====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: kernel security, bug fix, and enhancement update
Advisory ID:       RHSA-2011:1106-01
Product:           Red Hat Enterprise Linux
Advisory URL:      Issue date:        2011-08-02
CVE Names:         CVE-2011-1576 
====================================================================
1. Summary:

Updated kernel packages that fix one security issue, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.0
Extended Update Support.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 6.0.z) - i386, noarch, ppc64, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* A flaw allowed napi_reuse_skb() to be called on VLAN (virtual LAN)
packets. An attacker on the local network could trigger this flaw by
sending specially-crafted packets to a target system, possibly causing a
denial of service. (CVE-2011-1576, Moderate)

Red Hat would like to thank Ryan Sweat for reporting this issue.

This update also fixes the following bugs:

* The LSI SAS2 controller firmware issued an 0x620f fault while performing
I/O operations and with a Task Manager running, causing possible data
corruption. This update corrects this issue. (BZ#710625)

* The crashkernel memory region can overlap the RunTime Abstraction
Services (RTAS) memory region. If the crashkernel memory region was freed,
the RTAS memory region was freed as well and the system would crash. With
this update, the crash_free_reserved_phys_range() function is overridden
and overlaps with the RTAS memory region are checked so that system crashes
no longer occur. (BZ#710626)

* If the microcode module was loaded, saving and restoring a Xen guest
returned a warning message and a backtrace error. With this update,
backtrace errors are no longer returned, and saving and restoring a Xen
guest works as expected. (BZ#710632)

* When the Distributed Lock Manager (DLM) queued three callbacks for a lock
in the following sequence: blocking - completion - blocking, it would
consider the final blocking callback redundant and skip it. Because the
callback was skipped, GFS would not release the lock, causing processes on
other nodes to wait indefinitely for it. With this update, the DLM does not
skip the necessary blocking callback. (BZ#710642)

* The XFRM_SUB_POLICY feature causes all bundles to be at the finest
granularity possible. As a result of the data structure used to implement
this, the system performance would drop considerably. This update disables
a part of XFRM_SUB_POLICY, eliminating the poor performance at the cost of
sub-IP address selection granularity in the policy. (BZ#710645)

* A kernel panic in the mpt2sas driver could occur on an IBM system using a
drive with SMART (Self-Monitoring, Analysis and Reporting Technology)
issues. This was because the driver was sending an SEP request while the
kernel was in the interrupt context, causing the driver to enter the sleep
state. With this update, a fake event is now executed from the interrupt
context, assuring the SEP request is properly issued. (BZ#714189)

Finally, this update provides the following enhancements:

* This update introduces a kernel module option that allows the Flow
Director to be disabled. (BZ#711549)

* This update introduces parallel port printer support for Red Hat
Enterprise Linux 6. (BZ#713825)

* This update restricts access to the /proc/kcore file to ELF headers only.
(BZ#710638)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues and add these enhancements. The system must
be rebooted for this update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

5. Bugs fixed (http://bugzilla.redhat.com/):

695173 - CVE-2011-1576 kernel: net: Fix memory leak/corruption on VLAN GRO_DROP
710632 - xen microcode WARN on save-restore
710638 - kernel: restrict access to /proc/kcore to just elf headers [rhel-6.0.z]
710642 - GFS2: inode glock stuck without holder
710645 - Big performance regression found on connect/request/response test through IPSEC (openswan) transport
713825 - Parallel port issue in RHEL 6.0 server
714189 - System Hang when there is smart error on IBM platform

6. Package List:

Red Hat Enterprise Linux Server (v. 6.0.z):

Source:
kernel-2.6.32-71.34.1.el6.src.rpm

i386:
kernel-2.6.32-71.34.1.el6.i686.rpm
kernel-debug-2.6.32-71.34.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-71.34.1.el6.i686.rpm
kernel-debug-devel-2.6.32-71.34.1.el6.i686.rpm
kernel-debuginfo-2.6.32-71.34.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-71.34.1.el6.i686.rpm
kernel-devel-2.6.32-71.34.1.el6.i686.rpm
kernel-headers-2.6.32-71.34.1.el6.i686.rpm

noarch:
kernel-doc-2.6.32-71.34.1.el6.noarch.rpm
kernel-firmware-2.6.32-71.34.1.el6.noarch.rpm
perf-2.6.32-71.34.1.el6.noarch.rpm

ppc64:
kernel-2.6.32-71.34.1.el6.ppc64.rpm
kernel-bootwrapper-2.6.32-71.34.1.el6.ppc64.rpm
kernel-debug-2.6.32-71.34.1.el6.ppc64.rpm
kernel-debug-debuginfo-2.6.32-71.34.1.el6.ppc64.rpm
kernel-debug-devel-2.6.32-71.34.1.el6.ppc64.rpm
kernel-debuginfo-2.6.32-71.34.1.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-71.34.1.el6.ppc64.rpm
kernel-devel-2.6.32-71.34.1.el6.ppc64.rpm
kernel-headers-2.6.32-71.34.1.el6.ppc64.rpm

s390x:
kernel-2.6.32-71.34.1.el6.s390x.rpm
kernel-debug-2.6.32-71.34.1.el6.s390x.rpm
kernel-debug-debuginfo-2.6.32-71.34.1.el6.s390x.rpm
kernel-debug-devel-2.6.32-71.34.1.el6.s390x.rpm
kernel-debuginfo-2.6.32-71.34.1.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-71.34.1.el6.s390x.rpm
kernel-devel-2.6.32-71.34.1.el6.s390x.rpm
kernel-headers-2.6.32-71.34.1.el6.s390x.rpm
kernel-kdump-2.6.32-71.34.1.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-71.34.1.el6.s390x.rpm
kernel-kdump-devel-2.6.32-71.34.1.el6.s390x.rpm

x86_64:
kernel-2.6.32-71.34.1.el6.x86_64.rpm
kernel-debug-2.6.32-71.34.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-71.34.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-71.34.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-71.34.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-71.34.1.el6.x86_64.rpm
kernel-devel-2.6.32-71.34.1.el6.x86_64.rpm
kernel-headers-2.6.32-71.34.1.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-1576.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is .  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.

Red Hat: 2011:1106-01: kernel: Moderate Advisory

Updated kernel packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6.0 Extended Update Support

Summary

The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following security issue:
* A flaw allowed napi_reuse_skb() to be called on VLAN (virtual LAN) packets. An attacker on the local network could trigger this flaw by sending specially-crafted packets to a target system, possibly causing a denial of service. (CVE-2011-1576, Moderate)
Red Hat would like to thank Ryan Sweat for reporting this issue.
This update also fixes the following bugs:
* The LSI SAS2 controller firmware issued an 0x620f fault while performing I/O operations and with a Task Manager running, causing possible data corruption. This update corrects this issue. (BZ#710625)
* The crashkernel memory region can overlap the RunTime Abstraction Services (RTAS) memory region. If the crashkernel memory region was freed, the RTAS memory region was freed as well and the system would crash. With this update, the crash_free_reserved_phys_range() function is overridden and overlaps with the RTAS memory region are checked so that system crashes no longer occur. (BZ#710626)
* If the microcode module was loaded, saving and restoring a Xen guest returned a warning message and a backtrace error. With this update, backtrace errors are no longer returned, and saving and restoring a Xen guest works as expected. (BZ#710632)
* When the Distributed Lock Manager (DLM) queued three callbacks for a lock in the following sequence: blocking - completion - blocking, it would consider the final blocking callback redundant and skip it. Because the callback was skipped, GFS would not release the lock, causing processes on other nodes to wait indefinitely for it. With this update, the DLM does not skip the necessary blocking callback. (BZ#710642)
* The XFRM_SUB_POLICY feature causes all bundles to be at the finest granularity possible. As a result of the data structure used to implement this, the system performance would drop considerably. This update disables a part of XFRM_SUB_POLICY, eliminating the poor performance at the cost of sub-IP address selection granularity in the policy. (BZ#710645)
* A kernel panic in the mpt2sas driver could occur on an IBM system using a drive with SMART (Self-Monitoring, Analysis and Reporting Technology) issues. This was because the driver was sending an SEP request while the kernel was in the interrupt context, causing the driver to enter the sleep state. With this update, a fake event is now executed from the interrupt context, assuring the SEP request is properly issued. (BZ#714189)
Finally, this update provides the following enhancements:
* This update introduces a kernel module option that allows the Flow Director to be disabled. (BZ#711549)
* This update introduces parallel port printer support for Red Hat Enterprise Linux 6. (BZ#713825)
* This update restricts access to the /proc/kcore file to ELF headers only. (BZ#710638)
Users should upgrade to these updated packages, which contain backported patches to resolve these issues and add these enhancements. The system must be rebooted for this update to take effect.



Summary


Solution

Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system.

References

https://www.redhat.com/security/data/cve/CVE-2011-1576.html https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux Server (v. 6.0.z):
Source: kernel-2.6.32-71.34.1.el6.src.rpm
i386: kernel-2.6.32-71.34.1.el6.i686.rpm kernel-debug-2.6.32-71.34.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-71.34.1.el6.i686.rpm kernel-debug-devel-2.6.32-71.34.1.el6.i686.rpm kernel-debuginfo-2.6.32-71.34.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-71.34.1.el6.i686.rpm kernel-devel-2.6.32-71.34.1.el6.i686.rpm kernel-headers-2.6.32-71.34.1.el6.i686.rpm
noarch: kernel-doc-2.6.32-71.34.1.el6.noarch.rpm kernel-firmware-2.6.32-71.34.1.el6.noarch.rpm perf-2.6.32-71.34.1.el6.noarch.rpm
ppc64: kernel-2.6.32-71.34.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-71.34.1.el6.ppc64.rpm kernel-debug-2.6.32-71.34.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-71.34.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-71.34.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-71.34.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-71.34.1.el6.ppc64.rpm kernel-devel-2.6.32-71.34.1.el6.ppc64.rpm kernel-headers-2.6.32-71.34.1.el6.ppc64.rpm
s390x: kernel-2.6.32-71.34.1.el6.s390x.rpm kernel-debug-2.6.32-71.34.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-71.34.1.el6.s390x.rpm kernel-debug-devel-2.6.32-71.34.1.el6.s390x.rpm kernel-debuginfo-2.6.32-71.34.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-71.34.1.el6.s390x.rpm kernel-devel-2.6.32-71.34.1.el6.s390x.rpm kernel-headers-2.6.32-71.34.1.el6.s390x.rpm kernel-kdump-2.6.32-71.34.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-71.34.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-71.34.1.el6.s390x.rpm
x86_64: kernel-2.6.32-71.34.1.el6.x86_64.rpm kernel-debug-2.6.32-71.34.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-71.34.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-71.34.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-71.34.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-71.34.1.el6.x86_64.rpm kernel-devel-2.6.32-71.34.1.el6.x86_64.rpm kernel-headers-2.6.32-71.34.1.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package


Severity
Advisory ID: RHSA-2011:1106-01
Product: Red Hat Enterprise Linux
Advisory URL: Issued Date: : 2011-08-02
CVE Names: CVE-2011-1576

Topic

Updated kernel packages that fix one security issue, several bugs, and addvarious enhancements are now available for Red Hat Enterprise Linux 6.0Extended Update Support.The Red Hat Security Response Team has rated this update as having moderatesecurity impact. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available from the CVE link inthe References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Server (v. 6.0.z) - i386, noarch, ppc64, s390x, x86_64


Bugs Fixed

695173 - CVE-2011-1576 kernel: net: Fix memory leak/corruption on VLAN GRO_DROP

710632 - xen microcode WARN on save-restore

710638 - kernel: restrict access to /proc/kcore to just elf headers [rhel-6.0.z]

710642 - GFS2: inode glock stuck without holder

710645 - Big performance regression found on connect/request/response test through IPSEC (openswan) transport

713825 - Parallel port issue in RHEL 6.0 server

714189 - System Hang when there is smart error on IBM platform


Related News