rhba-2012_0496
Vulnerability from csaf_redhat
Published
2012-04-18 20:01
Modified
2024-11-22 05:32
Summary
Red Hat Bug Fix Advisory: Red Hat Enterprise MRG Realtime 2.1 kernel bug fix update
Notes
Topic
Updated kernel-rt packages that fix several bugs are now available for Red Hat Enterprise MRG 2.1.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux operating system.
This update provides a build of the kernel-rt package for MRG 2.1, which is layered on Red Hat Enterprise Linux 6.
This update fixes the following bugs:
* Previously, while working with an open file, the epoll kernel code was calling poll operations of another open file without holding the file's lock. Consequently, a deadlock in the code could occur when using the system console. Now, an upstream patch to use the ep_poll_nested() function has been provided and the system console now works correctly in the described scenario. (BZ#675885)
* The i7core_edac code did multiple probes for the same hardware component. As a consequence, boot time error message about the code being unable to create a duplicate file in the /sys/devices/ directory was returned. With this update, duplicate probe code has been removed and the error messages are no longer returned in the described scenario. (BZ#773746)
* A previous Realtime work queue patch introduced a race conditions in the CPU hotplug code. Consequently, the system could become unresponsive in this code. This update reverts a few past updates to the work queue, which turned out to be unnecessary, and the hangs no longer occur in the described scenario. (BZ#787331)
* The CONFIG_CC_OPTIMIZE_FOR_SIZE configuration parameter, which was previously introduced to MRG Realtime, caused the gcc compiler to produce code prone to cache line bouncing. As a result, the kernel performance was decreased. This update turns off this parameter, thus improving cache utilization and performance. (BZ#796297)
* Previously, configuration files in MRG Realtime and Red Hat Enterprise Linux 6 were not synchronized regarding modules and built-ins. Consequently, the mkinitrd daemon failed to find code that was part of a module in Red Hat Enterprise Linux 6 but part of a built-in in MRG Realtime. Now, the configuration files have been synchronized between these two products and mkinitrd correctly finds and sets up kernel components such as kdump. (BZ#804119, BZ#756631)
Users of the Realtime capabilities of Red Hat Enterprise MRG 2.1, which is layered on Red Hat Enterprise Linux 6, are advised to upgrade to these updated packages, which fix these bugs. Note that the system must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix several bugs are now available for Red Hat Enterprise MRG 2.1.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux operating system.\n\nThis update provides a build of the kernel-rt package for MRG 2.1, which is layered on Red Hat Enterprise Linux 6.\n\nThis update fixes the following bugs:\n\n* Previously, while working with an open file, the epoll kernel code was calling poll operations of another open file without holding the file\u0027s lock. Consequently, a deadlock in the code could occur when using the system console. Now, an upstream patch to use the ep_poll_nested() function has been provided and the system console now works correctly in the described scenario. (BZ#675885)\n\n* The i7core_edac code did multiple probes for the same hardware component. As a consequence, boot time error message about the code being unable to create a duplicate file in the /sys/devices/ directory was returned. With this update, duplicate probe code has been removed and the error messages are no longer returned in the described scenario. (BZ#773746)\n\n* A previous Realtime work queue patch introduced a race conditions in the CPU hotplug code. Consequently, the system could become unresponsive in this code. This update reverts a few past updates to the work queue, which turned out to be unnecessary, and the hangs no longer occur in the described scenario. (BZ#787331)\n\n* The CONFIG_CC_OPTIMIZE_FOR_SIZE configuration parameter, which was previously introduced to MRG Realtime, caused the gcc compiler to produce code prone to cache line bouncing. As a result, the kernel performance was decreased. This update turns off this parameter, thus improving cache utilization and performance. (BZ#796297)\n\n* Previously, configuration files in MRG Realtime and Red Hat Enterprise Linux 6 were not synchronized regarding modules and built-ins. Consequently, the mkinitrd daemon failed to find code that was part of a module in Red Hat Enterprise Linux 6 but part of a built-in in MRG Realtime. Now, the configuration files have been synchronized between these two products and mkinitrd correctly finds and sets up kernel components such as kdump. (BZ#804119, BZ#756631)\n\nUsers of the Realtime capabilities of Red Hat Enterprise MRG 2.1, which is layered on Red Hat Enterprise Linux 6, are advised to upgrade to these updated packages, which fix these bugs. Note that the system must be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2012:0496", "url": "https://access.redhat.com/errata/RHBA-2012:0496" }, { "category": "external", "summary": "675885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675885" }, { "category": "external", "summary": "787331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787331" }, { "category": "external", "summary": "796297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796297" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhba-2012_0496.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat Enterprise MRG Realtime 2.1 kernel bug fix update", "tracking": { "current_release_date": "2024-11-22T05:32:05+00:00", "generator": { "date": "2024-11-22T05:32:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2012:0496", "initial_release_date": "2012-04-18T20:01:54+00:00", "revision_history": [ { "date": "2012-04-18T20:01:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-04-18T20:01:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:32:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.0.25-rt44.57.el6rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.0.25-rt44.57.el6rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch", "product": { "name": "kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch", "product_id": "kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.0.25-rt44.57.el6rt?arch=noarch" } } }, { "category": "product_version", "name": "kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch", "product": { "name": "kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch", "product_id": "kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.0.25-rt44.57.el6rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.0.25-rt44.57.el6rt.src", "product": { "name": "kernel-rt-0:3.0.25-rt44.57.el6rt.src", "product_id": "kernel-rt-0:3.0.25-rt44.57.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.0.25-rt44.57.el6rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.0.25-rt44.57.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-0:3.0.25-rt44.57.el6rt.src" }, "product_reference": "kernel-rt-0:3.0.25-rt44.57.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch" }, "product_reference": "kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Nelson Elhage" ] } ], "cve": "CVE-2011-1083", "discovery_date": "2011-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "681578" } ], "notes": [ { "category": "description", "text": "The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: excessive in kernel CPU consumption when creating large nested epoll structures", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affected the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. It was addressed in Red Hat Enterprise Linux 5 and 6 via RHSA-2012:0150 and RHSA-2012:0862 respectively. There is no plan to address this flaw in Red Hat Enterprise Linux 4. Future updates may address this issue in Red Hat Enterprise MRG.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-0:3.0.25-rt44.57.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1083" }, { "category": "external", "summary": "RHBZ#681578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1083", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1083" } ], "release_date": "2011-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-18T20:01:54+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-0:3.0.25-rt44.57.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2012:0496" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-0:3.0.25-rt44.57.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-0:3.0.25-rt44.57.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-0:3.0.25-rt44.57.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-0:3.0.25-rt44.57.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-0:3.0.25-rt44.57.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: excessive in kernel CPU consumption when creating large nested epoll structures" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.