Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHBA-2012:1310 - Bug Fix Advisory
Issued:
2012-09-25
Updated:
2012-09-25

RHBA-2012:1310 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

kernel bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several bugs and add an enhancement are now
available for Red Hat Enterprise Linux 6 Extended Update Support.

[Updated 23 Oct 2012]
This advisory has been updated with an accurate value of the clock drift for
BZ#853951 (+/- 20 MHz). This update does not change the packages in any way.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

This update fixes the following bugs:

  • Prior to this update, the find_busiest_group() function used

sched_group->cpu_power in the denominator of a fraction with a value of 0.
Consequently, a kernel panic occurred. This update prevents the divide by zero
in the kernel and the panic no longer occurs. (BZ#844943)

  • Previously, the TCP socket bound to NFS server contained a stale skb_hints

socket buffer. Consequently, kernel could terminate unexpectedly. A patch has
been provided to address this issue and skb_hints is now properly cleared from
the socket, thus preventing this bug. (BZ#846830)

  • Previously, when a server attempted to shut down a socket, the

svc_tcp_sendto() function set the XPT_CLOSE variable if the entire reply failed
to be transmitted. However, before XPT_CLOSE could be acted upon, other threads
could send further replies before the socket was really shut down. Consequently,
data corruption could occur in the RPC record marker. With this update, send
operations on a closed socket are stopped immediately, thus preventing this bug.
(BZ#853255)

  • When a PIT (Programmable Interval Timer) MSB (Most Significant Byte)

transition occurred very close to an SMI (System Management Interrupt)
execution, the pit_verify_msb() function did not see the MSB transition.
Consequently, the pit_expect_msb() function returned success incorrectly,
eventually causing a large clock drift in the quick_pit_calibrate() function. As
a result, the TSC (Time Stamp Counter) calibration on some systems was off by
+/- 20 MHz, which led to inaccurate timekeeping or ntp synchronization failures.
This update fixes pit_expect_msb() and the clock drift no longer occurs in the
described scenario. (BZ#853951)

This update adds the following enhancement:

  • This update adds support for the Proportional Rate Reduction (PRR) algorithms

for the TCP protocol. This algorithm determines TCP's sending rate in fast
recovery. PRR avoids excessive window reductions and improves accuracy of the
amount of data sent during loss recovery. In addition, a number of other
enhancements and bug fixes for TCP are part of this update. (BZ#847731)

All users are advised to upgrade to these updated packages, which fix these bugs
and add this enhancement. The system must be rebooted for this update to take
effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.33.1.el6.src.rpm SHA-256: 634b93f4dd4423d770968c1c956ea055071adead6df2060ea7b151c4dec52e18
x86_64
kernel-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 3f839eca29b023121c6079967b4d41cee1d253de0dc6eaf78889a5af72c1b522
kernel-debug-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: b547145cc85e5b8a456260618e5a24cc37acf029d9c9d581ccf02d92e7562c18
kernel-debug-debuginfo-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 1e5f2e63b9c663ecb9fa54146cd1296d898a69d6171311b2f8517b470e374754
kernel-debug-devel-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 2794a518e285829f8247f738f0f00f02b24ca4264a4bdcd4777c08f2daeee7de
kernel-debuginfo-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: b8194e98d2c810814c5c560df378ee89323e6642afa818d638ebb5e0621c6308
kernel-debuginfo-common-x86_64-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: bb2c3d71767023cf9f7e5a7a1e7414bddbd94e6355f54ba37e5a0e071411b5a2
kernel-devel-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 3fa53e63994f94a687e5b1da22ce9bf01de1750a919243adc638a1806f191748
kernel-doc-2.6.32-131.33.1.el6.noarch.rpm SHA-256: cc1bcdbd3199ee14599d431932ea20e5560736b935b3e2588e3ac63f12ab87dd
kernel-firmware-2.6.32-131.33.1.el6.noarch.rpm SHA-256: de2eadd44d1e027a05d62b94c09f3e3e782dceeb2f46ded849b0194a26b01fe3
kernel-headers-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 322d43c29039b2b338a4c1cb522c2bbab174a1b7f9c7a3db89ca5cbb5bbe146f
perf-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 21a99de2fa9819405e22f7bda046274d11009218d4b2f526875da307c563e966
perf-debuginfo-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 6ecbafb63224223f9906d702c1d391b3d4410bc8aaacd99e62c96f9c39a76697
i386
kernel-2.6.32-131.33.1.el6.i686.rpm SHA-256: a5c0c22d744414ad526399cc72340a205d017af021e25da4572ec5523b3f5779
kernel-debug-2.6.32-131.33.1.el6.i686.rpm SHA-256: 54239ec16498bd4d5452b09697d2fa7e414e11bdad124da508b3ade005105e26
kernel-debug-debuginfo-2.6.32-131.33.1.el6.i686.rpm SHA-256: d2ba23e43430592b39a25c9cf70044e4d02502a50b60bf257ebf961204d0850d
kernel-debug-devel-2.6.32-131.33.1.el6.i686.rpm SHA-256: 1a1dfaa248b21e8679b23b9516cb5b5cef51ade2d33030a241f337e41ec0cd0c
kernel-debuginfo-2.6.32-131.33.1.el6.i686.rpm SHA-256: 579924530af5330db483fb1490e0870b1e5f54c36d1e96670ea3160d81bb31fe
kernel-debuginfo-common-i686-2.6.32-131.33.1.el6.i686.rpm SHA-256: ea66381919799fde6cc6ad52b362f2fc2f77c456862b0a15af264dda99bd82a6
kernel-devel-2.6.32-131.33.1.el6.i686.rpm SHA-256: 65d8e93118a14024264f6a14ed46fa7a8e891014c8a411a1627d3f4bbb5f0d85
kernel-doc-2.6.32-131.33.1.el6.noarch.rpm SHA-256: cc1bcdbd3199ee14599d431932ea20e5560736b935b3e2588e3ac63f12ab87dd
kernel-firmware-2.6.32-131.33.1.el6.noarch.rpm SHA-256: de2eadd44d1e027a05d62b94c09f3e3e782dceeb2f46ded849b0194a26b01fe3
kernel-headers-2.6.32-131.33.1.el6.i686.rpm SHA-256: fd41562ec82cd20da6566719c224e20891b9ec77fe036ae3ef8f0c20bf266eb6
perf-2.6.32-131.33.1.el6.i686.rpm SHA-256: c198c217e9d77a7670bffb1fdd8a4b6b196f0021bbc32b02db7bf611f277cd11
perf-debuginfo-2.6.32-131.33.1.el6.i686.rpm SHA-256: 3e2ee1cc6744639cd6f615dd35c91366ec0bac992c63b402c0c2a5f5cc279e2b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.33.1.el6.src.rpm SHA-256: 634b93f4dd4423d770968c1c956ea055071adead6df2060ea7b151c4dec52e18
s390x
kernel-2.6.32-131.33.1.el6.s390x.rpm SHA-256: ab2fe69151d770e4a582aede712c32751a5dcd2e93c34cc48e0fe66dd67dd773
kernel-debug-2.6.32-131.33.1.el6.s390x.rpm SHA-256: ee5c0fb10f6a0db4b1459e298e13ae55af78fdca5e9e1acb2910e937ed5af0e1
kernel-debug-debuginfo-2.6.32-131.33.1.el6.s390x.rpm SHA-256: cce631e58297207f676c20f1dfbf0e98b4e4bf30274f538b3d9ae1f84dd8c69c
kernel-debug-devel-2.6.32-131.33.1.el6.s390x.rpm SHA-256: d47d8416075d1d302d49b37125cf338e3659a85aeb387bf9f7c6d296f265b7ad
kernel-debuginfo-2.6.32-131.33.1.el6.s390x.rpm SHA-256: 21be508f371ff96fc4be4741cf019a9a45052601f6d58e8b0149544fac6bd7b5
kernel-debuginfo-common-s390x-2.6.32-131.33.1.el6.s390x.rpm SHA-256: a5a3e74508d721663cdcc0e178e3224d76c9ef9ec8fa07dffc8d7a8b0aac0697
kernel-devel-2.6.32-131.33.1.el6.s390x.rpm SHA-256: ad15b2eaaef805c576a40b86c555cd51a839703de94834cc84ccd1b4dfb1af99
kernel-doc-2.6.32-131.33.1.el6.noarch.rpm SHA-256: cc1bcdbd3199ee14599d431932ea20e5560736b935b3e2588e3ac63f12ab87dd
kernel-firmware-2.6.32-131.33.1.el6.noarch.rpm SHA-256: de2eadd44d1e027a05d62b94c09f3e3e782dceeb2f46ded849b0194a26b01fe3
kernel-headers-2.6.32-131.33.1.el6.s390x.rpm SHA-256: e7edb509e345c540b79aee69165043382ea184334d4a1efde73e7760bd6a53ce
kernel-kdump-2.6.32-131.33.1.el6.s390x.rpm SHA-256: f32759492f88795371ce39254487071e66318b75784c45e375b0988f7b4c2096
kernel-kdump-debuginfo-2.6.32-131.33.1.el6.s390x.rpm SHA-256: 35379eb995d6fa66b54df7c31362b1b906534949da5358c9006b8cd2ce342ea1
kernel-kdump-devel-2.6.32-131.33.1.el6.s390x.rpm SHA-256: 9d0e9ae71c1baa01dc2e3affec975a2e75b0beec793410772d845d8c5296d6c1
perf-2.6.32-131.33.1.el6.s390x.rpm SHA-256: 4c3063af018e6d345ba914084cbd4abcdb8323509b6bf72fc29fd3c15281a7d0
perf-debuginfo-2.6.32-131.33.1.el6.s390x.rpm SHA-256: 3eac5275ff8d31bbf869f4c0e177fd5296d75ea61a54c0beaf71b4ec25b17098

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.33.1.el6.src.rpm SHA-256: 634b93f4dd4423d770968c1c956ea055071adead6df2060ea7b151c4dec52e18
ppc64
kernel-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: 2ce6b0a39f807ade00a7b8df935603397d32807471077904df0d2b76bc725a57
kernel-bootwrapper-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: ea82b1ff6f54d9fc1f44d83309620be091a9eb44c915a977fb0ad2b8146c9ca8
kernel-debug-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: 361d2702a02be4c0ffefe7d4d4f37e47f972d2636e856169cf32f8a1cfe181c5
kernel-debug-debuginfo-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: 6fb845a7239560301459ff56db015f78359f44f9685f5f4c3e6ee180e74d37f5
kernel-debug-devel-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: faee1c3422b2c607376425d8421b791c310956704fbf0a7b63e277a140f94a25
kernel-debuginfo-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: df38e1610d2aba1cc72c7b61e6b3d5166c4159c0212fefc9c60d19f045e6b3a1
kernel-debuginfo-common-ppc64-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: cae87d46e9001f3d921d587a3407088dfee263f593de1cb7c3f921edba7e80d4
kernel-devel-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: dea3b5d8102642f7b421f49309fe21394dcec9a14002854edc66c52a2fe4bb08
kernel-doc-2.6.32-131.33.1.el6.noarch.rpm SHA-256: cc1bcdbd3199ee14599d431932ea20e5560736b935b3e2588e3ac63f12ab87dd
kernel-firmware-2.6.32-131.33.1.el6.noarch.rpm SHA-256: de2eadd44d1e027a05d62b94c09f3e3e782dceeb2f46ded849b0194a26b01fe3
kernel-headers-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: 25e12a22c5b6c28960b027fcef34f78af4da184392ebac0f223d6ffaa1507095
perf-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: 6baa22230d6cd0ee74f916ac430fbdd5a1365242ad3c89a506eaff847e129a3d
perf-debuginfo-2.6.32-131.33.1.el6.ppc64.rpm SHA-256: d8c5ea5ea63cf69f206ee63e72e26a1a71e6b34a679c3fdb0fcc2efe0983fd14

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
kernel-2.6.32-131.33.1.el6.src.rpm SHA-256: 634b93f4dd4423d770968c1c956ea055071adead6df2060ea7b151c4dec52e18
x86_64
kernel-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 3f839eca29b023121c6079967b4d41cee1d253de0dc6eaf78889a5af72c1b522
kernel-debug-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: b547145cc85e5b8a456260618e5a24cc37acf029d9c9d581ccf02d92e7562c18
kernel-debug-debuginfo-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 1e5f2e63b9c663ecb9fa54146cd1296d898a69d6171311b2f8517b470e374754
kernel-debug-devel-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 2794a518e285829f8247f738f0f00f02b24ca4264a4bdcd4777c08f2daeee7de
kernel-debuginfo-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: b8194e98d2c810814c5c560df378ee89323e6642afa818d638ebb5e0621c6308
kernel-debuginfo-common-x86_64-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: bb2c3d71767023cf9f7e5a7a1e7414bddbd94e6355f54ba37e5a0e071411b5a2
kernel-devel-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 3fa53e63994f94a687e5b1da22ce9bf01de1750a919243adc638a1806f191748
kernel-doc-2.6.32-131.33.1.el6.noarch.rpm SHA-256: cc1bcdbd3199ee14599d431932ea20e5560736b935b3e2588e3ac63f12ab87dd
kernel-firmware-2.6.32-131.33.1.el6.noarch.rpm SHA-256: de2eadd44d1e027a05d62b94c09f3e3e782dceeb2f46ded849b0194a26b01fe3
kernel-headers-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 322d43c29039b2b338a4c1cb522c2bbab174a1b7f9c7a3db89ca5cbb5bbe146f
perf-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 21a99de2fa9819405e22f7bda046274d11009218d4b2f526875da307c563e966
perf-debuginfo-2.6.32-131.33.1.el6.x86_64.rpm SHA-256: 6ecbafb63224223f9906d702c1d391b3d4410bc8aaacd99e62c96f9c39a76697
i386
kernel-2.6.32-131.33.1.el6.i686.rpm SHA-256: a5c0c22d744414ad526399cc72340a205d017af021e25da4572ec5523b3f5779
kernel-debug-2.6.32-131.33.1.el6.i686.rpm SHA-256: 54239ec16498bd4d5452b09697d2fa7e414e11bdad124da508b3ade005105e26
kernel-debug-debuginfo-2.6.32-131.33.1.el6.i686.rpm SHA-256: d2ba23e43430592b39a25c9cf70044e4d02502a50b60bf257ebf961204d0850d
kernel-debug-devel-2.6.32-131.33.1.el6.i686.rpm SHA-256: 1a1dfaa248b21e8679b23b9516cb5b5cef51ade2d33030a241f337e41ec0cd0c
kernel-debuginfo-2.6.32-131.33.1.el6.i686.rpm SHA-256: 579924530af5330db483fb1490e0870b1e5f54c36d1e96670ea3160d81bb31fe
kernel-debuginfo-common-i686-2.6.32-131.33.1.el6.i686.rpm SHA-256: ea66381919799fde6cc6ad52b362f2fc2f77c456862b0a15af264dda99bd82a6
kernel-devel-2.6.32-131.33.1.el6.i686.rpm SHA-256: 65d8e93118a14024264f6a14ed46fa7a8e891014c8a411a1627d3f4bbb5f0d85
kernel-doc-2.6.32-131.33.1.el6.noarch.rpm SHA-256: cc1bcdbd3199ee14599d431932ea20e5560736b935b3e2588e3ac63f12ab87dd
kernel-firmware-2.6.32-131.33.1.el6.noarch.rpm SHA-256: de2eadd44d1e027a05d62b94c09f3e3e782dceeb2f46ded849b0194a26b01fe3
kernel-headers-2.6.32-131.33.1.el6.i686.rpm SHA-256: fd41562ec82cd20da6566719c224e20891b9ec77fe036ae3ef8f0c20bf266eb6
perf-2.6.32-131.33.1.el6.i686.rpm SHA-256: c198c217e9d77a7670bffb1fdd8a4b6b196f0021bbc32b02db7bf611f277cd11
perf-debuginfo-2.6.32-131.33.1.el6.i686.rpm SHA-256: 3e2ee1cc6744639cd6f615dd35c91366ec0bac992c63b402c0c2a5f5cc279e2b

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
x86_64

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter