- Home
- CVEs with nessus.description==From+Red+Hat+Security+Advisory+2015%3A1623+%3A%0A%0AUpdated+kernel+packages+that+fix+two+security+issues+and+several+bugs+are+now+available+for+Red+Hat+Enterprise+Linux+6.%0A%0ARed+Hat+Product+Security+has+rated+this+update+as+having+Important+security+impact.+Common+Vulnerability+Scoring+System+%28CVSS%29+base+scores%2C+which+give+detailed+severity+ratings%2C+are+available+for+each+vulnerability+from+the+CVE+links+in+the+References+section.%0A%0A%5BUpdated+3+September+2015%5D+This+advisory+has+been+updated+to+push+packages+into+the+Red+Hat+Enterprise+Linux+6+Client+channels.+The+packages+included+in+this+revised+update+have+not+been+changed+in+any+way+from+the+packages+included+in+the+original+advisory.%0A%0AThe+kernel+packages+contain+the+Linux+kernel%2C+the+core+of+any+Linux+operating+system.%0A%0ATwo+flaws+were+found+in+the+way+the+Linux+kernel%27s+networking+implementation+handled+UDP+packets+with+incorrect+checksum+values.+A+remote+attacker+could+potentially+use+these+flaws+to+trigger+an+infinite+loop+in+the+kernel%2C+resulting+in+a+denial+of+service+on+the+system%2C+or+cause+a+denial+of+service+in+applications+using+the+edge+triggered+epoll+functionality.+%28CVE-2015-5364%2C+CVE-2015-5366%2C+Important%29%0A%0AThis+update+also+fixes+the+following+bugs+%3A%0A%0A%2A+When+removing+a+directory%2C+and+a+reference+was+held+to+that+directory+by+a+reference+to+a+negative+child+dentry%2C+the+directory+dentry+was+previously+not+killed.+In+addition%2C+once+the+negative+child+dentry+was+killed%2C+an+unlinked+and+unused+dentry+was+present+in+the+cache.+As+a+consequence%2C+deadlock+could+be+caused+by+forcing+the+dentry+eviction+while+the+file+system+in+question+was+frozen.+With+this+update%2C+all+unused+dentries+are+unhashed+and+evicted+just+after+a+successful+directory+removal%2C+which+avoids+the+deadlock%2C+and+the+system+no+longer+hangs+in+the+aforementioned+scenario.+%28BZ%231243400%29%0A%0A%2A+Due+to+the+broken+s_umount+lock+ordering%2C+a+race+condition+occurred+when+an+unlinked+file+was+closed+and+the+sync+%28or+syncfs%29+utility+was+run+at+the+same+time.+As+a+consequence%2C+deadlock+occurred+on+a+frozen+file+system+between+sync+and+a+process+trying+to+unfreeze+the+file+system.+With+this+update%2C+sync+%28or+syncfs%29+is+skipped+on+a+frozen+file+system%2C+and+deadlock+no+longer+occurs+in+the+aforementioned+situation.%0A%28BZ%231243404%29%0A%0A%2A+Previously%2C+in+the+scenario+when+a+file+was+opened+by+file+handle+%28fhandle%29+with+its+dentry+not+present+in+dcache+%28%27cold+dcache%27%29+and+then+making+use+of+the+unlink%28%29+and+close%28%29+functions%2C+the+inode+was+not+freed+upon+the+close%28%29+system+call.+As+a+consequence%2C+the+iput%28%29+final+was+delayed+indefinitely.+A+patch+has+been+provided+to+fix+this+bug%2C+and+the+inode+is+now+freed+as+expected.+%28BZ%231243406%29%0A%0A%2A+Due+to+a+corrupted+Executable+and+Linkable+Format+%28ELF%29+header+in+the+%2Fproc%2Fvmcore+file%2C+the+kdump+utility+failed+to+provide+any+information.+The+underlying+source+code+has+been+patched%2C+and+kdump+now+provides+debuging+information+for+kernel+crashes+as+intended.%0A%28BZ%231245195%29%0A%0A%2A+Previously%2C+running+the+multipath+request+queue+caused+regressions+in+cases+where+paths+failed+regularly+under+I%2FO+load.+This+regression+manifested+as+I%2FO+stalls+that+exceeded+300+seconds.+This+update+reverts+the+changes+aimed+to+reduce+running+the+multipath+request+queue+resulting+in+I%2FO+completing+in+a+timely+manner.+%28BZ%231246095%29%0A%0AAll+kernel+users+are+advised+to+upgrade+to+these+updated+packages%2C+which+contain+backported+patches+to+correct+these+issues.+The+system+must+be+rebooted+for+this+update+to+take+effect
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top