Skip to navigation

Security Advisory Important: kernel security update

Advisory: RHSA-2010:0704-1
Type: Security Advisory
Severity: Important
Issued on: 2010-09-21
Last updated on: 2010-09-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2010-3081

Details

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel if its length argument
can be controlled from user-space. On 64-bit systems, a local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)

Red Hat would like to thank Ben Hawkes for reporting this issue.

Red Hat is aware that a public exploit for this issue is available. Refer
to Knowledgebase article DOC-40265 for further details:
https://access.redhat.com/kb/docs/DOC-40265

Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-194.11.4.el5.src.rpm
File outdated by:  RHSA-2014:0433
    MD5: 2746a9182fb406c1a4cc27496c53901b
SHA-256: 098109b2fbabeec4a3229287520d6e06b46ae1a2df7163a6de280a62a5b79c1a
 
IA-32:
kernel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 32f2571b2e92d80fcc261bd57536b41a
SHA-256: b484a801cfea8db450f501c579c8e1cd5a830aafcd33d25b80029d547e117d85
kernel-PAE-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 3913b71d78388e506dbeab199cbd5b61
SHA-256: 4c3f6b75841f9ccc4ba493c25ac66cdee274af7d710f936acc600afbd6c1cb1a
kernel-PAE-devel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 7d107f310ad1f25ea9c4ccf14987c58a
SHA-256: 53b9bec9a6d74b6f1b26d98a7ed2348d7bafa7778749951f93a6794151e48547
kernel-debug-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 837a6badc4cf279b553f42c256097469
SHA-256: 8d399713f081f68a1aa9ae98a0d8bc4e62fd4581ba5ff106c55fcb9e107f365a
kernel-debug-devel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: cb8689973d431d2c7f36ab496e666937
SHA-256: dbf43680f23a9979e6d74ccd1d19980526351add722dafecb6db0e95a7bff79c
kernel-devel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: d6f582e01851a40c26e8da4421c0adec
SHA-256: 853d2a87df35cbc799d860e6d67630714bb2286cf3ca5d594f28acb071c3c3b0
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae0127fb5d22ec90a39697876ab1a8b9
SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.i386.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae415ffd147223531b520399e2923ef7
SHA-256: 68aabb4cfe3fe2c2a17d808451e67748dc089f8ff7560b6c767a1d0b88d8d652
kernel-xen-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: dc12bc211da73a4d12dc0614cd381cde
SHA-256: be992d79601d877c9785913691475895ff59aea9dbb1dfb987049b3d8648b4a9
kernel-xen-devel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: b7247b93629b9b8b15a2b7ae4ee93551
SHA-256: 099d7ee2ee26c02b2c96688735afc4d5e783fe5161ed8a64190b6c55a3e95d10
 
IA-64:
kernel-2.6.18-194.11.4.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: a7f6f0326d58e6b3d4ac3051514c785e
SHA-256: 891befe22f0dcf246a79dbf9ebe44c58a659d20ec2f4d32c26fe081855acf492
kernel-debug-2.6.18-194.11.4.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 1818503e8a8b52b8f2d8a1973dd7c713
SHA-256: 2bba5ac901f58432b707006504f7849ef30eb776ecd2e1f236ab11e89e677eac
kernel-debug-devel-2.6.18-194.11.4.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 78ef78577d9927cdc7c357359ca440a9
SHA-256: 60665ed8908f87bf01e73c178d7f5af4ae7a1de09c6e1801ee61d6d9682854dc
kernel-devel-2.6.18-194.11.4.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 666a3e48d3ce99b7a8b3e56dae9b0009
SHA-256: 20168857aede4076b5b05d06db814db5c4a9ff94be584c6e06b256ff3ce959cb
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae0127fb5d22ec90a39697876ab1a8b9
SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: c2320a0b166c1718ec2332954145967e
SHA-256: 6343eb98d98957e0f2650715d536c493022cc89d028e9e9416d5d58f6ac2c8d2
kernel-xen-2.6.18-194.11.4.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: c07acc2751432179d4a8ba7eb51d82ff
SHA-256: 62ff78a9cb0d39e70d47ca10310ae9b1468f3a4c7d3d9128d3de2b96459887ac
kernel-xen-devel-2.6.18-194.11.4.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: cd6df8980252958b5a912538274f570a
SHA-256: d2cb4eea8a54fd59668e737b5b0399f8d28c043986e25e2360ccba812c10ca5c
 
PPC:
kernel-2.6.18-194.11.4.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 3e6798586907a67975ee1280a15c6f6c
SHA-256: 8d1a819494d86923865d77de9d693859c678817718f53b6ce5c310001bccd0b5
kernel-debug-2.6.18-194.11.4.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: a3e2be8b2745c299cbc642a3d02063cf
SHA-256: 2b76287673ab8298343c6975ac0720d20829c081535b9a6c25f8d1ca33076853
kernel-debug-devel-2.6.18-194.11.4.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 8b025a7609f110149002765129f695e7
SHA-256: 9b14e0e13865dc0fffd68b1cf5c78e1dad73ebbe287ff669a005a8b2509e20c4
kernel-devel-2.6.18-194.11.4.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: d6f3da7344e96b056d106f01ba3c0210
SHA-256: 4d121c39010a70b6517dd7b751761c8a073abf08cc91aa24178771b4af4265dc
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae0127fb5d22ec90a39697876ab1a8b9
SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.ppc.rpm
File outdated by:  RHSA-2014:0433
    MD5: 7eda7cdd7ae7509c2d03bd2575610fe4
SHA-256: 8f0c738d5ca261cdebb4e8661bf94b124f12ac3ec7a1770ea42a7fbc0996da51
kernel-headers-2.6.18-194.11.4.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: d15fb70c636635ef14a2228ae8930652
SHA-256: 0b83e9671c8394948fec32a76de35a1f0a65dd53d00d1f8ff6d3f9b09150043f
kernel-kdump-2.6.18-194.11.4.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 82e815d4f6eb8fafc9dc90166b463d90
SHA-256: d2575c27071a4c07a4ff3a9da7d6ae04308da1e20103bd255a2a0045c473780d
kernel-kdump-devel-2.6.18-194.11.4.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: dceb667ec1019b2d978d9910d576dc89
SHA-256: c2031c830fd8374f5d7cad8847e1d77602d2eee08153eadc18b1572d342bbc52
 
s390x:
kernel-2.6.18-194.11.4.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9af8bfa03bb1043f2611ffb7c4e1a87d
SHA-256: 2ec14296e342c7bfbb82987842728905d0130b3312c42ad07c58b51904ac3fc1
kernel-debug-2.6.18-194.11.4.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: 05860b1e0e00a2ee320bd4c3edc1989b
SHA-256: 7bbc88da9ea5fcc8e587d2fb3f50b21ee956be77c9a446b1bec04856a3721c68
kernel-debug-devel-2.6.18-194.11.4.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: b55238f3827ed009609d7cff5a8aef40
SHA-256: ad8f151e3f4c97cbaaed12e62dd8ad2cea3e44865c5ab6ea7013f9cc25a43f5c
kernel-devel-2.6.18-194.11.4.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: 8df8243fbfe34cfedda98923d062d7c4
SHA-256: 7f8688a64513cfb30567326a353fa41d5b3afdc53865df926ab1f65bcae13741
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae0127fb5d22ec90a39697876ab1a8b9
SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: 89e16e66bc43d32106d02fe067f079b3
SHA-256: 99c840281f2ab87c63e53bd9d2a2b360d0fecee41015d1b1a56720c7bc9e4a94
kernel-kdump-2.6.18-194.11.4.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: aab2c6fc9b95018dff4201d4d9650349
SHA-256: a33792b148a1b1ccc4ad9c312dc3a3b1937c3684e1283d7c3fa0b5f912dcb89a
kernel-kdump-devel-2.6.18-194.11.4.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: fe3080d7d9eb4a9ec71fecf9f6ac6257
SHA-256: b4c9d75f440b956e0bfe448be2cc3fbbb22e97c9d23609ea8ac6f65cc36f3c31
 
x86_64:
kernel-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: c3a359c4543ab180bff454877d169a54
SHA-256: 742b6c299ad5a793c0e78452341849bacbb1ba35a503d5b2634fcd1051320973
kernel-debug-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 8211c2c3c0ae29fab25c7a350289147e
SHA-256: c5e867856aa121b2680dc16cf145ea6e3cd2a72f410bbaf72c14cca1a8787072
kernel-debug-devel-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 5719e346e1a4d87ade87a8fe4e225058
SHA-256: 55111d7c7cb749530352464506f80973166469ee4340b3fb7f1882be4d3943ef
kernel-devel-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9b044dd10818d751653ca316429c3e29
SHA-256: b49b9a1df8149f91aac1f6d29779abc61682ef7fa28d624f3cadd0adf594140e
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae0127fb5d22ec90a39697876ab1a8b9
SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9605236e2b585bdeb42cb9c678b78564
SHA-256: e9d94db6c2ab7c5e649fb2d001f2243fcc3c6ac228f80dcc4b7131de87b08007
kernel-xen-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 6cdd471f02274318cfc5021297d437d0
SHA-256: 45779561dd9cc24576c3dcbdd20ee358b2c90e3bc6615afe8de4b224ea4ad3d2
kernel-xen-devel-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 959021f52e8e8741997004b4d5790f56
SHA-256: 81eb81f102ca863024124a544b102ec0a12a52212edbb2a79f80e09b2c77f4cc
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-194.11.4.el5.src.rpm
File outdated by:  RHSA-2014:0433
    MD5: 2746a9182fb406c1a4cc27496c53901b
SHA-256: 098109b2fbabeec4a3229287520d6e06b46ae1a2df7163a6de280a62a5b79c1a
 
IA-32:
kernel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 32f2571b2e92d80fcc261bd57536b41a
SHA-256: b484a801cfea8db450f501c579c8e1cd5a830aafcd33d25b80029d547e117d85
kernel-PAE-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 3913b71d78388e506dbeab199cbd5b61
SHA-256: 4c3f6b75841f9ccc4ba493c25ac66cdee274af7d710f936acc600afbd6c1cb1a
kernel-PAE-devel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 7d107f310ad1f25ea9c4ccf14987c58a
SHA-256: 53b9bec9a6d74b6f1b26d98a7ed2348d7bafa7778749951f93a6794151e48547
kernel-debug-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 837a6badc4cf279b553f42c256097469
SHA-256: 8d399713f081f68a1aa9ae98a0d8bc4e62fd4581ba5ff106c55fcb9e107f365a
kernel-debug-devel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: cb8689973d431d2c7f36ab496e666937
SHA-256: dbf43680f23a9979e6d74ccd1d19980526351add722dafecb6db0e95a7bff79c
kernel-devel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: d6f582e01851a40c26e8da4421c0adec
SHA-256: 853d2a87df35cbc799d860e6d67630714bb2286cf3ca5d594f28acb071c3c3b0
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae0127fb5d22ec90a39697876ab1a8b9
SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.i386.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae415ffd147223531b520399e2923ef7
SHA-256: 68aabb4cfe3fe2c2a17d808451e67748dc089f8ff7560b6c767a1d0b88d8d652
kernel-xen-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: dc12bc211da73a4d12dc0614cd381cde
SHA-256: be992d79601d877c9785913691475895ff59aea9dbb1dfb987049b3d8648b4a9
kernel-xen-devel-2.6.18-194.11.4.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: b7247b93629b9b8b15a2b7ae4ee93551
SHA-256: 099d7ee2ee26c02b2c96688735afc4d5e783fe5161ed8a64190b6c55a3e95d10
 
x86_64:
kernel-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: c3a359c4543ab180bff454877d169a54
SHA-256: 742b6c299ad5a793c0e78452341849bacbb1ba35a503d5b2634fcd1051320973
kernel-debug-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 8211c2c3c0ae29fab25c7a350289147e
SHA-256: c5e867856aa121b2680dc16cf145ea6e3cd2a72f410bbaf72c14cca1a8787072
kernel-debug-devel-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 5719e346e1a4d87ade87a8fe4e225058
SHA-256: 55111d7c7cb749530352464506f80973166469ee4340b3fb7f1882be4d3943ef
kernel-devel-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9b044dd10818d751653ca316429c3e29
SHA-256: b49b9a1df8149f91aac1f6d29779abc61682ef7fa28d624f3cadd0adf594140e
kernel-doc-2.6.18-194.11.4.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: ae0127fb5d22ec90a39697876ab1a8b9
SHA-256: 2df9c9b2fa572cf485b823e57a978f728f226f7ac55825a33ae6e60807f8f8af
kernel-headers-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9605236e2b585bdeb42cb9c678b78564
SHA-256: e9d94db6c2ab7c5e649fb2d001f2243fcc3c6ac228f80dcc4b7131de87b08007
kernel-xen-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 6cdd471f02274318cfc5021297d437d0
SHA-256: 45779561dd9cc24576c3dcbdd20ee358b2c90e3bc6615afe8de4b224ea4ad3d2
kernel-xen-devel-2.6.18-194.11.4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 959021f52e8e8741997004b4d5790f56
SHA-256: 81eb81f102ca863024124a544b102ec0a12a52212edbb2a79f80e09b2c77f4cc
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

634457 - CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/