Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:1589 - Security Advisory
Issued:
2012-12-18
Updated:
2012-12-18

RHSA-2012:1589 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: kernel security and bug fix update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 6.1 Extended Update Support.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A flaw was found in the way the Linux kernel's dl2k driver, used by

certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local,
unprivileged user could use this flaw to issue potentially harmful IOCTLs,
which could cause Ethernet adapters using the dl2k driver to malfunction
(for example, losing network connectivity). (CVE-2012-2313, Low)

Red Hat would like to thank Stephan Mueller for reporting this issue.

This update also fixes the following bug:

  • The kernel allows high priority real time tasks, such as tasks scheduled

with the SCHED_FIFO policy, to be throttled. Previously, the CPU stop tasks
were scheduled as high priority real time tasks and could be thus throttled
accordingly. However, the replenishment timer, which is responsible for
clearing a throttle flag on tasks, could be pending on the just disabled
CPU. This could lead to the situation that the throttled tasks were never
scheduled to run. Consequently, if any of such tasks was needed to complete
the CPU disabling, the system became unresponsive. This update introduces a
new scheduler class, which gives a task the highest possible system
priority and such a task cannot be throttled. The stop-task scheduling
class is now used for the CPU stop tasks, and the system shutdown completes
as expected in the scenario described. (BZ#876077)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

  • BZ - 818820 - CVE-2012-2313 kernel: unfiltered netdev rio_ioctl access by users

CVEs

  • CVE-2012-2313

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.36.1.el6.src.rpm SHA-256: ab6bd2acbe36fa36b1945aecc4a4a1a7383989fe69cf3a93330517ef6ab33cce
x86_64
kernel-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: 58ea32d276b7ce4faab370af44333dcef10b04b77005a8de541f878959dd0d21
kernel-debug-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: e32e9894a42d18fb04295d66ba4b6d27fd8e221da78a14553ef345ad6a58c071
kernel-debug-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: b1c969c3615bbef3ee1a110d9b2d11857e303f7ecc172eda8b619b7f86e7e6b9
kernel-debug-devel-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: 9010cb27661560123f9db5f761d973d06525262a93635bf7a2bf31eb6d736a55
kernel-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: 24a85958a44875a370671c6c3dc05c19b348eba89a9dbe76712c5623894d8f2e
kernel-debuginfo-common-x86_64-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: c8fc14c862f5434318303019a20442e15a288c3af8961c5353ed2ce3a911598f
kernel-devel-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: f8d409fce539885d39d10bb0c6fcd73b30de8808769949c9e68613fe6e06c36c
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: 0ccf689aa4e2cd98332be914dd6bc44e92f3f200268e08dbeddd12b97721113a
perf-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: c312d5fd5520f6656f8ce541016e3b98c8d0db95f64eac304309c35c09a65ba7
perf-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: e0f81c51824579eb2d5d3617c1b026e7e75ae86181ff3ee90ce29f6ef4978e73
i386
kernel-2.6.32-131.36.1.el6.i686.rpm SHA-256: 0560c8ac74c6beaa9345bd67d4889c5348a9b7348b36c4c6cd97129cbdd83ac7
kernel-debug-2.6.32-131.36.1.el6.i686.rpm SHA-256: f1b02f0bdac40b29433615d0a99cd44b27724ffa744785eb3a8ddbbc080ed035
kernel-debug-debuginfo-2.6.32-131.36.1.el6.i686.rpm SHA-256: 4d00a891b2f7b13f82e8e4c601d7f3491c73a324304e537513a60332effdf5a7
kernel-debug-devel-2.6.32-131.36.1.el6.i686.rpm SHA-256: 429614329a91a23979fbf84521520556acd3b4c07e80a6dc0dd09fdbc4fb8c3c
kernel-debuginfo-2.6.32-131.36.1.el6.i686.rpm SHA-256: 873e4e1a8d869a97c376ebeb5c9a8ed637bc4a3701331c53febb3df0e47414e1
kernel-debuginfo-common-i686-2.6.32-131.36.1.el6.i686.rpm SHA-256: 4547667e8690c03ab623da7e3157839eb8838a8eabac9e7ac29b0b470ce97622
kernel-devel-2.6.32-131.36.1.el6.i686.rpm SHA-256: 800a3ec0dc0b4cc4a955c67d29dda8e914d54176d34841c450fd3b1ccf525553
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.i686.rpm SHA-256: a86ee428c7e735bf76afce77ae8f7828dc2da8bb45963d74157ba5d40f4037ca
perf-2.6.32-131.36.1.el6.i686.rpm SHA-256: d4dd91b489fa61ae890fbca02ed3ca229452003ff1ef77fab32fe97fcbf295a6
perf-debuginfo-2.6.32-131.36.1.el6.i686.rpm SHA-256: 5e7b9a5ffca31086271fdb0d77c567b9da034bda37dd5c441fabf85ed282ea35

