Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2013:1783-1
Type: Security Advisory
Severity: Important
Issued on: 2013-12-05
Last updated on: 2013-12-05
Affected Products: Red Hat Enterprise Linux Server EUS (v. 6.3.z)
CVEs (cve.mitre.org): CVE-2012-4508
CVE-2013-2851
CVE-2013-4299

Details

Updated kernel packages that fix three security issues and several bugs are
now available for Red Hat Enterprise Linux 6.3 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A race condition was found in the way asynchronous I/O and fallocate()
interacted when using the ext4 file system. A local, unprivileged user
could use this flaw to expose random data from an extent whose data blocks
have not yet been written, and thus contain data from a deleted file.
(CVE-2012-4508, Important)

* An information leak flaw was found in the way the Linux kernel's device
mapper subsystem, under certain conditions, interpreted data written to
snapshot block devices. An attacker could use this flaw to read data from
disk blocks in free space, which are normally inaccessible. (CVE-2013-4299,
Moderate)

* A format string flaw was found in the Linux kernel's block layer.
A privileged, local user could potentially use this flaw to escalate their
privileges to kernel level (ring0). (CVE-2013-2851, Low)

Red Hat would like to thank Theodore Ts'o for reporting CVE-2012-4508,
Fujitsu for reporting CVE-2013-4299, and Kees Cook for reporting
CVE-2013-2851. Upstream acknowledges Dmitry Monakhov as the original
reporter of CVE-2012-4508.

This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
kernel-2.6.32-279.39.1.el6.src.rpm
File outdated by:  RHSA-2014:0419
    MD5: 0db19f755f8b9a0580071ba3b8475d9e
SHA-256: 77dd68b6c57a85193ee196714fb2f1cffbda329add9b65b19e134a083aa94ee8
 
IA-32:
kernel-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 765542d44bced5904ac1649cbfc03a40
SHA-256: 2516ae92d3a7481b268ee6cf859eaff55e4b148c845031becabba7dce86e8af5
kernel-debug-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 3ee615fe6c40f34e275df938c7a53c25
SHA-256: 2a96ac91722edda32834a4433890e79f2211947b52cc5b21c74885cdde74ae67
kernel-debug-debuginfo-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 18d571a19161be0d0da35f4d0dadbdeb
SHA-256: f759645ec89f89b9c7195c11b029f2ac23afd0ae6567ff6ab0df34e0fff60ac0
kernel-debug-devel-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 05350c95e7551b82c39df20cf9982856
SHA-256: b4bed37bf1dc8d8d1ac0674725d153d3d3024c5f3f927638bc0fc8e738f11dcf
kernel-debuginfo-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: be6a29bb966a3b58a8f1509aa60070bb
SHA-256: 17331228d3062b87ebbbc84af5d04f4377246bf3efd6aef97432cb615b76b5d3
kernel-debuginfo-common-i686-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 42d8ec01d6dca1a52d45a076c6798439
SHA-256: af53b4278e1a50d56216ea3e9a87de2fc30744d8c51fabdf3a625b47e1c7eee5
kernel-devel-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 923cef9c91173d3524df75fa7381f17e
SHA-256: d9d325c3ce9abddd3a0a5301791b81e7877d99b034e503099da4233b39c3e33c
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0419
    MD5: b754a1f27c178b319e05855ce003f7da
SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0419
    MD5: 7ba419e2f8adbf64307d399992a0ba64
SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 2bf29f18522d6bdc33206253d4c54b8a
SHA-256: a72b27f00910efcf2dfb2e7c3f2837ee06a39cf84d22c1e2dc4d6b6521466c57
perf-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 195ac1aa7519bf26e2fce05ede7516c0
SHA-256: 4d99d3dfc8cf8c0832b50f3ef28d64ae149a192724ed1b6158b21a4ac86b1075
perf-debuginfo-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 67f84ca6be9d3fce12b9f61758f530a5
SHA-256: 0845f7aea104b050364df82b2cc97fef0dd9cdf2c425faaa51ca26e3a08b5b01
python-perf-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 8d03af192a3d99813e6f41cff5e3fde5
SHA-256: 68b7ebab0c00ae425dd230052cca6fae3724859a8fad7df4b790226f3d93d4db
python-perf-debuginfo-2.6.32-279.39.1.el6.i686.rpm
File outdated by:  RHSA-2014:0419
    MD5: 17e3db1812742cb130399938125792c4
SHA-256: 4664416be224d9ac3f502a43a232770a6bc22710484b88f0b9ad8a0cf8381dd7
 
PPC:
kernel-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 83ce4673906dab5e3578bcd25bda1486
SHA-256: 0e1d136f80e26e1696da76fbd70bb796edc7c5983a21817da4bb4d37308dba03
kernel-bootwrapper-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: fb573acca338567a2cfefb04cea49ac0
SHA-256: 95c7ac0becd135d9c5b9e203591cd2a6c4aecc411f45eecdb7742e2021680187
kernel-debug-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 2477df6fd21c9b57c9e8dff1d48c4b99
SHA-256: ceeffeddcfecfbbeef2c8cdf56d52b54b0c6850f1db8caec9d6eeab07928048d
kernel-debug-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 904b3c5b00ce4a87c099417566cc3c0b
SHA-256: 92aecbbfc439ff3d5b25fbb47f7e193884516702d580a6c5d1ec77e0bfa0f5ca
kernel-debug-devel-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: f758eb4eaf311222f78f419fbf2657d0
SHA-256: d4016873c9e5ffa9eab11a4889d5351df0513245f14c8756f7b5a19b9a869ee5
kernel-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 0000468337273ee83b8483097608edff
SHA-256: c59d9a1adf5ba31cd82ad156154547d70d13dbfe449cc56a5a5c3bcb5b44add7
kernel-debuginfo-common-ppc64-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: a63ec1cf21f23f76e0e6a26726eddc05
SHA-256: d7e1dc1974d37a09bf38a99be2ed2373e1aefe264027da65edeac37cf2a06159
kernel-devel-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 61a593809374d03f58c86ae39b2efde1
SHA-256: 7cf09bb07be656f27bf30303e8be16cf254ecbb6b8954fe3fa58b5cc0a61e31f
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0419
    MD5: b754a1f27c178b319e05855ce003f7da
SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0419
    MD5: 7ba419e2f8adbf64307d399992a0ba64
SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: f942ad552d99c0cbbc32ea88cefde1cf
SHA-256: 0406d2555f43484f535dc4f94b5aaadd12f491d5fa4d2a324181a172e51708ee
perf-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: e1e57c185af1213463cc3075eb23c411
SHA-256: 054d56332d919c8e99383b88fbc3e00f3aff9acde2dbca6d1c635af4cf9db016
perf-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 259c83da157ad9f0279bb207118e5fdc
SHA-256: 72b9f476eb09b13c2ce1a42d9d0a7b45c7193ad0f71f1c788113b1ed0159408b
python-perf-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: f3a8ef648e19b88757417cac8b8a6993
SHA-256: b747ad0678cbd24346c3fc76b2d2f8721c25110c0d5e107b3f556bd22267c84a
python-perf-debuginfo-2.6.32-279.39.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0419
    MD5: f007ad2b305e19e1185c9f17afc8651c
SHA-256: ec3e47aad436576bc3425224525a2feec432b5ef4d4207853b239f5644595807
 
s390x:
kernel-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 225f1bfd05be67f55500798e38f7862a
SHA-256: 623eccf7835c794184ffc116a04fc6dc3ed62a110f73b591e4460300dadd1264
kernel-debug-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 70d052847e2b185a42cb6a6a81d65aa8
SHA-256: 59406a3b5fc750452b6f4d3f6c63405b32fc84f759140379c08dc00af3758dab
kernel-debug-debuginfo-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 5474fbde9bc27ab4976f748f6c6e64f6
SHA-256: 32b41e121dffe56f2dde3aa093c8f9d311e7c66fd3f6c032869a7c64dec2b4eb
kernel-debug-devel-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: b7a094b23b776937229c3e8dfea035e1
SHA-256: fa08678e806828f78c2322a2afd7849ada5e25302ef529d267b2b8d192ba6f40
kernel-debuginfo-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: f71d31c26a183e87eddb57b48cee20e1
SHA-256: 0489446fa26418c9b2f66606dc1770858c56fc6afb6d49bab358d220b562255a
kernel-debuginfo-common-s390x-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 87596fc275016654749638c152804669
SHA-256: 3ef4d10c0a0c9dba35cd50c909dfbdff5a04c6b21ccceb74f17dba90ce8c4246
kernel-devel-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 4d8a2cf4a3915689e3ad0f69c74eb8fa
SHA-256: 2bef511b2a4dce142decd57ab87ef801957f95c1548a05a5e6bda9064f13c71c
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0419
    MD5: b754a1f27c178b319e05855ce003f7da
SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0419
    MD5: 7ba419e2f8adbf64307d399992a0ba64
SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 29b22a307455f954ee22fe3975cb0c9e
SHA-256: 59c431b57464ce50f08c2ae05f100a04397ed16080f82e4f854eefe14f0dae2e
kernel-kdump-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: d8a0587d9679f6f19340880de5a4dc80
SHA-256: 2cf316b6052e669eae1b223700b8a8f314efb8ebbdee9b681803ae1098cf2d49
kernel-kdump-debuginfo-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: ae7c3a7014bea06376a05b9c32037a3e
SHA-256: 343c21e0ff75375af2f7646b779a3a63b3ac02e70a3776cd5f487098bee307c8
kernel-kdump-devel-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: b9be3605ec6bb097b8ad22f97f25d75e
SHA-256: 75b4c106f3160f80b28e2e95d9fb54c6e41c2f8268eacd1e606467a7d490a5bf
perf-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 3e61e9a9e6b8e92ca7834d4bbb1d3242
SHA-256: b8a9b5c4231e0671149627facfaf9219b71e3d3dae3763afe2634bd952770c22
perf-debuginfo-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 14df7aaf0b9c3c247fbf4e2ceb586292
SHA-256: af109185f1b6a47d6c2331b7613e5175567e6a93e9dfb9b3932d8d4543bfaf4c
python-perf-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: e4f9184cf6ab83fb14e4d819a7637000
SHA-256: 6435238075b2cf2ff8d67730b0c5c375b5e350373ad2720a833ab99d8d3f79df
python-perf-debuginfo-2.6.32-279.39.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0419
    MD5: 80d6ecaed1c760f0d8aca09c5bdb578c
SHA-256: 4fee3dbb6511fe87b8c65e0451e97b495505b5a942196b2f8fc9b97b08a2dae4
 
x86_64:
kernel-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 3b90001a9ce14d6df0d1e13b283c72a7
SHA-256: d7d6e64fdc2a5e387f60c489efaa24ff1f7208fa21259183c778e0b745726dfd
kernel-debug-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 19d319497866791f112f42b4cf20c1f8
SHA-256: d0b3676d4ac24a0cdb1e858f4e9b017c6a2112038769d10a909e437ab949be2c
kernel-debug-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: b1c0d6536c03b786200e6d5048e91ead
SHA-256: 9ab6ba9b553733a75a86148ffeb7bb6e31f22d3bf9efb3da370fa8209be47802
kernel-debug-devel-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: f9235638b4297d34acc41effbbddc241
SHA-256: afb7410cee881db8b79e88d8816365ab74a89c1a933d41ebb8d909fa05d64b5f
kernel-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 5339c3d3dbf52ddd7fb14ed17f64f9d8
SHA-256: b9a17c771fd815aae6d4989fb84d06d859d1b4ff4ed9af27af8e789f714a01db
kernel-debuginfo-common-x86_64-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 0c79d280d03cb3b54da59b3602520658
SHA-256: 94b4e0c55695fbce04cc834b68761578978f7c829f756af81402110eb442cd61
kernel-devel-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: d8e65a5a9c21ea0073d55c97798ec33f
SHA-256: c74e65a1adeb990c49a48101317bd942c0fdb5f4e7ddf3a1c35cf64ab3627195
kernel-doc-2.6.32-279.39.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0419
    MD5: b754a1f27c178b319e05855ce003f7da
SHA-256: de7dc3cc99ec4e4989cc27967456999a096b0dad19f23ac805847bcac462100e
kernel-firmware-2.6.32-279.39.1.el6.noarch.rpm
File outdated by:  RHSA-2014:0419
    MD5: 7ba419e2f8adbf64307d399992a0ba64
SHA-256: 92585df2d37d4593aa0d9941ca363519fb2a861f68c78a7dae1ece572d22df22
kernel-headers-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 94b168a0aa0a1af785b1766db5bba137
SHA-256: 5f343db45b5ac2004d83e4f23ff814c270c5603f5fdd83bb5ac71dd134315fa5
perf-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: cae435f31d87b9363e0f0bc6aba40364
SHA-256: ed5dab017d548a2cbbdba2676b0f8b18bf602ab0de84332a76202b2ef644d0da
perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 69947294579092a65d5e23691380ddfd
SHA-256: da77e82791c4654890650ff309e529702f65bd57a67c4dc34a98123d48fbe9e1
python-perf-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: deb5884e94dfb65f93bc2fded9e172ec
SHA-256: 036b754993c347ca938c50e48f06e98b98ac5e6e8d563be76c6159a5dfea9ce8
python-perf-debuginfo-2.6.32-279.39.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0419
    MD5: 363106b09eb112fd293be08c8d2edd31
SHA-256: 57c41ff5886ac5a28bce48d7038b2d0031762cd8ad83712e434a1e09af1db8a3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1004233 - CVE-2013-4299 kernel: dm: dm-snapshot data leak
869904 - CVE-2012-4508 kernel: ext4: AIO vs fallocate stale data exposure
969515 - CVE-2013-2851 kernel: block: passing disk names as format strings


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/