求助谁能给我个极品飞车17nfs13.exe2的nfsfix

Red Hat Customer Portal
Important: Red Hat Enterprise Linux 6 kernel update
Security Advisory
Issued on:
Last updated on:
Affected Products:
Updated kernel packages that fix multiple security issues, address severalhundred bugs, and add numerous enhancements are now available as part ofthe ongoing support and maintenance of Red Hat Enterprise Linux version 6.This is the fourth regular update.The Red Hat Security Response Team has rated this update as havingimportant security impact. Common Vulnerability Scoring System (CVSS) basescores, which give detailed severity ratings, are available for eachvulnerability from the CVE links in the References section.
The kernel packages contain the Linux kernel, the core of any Linuxoperating system.This update fixes the following security issues:* A race condition was found in the way asynchronous I/O and fallocate()interacted when using the ext4 file system. A local, unprivileged usercould use this flaw to expose random data from an extent whose data blockshave not yet been written, and thus contain data from a deleted file.(CVE-, Important)* A flaw was found in the way the vhost kernel module handled descriptorsthat spanned multiple regions. A privileged guest user in a KVM guest coulduse this flaw to crash the host or, potentially, escalate their privilegeson the host. (CVE-, Important)* It was found that the default SCSI command filter does not accommodatecommands that overlap across device classes. A privileged guest user couldpotentially use this flaw to write arbitrary data to a LUN that ispassed-through as read-only. (CVE-, Moderate)* A flaw was found in the way the xen_failsafe_callback() function in theLinux kernel handled the failed iret (interrupt return) instructionnotification from the Xen hypervisor. An unprivileged user in a 32-bitpara-virtualized guest could use this flaw to crash the guest.(CVE-, Moderate)* A flaw was found in the way pmd_present() interacted with PROT_NONEmemory ranges when transparent hugepages were in use. A local, unprivilegeduser could use this flaw to crash the system. (CVE-, Moderate)* A flaw was found in the way CIPSO (Common IP Security Option) IP optionswere validated when set from user mode. A local user able to set CIPSO IPoptions on the socket could use this flaw to crash the system.(CVE-, Moderate)Red Hat would like to thank Theodore Ts'o for reporting CVE-, andAndrew Cooper of Citrix for reporting CVE-. Upstream acknowledgesDmitry Monakhov as the original reporter of CVE-. TheCVE- issue was discovered by Paolo Bonzini of Red Hat.This update also fixes several hundred bugs and adds enhancements. Refer tothe Red Hat Enterprise Linux 6.4 Release Notes for information on the mostsignificant of these changes, and the Technical Notes for furtherinformation, both linked to in the References.All Red Hat Enterprise Linux 6 users are advised to install these updatedpackages, which correct these issues, and fix the bugs and add theenhancements noted in the Red Hat Enterprise Linux 6.4 Release Notes andTechnical Notes. The system must be rebooted for this update to takeeffect.
Before applying this update, make sure all previously-released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available atTo install kernel packages manually, use &rpm -ivh [package]&. Do notuse &rpm -Uvh& as that will remove the running kernel binaries fromyour system. You may use &rpm -e& to remove old kernels afterdetermining that the new kernel functions properly on your system.
Updated packages
kernel-2.6.32-358.el6.src.rpm
File outdated by:  
    MD5: 645cb81fcd3fb69f64f299SHA-256: bb68f27e6cd3aeb54a4c01ef43ee4cba7ce612015b
kernel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: b1ec7b5c52ebb58ecee8SHA-256: bcfacb0857dbd78834c3ebe4cec47aa590a92a3c17f4
kernel-debug-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 0d4f3fd8e59e5ec326a85aca1bc400d0SHA-256: 4e9d6c6ea99bbad6e01ef33af877bf5aef4c6d8a3d2
kernel-debug-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 128ca75acf674b8d05c15a2334efeb9dSHA-256: fe146457aab2bfce864bda1efe
kernel-debug-devel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 685fd3e924ff6556a8cbf2SHA-256: f3af1c2d812cbbafa54b295da5caad7
kernel-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 3a8e394cda29a396c297f1SHA-256: 80218cca2f2be21bb6a137d663d5ca28e560cfd829
kernel-debuginfo-common-i686-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: fc904c477a86a87219d5SHA-256: f0bfd71deb3f20f8ed8fb18cd88c535a8
kernel-devel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 06f3df34e25b821083bfe02e5afd8060SHA-256: ccf2c864bba5befbaac3a635
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: d2bd8c9c26a5d5fb02a8de0d2593e30dSHA-256: 7b085a0d6abe7e4e9c9f7b60340ba0
perf-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 4b56e6fae417e63cffb7eeb0f8aa71f3SHA-256: 30cb6880f2eed999d91feef5b00b831d7ea9e99613d2
perf-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 0c0af9a69b2fe22a3d1a93SHA-256: 0cb4f5d2fa13a6f2d387badc24fee7b202e
python-perf-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 88afd4c8d06SHA-256: e3deb503f82b998ab4f42a340ea33a73
python-perf-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: d41c0bb49b663af3a67d046e82f7aa95SHA-256: 4fdbeab8aa22c6c1bf6d1b
kernel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: b34a544be7ebfSHA-256: c7a14d916cdadc146fafbdca17b8358aba8d4c1ff21191
kernel-debug-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: b177c8a933dSHA-256: 2eac40eefdf96def592
kernel-debug-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 70f81e3db79bab698ca53aSHA-256: a2eb72a218aacccb689bec7f4ab3dd71c84fbaff2af3c
kernel-debug-devel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 500ddf3e8a0abac4dc063a4dc79f4c61SHA-256: de01d7c525a09abb64e265a01d05aea5e34bb6119ffdc8
kernel-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: c8eeb9caecSHA-256: c863fc735f2fb6963dbad2c48bf800e7c1a309e034
kernel-debuginfo-common-x86_64-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: a809a9ee8eb2defcfb6003SHA-256: 3a6b57b90a69c4bc75a8e3ad8a34cc131e47a9950fa0dce6de71
kernel-devel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 2f8caf6bfe3f5d11e7c4252SHA-256: f004be15da2fc5d7d858ae337b713cabe4df84facf8
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: d1b6fae31c77ab2e6f3b26SHA-256: fd299e9cb864daabbddd6bb
perf-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: bfea135fb17dcf3e527a511SHA-256: 76beefdcb48ace0bb925cb3f829dd3d2fb1fe51f3ac
perf-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: c26dedb58aef12a7bc2225SHA-256: db24e3c463c0d31da54f917aeaa2fe7ca017b81b1b41f3bfec5397b9
python-perf-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: d2a66f4c24cc6a36bf076f0a4d7da4bfSHA-256: dcec9f7edcdaf3ece4
python-perf-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 196eaa73f056f2ac46f79SHA-256: df3cb03fcbdf2dfc2ec16be
kernel-2.6.32-358.el6.src.rpm
File outdated by:  
    MD5: 645cb81fcd3fb69f64f299SHA-256: bb68f27e6cd3aeb54a4c01ef43ee4cba7ce612015b
kernel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: b34a544be7ebfSHA-256: c7a14d916cdadc146fafbdca17b8358aba8d4c1ff21191
kernel-debug-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: b177c8a933dSHA-256: 2eac40eefdf96def592
kernel-debug-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 70f81e3db79bab698ca53aSHA-256: a2eb72a218aacccb689bec7f4ab3dd71c84fbaff2af3c
kernel-debug-devel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 500ddf3e8a0abac4dc063a4dc79f4c61SHA-256: de01d7c525a09abb64e265a01d05aea5e34bb6119ffdc8
kernel-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: c8eeb9caecSHA-256: c863fc735f2fb6963dbad2c48bf800e7c1a309e034
kernel-debuginfo-common-x86_64-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: a809a9ee8eb2defcfb6003SHA-256: 3a6b57b90a69c4bc75a8e3ad8a34cc131e47a9950fa0dce6de71
kernel-devel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 2f8caf6bfe3f5d11e7c4252SHA-256: f004be15da2fc5d7d858ae337b713cabe4df84facf8
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: d1b6fae31c77ab2e6f3b26SHA-256: fd299e9cb864daabbddd6bb
perf-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: bfea135fb17dcf3e527a511SHA-256: 76beefdcb48ace0bb925cb3f829dd3d2fb1fe51f3ac
perf-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: c26dedb58aef12a7bc2225SHA-256: db24e3c463c0d31da54f917aeaa2fe7ca017b81b1b41f3bfec5397b9
python-perf-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: d2a66f4c24cc6a36bf076f0a4d7da4bfSHA-256: dcec9f7edcdaf3ece4
python-perf-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 196eaa73f056f2ac46f79SHA-256: df3cb03fcbdf2dfc2ec16be
kernel-2.6.32-358.el6.src.rpm
File outdated by:  
    MD5: 645cb81fcd3fb69f64f299SHA-256: bb68f27e6cd3aeb54a4c01ef43ee4cba7ce612015b
kernel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: b1ec7b5c52ebb58ecee8SHA-256: bcfacb0857dbd78834c3ebe4cec47aa590a92a3c17f4
kernel-debug-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 0d4f3fd8e59e5ec326a85aca1bc400d0SHA-256: 4e9d6c6ea99bbad6e01ef33af877bf5aef4c6d8a3d2
kernel-debug-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 128ca75acf674b8d05c15a2334efeb9dSHA-256: fe146457aab2bfce864bda1efe
kernel-debug-devel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 685fd3e924ff6556a8cbf2SHA-256: f3af1c2d812cbbafa54b295da5caad7
kernel-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 3a8e394cda29a396c297f1SHA-256: 80218cca2f2be21bb6a137d663d5ca28e560cfd829
kernel-debuginfo-common-i686-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: fc904c477a86a87219d5SHA-256: f0bfd71deb3f20f8ed8fb18cd88c535a8
kernel-devel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 06f3df34e25b821083bfe02e5afd8060SHA-256: ccf2c864bba5befbaac3a635
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: d2bd8c9c26a5d5fb02a8de0d2593e30dSHA-256: 7b085a0d6abe7e4e9c9f7b60340ba0
perf-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 4b56e6fae417e63cffb7eeb0f8aa71f3SHA-256: 30cb6880f2eed999d91feef5b00b831d7ea9e99613d2
perf-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 0c0af9a69b2fe22a3d1a93SHA-256: 0cb4f5d2fa13a6f2d387badc24fee7b202e
python-perf-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 88afd4c8d06SHA-256: e3deb503f82b998ab4f42a340ea33a73
python-perf-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: d41c0bb49b663af3a67d046e82f7aa95SHA-256: 4fdbeab8aa22c6c1bf6d1b
kernel-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: f7a681ae7dSHA-256: 4ad774f3df5f03acc63f04db0aea677cc672dee029f0f81abfeca20
kernel-bootwrapper-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: 73a1acf324af4cebe6e75aSHA-256: e7c4c5e1f1d3aacefde20a
kernel-debug-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: a8d6be1b970a77dde5f0SHA-256: daa4cce7ebec59a5ea5aade3f7e934b
kernel-debug-debuginfo-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: 03eacafe4c510aSHA-256: fc34d58fcc52f1557997ccee08c8e66dee351bb9095
kernel-debug-devel-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: cafbbc7db5482bSHA-256: ad452ae0f093be5e2cebeecdb
kernel-debuginfo-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: 49635b6fcedab751dc6cSHA-256: d0b21afd08e6f4cb112e2a8b4d74d60
kernel-debuginfo-common-ppc64-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: cdc509fa4d0b9f332e432SHA-256: b74f9c768c65b7e468e7a9fefc9da392ca8f93f54f18fbf9ccac3e2
kernel-devel-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: 7dcfed3a1c652SHA-256: d40ce0fbbdbdff0aabba262bd1bdeb19f151b60fba50dc
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: 70c7ac51ed2c2dd2bdae861dba35ea6eSHA-256: 929d4ba2bed1bfe8a8aae19
perf-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: cbc921ff715aae2c7634ac6SHA-256: 571c6deadadb4b6acc54df57bb63eacd37d
perf-debuginfo-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: 5ee80e4cd03a20f901ff1cSHA-256: 40c15abcc8e6dfdc22af89aa
python-perf-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: cb1cbb4e41c5fSHA-256: bb90e76a42acc819eb9b76a04ef2f2362faa5d88cd49ad853280
python-perf-debuginfo-2.6.32-358.el6.ppc64.rpm
File outdated by:  
    MD5: 0fc3e76ddaa2de2bd7c9a0SHA-256: 0ac9d40abb9a5ea40dfc7b
kernel-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 7cf372dc9a63b29beae55afbSHA-256: acaf8cf83dbfc7b78e69f4fd
kernel-debug-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: e7fa7c998f0b90bd870cSHA-256: beaa5f2b7aab57d7febea30
kernel-debug-debuginfo-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: faacb0d7239SHA-256: 64afe16ca788e4a2e4b9ce5e4ebe2674acd68a4989ff16
kernel-debug-devel-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 88bcba9b8089ccabd8ccSHA-256: 1feda31a5f2a90a2c5d6351cbef26edfb59529c48eccb5adfeb670fa
kernel-debuginfo-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 8b5e77d762bafcf848b002dSHA-256: 5f50fc1a78f5fff06162ecfdae1852965fa
kernel-debuginfo-common-s390x-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 475e5e45da7e2b98de26SHA-256: aeda0ca0549c0dec216e6ca99acc
kernel-devel-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 7b6d17e4ede2235SHA-256: e88d71239eaac61a3fdcdf7da8a1f5e97755aed1
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: fa569d9d3f55fec9ab467dSHA-256: a105f3ee3b9cf87cf257d56b696c7edefdc4c1ba230b7b785e79f
kernel-kdump-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 0f793b3f432e5754a0dbSHA-256: 8cf05f8adafe26995a0eccb0d2131ecebcc
kernel-kdump-debuginfo-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: e23f0a617bdSHA-256: 266ffefb05288dce498fd32a59ab80f8da90a265abf
kernel-kdump-devel-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: c4ff2b22c79de5bab3e1eaaSHA-256: 78a53bc6ddb00b96fe7f8c2aceb91f9039741abc8ae25b
perf-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 690d682f7be70abf0be76aSHA-256: eaabd67bb2fc25eaa6d643ee39baa21a54300a0
perf-debuginfo-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 17ae27cdfc86e8fa2e95fSHA-256: 0f5c869e1ce8a208ffbbd57859ced59b73b
python-perf-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: ca29d0d118bbfcfab85b7296SHA-256: f35a22d774f375a77a3efb772f1fca6c9d14cbbd428
python-perf-debuginfo-2.6.32-358.el6.s390x.rpm
File outdated by:  
    MD5: 67ccc0daecSHA-256: ee25b7d8f0def37d1341bfeb19a207b131e535abbcb313fd95d51f39
kernel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: b34a544be7ebfSHA-256: c7a14d916cdadc146fafbdca17b8358aba8d4c1ff21191
kernel-debug-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: b177c8a933dSHA-256: 2eac40eefdf96def592
kernel-debug-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 70f81e3db79bab698ca53aSHA-256: a2eb72a218aacccb689bec7f4ab3dd71c84fbaff2af3c
kernel-debug-devel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 500ddf3e8a0abac4dc063a4dc79f4c61SHA-256: de01d7c525a09abb64e265a01d05aea5e34bb6119ffdc8
kernel-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: c8eeb9caecSHA-256: c863fc735f2fb6963dbad2c48bf800e7c1a309e034
kernel-debuginfo-common-x86_64-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: a809a9ee8eb2defcfb6003SHA-256: 3a6b57b90a69c4bc75a8e3ad8a34cc131e47a9950fa0dce6de71
kernel-devel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 2f8caf6bfe3f5d11e7c4252SHA-256: f004be15da2fc5d7d858ae337b713cabe4df84facf8
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: d1b6fae31c77ab2e6f3b26SHA-256: fd299e9cb864daabbddd6bb
perf-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: bfea135fb17dcf3e527a511SHA-256: 76beefdcb48ace0bb925cb3f829dd3d2fb1fe51f3ac
perf-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: c26dedb58aef12a7bc2225SHA-256: db24e3c463c0d31da54f917aeaa2fe7ca017b81b1b41f3bfec5397b9
python-perf-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: d2a66f4c24cc6a36bf076f0a4d7da4bfSHA-256: dcec9f7edcdaf3ece4
python-perf-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 196eaa73f056f2ac46f79SHA-256: df3cb03fcbdf2dfc2ec16be
kernel-2.6.32-358.el6.src.rpm
File outdated by:  
    MD5: 645cb81fcd3fb69f64f299SHA-256: bb68f27e6cd3aeb54a4c01ef43ee4cba7ce612015b
kernel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: b1ec7b5c52ebb58ecee8SHA-256: bcfacb0857dbd78834c3ebe4cec47aa590a92a3c17f4
kernel-debug-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 0d4f3fd8e59e5ec326a85aca1bc400d0SHA-256: 4e9d6c6ea99bbad6e01ef33af877bf5aef4c6d8a3d2
kernel-debug-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 128ca75acf674b8d05c15a2334efeb9dSHA-256: fe146457aab2bfce864bda1efe
kernel-debug-devel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 685fd3e924ff6556a8cbf2SHA-256: f3af1c2d812cbbafa54b295da5caad7
kernel-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 3a8e394cda29a396c297f1SHA-256: 80218cca2f2be21bb6a137d663d5ca28e560cfd829
kernel-debuginfo-common-i686-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: fc904c477a86a87219d5SHA-256: f0bfd71deb3f20f8ed8fb18cd88c535a8
kernel-devel-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 06f3df34e25b821083bfe02e5afd8060SHA-256: ccf2c864bba5befbaac3a635
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: d2bd8c9c26a5d5fb02a8de0d2593e30dSHA-256: 7b085a0d6abe7e4e9c9f7b60340ba0
perf-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 4b56e6fae417e63cffb7eeb0f8aa71f3SHA-256: 30cb6880f2eed999d91feef5b00b831d7ea9e99613d2
perf-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 0c0af9a69b2fe22a3d1a93SHA-256: 0cb4f5d2fa13a6f2d387badc24fee7b202e
python-perf-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: 88afd4c8d06SHA-256: e3deb503f82b998ab4f42a340ea33a73
python-perf-debuginfo-2.6.32-358.el6.i686.rpm
File outdated by:  
    MD5: d41c0bb49b663af3a67d046e82f7aa95SHA-256: 4fdbeab8aa22c6c1bf6d1b
kernel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: b34a544be7ebfSHA-256: c7a14d916cdadc146fafbdca17b8358aba8d4c1ff21191
kernel-debug-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: b177c8a933dSHA-256: 2eac40eefdf96def592
kernel-debug-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 70f81e3db79bab698ca53aSHA-256: a2eb72a218aacccb689bec7f4ab3dd71c84fbaff2af3c
kernel-debug-devel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 500ddf3e8a0abac4dc063a4dc79f4c61SHA-256: de01d7c525a09abb64e265a01d05aea5e34bb6119ffdc8
kernel-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: c8eeb9caecSHA-256: c863fc735f2fb6963dbad2c48bf800e7c1a309e034
kernel-debuginfo-common-x86_64-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: a809a9ee8eb2defcfb6003SHA-256: 3a6b57b90a69c4bc75a8e3ad8a34cc131e47a9950fa0dce6de71
kernel-devel-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 2f8caf6bfe3f5d11e7c4252SHA-256: f004be15da2fc5d7d858ae337b713cabe4df84facf8
kernel-doc-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 402c5be9afaSHA-256: 9cd5d8f2baadcd31bffeee29afc518cfcee45a9e9d5dac1bdef991b4
kernel-firmware-2.6.32-358.el6.noarch.rpm
File outdated by:  
    MD5: 5bafdfabbd182SHA-256: b2b2db501fbda192aeae94c8
kernel-headers-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: d1b6fae31c77ab2e6f3b26SHA-256: fd299e9cb864daabbddd6bb
perf-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: bfea135fb17dcf3e527a511SHA-256: 76beefdcb48ace0bb925cb3f829dd3d2fb1fe51f3ac
perf-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: c26dedb58aef12a7bc2225SHA-256: db24e3c463c0d31da54f917aeaa2fe7ca017b81b1b41f3bfec5397b9
python-perf-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: d2a66f4c24cc6a36bf076f0a4d7da4bfSHA-256: dcec9f7edcdaf3ece4
python-perf-debuginfo-2.6.32-358.el6.x86_64.rpm
File outdated by:  
    MD5: 196eaa73f056f2ac46f79SHA-256: df3cb03fcbdf2dfc2ec16be
(The unlinked packages above are only available from the )
Bugs fixed (see
for more information)
- ALSA - backport the recent USB audio driver from upstream (to fix low audio volume issue, new hw enablement)
- RFE: add online discard support to XFS
- rhel6.1 guest hang when unplug is using virtio disk from monitor
- kernel BUG at fs/jbd2/commit.c:353 or fs/jbd/commit.c:319 hitting J_ASSERT(journal-&j_running_transaction != NULL) in journal_commit_transaction
- Failure to resume from suspend (nVidia Quadro NVS 400)
- pNFS read crashes when mounting with rsize & 4096
- ATS capability is disabled when NIC is assigned to a guest
- SECINFO support in the NFS v4 client in RHEL 6
- NFS mounts fail against Windows 8 servers
- krb5p mounts fail against a Microsoft 8 server.
- xfs contention problem
- [nfsv4] open(O_CREAT) returns EEXISTS on symbolic link created on another system until stat()ed
- [xfs/xfstests 273] heavy cp workload hang
- Balloon value reported doesn't get updated after guest driver is removed and re-inserted.
- can not Install guest(RHEL6.3 32) using scsi-hd
- kvm: 9480: cpu0 unimplemented perfctr wrmsr: 0x186 data 0x130079
- ALSA: Update the snd-oxygen and snd-virtuoso (CMI87xx based) drivers for RHEL 6.4
- kernel panic in qfq_dequeue
- Guest failed to resume from S4 after migration with kvmclock
- dlm: make dlm_recv single threaded
- SEP CPU flag is disabled on Intel 64 bit when exec_shield is on
- Console complain about &Unable to load target_core_stgt&
- link of a delegated file fails (due to server returning NOENT instead of DELAY)
- cifs: fix handling of scopeid in cifs_convert_address
- cifs: simplify open code
- cifs: Cleanup TCP_SERVER_Info
- cifs: Fix oplock break handling
- cifs: Simplify cache invalidation
- cifs: Add rwpidforward mount option [kernel]
- cifs: Cleanup cifs mount code.
- cifs: Introduce code required for cifs idmap and ACL support
- dlm: deadlock between dlm_send and dlm_controld
- NFSv4.1: Add LAYOUTRETURN support
- Use-after-free on CPU hotplug
- pNFS: Page Infrastructure Upgrades.
- [RHEL 6.4] Sync up perf tool with upstream 3.4 [perf-tool]
- Fix KVM device assignment bridge test
- [RHEL6 kernel] crypto: sha512 - Fix byte counter overflow in SHA-512
- cifs_async_writev blocked by limited kmap on i386 with high-mem
- windows 8 32bit
can not be installed on qemu-kvm
- nfs: rpciod is blocked in nfs_release_page waiting for nfs_commit_inode to complete
- KVM: make GET_SUPPORTED_CPUID whitelist-based
- Performance regression between kernels 2.6.32-131.0.15 and 2.6.32-220
- RHEL6: Potential fix for leapsecond caused futex related load spikes
- pNFS: General Client Infrastructure
- Change network with netconsole loaded cause kernel panic
- [PATCH sysfs] kernel cannot rename network interfaces
- RFE - Virtio-scsi should support block_resize
- Update wireless LAN subsystem
- Add support for modern Ralink wireless devices (28xx/3xxx/53xx chips)
- add virtio-scsi unlocked kick patches
- VLAN configured on top of a bonded interface (active-backup) does not failover
- nfs_attr_use_mounted_on_file() returns wrong value
- NFSv4 Handle a bad or revoked delegation
- virtio: Use ida to allocate virtio index
- virtio-rng: 'cat' process hangs when ^C pressed when there's no input
- virtio-rng: module removal doesn't succeed till input from host received
- s3/s4 support for virtio-rng driver
- XFS regularly truncating files after crash/reboot
- [qemu-kvm] [hot-plug] qemu-process (RHEL6.3 guest) goes into D state during nic hot unplug (netdev_del hostnet1)
- [RHEL 6.4] Sync up perf tool with upstream 3.5 [perf-tool]
- backport: KVM: fix race with level interrupts
- RHEL5 Xen SR-IOV VF PCI passthru does not work to RHEL6 HVM no interrupts received on the guest VF
- Fuse: backport FUSE_AUTO_INVAL_DATA flag support and related patches
- pNFS client fails to select correct DS from multipath
- [rhel6] lvs: issues with GRO / icmp fragmentation needed
- mmu_notifier: updates for RHEL6.4
- Spurious LVDS detected on HP T5740
- DM RAID: Bad table argument could cause kernel panic
- nfs: fix potential slabcache leaks when cache allocations fail
- drm rebase bug for 6.4
- hpsa: fix handling of protocol error
- cciss: fix handling of protocol error
- fuse: backport scatter-gather direct IO
- [6.4] Backport upstream XFS fixes
- parallel perf build fails
- wireless: crash in crypto_destroy_tfm
- [RHEL 6.4] Sync up perf tool with upstream latest 3.6 [perf-tool]
- wl1251_sdio driver missed in RHEL6.4
- Soft lockup on reboot with an active VG
- SUNRPC: Patch inclusion request
- Kernel oops/crash when running perf on a SandyBridge host
- host boot fail and when system boots with kernel parameter intel_iommu=on
- xfs: report projid32bit feature in geometry call
- When browse option is used, failed mounts by AutoFS leave broken directories
- iwlwifi rmmod crash after roaming
- nouveau in optimus configuration oops on load
- sysctl table check failed: /net/ipv6/nf_conntrack_frag6_low_thresh Unknown sysctl binary path
- [xfs/md] NULL pointer dereference - xfs_alloc_ioend_bio
- [Arrandale] Text disappearing in Firefox and Terminal
- CVE- kernel: ext4: AIO vs fallocate stale data exposure
- LVM RAID:
Images that are reintroduced into an array are not synced
- storvsc: Account for in-transit packets in the RESET path
- Add minimal hyper-v support to kvm in order to support relaxed timing feature
- DM RAID: kernel panic when attempting to activate partial RAID LV (i.e. an array that has missing devices)
- RPC tasks can deadlock during rpc_shutdown
- export the symbol nfs_fs_type
- export the symbol nfs_fhget
- net: WARN if struct ip_options was allocated directly by kmalloc [rhel-6.4]
- attaching a dummy interface to bonding device causes a crash
- PCIe SRIOV VFs may not configure on PCIe port with no ARI support
- NFSv4 referrals fail if NFS server returns hostnames rather than IP addresses (Kernel part)
- [6.4] XFS log recovery failure leads to loss of data
- [xfs] Bug on invaliding page that is not locked
- An Hyper-V RHEL6.3 Guest is unreachable from the network after live migration
- CVE- kernel: block: default SCSI command filter does not accomodate commands overlap across device classes
- CVE- kernel: stack corruption in xen_failsafe_callback()
- CVE- kernel: mm: thp: pmd_present and PROT_NONE local DoS
- CVE- kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference
- CVE- kernel: vhost: fix length for cross region descriptor
References
These packages are GPG signed by Red Hat for security.
Our key and
details on how to verify the signature are available from:
The Red Hat security contact is .
More contact details at

我要回帖

更多关于 极品飞车9nfs 的文章

 

随机推荐