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.36.1.el6.src.rpm SHA-256: ab6bd2acbe36fa36b1945aecc4a4a1a7383989fe69cf3a93330517ef6ab33cce
s390x
kernel-2.6.32-131.36.1.el6.s390x.rpm SHA-256: 2d3ad159d545382f9983291a5ac40d7ade78849c31c5328c81b6fa078ca111e4
kernel-debug-2.6.32-131.36.1.el6.s390x.rpm SHA-256: 584da4bb81f6ede226ef145834b06bbc121b64ff2ce8b599461e77f31ab52ae3
kernel-debug-debuginfo-2.6.32-131.36.1.el6.s390x.rpm SHA-256: 89bcffa28894a7a43bdcc2550759b1035a3504540342f36b1fb4fc531980b8fa
kernel-debug-devel-2.6.32-131.36.1.el6.s390x.rpm SHA-256: b1ede45d8e164f075143a800f848bd2718d8151476829ecf95f9bd4d324a4ee3
kernel-debuginfo-2.6.32-131.36.1.el6.s390x.rpm SHA-256: 7287f291777991a3c272d6f610486fef6022b2f99d9f11ae325da544c1dc48e3
kernel-debuginfo-common-s390x-2.6.32-131.36.1.el6.s390x.rpm SHA-256: 6aca98bc94ccba58cdc98108386d147735d14abb45095d81d3d6a970fb7ec47a
kernel-devel-2.6.32-131.36.1.el6.s390x.rpm SHA-256: c430850fc13eb928be97a37cddcb172872708e5a3ca0fa0d1131e98a22d3da9f
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.s390x.rpm SHA-256: a407607f17a6eba6ce50a30b348a210717ec47cc4d444eebc8b13774b5670c04
kernel-kdump-2.6.32-131.36.1.el6.s390x.rpm SHA-256: c8e813d506c96813c6190b7885e41c01eed3003e08bc257a7183f55ae78ceb5c
kernel-kdump-debuginfo-2.6.32-131.36.1.el6.s390x.rpm SHA-256: 68ee95c52094cc7e0db8050fa89f1add16c2b572b2322130a15c08aca43bcf1d
kernel-kdump-devel-2.6.32-131.36.1.el6.s390x.rpm SHA-256: c825d27a441bd8303702e0f4e77128bc6e4b69a654266a51769218187021a247
perf-2.6.32-131.36.1.el6.s390x.rpm SHA-256: f39916c1c2d68755cd57dee40150f03e1385e8ca9f8e3dcad0a2506ece2bbffc
perf-debuginfo-2.6.32-131.36.1.el6.s390x.rpm SHA-256: 271167ed7c62700ce2a589055eb8b8b295944670faec5af88501dd49e352035f

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.36.1.el6.src.rpm SHA-256: ab6bd2acbe36fa36b1945aecc4a4a1a7383989fe69cf3a93330517ef6ab33cce
ppc64
kernel-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: 770b7491689956cceeadda8e6da388894625391e129cdbf568f90c356294f7ba
kernel-bootwrapper-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: 39938cc5d6de2b97f742800a000d616fcdd42119657fa7dea6c5f8f11f9289e9
kernel-debug-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: 43e95a66df4696371b588fecd71076313569ed273e325be0a73d69b8077755cd
kernel-debug-debuginfo-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: dcc31104828487b4d819fa1131e22818672d4ceaa9fed0eda0183f203ae29b2a
kernel-debug-devel-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: 7c098c333b382c68b8ef70dc0b239d7b2ea321e6d0e874d296aac44107897ecf
kernel-debuginfo-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: 917a2322ffffeed4cd5bf257fda29df3d040e04f161d944c3c7ed0e505e283c6
kernel-debuginfo-common-ppc64-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: c4bee538f2661c196c9d77f162ecfd4e5f3f47b2aace3a684bc6d0a669b0060f
kernel-devel-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: 5cda2d409a1b3a1d8ce3bfe23228011f14258f727838a0f6c12a3af173ed2592
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: edb3869c76df7ce55ba7ce220f5ed26833128c25d3b6a40f2d07dda915ae7077
perf-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: 5d277e90f18c0b28a55f8990e07d61c42081c8124a1cba710a435e3ef0ce5d05
perf-debuginfo-2.6.32-131.36.1.el6.ppc64.rpm SHA-256: 359492307acb3bfa5b1ce77b4e6dec85e75ba00fef0bba81cc58431b0569c7a9

