Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2011:1212-1
Type: Security Advisory
Severity: Important
Issued on: 2011-09-06
Last updated on: 2011-09-06
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2011-2482
CVE-2011-2491
CVE-2011-2495
CVE-2011-2517
CVE-2011-2519
CVE-2011-2901

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A NULL pointer dereference flaw was found in the Linux kernel's Stream
Control Transmission Protocol (SCTP) implementation. A remote attacker
could send a specially-crafted SCTP packet to a target system, resulting in
a denial of service. (CVE-2011-2482, Important)

* A flaw in the Linux kernel's client-side NFS Lock Manager (NLM)
implementation could allow a local, unprivileged user to cause a denial of
service. (CVE-2011-2491, Important)

* Buffer overflow flaws in the Linux kernel's netlink-based wireless
configuration interface implementation could allow a local user, who has
the CAP_NET_ADMIN capability, to cause a denial of service or escalate
their privileges on systems that have an active wireless interface.
(CVE-2011-2517, Important)

* A flaw was found in the way the Linux kernel's Xen hypervisor
implementation emulated the SAHF instruction. When using a
fully-virtualized guest on a host that does not use hardware assisted
paging (HAP), such as those running CPUs that do not have support for (or
those that have it disabled) Intel Extended Page Tables (EPT) or AMD
Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged
guest user could trigger this flaw to cause the hypervisor to crash.
(CVE-2011-2519, Moderate)

* An off-by-one flaw was found in the __addr_ok() macro in the Linux
kernel's Xen hypervisor implementation when running on 64-bit systems. A
privileged guest user could trigger this flaw to cause the hypervisor to
crash. (CVE-2011-2901, Moderate)

* /proc/[PID]/io is world-readable by default. Previously, these files
could be read without any further restrictions. A local, unprivileged user
could read these files, belonging to other, possibly privileged processes
to gather confidential information, such as the length of a password used
in a process. (CVE-2011-2495, Low)

Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and
Vasiliy Kulikov of Openwall for reporting CVE-2011-2495.

This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-274.3.1.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 10c0fcb19ef99c248c011645b78a018d
SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
 
IA-32:
kernel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7fc3a0e0ea7586260dfeb0c9acb101df
SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d20e7f19464d2a7ad39e774040eec06
SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 94a65465aa45eed7b000b6a56b28d073
SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0835bbf49d61ecbe883c90f2d6b5d678
SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 07281841540df0faf8043bdccc455957
SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d773a892336ebcbc73837e3256defead
SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 16dab3b8af5f7057a11f0614579ac1ac
SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2d42cfd958fdd33052ce57e31a5aa0e4
SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5b72ba2392b7f2a0a12509a1d6eb00c1
SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7f775017233301f460c4c900f143d707
SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86
 
IA-64:
kernel-2.6.18-274.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0dbcd3484cffe663b93c52a7a14aeff2
SHA-256: 538f040db3c5534d678a8616bc911d328d00d4031106d47d4b0f33b61455e3f6
kernel-debug-2.6.18-274.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 55290624e0523d6fa3a70d2fe71842e2
SHA-256: 4f789c732301ebea8c3bc1ce183ce2b63d027710c81afa6bbdb09461c2329a32
kernel-debug-devel-2.6.18-274.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0794b689feac67e87fa09c4a2b75eada
SHA-256: eae6dd1001d9270c86a92f2206ec914aac6ed233cab1e95c39d41a12b1a82079
kernel-devel-2.6.18-274.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 393769d4de2d20e1e5d52d70457f8888
SHA-256: 70bbb0116007dd4833b38cd5ee5516a8e4fcfe13cae83d5a328d0d39764165ff
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 16dab3b8af5f7057a11f0614579ac1ac
SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f3e64d0f02e0e822421924562da84058
SHA-256: 8d0452b36fb413e314c9559194205ea87061b09ca2bfc6c4f59f8429c6b02ff7
kernel-xen-2.6.18-274.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d5be47ff5c7d5d65118da49ee182610b
SHA-256: beca198a6baef6b562ff6976278650fa157d691544f814bdc01139de781d5803
kernel-xen-devel-2.6.18-274.3.1.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 251715564bae11f1dd49f51b06533015
SHA-256: 253e132ce35b11a01920e83a53690ada6c03c365a47ef48e543a1a1905fe147c
 
PPC:
kernel-2.6.18-274.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e8ce1344b5b0fcbdefc2b3301b7c094d
SHA-256: 77b545f3adbd1a7636e2a59ef80ddc27a114022cb338607164a42104dd0da717
kernel-debug-2.6.18-274.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: fcb9c90c416b6b7433f3651c967bead5
SHA-256: 99cea545e70d5911427b589bea386385b4ca7311a604233fa9fc7a454cb9ade5
kernel-debug-devel-2.6.18-274.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: cf71d4a03d07074e50724c62d8fddb8a
SHA-256: 2cf0c32fc579767e7bf1bdd543bd4e8dc55736ed90266b2003a9e60d4af8911f
kernel-devel-2.6.18-274.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8da534f8ec7ced59f3b4215d7bdbde54
SHA-256: 705fd34c78ea992b98724bf721d7ddb1a3d261f0a025bda34f805f95c37db887
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 16dab3b8af5f7057a11f0614579ac1ac
SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: e7bd3e2e457288af0f1af8ed9bb7f6dd
SHA-256: 2a65f8dddbc2774dd95cb534cc342a6f07508b824ec551288da4bd4226f8b408
kernel-headers-2.6.18-274.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1888e114a6fce8c3e20789799f619a80
SHA-256: ffc62301ea3c948c06e0cc79b040060672edd33e4bc69236928a00a4264d249f
kernel-kdump-2.6.18-274.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9f5f26fa3f661961312dd456ac99d03c
SHA-256: e9e41d7d6bec55fc416cff528276d4b19470e010bc7a0be9b40645ba246365fe
kernel-kdump-devel-2.6.18-274.3.1.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f5730d78c450fd4ac73ffdaae21d45e5
SHA-256: 002684a7b0953b63d85fb5f42308dbbd23982fe059f33a35a612a900c36c8748
 
s390x:
kernel-2.6.18-274.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: d1c44d1b57d9aab832b600b3f8561207
SHA-256: e32d9631c98702b7bbb772a435adc154c4eb1179d5f273a9981e532a371ec8b9
kernel-debug-2.6.18-274.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2d21b98509f76f5a38b540690b5f90b0
SHA-256: 4f54fbeef71b65d4463b5eaa5fc02aecaba118daf76afceba1fa7e5b422e9a51
kernel-debug-devel-2.6.18-274.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 688677a63ac4b4a70e81e61f34a41334
SHA-256: 2fff6d4b3d1003d4ef9bfd9099825ee2c85e24af91cf50b3b48071890c82b771
kernel-devel-2.6.18-274.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 478242049043bac45f4692c3af7477c1
SHA-256: 1a4726ca726b3fe92ffec349ad2e6c23e159cc8ae0da29b1d1457cbdd033fc26
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 16dab3b8af5f7057a11f0614579ac1ac
SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 989575fddaef965e7f8c24f0d371121a
SHA-256: 0e515099efce7c495f0f3a17a2cd3644e143ab2908a0593bf04d3e0c2ba7c547
kernel-kdump-2.6.18-274.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: aee9b31ac26aa694aa6b2f1d14cd4e5d
SHA-256: 4a8c87c337561bc5c891d999f75a06a487333d1512b65988791849cecefcd6c2
kernel-kdump-devel-2.6.18-274.3.1.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 02b90741c795c2617317aba45d7d8017
SHA-256: 10812e8a4166a7ae9178de735c4acb90ff425a90d8e731f1b77c8ffaaec18899
 
x86_64:
kernel-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3024a18929271560b4b86e873dc5b425
SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 372dc8f30ec51cb3e792be92a19cf565
SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 80fd29249640f0e80f710cd858a56b21
SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ce1cccae1e8bd2e71b2c4819fa2a7a20
SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 16dab3b8af5f7057a11f0614579ac1ac
SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: da8a50756974cb337d30c285e4610d58
SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 347a3a609a1cabd03bd2eca2bc59819c
SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 63e36e40fdb0352c6dbb091dddb6ac19
SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-274.3.1.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: 10c0fcb19ef99c248c011645b78a018d
SHA-256: ed0c906528427d50bfeaf08aab7cbc04985976ff14ab6ba56947641723b988eb
 
IA-32:
kernel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7fc3a0e0ea7586260dfeb0c9acb101df
SHA-256: d930c068a9a0c35dde9856f334e5a45827356e896134f5eac0bc620cf9ba9cec
kernel-PAE-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9d20e7f19464d2a7ad39e774040eec06
SHA-256: 70d23462ecd3fd1bb332ebe39b17f7751267fd489e51fdc0bb3f37c400c6d84d
kernel-PAE-devel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 94a65465aa45eed7b000b6a56b28d073
SHA-256: a8facdaf87dbd9ce8742e8afa1734231c345363186a4b8901233aa1b5c86f697
kernel-debug-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0835bbf49d61ecbe883c90f2d6b5d678
SHA-256: 73568ab3cf7c429c34461b8121886c97a9c6655667f352ee9f3bd762e7d0a423
kernel-debug-devel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 07281841540df0faf8043bdccc455957
SHA-256: 942d4d618c98b7aace66a2b7aaeadeeebd69907345de1a09f06bd97a34db6b52
kernel-devel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: d773a892336ebcbc73837e3256defead
SHA-256: 4350c374b8cae87a8a13b739b600e87169d01ddfdcac7ea4b6de6e1a284a9b01
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 16dab3b8af5f7057a11f0614579ac1ac
SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2d42cfd958fdd33052ce57e31a5aa0e4
SHA-256: ba5510b587dea215b046ed4df4a6481a21be7b2d655af3a6389a88a7ad979be3
kernel-xen-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5b72ba2392b7f2a0a12509a1d6eb00c1
SHA-256: 6cdf52cb92c603b1732b16e9200bb64ee90e41de6a1647010d7d8e5261134029
kernel-xen-devel-2.6.18-274.3.1.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7f775017233301f460c4c900f143d707
SHA-256: b79e6544923497132b9fd513dbc5142ee75db37dba595a4047f66ae117034a86
 
x86_64:
kernel-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3024a18929271560b4b86e873dc5b425
SHA-256: c54d83c56aa550544782baa959ada1b94194d7ca8f6634d2279ccaf57eb46d64
kernel-debug-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 372dc8f30ec51cb3e792be92a19cf565
SHA-256: aa993c98819bdcdeeac35e4093025257e3157c3e78b80be4e0d8cfae5d43a32f
kernel-debug-devel-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 80fd29249640f0e80f710cd858a56b21
SHA-256: 77601520d928f109a7246d237ad6c2e98a742d82163c5ce9be70c89c0fc4fd16
kernel-devel-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ce1cccae1e8bd2e71b2c4819fa2a7a20
SHA-256: 5b6303f358851a73c10ffb020fba413b34435df9601cdc344811ed56180829b3
kernel-doc-2.6.18-274.3.1.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 16dab3b8af5f7057a11f0614579ac1ac
SHA-256: d904f93ad2fc00b818ab1a089cd5b73896b10c3a768ddf7d21bc5a4065706472
kernel-headers-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: da8a50756974cb337d30c285e4610d58
SHA-256: 2185cc8c096fbf83fdc794db2bf6969e070fb67b5eca01277d3dc11d9a403b90
kernel-xen-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 347a3a609a1cabd03bd2eca2bc59819c
SHA-256: 109a77b31f51d6a8a838ac011a62669d994b79396269048f701ea71a4a839fca
kernel-xen-devel-2.6.18-274.3.1.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 63e36e40fdb0352c6dbb091dddb6ac19
SHA-256: 9bbc42cf102301c9e0beacbe1a68da9fd27dfa43d6c8dfd5627ae5bd4152d5c7
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share
712885 - RHEL6.1 32bit xen hvm guest crash randomly
714867 - CVE-2011-2482 kernel: sctp dos
716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak
718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations
718882 - CVE-2011-2519 kernel: xen: x86_emulate: fix SAHF emulation
727590 - [xfs] mis-sized O_DIRECT I/O results in hung task timeouts [rhel-5.7.z]
727835 - xfs_error_report() oops when passed-in mp is NULL [rhel-5.7.z]
728042 - CVE-2011-2901 kernel: xen: off-by-one shift in x86_64 __addr_ok()


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/