Security Advisory Important: kernel security update

Advisory: RHSA-2014:0512-1
Type: Security Advisory
Severity: Important
Issued on: 2014-05-19
Last updated on: 2014-05-19
Affected Products: Red Hat Enterprise Linux Server EUS (v. 6.3.z)
CVEs (cve.mitre.org): CVE-2014-0196

Details

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.3 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A race condition flaw, leading to heap-based buffer overflows, was found
in the way the Linux kernel's N_TTY line discipline (LDISC) implementation
handled concurrent processing of echo output and TTY write operations
originating from user space when the underlying TTY driver was PTY.
An unprivileged, local user could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2014-0196,
Important)

All kernel users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. The system must be
rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.

Updated packages

Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
kernel-2.6.32-279.43.2.el6.src.rpm
File outdated by:  RHSA-2014:0593
    MD5: ee2397a399bb9164c9452d90899ca709
SHA-256: 1ddc4bfa55a9661416c524cb77504cd7f5c0cd24938d54ef22af4643818a914d
 
IA-32:
kernel-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: 35e8eb94b95805c0ac06c0ba7d512af5
SHA-256: d4e3c1f1b8f167539206040bd04d3eb561b7a36be573694ed68c535c1b029a16
kernel-debug-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: 46d790c792285c3db20759a5976c5e03
SHA-256: b1977139bd6fc550af18e023db468fbeac0ed8d7e9d10c0673e606a541f40e44
kernel-debug-debuginfo-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: bef597b0b3a9c341f5b6c574658ecd45
SHA-256: b23129233822d7b8612f0007caecee854ab6442ae7b24efd443c6ae75b6d5d20
kernel-debug-devel-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: c6332fcbbf43650c4b061af2a225849a
SHA-256: feb49cd577a5cd6919f0e130eea2be595192331900990a825b234484bdb0c99c
kernel-debuginfo-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: eff4ebec23834fecf1019f05b2907248
SHA-256: 05a83138b8a41f6a3ee6c8d49a0316bdd7add8e32927107cf34c305750ed3888
kernel-debuginfo-common-i686-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: b8fa1578ec4b00aec6c4d21deeda81c0
SHA-256: 32d15a83bea2296da4e761e0fbd1f57b0ea307cd33bf796d9339b7a95e27b09b
kernel-devel-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: 7ef006d3d10a8deda6000be151c2a82c
SHA-256: 1c358081cb9ad523168be1e12d811c80be530fa7fbe4218b03e94d73bf2223c7
kernel-doc-2.6.32-279.43.2.el6.noarch.rpm
File outdated by:  RHSA-2014:0593
    MD5: 30a70f07a1d54576c153bb178521f379
SHA-256: 2bd20eaabcaa8910d92ec1f2d7a94dd320345d4571aa183545eb74d1f92c364f
kernel-firmware-2.6.32-279.43.2.el6.noarch.rpm
File outdated by:  RHSA-2014:0593
    MD5: 0669060e11752fee06d0327968768d4b
SHA-256: fb97268603aefa886f63457e80c225126f5805bab674ec8413aa5aa8b744a479
kernel-headers-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: 9da40d899903782c9bfba1f5c6a7cc40
SHA-256: 57ac9b54bd4372ccf28367ce417e354363584f6d50ef6aab845e6cd8c0be2152
perf-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: 990a5583e1fd863b181a3a67f9fe33d0
SHA-256: d79b025856753fc7699bee257a560193f3a41e790a1f0724a9eb8edbd302fa48
perf-debuginfo-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: ef0fae447a3987fce76cc5860c22745a
SHA-256: ab1b6e2cbdaa7681c68aa0fa284f6db9dd437128ff27d2dd5f1860b263c87e08
python-perf-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: 0dbdf23df919408d8651029d6e125187
SHA-256: 3d9ba967699ae148e00cbfc67eb724fe6036777afbd7a8648d1b6ad0c92bbd6c
python-perf-debuginfo-2.6.32-279.43.2.el6.i686.rpm
File outdated by:  RHSA-2014:0593
    MD5: 4b6fd8cf52efb2b01377e463c81ce63b
SHA-256: 0f0a51acf24aca233bbc0bc7e1a809cf5779bd7ca8a094bb7c3380de2ae7fb25
 
PPC:
kernel-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 45fec044dfc6e39182600da73725c46c
SHA-256: 298d6de26836a87cb03288455d39127fe34ae4e12189b8a56e2d7a517a87855a
kernel-bootwrapper-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: cf1e99ca7d2bab832935a3597a220798
SHA-256: f7b1ffd7f2bd76b92943428f40ef7f67bdd97c6e69b11ad402a162bbddc42c85
kernel-debug-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 7cf6303f4babfb1e7dd2465447161ad7
SHA-256: 7e4263d960c9da9576cbc63d2c014db3bbeb9ebcf330164e681a764a82d199b1
kernel-debug-debuginfo-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: f461757805a49fcbb4376a0ea340c9f0
SHA-256: b6d3635c195b43b605c7901d543e8a749e0a9b2690918830f5d0856130387702
kernel-debug-devel-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 8ed6f540637afe677ec6d56d40a4b5b7
SHA-256: 4d4f1636971f567570ff8d42e8ba5b1ead1ec18b107e3548243d5c880f1b4629
kernel-debuginfo-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 8ea2dcc2339877a85c0daddb47cdeac3
SHA-256: 6a9e9c3c8faa0fa98e34e0877e168627567605e7475ca15bf9ce3a9119a85b68
kernel-debuginfo-common-ppc64-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 13a62efe65bba93cb07f619fb911abe4
SHA-256: d52c2e86099e41575c0bdca92bb3ee166a03fdf2854e54b50091f10545f48935
kernel-devel-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 0b099e8f0ee63c272280e6852dacb146
SHA-256: 0015b3b09bf030b6bd5af59856c7d9a2a0f4bf635defc72e94968ba9c50d433a
kernel-doc-2.6.32-279.43.2.el6.noarch.rpm
File outdated by:  RHSA-2014:0593
    MD5: 30a70f07a1d54576c153bb178521f379
SHA-256: 2bd20eaabcaa8910d92ec1f2d7a94dd320345d4571aa183545eb74d1f92c364f
kernel-firmware-2.6.32-279.43.2.el6.noarch.rpm
File outdated by:  RHSA-2014:0593
    MD5: 0669060e11752fee06d0327968768d4b
SHA-256: fb97268603aefa886f63457e80c225126f5805bab674ec8413aa5aa8b744a479
kernel-headers-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 5314c4b9b6d32050185378c06d17a462
SHA-256: d7cc5ee945053e71f6d40febb354f43ffe8797c743f4dffc52abdaa7b54dd2e1
perf-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 1afbd47028fa2d4e70050c9a0886782f
SHA-256: 284a5291cfc3ac2d6271c4cdd219f6d5b60222bca8e2f41bbd6d744a85a47d95
perf-debuginfo-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: cecbba05e81d0d95d444d342a6ca6357
SHA-256: 290f2d8b1cf15740ed29f090ddf00e746f052ac57afbd8d741e7fbb1f2b2c628
python-perf-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 2fbbf735abc75fa0050c135bfd0b0cdb
SHA-256: 3a1a5126bf0dc866c4f14c411c1f43821230c255616f4bd3f4d1f9a4e2d111bb
python-perf-debuginfo-2.6.32-279.43.2.el6.ppc64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 87ec6a5dda04cb08afdc2ac99c4bbe7c
SHA-256: 5196dab72da6001d99c67b83bdbba928d1adb695b0dd1ab4784145c3067c803b
 
s390x:
kernel-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 57adf2b08ede02e971648f7eaa9c362f
SHA-256: 678918d400a08e0aa8a2e50e28dfd35b52c88b8103e8f036b3647e098e1307b3
kernel-debug-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: a4e068b1db0996f8772f2f0fe8057cba
SHA-256: 76aae9ae9b45c66a35c9e48233bf8795d3a6ad2c081c701e0b2c15d8d1186038
kernel-debug-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 07970a95781bf158441f942e6a5c86cb
SHA-256: 40a9fa57fb8d1f3237c4c8d87320b33fe5c0016b8925dbfda5c119e1b1150bca
kernel-debug-devel-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: dfe3eac8433c3fa94e02c1d7e1dd8ff7
SHA-256: 21ae55e085ecc7eab0b462d9022a037ab4dfd43d5cc438d19b376882affe3621
kernel-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: ad08eb95eb71a653615b4ae34ca121f0
SHA-256: 45669aa11fdc6dd4b1e55696c768191ed0f4c401244e1f79c9efd86fa0e8b963
kernel-debuginfo-common-s390x-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 56f599fea0d3743cd4c652f6c17070cb
SHA-256: 34fd518b51972e5aa12453a1937bbaeb6a84b99318132a6950423ea457488660
kernel-devel-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 7e6bc50eb86bc40ba1428208652987ed
SHA-256: bc83c56cc6d3ec8576b29926b7db2a5177cca2fd7ea182d95e33db1ec5542bf9
kernel-doc-2.6.32-279.43.2.el6.noarch.rpm
File outdated by:  RHSA-2014:0593
    MD5: 30a70f07a1d54576c153bb178521f379
SHA-256: 2bd20eaabcaa8910d92ec1f2d7a94dd320345d4571aa183545eb74d1f92c364f
kernel-firmware-2.6.32-279.43.2.el6.noarch.rpm
File outdated by:  RHSA-2014:0593
    MD5: 0669060e11752fee06d0327968768d4b
SHA-256: fb97268603aefa886f63457e80c225126f5805bab674ec8413aa5aa8b744a479
kernel-headers-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 30243b52c240bc37d46c1e686aa316d9
SHA-256: cce2bb9a883694c6929701deb29f1875e248642a699f86bb6897aa1042b9b7ee
kernel-kdump-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 77ac24693f94517f6ab7075a2366c266
SHA-256: bf36d064c1d19665868c22639da18e843c896c19706174e4c07f93c22cd8c48d
kernel-kdump-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 9b6dfbc6a8a1f4f01393d6474c5c436a
SHA-256: 50dc06c90b5c9ba77d7c91e2dc37ce3cde4befbcccb764a01583e49ca6e89701
kernel-kdump-devel-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 20a7d5da49ff2e7a5e8d1755270238ce
SHA-256: 92d99cdb52cd2c7562157ec109ce9cd57a9b5c63350c44c589b0d61738b27cf3
perf-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: d7717b13fdca126db04cfd5aaed04fbb
SHA-256: c98f30ef755b737314eaf62cf77002fc213fb9484c7111cc275a70647d79ddd8
perf-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 2bf4e11068044fff0491b1e06f6537b7
SHA-256: 9189886a69d2f1bf3ea4384b8218e0b4a7df0805b332ac5cd67d5cb5af3ac9e3
python-perf-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 84e2bc40f5411d62b6e04e1f52793cd1
SHA-256: 71c3e8e424df317cd79ac4a1817730098e436b7acf86a7ca656c36b6d2b2e95b
python-perf-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
File outdated by:  RHSA-2014:0593
    MD5: 7ef0b1704d4bf9b48beeb51cd15c8e8e
SHA-256: a682d915f94c208b3741d22c2a8715270be54a3e8c070a1cc13e7feecf4cc2fa
 
x86_64:
kernel-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 0596de41432d4958cdf038b107c36b1d
SHA-256: e55df2112c0014841818932b0db1ba8f072e8fa9fe3b1ed44a52000316ae8ca1
kernel-debug-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: a867ac8fee3806d39fb91ef843f3da61
SHA-256: 85c88e4be482d7fa395e64a8d10dae8b54e80b35e378f710448f71f91d9b8ae3
kernel-debug-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 3267c99a53c42e7369f15c456889a463
SHA-256: 739550bcd86ee92239bb7c4cfaac91e51a13bfa9f4460ec1df8be8fc06b8bd30
kernel-debug-devel-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 32feaff3e538ae089ccca3f04235b0f7
SHA-256: f9cb7dcece105fef4fc668337228d53ea228a0638848d1c42abc9fb43ca8b5b6
kernel-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 7f692a2430943d9a0c93ec2e22d00eed
SHA-256: ff538efe99634b3048f26f9c95ef8f6d49daf2129dc84cbfcb96097d82a3e955
kernel-debuginfo-common-x86_64-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 1c036f78b33c05bcf5eb51a821e134bc
SHA-256: 2911011fa43b5eb61676eb9ba9c9203de7ce13eece8bc4dd92e12e285763385a
kernel-devel-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 285f57d53bc1d8dbac37fe355efcbe91
SHA-256: f100c8574b367d7e86b12fd33771024ce050e76c30b2a845bc7a4a893f80ad82
kernel-doc-2.6.32-279.43.2.el6.noarch.rpm
File outdated by:  RHSA-2014:0593
    MD5: 30a70f07a1d54576c153bb178521f379
SHA-256: 2bd20eaabcaa8910d92ec1f2d7a94dd320345d4571aa183545eb74d1f92c364f
kernel-firmware-2.6.32-279.43.2.el6.noarch.rpm
File outdated by:  RHSA-2014:0593
    MD5: 0669060e11752fee06d0327968768d4b
SHA-256: fb97268603aefa886f63457e80c225126f5805bab674ec8413aa5aa8b744a479
kernel-headers-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 5406f41ac1f414276abbf5010bd31c66
SHA-256: 25f803fd60f5e1aaa7fe228d5bac670a72f8d2f335d495bfb0f50d0af0fc6c8a
perf-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: e8d19507952177e96688382421a8c510
SHA-256: 73d26cb927635f9cff95026d5d0a094f97574a01a22354481fea783bf7fb3acf
perf-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 998506e0fc04d63b876331bbf3a4c63f
SHA-256: e5ac5a30c3759f648eced6cab3da0ad0ce8e759c9e3ee44c049d1a6190298209
python-perf-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: a1ef10533d6dc3cf54646109f6fe77fc
SHA-256: ade943cc9128078ea9b767706aa97b0706034ea96ae7306ad7d4069c5ac21f88
python-perf-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
File outdated by:  RHSA-2014:0593
    MD5: 9dbc653171c10b708a5328747a3bae83
SHA-256: f7801328c30432b6901cace0fbffb2570f268f6320973f41c27b0ef0b9539f1b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1094232 - CVE-2014-0196 kernel: pty layer race condition leading to memory corruption


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/