First published: Thu Mar 26 2015(Updated: )
The kernel-rt packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> It was found that the Linux kernel's Infiniband subsystem did not</li> properly sanitize input parameters while registering memory regions from<br>user space via the (u)verbs API. A local user with access to a<br>/dev/infiniband/uverbsX device could use this flaw to crash the system or,<br>potentially, escalate their privileges on the system. (CVE-2014-8159,<br>Important)<br><li> A use-after-free flaw was found in the way the Linux kernel's SCTP</li> implementation handled authentication key reference counting during INIT<br>collisions. A remote attacker could use this flaw to crash the system or,<br>potentially, escalate their privileges on the system. (CVE-2015-1421,<br>Important)<br>Red Hat would like to thank Mellanox for reporting the CVE-2014-8159 issue.<br>The CVE-2015-1421 issue was discovered by Sun Baoliang of Red Hat.<br>The kernel-rt packages have been upgraded to version 3.10.0-229.1.2, which<br>provides a number of bug fixes over the previous version, including:<br><li> The kdump service could become unresponsive due to a deadlock in the</li> kernel call ioapic_lock.<br><li> Attempt to make metadata changes such as creating a thin device or</li> snapshot thin device did not error out cleanly.<br>(BZ#1203359)<br>All kernel-rt users are advised to upgrade to these updated packages, which<br>correct these issues. The system must be rebooted for this update to take<br>effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-debug | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-debug-debuginfo | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-debug-devel | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-debuginfo | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-devel | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-doc | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-trace | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-trace-debuginfo | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel-rt-trace-devel | <3.10.0-229.1.2.rt56.141.2.el7_1 | 3.10.0-229.1.2.rt56.141.2.el7_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.