Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0841 - Security Advisory
Issued:
2013-05-20
Updated:
2013-05-20

RHSA-2013:0841 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.1 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • It was found that the Red Hat Enterprise Linux 6.1 kernel update

(RHSA-2011:0542) introduced an integer conversion issue in the Linux
kernel's Performance Events implementation. This led to a user-supplied
index into the perf_swevent_enabled array not being validated properly,
resulting in out-of-bounds kernel memory access. A local, unprivileged user
could use this flaw to escalate their privileges. (CVE-2013-2094,
Important)

A public exploit that affects Red Hat Enterprise Linux 6 is available.

Refer to Red Hat Knowledge Solution 373743, linked to in the References,
for further information and mitigation instructions for users who are
unable to immediately apply this update.

Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

  • BZ - 962792 - CVE-2013-2094 kernel: perf_swevent_enabled array out-of-bound access

CVEs

  • CVE-2013-2094

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/site/solutions/373743
  • https://rhn.redhat.com/errata/RHSA-2011-0542.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.39.1.el6.src.rpm SHA-256: 5098a8ae90a0a93a57c4ccfec2276c87edaced73b063c82ca8a8f7bdb3d89ebe
x86_64
kernel-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 1854b10511abba281482748d72b59f6dfea5e0a0999ee9d275ddd9c592fbcdc2
kernel-debug-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: cbf180e52034b6c4df2d63574e8c40f6aedb996a785b203b1bbe62ef556caeb0
kernel-debug-debuginfo-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 98a1913f150dd33e7754b4f8d28e6acc8fe1b6e92dc9fb472b188c54dadc72d1
kernel-debug-devel-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 2cf285ed0c98114f264a97f31312c0f14182004959900d69a24b034d33f10886
kernel-debuginfo-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: ca864fafd05f5490b2a0498a2040fe02bb23a0e22f6db80fd379130a540ed674
kernel-debuginfo-common-x86_64-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 570fd60506af823638e607a35cf723e2d5d8162977ff0f84b3d6dfd79c7d0da7
kernel-devel-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 8eb4cda334b92fe48949e2a5fafe50a3350804eeb826a7c93904fecbd15cf8e4
kernel-doc-2.6.32-131.39.1.el6.noarch.rpm SHA-256: 787fca24d65e5cece244a6a77d61bf1943160fb349b03d86a0b10718f9835d28
kernel-firmware-2.6.32-131.39.1.el6.noarch.rpm SHA-256: d1d02dd6539f17543239834ceb160804676880648c872d847684089f74306028
kernel-headers-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 533b0fd213dedb7e9f4e6920c6e89b1fa5ab3c8761f27e9932e1b5daf732e01a
perf-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: ba6c0993f373161d6daec2d5d9c397a643bde6f31b3dde160afc47bceaf6d519
perf-debuginfo-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 9bed10c1fcfd6ff7f7b11d7209585250c0d7d31fe8c4a5d028320daee3d4aef5
i386
kernel-2.6.32-131.39.1.el6.i686.rpm SHA-256: b066073ebdc30f6b734704b7ebf2c24e722461aa44735a30235ca3c58f29785d
kernel-debug-2.6.32-131.39.1.el6.i686.rpm SHA-256: 20b7e08e0525f7f1f00449a450c5030aa14cb84babdbc914a84ff47819ff5b0c
kernel-debug-debuginfo-2.6.32-131.39.1.el6.i686.rpm SHA-256: 3fef2347172e3c1964150005e3b35afd7bb559d6c9dec4335fb7ff29def58195
kernel-debug-devel-2.6.32-131.39.1.el6.i686.rpm SHA-256: f578f539f7c2dcf6b8b4076c68b9d16d1a839dd6f0420305b25f0205e6b713e2
kernel-debuginfo-2.6.32-131.39.1.el6.i686.rpm SHA-256: 7208461ab11abaa8e175e16636a76ad5171dd2c51aba4ef2ae53592b389729ee
kernel-debuginfo-common-i686-2.6.32-131.39.1.el6.i686.rpm SHA-256: c409a1e577af6815f92174cec877f2d56d80d62eb2b036be6ecf6681fac2c6e2
kernel-devel-2.6.32-131.39.1.el6.i686.rpm SHA-256: 7e878de7b2be336fed62217e2ec404b61fcd9f014d02b14e8ba03b103e4d63fe
kernel-doc-2.6.32-131.39.1.el6.noarch.rpm SHA-256: 787fca24d65e5cece244a6a77d61bf1943160fb349b03d86a0b10718f9835d28
kernel-firmware-2.6.32-131.39.1.el6.noarch.rpm SHA-256: d1d02dd6539f17543239834ceb160804676880648c872d847684089f74306028
kernel-headers-2.6.32-131.39.1.el6.i686.rpm SHA-256: aab1d0fa19ac54b4fcebc120649295fcbdf042563e267374d2a0eca4af1c84d7
perf-2.6.32-131.39.1.el6.i686.rpm SHA-256: 7f18b260bf40eac838eb0228a1e6fd1cd794a84cc23a887170dcf0d10dc16fcc
perf-debuginfo-2.6.32-131.39.1.el6.i686.rpm SHA-256: 9e727042f23a5e8f98beaa88e8d0d05b7d2b9e005495f83aaaa9a44c88bbd656

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
s390x
kernel-2.6.32-131.39.1.el6.s390x.rpm SHA-256: 2e43cb8e7571d34548e9f3bfaf1db00952ba281914e352be17c1bda969e7e552
kernel-debug-2.6.32-131.39.1.el6.s390x.rpm SHA-256: 8bb58e8753919c29da39a0f0525f839143e9ff2e58296d2603daeb001238c06c
kernel-debug-devel-2.6.32-131.39.1.el6.s390x.rpm SHA-256: b21162cbd35892d5d9d2cfb63e7521b33922781827d7dfa75885babf0562b666
kernel-devel-2.6.32-131.39.1.el6.s390x.rpm SHA-256: 566defe02d74f13186419de0568883cf3aad057d49c81e8b6a59955dbdf72d93
kernel-doc-2.6.32-131.39.1.el6.noarch.rpm SHA-256: 787fca24d65e5cece244a6a77d61bf1943160fb349b03d86a0b10718f9835d28
kernel-firmware-2.6.32-131.39.1.el6.noarch.rpm SHA-256: d1d02dd6539f17543239834ceb160804676880648c872d847684089f74306028
kernel-headers-2.6.32-131.39.1.el6.s390x.rpm SHA-256: 28239eaa82d07d37ec8ed2721099ad0f4e792d66f723725d6bfc6913faea01f4
kernel-kdump-2.6.32-131.39.1.el6.s390x.rpm SHA-256: a30baceedd42a71ed318cd14d9d9801a5ffb5731b1438564b6d6941d4bb43db0
kernel-kdump-devel-2.6.32-131.39.1.el6.s390x.rpm SHA-256: 79d9446830aa1e9fc5eadbffa8de40b4077c7b62c9eed611a86c402395aae980
perf-2.6.32-131.39.1.el6.s390x.rpm SHA-256: decf6611388e13988d1b30d486fb62bd7c5cadfd6d917428e2d59e4774da6631

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
ppc64
kernel-2.6.32-131.39.1.el6.ppc64.rpm SHA-256: 501605906ef5f52c65e76cb95df7442084e5d960603a0da1c9a6386831004bf3
kernel-bootwrapper-2.6.32-131.39.1.el6.ppc64.rpm SHA-256: 2aa099023a15490b3ce527d05126a81d6f4c64a0f4e9ec57395a6248b10dd03d
kernel-debug-2.6.32-131.39.1.el6.ppc64.rpm SHA-256: 9ec85b60a27ae7c88e0e640d6edd995283792e147da80c42b164401b7e1b0c1c
kernel-debug-devel-2.6.32-131.39.1.el6.ppc64.rpm SHA-256: 3a2b8e0febf4ceec908f3c252798f4ce936cdadcca3a9c2aa27f923d7a16d80c
kernel-devel-2.6.32-131.39.1.el6.ppc64.rpm SHA-256: 6004338aa90e69b6a35b186b672f4f3edc8b7cc1f9437b277b72c20bc96b87b3
kernel-doc-2.6.32-131.39.1.el6.noarch.rpm SHA-256: 787fca24d65e5cece244a6a77d61bf1943160fb349b03d86a0b10718f9835d28
kernel-firmware-2.6.32-131.39.1.el6.noarch.rpm SHA-256: d1d02dd6539f17543239834ceb160804676880648c872d847684089f74306028
kernel-headers-2.6.32-131.39.1.el6.ppc64.rpm SHA-256: 95d9aa666edd4209e7acf40453ff2b2da8e9ee2c5c2330736887d1a6b202c884
perf-2.6.32-131.39.1.el6.ppc64.rpm SHA-256: 5549327fb2f72e36bbca3534e63defd68af16a6170523e37bd860bfa0fd278eb

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
kernel-2.6.32-131.39.1.el6.src.rpm SHA-256: 5098a8ae90a0a93a57c4ccfec2276c87edaced73b063c82ca8a8f7bdb3d89ebe
x86_64
kernel-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 1854b10511abba281482748d72b59f6dfea5e0a0999ee9d275ddd9c592fbcdc2
kernel-debug-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: cbf180e52034b6c4df2d63574e8c40f6aedb996a785b203b1bbe62ef556caeb0
kernel-debug-debuginfo-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 98a1913f150dd33e7754b4f8d28e6acc8fe1b6e92dc9fb472b188c54dadc72d1
kernel-debug-devel-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 2cf285ed0c98114f264a97f31312c0f14182004959900d69a24b034d33f10886
kernel-debuginfo-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: ca864fafd05f5490b2a0498a2040fe02bb23a0e22f6db80fd379130a540ed674
kernel-debuginfo-common-x86_64-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 570fd60506af823638e607a35cf723e2d5d8162977ff0f84b3d6dfd79c7d0da7
kernel-devel-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 8eb4cda334b92fe48949e2a5fafe50a3350804eeb826a7c93904fecbd15cf8e4
kernel-doc-2.6.32-131.39.1.el6.noarch.rpm SHA-256: 787fca24d65e5cece244a6a77d61bf1943160fb349b03d86a0b10718f9835d28
kernel-firmware-2.6.32-131.39.1.el6.noarch.rpm SHA-256: d1d02dd6539f17543239834ceb160804676880648c872d847684089f74306028
kernel-headers-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 533b0fd213dedb7e9f4e6920c6e89b1fa5ab3c8761f27e9932e1b5daf732e01a
perf-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: ba6c0993f373161d6daec2d5d9c397a643bde6f31b3dde160afc47bceaf6d519
perf-debuginfo-2.6.32-131.39.1.el6.x86_64.rpm SHA-256: 9bed10c1fcfd6ff7f7b11d7209585250c0d7d31fe8c4a5d028320daee3d4aef5
i386
kernel-2.6.32-131.39.1.el6.i686.rpm SHA-256: b066073ebdc30f6b734704b7ebf2c24e722461aa44735a30235ca3c58f29785d
kernel-debug-2.6.32-131.39.1.el6.i686.rpm SHA-256: 20b7e08e0525f7f1f00449a450c5030aa14cb84babdbc914a84ff47819ff5b0c
kernel-debug-debuginfo-2.6.32-131.39.1.el6.i686.rpm SHA-256: 3fef2347172e3c1964150005e3b35afd7bb559d6c9dec4335fb7ff29def58195
kernel-debug-devel-2.6.32-131.39.1.el6.i686.rpm SHA-256: f578f539f7c2dcf6b8b4076c68b9d16d1a839dd6f0420305b25f0205e6b713e2
kernel-debuginfo-2.6.32-131.39.1.el6.i686.rpm SHA-256: 7208461ab11abaa8e175e16636a76ad5171dd2c51aba4ef2ae53592b389729ee
kernel-debuginfo-common-i686-2.6.32-131.39.1.el6.i686.rpm SHA-256: c409a1e577af6815f92174cec877f2d56d80d62eb2b036be6ecf6681fac2c6e2
kernel-devel-2.6.32-131.39.1.el6.i686.rpm SHA-256: 7e878de7b2be336fed62217e2ec404b61fcd9f014d02b14e8ba03b103e4d63fe
kernel-doc-2.6.32-131.39.1.el6.noarch.rpm SHA-256: 787fca24d65e5cece244a6a77d61bf1943160fb349b03d86a0b10718f9835d28
kernel-firmware-2.6.32-131.39.1.el6.noarch.rpm SHA-256: d1d02dd6539f17543239834ceb160804676880648c872d847684089f74306028
kernel-headers-2.6.32-131.39.1.el6.i686.rpm SHA-256: aab1d0fa19ac54b4fcebc120649295fcbdf042563e267374d2a0eca4af1c84d7
perf-2.6.32-131.39.1.el6.i686.rpm SHA-256: 7f18b260bf40eac838eb0228a1e6fd1cd794a84cc23a887170dcf0d10dc16fcc
perf-debuginfo-2.6.32-131.39.1.el6.i686.rpm SHA-256: 9e727042f23a5e8f98beaa88e8d0d05b7d2b9e005495f83aaaa9a44c88bbd656

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
x86_64

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility