First published: Tue Nov 18 2014(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> A NULL pointer dereference flaw was found in the way the Linux kernel's</li> Stream Control Transmission Protocol (SCTP) implementation handled<br>simultaneous connections between the same hosts. A remote attacker could<br>use this flaw to crash the system. (CVE-2014-5077, Important)<br>This update also fixes the following bug:<br><li> This update fixes several race conditions between PCI error recovery</li> callbacks and potential calls of the ifup and ifdown commands in the tg3<br>driver. When triggered, these race conditions could cause a kernel crash.<br>(BZ#1142568)<br>All kernel users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. The system must be<br>rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debug | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debug-devel | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-devel | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-doc | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-firmware | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-headers | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/perf | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/perf-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/python-perf | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debug | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debug-devel | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-devel | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-headers | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/perf | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/perf-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/python-perf | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-kdump | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-358.51.1.el6 | 2.6.32-358.51.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:1872 is classified as important according to Red Hat's security updates classification.
To fix RHSA-2014:1872, update your kernel to version 2.6.32-358.51.1.el6.
The impact of RHSA-2014:1872 includes a NULL pointer dereference flaw found in the SCTP implementation of the Linux kernel.
RHSA-2014:1872 affects various kernel packages, including kernel, kernel-debug, and kernel-devel versions prior to 2.6.32-358.51.1.el6.
There are no specific workarounds mentioned for RHSA-2014:1872 other than applying the relevant kernel update.