Skip to navigation

Security Advisory Low: kernel security and bug fix update

Advisory: RHSA-2012:1589-1
Type: Security Advisory
Severity: Low
Issued on: 2012-12-18
Last updated on: 2012-12-18
Affected Products: Red Hat Enterprise Linux Server EUS (v. 6.1.z)
CVEs (cve.mitre.org): CVE-2012-2313

Details

Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 6.1 Extended Update Support.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* A flaw was found in the way the Linux kernel's dl2k driver, used by
certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local,
unprivileged user could use this flaw to issue potentially harmful IOCTLs,
which could cause Ethernet adapters using the dl2k driver to malfunction
(for example, losing network connectivity). (CVE-2012-2313, Low)

Red Hat would like to thank Stephan Mueller for reporting this issue.

This update also fixes the following bug:

* The kernel allows high priority real time tasks, such as tasks scheduled
with the SCHED_FIFO policy, to be throttled. Previously, the CPU stop tasks
were scheduled as high priority real time tasks and could be thus throttled
accordingly. However, the replenishment timer, which is responsible for
clearing a throttle flag on tasks, could be pending on the just disabled
CPU. This could lead to the situation that the throttled tasks were never
scheduled to run. Consequently, if any of such tasks was needed to complete
the CPU disabling, the system became unresponsive. This update introduces a
new scheduler class, which gives a task the highest possible system
priority and such a task cannot be throttled. The stop-task scheduling
class is now used for the CPU stop tasks, and the system shutdown completes
as expected in the scenario described. (BZ#876077)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Server EUS (v. 6.1.z)

SRPMS:
kernel-2.6.32-131.36.1.el6.src.rpm
File outdated by:  RHSA-2013:0841
    MD5: 3beab1d88e95aa6c60f01ee70a385956
SHA-256: ab6bd2acbe36fa36b1945aecc4a4a1a7383989fe69cf3a93330517ef6ab33cce
 
IA-32:
kernel-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: a197498f14052e285b5153ac5b3841ab
SHA-256: 0560c8ac74c6beaa9345bd67d4889c5348a9b7348b36c4c6cd97129cbdd83ac7
kernel-debug-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: c65ebc2fe158a7c54f10cf74ca1764b0
SHA-256: f1b02f0bdac40b29433615d0a99cd44b27724ffa744785eb3a8ddbbc080ed035
kernel-debug-debuginfo-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: f9c976cc4b95ee246b80b8233ceb8f30
SHA-256: 4d00a891b2f7b13f82e8e4c601d7f3491c73a324304e537513a60332effdf5a7
kernel-debug-devel-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 2de4c3f1f6c74ffe0076b9b9f2be937c
SHA-256: 429614329a91a23979fbf84521520556acd3b4c07e80a6dc0dd09fdbc4fb8c3c
kernel-debuginfo-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: bc7f0182bec4b91fa89ca1b6a34a3c45
SHA-256: 873e4e1a8d869a97c376ebeb5c9a8ed637bc4a3701331c53febb3df0e47414e1
kernel-debuginfo-common-i686-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 580ba93d30dec968c9daab3da42c9df8
SHA-256: 4547667e8690c03ab623da7e3157839eb8838a8eabac9e7ac29b0b470ce97622
kernel-devel-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 31fab15ccd0336625c862657710be7d6
SHA-256: 800a3ec0dc0b4cc4a955c67d29dda8e914d54176d34841c450fd3b1ccf525553
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 27c4754d52fdbc7288879dd36a22f262
SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 706e5a44b32da7d31d2ef1e1272cc0a5
SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: e6fa2849328900133d97f11bead68dd8
SHA-256: a86ee428c7e735bf76afce77ae8f7828dc2da8bb45963d74157ba5d40f4037ca
perf-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 393607cb9251b643dc34ebb861f5b762
SHA-256: d4dd91b489fa61ae890fbca02ed3ca229452003ff1ef77fab32fe97fcbf295a6
perf-debuginfo-2.6.32-131.36.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 904a73a00b6e82faecb42ba4fe31c3c0
SHA-256: 5e7b9a5ffca31086271fdb0d77c567b9da034bda37dd5c441fabf85ed282ea35
 
PPC:
kernel-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 30cdbeac07c5140feec32e770565b602
SHA-256: 770b7491689956cceeadda8e6da388894625391e129cdbf568f90c356294f7ba
kernel-bootwrapper-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 47500584a797dcd30822857aaec9ffa5
SHA-256: 39938cc5d6de2b97f742800a000d616fcdd42119657fa7dea6c5f8f11f9289e9
kernel-debug-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 3c06d062fd68bcb0b6c67ea2d76a2b0c
SHA-256: 43e95a66df4696371b588fecd71076313569ed273e325be0a73d69b8077755cd
kernel-debug-debuginfo-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 1d2fbfe4dd41fc8d3990b63eab35eecd
SHA-256: dcc31104828487b4d819fa1131e22818672d4ceaa9fed0eda0183f203ae29b2a
kernel-debug-devel-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 2907350c7ef23cb2610fb4826772efa2
SHA-256: 7c098c333b382c68b8ef70dc0b239d7b2ea321e6d0e874d296aac44107897ecf
kernel-debuginfo-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: e556256310854797bc8f3da126f2a5e9
SHA-256: 917a2322ffffeed4cd5bf257fda29df3d040e04f161d944c3c7ed0e505e283c6
kernel-debuginfo-common-ppc64-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: e09485ccba332d758fb4b3506f6f6583
SHA-256: c4bee538f2661c196c9d77f162ecfd4e5f3f47b2aace3a684bc6d0a669b0060f
kernel-devel-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: a7cc56c069e6283adeb045ece4d366ef
SHA-256: 5cda2d409a1b3a1d8ce3bfe23228011f14258f727838a0f6c12a3af173ed2592
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 27c4754d52fdbc7288879dd36a22f262
SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 706e5a44b32da7d31d2ef1e1272cc0a5
SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: c94fb4e2f7c095ee9ef269d8c0e20161
SHA-256: edb3869c76df7ce55ba7ce220f5ed26833128c25d3b6a40f2d07dda915ae7077
perf-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: c12c6fe07bbc246ac5cd6f6dbb54e7bc
SHA-256: 5d277e90f18c0b28a55f8990e07d61c42081c8124a1cba710a435e3ef0ce5d05
perf-debuginfo-2.6.32-131.36.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 84239b56f3ccad3891dc070375b73be6
SHA-256: 359492307acb3bfa5b1ce77b4e6dec85e75ba00fef0bba81cc58431b0569c7a9
 
s390x:
kernel-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4bc4018ceb7f697e43215a12382361c9
SHA-256: 2d3ad159d545382f9983291a5ac40d7ade78849c31c5328c81b6fa078ca111e4
kernel-debug-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: e84ee91e29a345b5fdf04578c61fe5db
SHA-256: 584da4bb81f6ede226ef145834b06bbc121b64ff2ce8b599461e77f31ab52ae3
kernel-debug-debuginfo-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 178335b57260e89747615f63a827c78d
SHA-256: 89bcffa28894a7a43bdcc2550759b1035a3504540342f36b1fb4fc531980b8fa
kernel-debug-devel-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: af3a76d461e65f5455c92b26aece0cbf
SHA-256: b1ede45d8e164f075143a800f848bd2718d8151476829ecf95f9bd4d324a4ee3
kernel-debuginfo-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 949de2d25eeaf4317cdeaae9e378a60b
SHA-256: 7287f291777991a3c272d6f610486fef6022b2f99d9f11ae325da544c1dc48e3
kernel-debuginfo-common-s390x-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: c50337653deafafcc9e1293226c8a3b5
SHA-256: 6aca98bc94ccba58cdc98108386d147735d14abb45095d81d3d6a970fb7ec47a
kernel-devel-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 6618e6d07b2e7bdf01aa54f67d906dc8
SHA-256: c430850fc13eb928be97a37cddcb172872708e5a3ca0fa0d1131e98a22d3da9f
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 27c4754d52fdbc7288879dd36a22f262
SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 706e5a44b32da7d31d2ef1e1272cc0a5
SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: e737617b86952bdb917170b325d20a10
SHA-256: a407607f17a6eba6ce50a30b348a210717ec47cc4d444eebc8b13774b5670c04
kernel-kdump-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 78bb0af5ec149e7296b1783a154aeacd
SHA-256: c8e813d506c96813c6190b7885e41c01eed3003e08bc257a7183f55ae78ceb5c
kernel-kdump-debuginfo-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 8366a06b645c366384c57b3a337c5ef4
SHA-256: 68ee95c52094cc7e0db8050fa89f1add16c2b572b2322130a15c08aca43bcf1d
kernel-kdump-devel-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 75e12f392380cc8fe3a93720ba80c3cc
SHA-256: c825d27a441bd8303702e0f4e77128bc6e4b69a654266a51769218187021a247
perf-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 223de62b30d5b4d116ecac84724a511b
SHA-256: f39916c1c2d68755cd57dee40150f03e1385e8ca9f8e3dcad0a2506ece2bbffc
perf-debuginfo-2.6.32-131.36.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 337ca9d061ccf49334004d7543aa9f2d
SHA-256: 271167ed7c62700ce2a589055eb8b8b295944670faec5af88501dd49e352035f
 
x86_64:
kernel-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: c4fa5a5315c63f19694cf2c8907318f8
SHA-256: 58ea32d276b7ce4faab370af44333dcef10b04b77005a8de541f878959dd0d21
kernel-debug-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 60c55e60eb771dd205640e06309becf3
SHA-256: e32e9894a42d18fb04295d66ba4b6d27fd8e221da78a14553ef345ad6a58c071
kernel-debug-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 11a393d6753748407bd7c4f2c3e03653
SHA-256: b1c969c3615bbef3ee1a110d9b2d11857e303f7ecc172eda8b619b7f86e7e6b9
kernel-debug-devel-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: a77283252bf333b11bfe7f2243fa1dda
SHA-256: 9010cb27661560123f9db5f761d973d06525262a93635bf7a2bf31eb6d736a55
kernel-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: ee4e9cb562e3d0ef5d39b8840594d362
SHA-256: 24a85958a44875a370671c6c3dc05c19b348eba89a9dbe76712c5623894d8f2e
kernel-debuginfo-common-x86_64-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: d6ac538c04d7e5882a6c8afdeb265cb3
SHA-256: c8fc14c862f5434318303019a20442e15a288c3af8961c5353ed2ce3a911598f
kernel-devel-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: a382c93a268ebceb0b423f30b5ee61f1
SHA-256: f8d409fce539885d39d10bb0c6fcd73b30de8808769949c9e68613fe6e06c36c
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 27c4754d52fdbc7288879dd36a22f262
SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 706e5a44b32da7d31d2ef1e1272cc0a5
SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 08212ffc4db6568f89f3429faae85860
SHA-256: 0ccf689aa4e2cd98332be914dd6bc44e92f3f200268e08dbeddd12b97721113a
perf-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 1b5ca7a2aab56cd9a3d58f17d61ed9e0
SHA-256: c312d5fd5520f6656f8ce541016e3b98c8d0db95f64eac304309c35c09a65ba7
perf-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: ffbffdc41980511f2015b06c5fb50a28
SHA-256: e0f81c51824579eb2d5d3617c1b026e7e75ae86181ff3ee90ce29f6ef4978e73
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

818820 - CVE-2012-2313 kernel: unfiltered netdev rio_ioctl access by users


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/