Skip to navigation

Security Advisory Moderate: kernel security and bug fix update

Advisory: RHSA-2013:1080-1
Type: Security Advisory
Severity: Moderate
Issued on: 2013-07-16
Last updated on: 2013-07-16
Affected Products: Red Hat OpenStack 3.0
CVEs (cve.mitre.org): CVE-2012-6548
CVE-2013-0914
CVE-2013-1848
CVE-2013-2128
CVE-2013-2634
CVE-2013-2635
CVE-2013-2852
CVE-2013-3222
CVE-2013-3224
CVE-2013-3225
CVE-2013-3301

Details

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat OpenStack 3.0.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Red Hat OpenStack 3.0 includes a custom Red Hat Enterprise Linux 6.4
kernel. These custom kernel packages include support for network
namespaces, this support is required to facilitate advanced OpenStack
Networking deployments.

This update fixes the following security issues:

* A flaw was found in the tcp_read_sock() function in the Linux kernel's
IPv4 TCP/IP protocol suite implementation in the way socket buffers (skb)
were handled. A local, unprivileged user could trigger this issue via a
call to splice(), leading to a denial of service. (CVE-2013-2128,
Moderate)

* Information leak flaws in the Linux kernel could allow a local,
unprivileged user to leak kernel memory to user-space. (CVE-2012-6548,
CVE-2013-2634, CVE-2013-2635, CVE-2013-3222, CVE-2013-3224, CVE-2013-3225,
Low)

* An information leak was found in the Linux kernel's POSIX signals
implementation. A local, unprivileged user could use this flaw to bypass
the Address Space Layout Randomization (ASLR) security feature.
(CVE-2013-0914, Low)

* A format string flaw was found in the ext3_msg() function in the Linux
kernel's ext3 file system implementation. A local user who is able to mount
an ext3 file system could use this flaw to cause a denial of service or,
potentially, escalate their privileges. (CVE-2013-1848, Low)

* A format string flaw was found in the b43_do_request_fw() function in the
Linux kernel's b43 driver implementation. A local user who is able to
specify the "fwpostfix" b43 module parameter could use this flaw to cause a
denial of service or, potentially, escalate their privileges.
(CVE-2013-2852, Low)

* A NULL pointer dereference flaw was found in the Linux kernel's ftrace
and function tracer implementations. A local user who has the CAP_SYS_ADMIN
capability could use this flaw to cause a denial of service.
(CVE-2013-3301, Low)

Red Hat would like to thank Kees Cook for reporting CVE-2013-2852.

More information on the Red Hat Enterprise Linux 6.4 kernel packages upon
which these custom kernel packages are based is available in
RHSA-2013:1051:

https://rhn.redhat.com/errata/RHSA-2013-1051.html

All Red Hat OpenStack 3.0 users deploying the OpenStack Networking service
are advised to install these updated packages.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Details on how to use the Red Hat Network to apply this update are
available at https://access.redhat.com/site/articles/11258

This Red Hat OpenStack 3.0 kernel may be installed by running this command
while logged in as the root user on a system that has the required
entitlements and subscriptions attached:

# yum install "kernel-2.6.*.openstack.el6.x86_64"

Documentation for both stable and preview releases of Red Hat OpenStack is
available at:

https://access.redhat.com/site/documentation/en-US/Red_Hat_OpenStack/

In particular it is highly recommended that all users read the Release
Notes document for the relevant Red Hat OpenStack release prior to
installation.

Updated packages

Red Hat OpenStack 3.0

SRPMS:
kernel-2.6.32-358.114.1.openstack.el6.src.rpm
File outdated by:  RHSA-2013:1520
    MD5: 484bd4e0ddee0abe494a0383d3f7a704
SHA-256: 6535fc00b84e90eb0ec88c990b5af20309fc8a0e06340614635e2832f3b2484b
 
x86_64:
kernel-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: f640461ff49d748162f646f8c3913795
SHA-256: 3508c3af6ef9875658199215dcfd4fecab9bcb6eda4d4fa29e0e4ee9a8e7ea87
kernel-debug-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: 549541c36b7d84857ad7c0d5dd84fa19
SHA-256: bc15052cb22308f1d3f0efd9f963da5a68610544c2ebbd67b6a94daee62aa3c9
kernel-debug-debuginfo-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: 7625daa9a7dbd7859fe063b5a7c30519
SHA-256: 81597c0e838d77e597b03e7d1cd78ed341f2a77c6a0e744f5bca3507c9fe9218
kernel-debug-devel-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: a53d89f948ae422695196ba4ad32af86
SHA-256: e37673b08db80cd6b565c699f434a4e1c80dd9ddd571ae21bf62862c06894bdb
kernel-debuginfo-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: b167212768701ff2fbc98c6183bf3cb3
SHA-256: 3779fa7f9bd837917186c0ca242fa9f4d3c1d14b62a865cfcbd1920e8e78a68c
kernel-debuginfo-common-x86_64-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: 5b1054bec8c54b0abd6d8445361a9c76
SHA-256: 04c4b49573ed626a5a7f03392f05fa0a88e3a68c1222c99db77ff3a816659b97
kernel-devel-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: f3486e78cefec68185f4cd1869089348
SHA-256: 026834dc8479bc937805ac75e63ce852f8c977b1da502a301af8ba1c435decaf
kernel-doc-2.6.32-358.114.1.openstack.el6.noarch.rpm
File outdated by:  RHSA-2013:1520
    MD5: 8f99be83a6b7d349af476f1f2d622990
SHA-256: e5e254f2520cfdfdb5595f80e7749afc7dcc2fca8c31f50595226b26ca5e1296
kernel-firmware-2.6.32-358.114.1.openstack.el6.noarch.rpm
File outdated by:  RHSA-2013:1520
    MD5: 347d4a51fd637c69605fd93f7eec5ced
SHA-256: 158bc83e373f30065fde3332553883a674736b3a6e2bc73a0c88cd6a2d0d57c2
kernel-headers-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: e6b7e7d8a2fcd6460f44a2fa96dd5b3f
SHA-256: f6791daf6d34f6f9a60ca7953d774503287958ca58f16a03305d0514325e901c
perf-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: 873798535f0674e2cedfc763ee85cda4
SHA-256: c9d49a54f828b75ab1578566056132234c56fee3bd8f84127b14cf2207199c9b
perf-debuginfo-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: 37f9c8b7b942afe203bb667d1b1bc6ce
SHA-256: 937e5a5fcda90319df31789f71fefe46da8297358f525adbecb019262543670e
python-perf-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: e6368077b534ab254ba1a1277a282461
SHA-256: 4e9be07ad7d0c1a430f0d63537f418675db13d16463d59e1d4571c0e6989855f
python-perf-debuginfo-2.6.32-358.114.1.openstack.el6.x86_64.rpm
File outdated by:  RHSA-2013:1520
    MD5: 44a5e53e06f3c1f914b6684f7c903c5f
SHA-256: 868ee065068f2b9ef7e6c92f030eca7fe5de718ef0a72635e6ea1654965eead8
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

920499 - CVE-2013-0914 Kernel: sa_restorer information leak
920783 - CVE-2013-1848 kernel: ext3: format string issues
922353 - CVE-2012-6548 Kernel: udf: information leak on export
924689 - CVE-2013-2634 kernel: Information leak in the Data Center Bridging (DCB) component
924690 - CVE-2013-2635 kernel: Information leak in the RTNETLINK component
952197 - CVE-2013-3301 Kernel: tracing: NULL pointer dereference
955216 - CVE-2013-3222 Kernel: atm: update msg_namelen in vcc_recvmsg()
955599 - CVE-2013-3224 Kernel: Bluetooth: possible info leak in bt_sock_recvmsg()
955649 - CVE-2013-3225 Kernel: Bluetooth: RFCOMM - missing msg_namelen update in rfcomm_sock_recvmsg
968484 - CVE-2013-2128 Kernel: net: oops from tcp_collapse() when using splice(2)
969518 - CVE-2013-2852 kernel: b43: format string leaking into error msgs


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/