522f4a83a563af342b4c34dfef72SHA-256: 779f2bf1df5503cab99a0f9effe060d9a791b2c737ee787841b320e6f2cc2e3b
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply