Security Advisory Important: kernel-rt security and bug fix update

Advisory: RHSA-2012:0010-1
Type: Security Advisory
Severity: Important
Issued on: 2012-01-10
Last updated on: 2012-01-10
Affected Products: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6)
CVEs ( CVE-2011-1162


Updated kernel-rt packages that fix several security issues and two bugs
are now available for Red Hat Enterprise MRG 2.0.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A malicious CIFS (Common Internet File System) server could send a
specially-crafted response to a directory read request that would result in
a denial of service or privilege escalation on a system that has a CIFS
share mounted. (CVE-2011-3191, Important)

* The way fragmented IPv6 UDP datagrams over the bridge with UDP
Fragmentation Offload (UFO) functionality on were handled could allow a
remote attacker to cause a denial of service. (CVE-2011-4326, Important)

* GRO (Generic Receive Offload) fields could be left in an inconsistent
state. An attacker on the local network could use this flaw to cause a
denial of service. GRO is enabled by default in all network drivers that
support it. (CVE-2011-2723, Moderate)

* IPv4 and IPv6 protocol sequence number and fragment ID generation could
allow a man-in-the-middle attacker to inject packets and possibly hijack
connections. Protocol sequence numbers and fragment IDs are now more
random. (CVE-2011-3188, Moderate)

* A flaw in the FUSE (Filesystem in Userspace) implementation could allow
a local user in the fuse group who has access to mount a FUSE file system
to cause a denial of service. (CVE-2011-3353, Moderate)

* A flaw in the b43 driver. If a system had an active wireless interface
that uses the b43 driver, an attacker able to send a specially-crafted
frame to that interface could cause a denial of service. (CVE-2011-3359,

* A flaw in the way CIFS shares with DFS referrals at their root were
handled could allow an attacker on the local network, who is able to deploy
a malicious CIFS server, to create a CIFS network share that, when mounted,
would cause the client system to crash. (CVE-2011-3363, Moderate)

* A flaw in the m_stop() implementation could allow a local, unprivileged
user to trigger a denial of service. (CVE-2011-3637, Moderate)

* Flaws in ghash_update() and ghash_final() could allow a local,
unprivileged user to cause a denial of service. (CVE-2011-4081, Moderate)

* A flaw in the key management facility could allow a local, unprivileged
user to cause a denial of service via the keyctl utility. (CVE-2011-4110,

* A flaw in the Journaling Block Device (JBD) could allow a local attacker
to crash the system by mounting a specially-crafted ext3 or ext4 disk.
(CVE-2011-4132, Moderate)

* A flaw in the way memory containing security-related data was handled in
tpm_read() could allow a local, unprivileged user to read the results of a
previously run TPM command. (CVE-2011-1162, Low)

* I/O statistics from the taskstats subsystem could be read without any
restrictions, which could allow a local, unprivileged user to gather
confidential information, such as the length of a password used in a
process. (CVE-2011-2494, Low)

* Flaws in tpacket_rcv() and packet_recvmsg() could allow a local,
unprivileged user to leak information to user-space. (CVE-2011-2898, Low)

Red Hat would like to thank Darren Lavender for reporting CVE-2011-3191;
Brent Meshier for reporting CVE-2011-2723; Dan Kaminsky for reporting
CVE-2011-3188; Yogesh Sharma for reporting CVE-2011-3363; Nick Bowler for
reporting CVE-2011-4081; Peter Huewe for reporting CVE-2011-1162; and
Vasiliy Kulikov of Openwall for reporting CVE-2011-2494.

This update also fixes the following bugs:

* Previously, a mismatch in the build-id of the kernel-rt and the one in
the related debuginfo package caused failures in SystemTap and perf.

* IBM x3650m3 systems were not able to boot the MRG Realtime kernel because
they require a pmcraid driver that was not available. The pmcraid driver is
included in this update. (BZ#753992)

Users should upgrade to these updated packages, which correct these issues.
The system must be rebooted for this update to take effect.


Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6)

File outdated by:  RHSA-2017:1647
    MD5: b21a065d9f02f6972fd82475ce1ae7c9
SHA-256: 627e73fc9a9c750cfc6f17450b67799eb9e0789d0cc0e00952470ce957fd4b8e
File outdated by:  RHSA-2017:1647
    MD5: e16dadc60b4ee95c960982612b59154f
SHA-256: f4e0e27e887a733ee59d13ea96be84d15805945ec6c8ec1445b0ca66f831aca9
File outdated by:  RHSA-2017:1647
    MD5: 9526e610c188e5afa3499b83c4688c18
SHA-256: d7cdbbd195e92512342bbba6ab0674ad638139a615d9ec6474f2507b1f46a8f5
File outdated by:  RHSA-2017:1647
    MD5: 718478e9a3042e53708e649ba0038a94
SHA-256: ea4826de1b864d83c62f7f02d669b2fa428e9172a43ef90b2327216ec11b8ec7
File outdated by:  RHSA-2017:1647
    MD5: 33a985130d3ba0e7fcfa93b5116e92b6
SHA-256: aee150bd75a40859a7835597cb08740b6801317b1a34ba54d44cdb6ac946f690
File outdated by:  RHSA-2017:1647
    MD5: 981d8fd6682973f85f465447353424b7
SHA-256: 3bedc9708ebb246b97ba96811d5f47d4e58eea8a6e224c17a005ba50872c303d
File outdated by:  RHSA-2017:1647
    MD5: ed398273f65b4f987bba3ae5aba4c994
SHA-256: 89a342c32f8c7de22348bdbebe6c950fe280dcd07e61f490190ab7198bf5bdd6
File outdated by:  RHSA-2017:1647
    MD5: 92405f44c969b21b6b2a67c83a89477e
SHA-256: 440174bc8b1db0418a7590e80a2360de7b48ceac61540cf74c76566acc4bb1e5
File outdated by:  RHSA-2017:1647
    MD5: 67bd79e65c4c9723f715aaa720058561
SHA-256: a9a957554db4300235eae568557034f6596dcd205306000ab58e3d48650159a6
File outdated by:  RHSA-2017:1647
    MD5: dabee3455af97df1e44388fda685d028
SHA-256: f870c7bf2dfb882815f3ed504b684a9b224d68a4159d9956c97a20f699dd3574
File outdated by:  RHSA-2017:1647
    MD5: 1c095cd162094baccb8b770552de667e
SHA-256: 09701aaeaafc5622366cfc2f861ad14b59813c2a0aeb44ceca91b2628b8cf9f0
File outdated by:  RHSA-2017:1647
    MD5: 2781efa8fd07eb94aa001ecd04d1d243
SHA-256: 3e91708c438dd6710476dbecb60e5e7e4c1ce2015c18def1b151f434471056a3
File outdated by:  RHSA-2017:1647
    MD5: d1e6755b441e2053b665a5f4d3bd6fa6
SHA-256: 87ebcfe1107a6a2841d313a7801b06c504ac3789f092af015dfaafd5a70ea194
File outdated by:  RHSA-2017:1647
    MD5: 66ee5d8529cb2b519d313bcbd796c5e5
SHA-256: b50981f8c3a2cdfd9623cf419932e2133fa1e07133fd6c995b177de554256e84
File outdated by:  RHSA-2017:1647
    MD5: ed4da0a353c9e83ee9d187736e177b77
SHA-256: 265fc09a3ea79a6576d018dadc773613816936bab38225a3979eee484dd9a445
File outdated by:  RHSA-2017:1647
    MD5: 295505ec54ec8b8d4d9d41c47bc8a541
SHA-256: 02d1867c573dfd52b0c73bdb7f4aba6156b772b68cce8d67e77ca00b37661ebd
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

716842 - CVE-2011-2494 kernel: taskstats io infoleak
726552 - CVE-2011-2723 kernel: gro: only reset frag0 when skb can be pulled
728023 - CVE-2011-2898 kernel: af_packet: infoleak
732629 - CVE-2011-1162 kernel: tpm: infoleak
732658 - CVE-2011-3188 kernel: net: improve sequence number generation
732869 - CVE-2011-3191 kernel: cifs: signedness issue in CIFSFindNext()
736761 - CVE-2011-3353 kernel: fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
738202 - CVE-2011-3359 kernel: b43: allocate receive buffers big enough for max frame len + offset
738291 - CVE-2011-3363 kernel: cifs: always do is_path_accessible check in cifs_mount
747848 - CVE-2011-3637 kernel: proc: fix oops on invalid /proc/<pid>/maps access
749475 - CVE-2011-4081 kernel: crypto: ghash: null pointer deref if no key is set
751297 - CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type
753341 - CVE-2011-4132 kernel: jbd/jbd2: invalid value of first log block leads to oops
755584 - CVE-2011-4326 kernel: wrong headroom check in udp6_ufo_fragment()


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at