Updated kernel packages that fix multiple security issues and two bugs arenow available for Red Hat Enterprise Linux 6.2 Advanced Update Support.Red Hat Product Security has rated this update as having Important securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* A flaw was found in the way the Linux kernel’s SCTP implementationvalidated INIT chunks when performing Address Configuration Change(ASCONF). A remote attacker could use this flaw to crash the system bysending a specially crafted SCTP packet to trigger a NULL pointerdereference on the system. (CVE-2014-7841, Important)* It was found that the Linux kernel’s Infiniband subsystem did notproperly sanitize input parameters while registering memory regions fromuser space via the (u)verbs API. A local user with access to a/dev/infiniband/uverbsX device could use this flaw to crash the system or,potentially, escalate their privileges on the system. (CVE-2014-8159,Important)* An integer overflow flaw was found in the way the Linux kernel’s FrameBuffer device implementation mapped kernel memory to user space via themmap syscall. A local user able to access a frame buffer device file(/dev/fb*) could possibly use this flaw to escalate their privileges on thesystem. (CVE-2013-2596, Important)* It was found that the parse_rock_ridge_inode_internal() function of theLinux kernel’s ISOFS implementation did not correctly check relocateddirectories when processing Rock Ridge child link (CL) tags. An attackerwith physical access to the system could use a specially crafted ISO imageto crash the system or, potentially, escalate their privileges on thesystem. (CVE-2014-5471, CVE-2014-5472, Low)Red Hat would like to thank Mellanox for reporting the CVE-2014-8159 issue.The CVE-2014-7841 issue was discovered by Liu Wei of Red Hat.This update also fixes the following bugs:* Previously, certain network device drivers did not accept ethtoolcommands right after they were loaded. As a consequence, the currentsetting of the specified device driver was not applied and an error messagewas returned. The ETHTOOL_DELAY variable has been added, which makes surethe ethtool utility waits for some time before it tries to apply theoptions settings, thus fixing the bug. (BZ#1138299)* During the memory allocation for a new socket to communicate to theserver, the rpciod daemon released a clean page which needed to becommitted. However, the commit was queueing indefinitely as the commitcould only be provided with a socket connection. As a consequence, adeadlock occurred in rpciod. This update sets the PF_FSTRANS flag on thework queue task prior to the socket allocation, and adds thenfs_release_page check for the flag when deciding whether to make a commitcall, thus fixing this bug. (BZ#1192326)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kernel-2.6.32-220.60.2.el6.src.rpm
    MD5: 52c2f7284503886fcafc7dbe166d39a8SHA-256: 2d30422470e9ba2f577895e747f90be736af0b21ae53e9de299549964e3efe19
 
x86_64:
kernel-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 3f0d84250ca0df517c51471db5628a3cSHA-256: d0f78fe66cc2dae3dcd04816ea1f0af2f4e925a00197b03e2df548c4ce9f1bbf
kernel-debug-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 60486291bf77228126231d9f385234e9SHA-256: 0c85e4a37955fc27ea229c153dfec73da342e9bb5f553909d0ee60dd53fa74fa
kernel-debug-debuginfo-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 381d9f23c065d4b3eb9886ae7475af08SHA-256: 8f71e67d8b39b7fc0227d774558fa6dab5cbf6c5d791b16837bddca0e81a1d0e
kernel-debug-devel-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: afff191bbdf261540cd94a9ea9231288SHA-256: 6ee25fdeee6bde2df81a2177128e56a5c18d65471d4699388b51f693380bd560
kernel-debuginfo-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 862de41a6fed0149795cca3cd94002e9SHA-256: 958540abc121c206fc29b6a8c5b15c272c7ef9e56ea8d4a36896ff5b572a5f0a
kernel-debuginfo-common-x86_64-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 2b4f12b6a8a9a0bf29cccd0423857b88SHA-256: 67c59fa64896abf969383cfa54ed3703d9462aea9152832c572a830febe329a6
kernel-devel-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 65b83a74a68926d38886a500780b598dSHA-256: 2671c77fad2e3bd5d11f394099afb8b1635cbb933b67f95554bafaf35d374150
kernel-doc-2.6.32-220.60.2.el6.noarch.rpm
    MD5: 568c41b83d9697d8c35ebff64e6e1f38SHA-256: ec89df1a33ab84c4717c0b52f475db2511d6561d351be6bd1dc4374772cb0e76
kernel-firmware-2.6.32-220.60.2.el6.noarch.rpm
    MD5: 11edc8ae7d717ee9259b8afe0ece358cSHA-256: f40a151c56967f007d025f7ba4e345211c351ea9eeb2d414fa66686e30fffa0e
kernel-headers-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 3eba42a1cb2529ae9fd7dbb1da54bdc6SHA-256: 8fbbd90aba694ce62d949e941182af0306ac93abe7ab3e43f02780c270236783
perf-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 09c554cf984199a9c1e943c53bb31b87SHA-256: 3aa3ca66e9ff59f0c33c79e1ba88357fdbd7c1394ad80db7dc258427b90e5871
perf-debuginfo-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 1b57b932475fcb04ae545ce33b9cde63SHA-256: 5c7729e9bb9e4220ee9b2a20d3b46aac1dcc87f3a9a1245de2d0ee8a02aeb1ad
python-perf-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: 6fcfec4350c19fb3c0358c69d7a2d926SHA-256: 0d69aa5eba2c9041a4ead05437b55a5b794bab7524059e32c4c72266fac1a388
python-perf-debuginfo-2.6.32-220.60.2.el6.x86_64.rpm
    MD5: a7471c4d9135328467698c5de560ccb7SHA-256: 115c0ef7c0aca7f218e9a94526d9defe85b7e9283b41ece74d08740093751b0b
 
(The unlinked packages above are only available from the Red Hat Network)
1034490 – CVE-2013-2596 kernel: integer overflow in fb_mmap1134099 – CVE-2014-5471 CVE-2014-5472 kernel: isofs: unbound recursion when processing relocated directories1163087 – CVE-2014-7841 kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet1181166 – CVE-2014-8159 kernel: infiniband: uverbs: unprotected physical memory access

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply