Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2013:0661-1
Type: Security Advisory
Severity: Important
Issued on: 2013-03-19
Last updated on: 2013-03-19
Affected Products: Red Hat Enterprise Linux Server EUS (v. 6.1.z)
CVEs (cve.mitre.org): CVE-2013-0871

Details

Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 6.1 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* A race condition was found in the way the Linux kernel's ptrace
implementation handled PTRACE_SETREGS requests when the debuggee was woken
due to a SIGKILL signal instead of being stopped. A local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2013-0871,
Important)

This update also fixes the following bug:

* Due to the incorrect validation of a pointer dereference in the
d_validate() function, running a command such as ls or find on the
MultiVersion File System (MVFS), used by IBM Rational ClearCase, for
example, could trigger a kernel panic. This update modifies d_validate() to
verify the parent-child dentry relationship by searching through the
parent's d_child list. The kernel no longer panics in this situation.
(BZ#915580)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Server EUS (v. 6.1.z)

SRPMS:
kernel-2.6.32-131.38.1.el6.src.rpm
File outdated by:  RHSA-2013:0841
    MD5: 5df538570fcc719d48249afb30db3e69
SHA-256: b2a1c2ddfd9a84e31f68b330ace2f1f0e429786b2702d99ee0b81a123060f380
 
IA-32:
kernel-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 3311a105b9e73815747d8e6b68e374fc
SHA-256: 6fbeee5bbc854fda87d394b53a0d0f20de3b3e7d46450f7ced163d9faa8676e5
kernel-debug-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: a445886a8c3065e298eb22a775dd8190
SHA-256: 18dbb1b31951092bd35037bb0c318b5be9ac1e4d04a0b1805eb8877088c381be
kernel-debug-debuginfo-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: dace065aae205cbd10000bda94a18c52
SHA-256: 250e5b71d320f78e5f7ada600082ce8d33d233ecabe36ae9e97343ba1835605a
kernel-debug-devel-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4ca3ffd8873f41867d4117fdbe7845e2
SHA-256: 0df67b287b7ebc7da6d064a57840dc51feb367ad6445767823f107863cc18671
kernel-debuginfo-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: f8b5292e01c3f261078c8a9d2bc9e71f
SHA-256: 7a1740811726559a1f2ca30ec5b78bda307be2fc2801276519d21d0f4ec84847
kernel-debuginfo-common-i686-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 246a532ca8b18478c55a97c513285fc3
SHA-256: 241c9378035bea12d9c4ca4bfc42cc412f20af8818324f6376d36b9494a63350
kernel-devel-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: af220ab735f3316039fdb399fbc0007a
SHA-256: f7054a1b7d8b1ab182f50b73c8d85619dd7f349adfc2f790c5ae6f2bf9cd8b19
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4358e6583ae4289186682f63e562f207
SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 29b1fe3c3246e29ca1bad0f2ece96422
SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4f2d742941e6aafb8620356e2a93a9ae
SHA-256: c4452968a24d3c724c67c064e15d22f6470293e5c92f9cc1f7d68273268adfe8
perf-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: c86859fd6954f8dece09c74b25d7909c
SHA-256: 71b41a8ed7549ed7b21fd59155469bb0c397b96df655e2525646b0ad85f868f9
perf-debuginfo-2.6.32-131.38.1.el6.i686.rpm
File outdated by:  RHSA-2013:0841
    MD5: ac743e3bd13f863b3c947983edf0d1b8
SHA-256: 4bbb0fa4bc34c14ba6d261899c6ad516b4843b1cdb532d7b77a82b8a79735462
 
PPC:
kernel-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 414cd7b5500bef5763b7cb239c8990bd
SHA-256: 3279485b197bc0bfd2fd0e16b1bd7b1feeb715245449b34e24ae6ea8571e629a
kernel-bootwrapper-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 672975e9aeb05ef61408180f29fd659e
SHA-256: d383efb0cbe58230ad528eadb0ec970545704f3ffdab84d5d71b780ff9112ac9
kernel-debug-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 9d908ee5fd8d4449b1ceb8fbcada3b54
SHA-256: 0c7a19ea335eae6f3eaff529301e2d07d9be394895d28d9457b0c0e4283af4d9
kernel-debug-debuginfo-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 2b4941ce288fd810b689dd8ea067ed5f
SHA-256: 54cd6056a830a8ad18938767e1dbf86c723cbda9e29eed4ae71b5f5e3b9a719a
kernel-debug-devel-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: fb42f2542774b531713194b6e4746f29
SHA-256: 7a3fc5c134f58d1991ff84af0a97b4bded39c0dfec3d35c240ec906127310ddc
kernel-debuginfo-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: b5786755169f005b5834d457a0b223b5
SHA-256: 07c778261219132537db88ff4acf5658a3962149664d7c62d71ef45094109116
kernel-debuginfo-common-ppc64-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: a1f186dd778fab440bcd913ef776b517
SHA-256: 8c844e9d89dcd69d5180dcdc957bcbd0b7dca8638639f7cb31d4ad1e5084b037
kernel-devel-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: a39d474e4a8e09224fdb5a3d03fef54d
SHA-256: 15409eb9b60c72fbc3e6564f2bc9020550bbb931ce1bd8496d03d060cce7d9e8
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4358e6583ae4289186682f63e562f207
SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 29b1fe3c3246e29ca1bad0f2ece96422
SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 6a6fbb6e2e97f5abe5a0c65cd47b3b8d
SHA-256: b32026cdd2b3edecf70b430c97318bdd97966fa4d5575a0fcd3684bdcb253dee
perf-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: cc5bc776c717e4eb64b5e117179b0569
SHA-256: 7d6051de252762d95f3134bb500ba4ac3e5e945ed651f391a2b68a3443f11745
perf-debuginfo-2.6.32-131.38.1.el6.ppc64.rpm
File outdated by:  RHSA-2013:0841
    MD5: f5c5cc89229e8efaa2ca3eec10d1bf4d
SHA-256: d906021bf292c8366dce93480932eb3dd01c51a27114e01917c9433927261439
 
s390x:
kernel-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: c64356eb54a6baadb76f7f962d2acb97
SHA-256: 5d5b1d2852a12755aa90dee401ae706341858fd61f34ca916901b4660d15c6f4
kernel-debug-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 7a38e79206a1d60bae0c05f40a028c48
SHA-256: 20ba5068125bb39a19fd6ee3392787fbbda871ade7498616256328ef38e415f6
kernel-debug-debuginfo-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 2dee5c31481984640ff4c63bf275a034
SHA-256: 62ea4398e4ed01a254cdfedf52feaf86a74a9ed67e8240c3d562660e646e4d25
kernel-debug-devel-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 5946c702fb261a5235590ff73925e215
SHA-256: dee07fd97be44a23025c5f575568e4a656b54368f13e76ba5a73f761f79e9c32
kernel-debuginfo-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: fbfc8650fd3e6db44bd4ae5aafba5c20
SHA-256: 9afe389913566e92349d4c9adf76dce2ee727e031cec0b2ff4f9a0b36353d62d
kernel-debuginfo-common-s390x-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: c1bb3254bfb7150def667245843156dc
SHA-256: af7dd41b4c50dcb3651b5432e2582e8f52955623794d676dfedb1b348150724c
kernel-devel-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 1077c49817e1740cd7729eae52307e62
SHA-256: e9148fd575415fef47a1715ba6eb15bf22defcdc06727149af06d223049858c8
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4358e6583ae4289186682f63e562f207
SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 29b1fe3c3246e29ca1bad0f2ece96422
SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 9c473ef252e52a00dd72c59511ae56fa
SHA-256: 43b9a910c4fe565f2a412fde5563e4dab4fd576e8280e6ee1b2b2c2f607dcfb9
kernel-kdump-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: df0eaff5f2b9ddec268e097badac039d
SHA-256: 53394a66a46bb93e8cd57adeee4ac0833e5e4321bb93bd2565f779b035755c87
kernel-kdump-debuginfo-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 40f4ea58fa58285b3f0e433f72033450
SHA-256: 8f441bd63ab637f6992355646ce644d4d0b3d797aaeef5ccc76c99440cea39be
kernel-kdump-devel-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: f3442e5cfed6155cd3645a1561df1e22
SHA-256: 0c19fcbb8cc5864809ed4e9c722b24d5e0b8384e29b92ca228436d16c4e9e460
perf-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 58c403a2d9601e19e43329d135d73f3f
SHA-256: 8d601e00aa5da243ebda614d08035029fe6134f75e48026404fe97537bfaf2c2
perf-debuginfo-2.6.32-131.38.1.el6.s390x.rpm
File outdated by:  RHSA-2013:0841
    MD5: 1e35f85800fd090f4ff0273d75ba8a71
SHA-256: bbfb2a6a6cd4f83a94f261761c850edba5787916260dc3c21599013134958f1b
 
x86_64:
kernel-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: ca04f39e31bd9436de456889d44ae653
SHA-256: 5d86c4d02fbb2b9f902854620f5e124de11a3a387eb9fc2d755c746a8bffe91a
kernel-debug-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 0fc2aa31ce940600cbc4c12efd811f87
SHA-256: 0168b53275b0c8b62bec53d9988096826546475786a7d14e99e26ca07bdbba9f
kernel-debug-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: a75cee8bcdc8c903291db45b81c07e68
SHA-256: c1f78804f244971d627721790091036e442ec318830104e568696c0233df111d
kernel-debug-devel-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: fb4b832905bce9f6443c00391670cfdb
SHA-256: 1173dcc28e451cf93ad276cc8f9e34f9af4ba16f28f4739d29a8a8ee5cdbfc76
kernel-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 1dc19aea6d0795da050c5a5b176bdec5
SHA-256: 79ad3ef3da462bf035ff7d6181701afd65e934213bcce6de90afc323147aed57
kernel-debuginfo-common-x86_64-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 569beb61dedea8e0899daead26363883
SHA-256: d499417c661ae917b99ca832565c500612765024a1ef4063f0f8f04b175744d9
kernel-devel-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 6af9655788ccec1f09f3fbf32e887e73
SHA-256: 20ba34dfafb32d4841032441a2e3f490bedf25c78cb8aa0a67ca47bc5137b7c8
kernel-doc-2.6.32-131.38.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 4358e6583ae4289186682f63e562f207
SHA-256: efcfb392e18fcf400975788c214bab3b584b9f3648d6a7566c06a8fa2db95ec9
kernel-firmware-2.6.32-131.38.1.el6.noarch.rpm
File outdated by:  RHSA-2013:0841
    MD5: 29b1fe3c3246e29ca1bad0f2ece96422
SHA-256: 54a648c7c89ee7264738021bc6c273dfaeb6a9661118920573cd7e07b53b181e
kernel-headers-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: c698125139cbd7d90583aadab63091e2
SHA-256: c0390f1ffab8cb50f7cce89bd74ec8b63f13f1b396b16abe854be7ef12046422
perf-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: 70a60fa9e6d48672f78d333c5b9d241d
SHA-256: 5dd2147b07d0154979105273e574461d08c6b0de027da755be8064afe8eb8cd2
perf-debuginfo-2.6.32-131.38.1.el6.x86_64.rpm
File outdated by:  RHSA-2013:0841
    MD5: c418c4e03c8a835cca73c16bb1689244
SHA-256: e6f6d12dc4e391d8cc44049366b5026e531251e9e688dc167034bf211887306d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

911937 - CVE-2013-0871 kernel: race condition with PTRACE_SETREGS


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/