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
kernel-2.6.32-131.36.1.el6.src.rpm SHA-256: ab6bd2acbe36fa36b1945aecc4a4a1a7383989fe69cf3a93330517ef6ab33cce
x86_64
kernel-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: 58ea32d276b7ce4faab370af44333dcef10b04b77005a8de541f878959dd0d21
kernel-debug-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: e32e9894a42d18fb04295d66ba4b6d27fd8e221da78a14553ef345ad6a58c071
kernel-debug-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: b1c969c3615bbef3ee1a110d9b2d11857e303f7ecc172eda8b619b7f86e7e6b9
kernel-debug-devel-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: 9010cb27661560123f9db5f761d973d06525262a93635bf7a2bf31eb6d736a55
kernel-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: 24a85958a44875a370671c6c3dc05c19b348eba89a9dbe76712c5623894d8f2e
kernel-debuginfo-common-x86_64-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: c8fc14c862f5434318303019a20442e15a288c3af8961c5353ed2ce3a911598f
kernel-devel-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: f8d409fce539885d39d10bb0c6fcd73b30de8808769949c9e68613fe6e06c36c
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: 0ccf689aa4e2cd98332be914dd6bc44e92f3f200268e08dbeddd12b97721113a
perf-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: c312d5fd5520f6656f8ce541016e3b98c8d0db95f64eac304309c35c09a65ba7
perf-debuginfo-2.6.32-131.36.1.el6.x86_64.rpm SHA-256: e0f81c51824579eb2d5d3617c1b026e7e75ae86181ff3ee90ce29f6ef4978e73
i386
kernel-2.6.32-131.36.1.el6.i686.rpm SHA-256: 0560c8ac74c6beaa9345bd67d4889c5348a9b7348b36c4c6cd97129cbdd83ac7
kernel-debug-2.6.32-131.36.1.el6.i686.rpm SHA-256: f1b02f0bdac40b29433615d0a99cd44b27724ffa744785eb3a8ddbbc080ed035
kernel-debug-debuginfo-2.6.32-131.36.1.el6.i686.rpm SHA-256: 4d00a891b2f7b13f82e8e4c601d7f3491c73a324304e537513a60332effdf5a7
kernel-debug-devel-2.6.32-131.36.1.el6.i686.rpm SHA-256: 429614329a91a23979fbf84521520556acd3b4c07e80a6dc0dd09fdbc4fb8c3c
kernel-debuginfo-2.6.32-131.36.1.el6.i686.rpm SHA-256: 873e4e1a8d869a97c376ebeb5c9a8ed637bc4a3701331c53febb3df0e47414e1
kernel-debuginfo-common-i686-2.6.32-131.36.1.el6.i686.rpm SHA-256: 4547667e8690c03ab623da7e3157839eb8838a8eabac9e7ac29b0b470ce97622
kernel-devel-2.6.32-131.36.1.el6.i686.rpm SHA-256: 800a3ec0dc0b4cc4a955c67d29dda8e914d54176d34841c450fd3b1ccf525553
kernel-doc-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 705c8e48a94df48385a2ed8e5942bcf722822c929024b416ace4d696c01d9202
kernel-firmware-2.6.32-131.36.1.el6.noarch.rpm SHA-256: 9d812b6197755062b93c5aa4c00becf02db3f85129855cae0c564c4d408e66f1
kernel-headers-2.6.32-131.36.1.el6.i686.rpm SHA-256: a86ee428c7e735bf76afce77ae8f7828dc2da8bb45963d74157ba5d40f4037ca
perf-2.6.32-131.36.1.el6.i686.rpm SHA-256: d4dd91b489fa61ae890fbca02ed3ca229452003ff1ef77fab32fe97fcbf295a6
perf-debuginfo-2.6.32-131.36.1.el6.i686.rpm SHA-256: 5e7b9a5ffca31086271fdb0d77c567b9da034bda37dd5c441fabf85ed282ea35

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
x86_64

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter