- Home
- CVEs with nessus.description==Updated+kernel-rt+packages+that+fix+multiple+security+issues%2C+several+bugs%2C+and+add+various+enhancements+are+now+available+for+Red+Hat+Enterprise+Linux+7.%0A%0ARed+Hat+Product+Security+has+rated+this+update+as+having+Important+security+impact.+Common+Vulnerability+Scoring+System+%28CVSS%29+base+scores%2C+which+give+detailed+severity+ratings%2C+are+available+for+each+vulnerability+from+the+CVE+links+in+the+References+section.%0A%0AThe+kernel-rt+packages+contain+the+Linux+kernel%2C+the+core+of+any+Linux+operating+system.%0A%0A%2A+Two+flaws+were+found+in+the+way+the+Linux+kernel%27s+networking+implementation+handled+UDP+packets+with+incorrect+checksum+values.+A+remote+attacker+could+potentially+use+these+flaws+to+trigger+an+infinite+loop+in+the+kernel%2C+resulting+in+a+denial+of+service+on+the+system%2C+or+cause+a+denial+of+service+in+applications+using+the+edge+triggered+epoll+functionality.+%28CVE-2015-5364%2C+CVE-2015-5366%2C+Important%29%0A%0A%2A+A+flaw+was+found+in+the+way+the+Linux+kernel%27s+ext4+file+system+handled+the+%27page+size+%3E+block+size%27+condition+when+the+fallocate+zero+range+functionality+was+used.+A+local+attacker+could+use+this+flaw+to+crash+the+system.+%28CVE-2015-0275%2C+Moderate%29%0A%0A%2A+It+was+found+that+the+Linux+kernel%27s+keyring+implementation+would+leak+memory+when+adding+a+key+to+a+keyring+via+the+add_key%28%29+function.%0AA+local+attacker+could+use+this+flaw+to+exhaust+all+available+memory+on+the+system.+%28CVE-2015-1333%2C+Moderate%29%0A%0A%2A+A+race+condition+flaw+was+found+in+the+way+the+Linux+kernel%27s+SCTP+implementation+handled+Address+Configuration+lists+when+performing+Address+Configuration+Change+%28ASCONF%29.+A+local+attacker+could+use+this+flaw+to+crash+the+system+via+a+race+condition+triggered+by+setting+certain+ASCONF+options+on+a+socket.+%28CVE-2015-3212%2C+Moderate%29%0A%0A%2A+An+information+leak+flaw+was+found+in+the+way+the+Linux+kernel%27s+Virtual+Dynamic+Shared+Object+%28vDSO%29+implementation+performed+address+randomization.+A+local%2C+unprivileged+user+could+use+this+flaw+to+leak+kernel+memory+addresses+to+user-space.+%28CVE-2014-9585%2C+Low%29%0A%0ARed+Hat+would+like+to+thank+Canonical+for+reporting+the+CVE-2015-1333+issue.+The+CVE-2015-0275+issue+was+discovered+by+Xiong+Zhou+of+Red+Hat%2C+and+the+CVE-2015-3212+issue+was+discovered+by+Ji+Jianwen+of+Red+Hat+Engineering.%0A%0AThis+update+provides+a+build+of+the+kernel-rt+package+for+Red+Hat+Enterprise+MRG+2.5+that+is+layered+on+Red+Hat+Enterprise+Linux+6%2C+and+fixes+the+following+issues+%3A%0A%0A%2A+Fix+regression+in+scsi_send_eh_cmnd%28%29%0A%0A%2A+boot+hangs+at+%27Console%3A+switching+to+colour+dummy+device+80x25%27%0A%0A%2A+Update+tcp+stack+to+3.17+kernel%0A%0A%2A+ksoftirqd+high+CPU+usage+due+to+stray+tasklet+from+ioatdma+driver%0A%0A%28BZ%231245345%29%0A%0AThis+update+also+fixes+the+following+bugs+%3A%0A%0A%2A+The+configuration+option+CONFIG_RTC_HCTOSYS+was+disabled+on+the+realtime+kernel+causing+the+RTC+clock+to+be+adjusted+with+the+UTC+time+even+if+the+system+is+configured+to+set+the+RTC+to+the+local+time.+By+enabling+the+CONFIG_RTC_HCTOSYS+configuration+option%2C+when+the+system+is+configured+to+use+local+time%2C+RTC+will+correctly+update+with+the+local+time+and+not+try+to+use+another+timezone.+%28BZ%231248047%29%0A%0A%2A+In+the+realtime+kernel%2C+if+a+rt_mutex+was+taken+while+in+interrupt+context+the+normal+priority+inheritance+protocol+would+falsely+identify+a+deadlock+and+trigger+a+kernel+crash.+The+patch+that+added+the+rt_mutex+in+this+interrupt+context+was+reverted.+%28BZ%231250649%29%0A%0AAll+kernel-rt+users+are+advised+to+upgrade+to+these+updated+packages%2C+which+correct+these+issues+and+add+these+enhancements.+The+system+must+be+rebooted+for+this+update+to+take+effect
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top