6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
46.0%
CentOS Errata and Security Advisory CESA-2012:0052
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
Red Hat would like to thank JΓΌri Aedla for reporting this issue.
This update fixes the following bugs:
The RHSA-2011:1849 kernel update introduced a bug in the Linux kernel
scheduler, causing a βWARNING: at kernel/sched.c:5915 thread_returnβ
message and a call trace to be logged. This message was harmless, and was
not due to any system malfunctions or adverse behavior. With this update,
the WARN_ON_ONCE() call in the scheduler that caused this harmless message
has been removed. (BZ#768288)
The RHSA-2011:1530 kernel update introduced a regression in the way
the Linux kernel maps ELF headers for kernel modules into kernel memory.
If a third-party kernel module is compiled on a Red Hat Enterprise Linux
system with a kernel prior to RHSA-2011:1530, then loading that module on
a system with RHSA-2011:1530 kernel would result in corruption of one byte
in the memory reserved for the module. In some cases, this could prevent
the module from functioning correctly. (BZ#769595)
On some SMP systems the tsc may erroneously be marked as unstable during
early system boot or while the system is under heavy load. A βClocksource
tsc unstableβ message was logged when this occurred. As a result the system
would switch to the slower access, but higher precision HPET clock.
The βtsc=reliableβ kernel parameter is supposed to avoid this problem by
indicating that the system has a known good clock, however, the parameter
only affected run time checks. A fix has been put in to avoid the boot
time checks so that the TSC remains as the clock for the duration of
system runtime. (BZ#755867)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-January/080546.html
Affected packages:
kernel
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-firmware
kernel-headers
perf
python-perf
Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0052
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | kernel | <Β 2.6.32-220.4.1.el6 | kernel-2.6.32-220.4.1.el6.i686.rpm |
CentOS | 6 | i686 | kernel-debug | <Β 2.6.32-220.4.1.el6 | kernel-debug-2.6.32-220.4.1.el6.i686.rpm |
CentOS | 6 | i686 | kernel-debug-devel | <Β 2.6.32-220.4.1.el6 | kernel-debug-devel-2.6.32-220.4.1.el6.i686.rpm |
CentOS | 6 | i686 | kernel-devel | <Β 2.6.32-220.4.1.el6 | kernel-devel-2.6.32-220.4.1.el6.i686.rpm |
CentOS | 6 | noarch | kernel-doc | <Β 2.6.32-220.4.1.el6 | kernel-doc-2.6.32-220.4.1.el6.noarch.rpm |
CentOS | 6 | noarch | kernel-firmware | <Β 2.6.32-220.4.1.el6 | kernel-firmware-2.6.32-220.4.1.el6.noarch.rpm |
CentOS | 6 | i686 | kernel-headers | <Β 2.6.32-220.4.1.el6 | kernel-headers-2.6.32-220.4.1.el6.i686.rpm |
CentOS | 6 | i686 | perf | <Β 2.6.32-220.4.1.el6 | perf-2.6.32-220.4.1.el6.i686.rpm |
CentOS | 6 | i686 | python-perf | <Β 2.6.32-220.4.1.el6 | python-perf-2.6.32-220.4.1.el6.i686.rpm |
CentOS | 6 | x86_64 | kernel | <Β 2.6.32-220.4.1.el6 | kernel-2.6.32-220.4.1.el6.x86_64.rpm |