Updated kernel packages that fix multiple security issues and two bugs arenow available for Red Hat Enterprise Linux 6.4 Advanced Update Support.Red Hat Product Security has rated this update as having Important securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* It was found that the Linux kernel’s Infiniband subsystem did notproperly sanitize input parameters while registering memory regions fromuser space via the (u)verbs API. A local user with access to a/dev/infiniband/uverbsX device could use this flaw to crash the system or,potentially, escalate their privileges on the system. (CVE-2014-8159,Important)* An integer overflow flaw was found in the way the Linux kernel’s FrameBuffer device implementation mapped kernel memory to user space via themmap syscall. A local user able to access a frame buffer device file(/dev/fb*) could possibly use this flaw to escalate their privileges on thesystem. (CVE-2013-2596, Important)* It was found that the parse_rock_ridge_inode_internal() function of theLinux kernel’s ISOFS implementation did not correctly check relocateddirectories when processing Rock Ridge child link (CL) tags. An attackerwith physical access to the system could use a specially crafted ISO imageto crash the system or, potentially, escalate their privileges on thesystem. (CVE-2014-5471, CVE-2014-5472, Low)Red Hat would like to thank Mellanox for reporting the CVE-2014-8159 issue.This update also fixes the following bugs:* The kernel could sometimes panic due to a possible division by zero inthe kernel scheduler. This bug has been fixed by defining a new div64_ul()division function and correcting the affected calculation in theproc_sched_show_task() function. (BZ#1199898)* When repeating a Coordinated Universal Time (UTC) value during a leapsecond (when the UTC time should be 23:59:60), the International AtomicTime (TAI) timescale previously stopped as the kernel NTP code incrementedthe TAI offset one second too late. A patch has been provided, which fixesthe bug by incrementing the offset during the leap second itself. Now, thecorrect TAI is set during the leap second. (BZ#1201672)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
kernel-2.6.32-358.59.1.el6.src.rpm
    MD5: 7013d958f58832ac4d8f2dfbd816034eSHA-256: 8d17c7cd16647ac3f82d70e8817a8b4f6c7514b18cc7263e89d0067b074e2813
 
x86_64:
kernel-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: ce6835422b8b73a940834bb891df4f24SHA-256: 8427f101c32d71d167c5de39eedc6a4d0f02f9bc47a0d525e93e07fb0692cf42
kernel-debug-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: 6f3f9e10174bb410d54e86e0b25bf806SHA-256: e5d25100e9d84b69aaf9836278368e49f46c466a58bbbd91d02975423d446bc0
kernel-debug-debuginfo-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: 58fc829a68e3f6a3c0a558e564b5669cSHA-256: 66cc1103ae46a5d9c8125829e36048639f737aa7d6fd35214bb25151cb140962
kernel-debug-devel-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: 45432114e36e4a69e9acd88b76bd6639SHA-256: 8bee1f5460068f83b428698b865a20f681cc647559115412bdb2b7c526b4a615
kernel-debuginfo-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: aeb54d122121f764301246af25647d65SHA-256: e41b003790ef009daeee5422f1fa526e6898878cb2222847d5dadd1b9461b521
kernel-debuginfo-common-x86_64-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: bfd01679b9c0647a6ccf144230eb6af9SHA-256: a3e917bb14ee6640a330904d27608dee8df43a13f3787e69dfd97579dcf756d1
kernel-devel-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: 5a54ceec577e905206f4160eda9884a6SHA-256: 1e179389c25a3e8dd6e83255286d126b5834af8aa27a652fd6a9173cb480368d
kernel-doc-2.6.32-358.59.1.el6.noarch.rpm
    MD5: 31fccd34d87c78b77748ae187fd8f290SHA-256: 20f78f56beb63bd80aa44bea5576f1565c0649df1cdf0932c21243fc8fa36656
kernel-firmware-2.6.32-358.59.1.el6.noarch.rpm
    MD5: b86d633e32f77de31ff26c9c265b713fSHA-256: 3f65a15735eda9a5f66651b01999ac45bdd75c78b8be152bc286b5d7c8ff164a
kernel-headers-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: 2f5eb00cc6a81c008c06e017ae43b7b0SHA-256: 34311f1a88e006618978299dd73e228d58ffcb02df59ba76462bbaccee25f7e7
perf-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: 1f8ce177ae8ce5035911db7c42af4929SHA-256: 5c4c4782edeeb75e1c519dd3c05c8502d730f03fa1ae223d3691d3e3196d4f47
perf-debuginfo-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: 08f4021ed10346e86c30fb3a6079117dSHA-256: 8062e5f89c845232acd9c6bae888426e1b0202d00061996124a3e816c62b94e7
python-perf-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: ebff3f48006e3da3f7840ad88ca6fcadSHA-256: 8980bac5741db1f3aa79e12ff34b904c412bc078c56b59983d6f82aca153bb31
python-perf-debuginfo-2.6.32-358.59.1.el6.x86_64.rpm
    MD5: ad3e6e06b0dd89a87df1e3d5e032172eSHA-256: 5cc2afb7a5c4a8eb1c26bacce69f48d6688bc25aebb525852d32416539bcce62
 
(The unlinked packages above are only available from the Red Hat Network)
1034490 – CVE-2013-2596 kernel: integer overflow in fb_mmap1134099 – CVE-2014-5471 CVE-2014-5472 kernel: isofs: unbound recursion when processing relocated directories1181166 – CVE-2014-8159 kernel: infiniband: uverbs: unprotected physical memory access

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply