[CentOS] [CentOS-announce] CEBA-2012:0124 CentOS 6 kernel Update

Tue Feb 14 15:14:03 UTC 2012
Steve Clark <sclark at netwolves.com>

On 02/14/2012 06:00 AM, Johnny Hughes wrote:
> CentOS Errata and Bugfix Advisory 2012:0124
>
> Upstream details at :https://rhn.redhat.com/errata/RHBA-2012-0124.html
>
> The following updated files have been uploaded and are currently
> syncing to the mirrors: ( sha256sum Filename )
>
>
> i386:
> 73849c1b3103e62ef1f469d189d36e306b2a5c38ac1e03a23bb82ca569f33ded  kernel-2.6.32-220.4.2.el6.i686.rpm
> 283cf06274026bbce4894aaa46cf3a7b8eb3d950e707bce79df1b4744c2256fe  kernel-debug-2.6.32-220.4.2.el6.i686.rpm
> ccacf5db5d9ec3c08ab9b1cf913ccc19c2cf638570d5b304bab10fb0379e682c  kernel-debug-devel-2.6.32-220.4.2.el6.i686.rpm
> 3e4059a495c06656f9366c168899da4f7b9be2d4dd7d5b3b85b181d5bec1c8a6  kernel-devel-2.6.32-220.4.2.el6.i686.rpm
> 15eedf5373ef236ccd3f359dddf98a79bab7d6d73303207ecb8c1d8ad047ba55  kernel-doc-2.6.32-220.4.2.el6.noarch.rpm
> c415cdb090b59dcc80e13054012e45f23bf8e3cc1245a1f85aaf5d1cc791bc86  kernel-firmware-2.6.32-220.4.2.el6.noarch.rpm
> 7a9d72cd977f044ea24eba24a46bee0dedb112fe19d7f3aa6b9fe945d61663d5  kernel-headers-2.6.32-220.4.2.el6.i686.rpm
> 125120985bd7d7a83b4ccd9330affa64ace446f96b2a9a2121219745afdf621e  perf-2.6.32-220.4.2.el6.i686.rpm
> 925edef043f1f863ddf8d6b55040e7fce58c3185e276c33953a754a6c64116a1  python-perf-2.6.32-220.4.2.el6.i686.rpm
>
> x86_64:
> e7c8f813ef1ebc783811894d3143c3965c20c3312ad65fc4e1cf73f9afc29155  kernel-2.6.32-220.4.2.el6.x86_64.rpm
> 4e2c367554292ed66d991b24917948001877a995f50d03c54047c57cee470377  kernel-debug-2.6.32-220.4.2.el6.x86_64.rpm
> 58631186f2babbc46918e67f91760663f85235dc837b5695efbd97696b59c158  kernel-debug-devel-2.6.32-220.4.2.el6.x86_64.rpm
> 78b63a80fd7a8af3083d5b07e35ddd74cd9993c38ac1a67240774b08954f38a0  kernel-devel-2.6.32-220.4.2.el6.x86_64.rpm
> b69c65bad8e5bc58f9128d893b1a3e93c3dcc1e633b70fbeaa88c70f9568b510  kernel-doc-2.6.32-220.4.2.el6.noarch.rpm
> a0b8dadc909efb4d7b832bff405fd8c255bc0401a6123c96b3421c5c9600eb0b  kernel-firmware-2.6.32-220.4.2.el6.noarch.rpm
> 4bb63941d75b8c3334e2d9da2a4df1b812de1cb308bcaafd6161a06eba5d0469  kernel-headers-2.6.32-220.4.2.el6.x86_64.rpm
> 89612ecf638034983e045e978fada0b9885eec21fae3cd59ad714c06fb4b8936  perf-2.6.32-220.4.2.el6.x86_64.rpm
> de66cf4e775d1f4f8b652780c5d9c05bed629e3911696ffad03baeb891a22c20  python-perf-2.6.32-220.4.2.el6.x86_64.rpm
>
> Source:
> f412dbb7b1e7b0061c68fd6ad84960a47d0270fec644071ebd9583fc7a1b3290  kernel-2.6.32-220.4.2.el6.src.rpm
>
>
>
Anyone know how to tell if your system is using:
  "This overflow led to a kernel panic on the systems
using the Time Stamp Counter (TSC) or Virtual Machine Interface (VMI) clock
source"

-- 
Stephen Clark
*NetWolves*
Director of Technology
Phone: 813-579-3200
Fax: 813-882-0209
Email: steve.clark at netwolves.com
http://www.netwolves.com