Skip to navigation

Security Advisory Moderate: kernel security update

Advisory: RHSA-2011:1418-1
Type: Security Advisory
Severity: Moderate
Issued on: 2011-11-01
Last updated on: 2011-11-01
Affected Products: Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2011-3209

Details

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.3 Long Life.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* A flaw was found in the Linux kernel's clock implementation on 32-bit,
SMP (symmetric multiprocessing) systems. A local, unprivileged user could
use this flaw to cause a divide error fault, resulting in a denial of
service. (CVE-2011-3209, Moderate)

Red Hat would like to thank Yasuaki Ishimatsu for reporting this issue.

Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
kernel-2.6.18-128.36.1.el5.src.rpm
File outdated by:  RHBA-2012:1356
    MD5: 590b94e57ff374321265e6f5e3c6b032
SHA-256: 75ab9efaa1d9c28e63df40be140b559a18bac49f2c266c7742e07cfcf41f16ad
 
IA-32:
kernel-2.6.18-128.36.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 9a885dfbc6cbd0dc842d5c7535497883
SHA-256: 865a8dc1419a42270468c8bd928b1c5b1a03edfdd2e8eafaf7558c80f912995c
kernel-PAE-2.6.18-128.36.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 4128f6a7d07f9edc2cc13af083117681
SHA-256: a2aa5413a7eed0b447fa397632de7845662aa7392d04be53224a24d9bdf5fc76
kernel-PAE-devel-2.6.18-128.36.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 9e520addcd98c1ec035e332b4380a38e
SHA-256: a88f026cbeb8a96f226a1db210f9912bb313adca5835fe84df2b7dfdab0db84a
kernel-debug-2.6.18-128.36.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 39f570cfed605e47c8d02d9357324d6a
SHA-256: 674d62397a483241546d2ebb118fccbf7f24275ab5412445f24ab238c5fc52d3
kernel-debug-devel-2.6.18-128.36.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: f384208fbb6ac56a56d5b12a2df37c8a
SHA-256: 82d54416c8d72eafb37f2cae5098e6e4c962ed7efb8b8b2cf38edb86a4534d8d
kernel-devel-2.6.18-128.36.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 07e73aa17b0d2b9a4222557da629897c
SHA-256: f46767ddc9202afba4c2fc6c462dee362638ad5e10e1f31999534d15ff7cf573
kernel-doc-2.6.18-128.36.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: 6f869e6fd11bfffc942a4b6d5ce33265
SHA-256: f41bd35eaeb574975d820d75b9386b07add358e33db11cf580e600a89fb9dc25
kernel-headers-2.6.18-128.36.1.el5.i386.rpm
File outdated by:  RHBA-2012:1356
    MD5: 54debb674ef0e30484e179e0e263eb84
SHA-256: 56fdcab90ba0a4420e9d8b077c4ef72809dc49236cb4715e43cf7338b8d012a5
kernel-xen-2.6.18-128.36.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: bd5d152a62b0a8923666b2f29ea73ead
SHA-256: 296523fde4c0c7608f812e8de13d1891affe162625e47ee927b9b9aadfd75d92
kernel-xen-devel-2.6.18-128.36.1.el5.i686.rpm
File outdated by:  RHBA-2012:1356
    MD5: 2a1f6e24995a47038914bfbc6fd2e975
SHA-256: 04473b63120fdf2f8a82203c8b3fc4b44a413b41d7abdf54d4d61580f5e2e2fb
 
IA-64:
kernel-2.6.18-128.36.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 78dab6eea57f6484eecc261571465752
SHA-256: e8f9f717dcf64191f0240c10607d671f93ba9ba6d3318470dd1e069014f5a745
kernel-debug-2.6.18-128.36.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 121ae8f5b7bed14e2c5fa4eb63d46e36
SHA-256: 063546085edf7373199cd6f6c08104764ac543c171c68984e25be904ad1e6e6b
kernel-debug-devel-2.6.18-128.36.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 5457f3955028d316ef260e6ed2bd3908
SHA-256: 557edc8b74f19c9e92771375f681a9c0f5e5e1e0353fd89267905b3832a71f9a
kernel-devel-2.6.18-128.36.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 5e04999b993ce0bdc09a3d79ea81d0d4
SHA-256: be1c7777c3a4e790c168ca9fe4cf381d5877656b5880b5a425fa411c75504ecd
kernel-doc-2.6.18-128.36.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: 6f869e6fd11bfffc942a4b6d5ce33265
SHA-256: f41bd35eaeb574975d820d75b9386b07add358e33db11cf580e600a89fb9dc25
kernel-headers-2.6.18-128.36.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 02c6273b949971f78af19c752b26d499
SHA-256: 76459901564d43f73c740e7ba6cfba5bd510c2203c351c6579b1c54423c9b53a
kernel-xen-2.6.18-128.36.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 9bf774dca6c89d5083f4c6f41b4b2430
SHA-256: be38926f85ee940237b2deb7e869b7c2238aa9f593b41c882f4cbd881ff21215
kernel-xen-devel-2.6.18-128.36.1.el5.ia64.rpm
File outdated by:  RHBA-2012:1356
    MD5: e3fb72b61d2d5f2ccd63836bede1aeeb
SHA-256: cf3c4bc7aecf8ee9f9c826e6755f6063aa33d02c0d0ec21d8ef370fbb164627a
 
x86_64:
kernel-2.6.18-128.36.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: b0bc26619b4a3132277da1de6f76f5d3
SHA-256: 8b975868fef793b367ebd7d61f15efed93f2dc1cedc55d0e26936bc0921dff30
kernel-debug-2.6.18-128.36.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 8867a21b17ae0c541cc9477897351bd1
SHA-256: 21dfe44c805186c9440b9c4aec6b4638115cf830de31fb06e35e510a2fb23bb3
kernel-debug-devel-2.6.18-128.36.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 5a74311643b4c0e24803e9a171d79814
SHA-256: 7db014e2e2f790d1e08fcb568b006c23b9d8cfce23638e23dca8f1b6c1f5014e
kernel-devel-2.6.18-128.36.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 1370d2a0287c4c67af09fc236372f634
SHA-256: 9b71a339d1907d7b52a37c65f660c3cc93615af918d1313bf16225817c1cc62f
kernel-doc-2.6.18-128.36.1.el5.noarch.rpm
File outdated by:  RHBA-2012:1356
    MD5: 6f869e6fd11bfffc942a4b6d5ce33265
SHA-256: f41bd35eaeb574975d820d75b9386b07add358e33db11cf580e600a89fb9dc25
kernel-headers-2.6.18-128.36.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: d2cc5c070b683f78be827299bf9611ab
SHA-256: e29f408076e972350bff9dd872963da7ea4f73a5e339ecda154dff93ec0cf198
kernel-xen-2.6.18-128.36.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: 4a93934e31ec2601a3d0f252587118b6
SHA-256: 7db2679290b82c30c6693a4bdb7507594f00010c9293a4851e07652f9bb5af5c
kernel-xen-devel-2.6.18-128.36.1.el5.x86_64.rpm
File outdated by:  RHBA-2012:1356
    MD5: fd0dca4e48d04a3bcfdc745238d91ff0
SHA-256: a6d891dbbbf94e47852d973692e246e3e3bf3cffcdd8f3cc431a746ac381d7e3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

732878 - CVE-2011-3209 kernel: panic occurs when clock_gettime() is called


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/