First published: Tue Jul 14 2015(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> A NULL pointer dereference flaw was found in the way the Linux kernel's</li> virtual console implementation handled reference counting when accessing<br>pseudo-terminal device files (/dev/pts/*). A local, unprivileged attacker<br>could use this flaw to crash the system. (CVE-2011-5321, Moderate)<br><li> It was found that the Linux kernel's ping socket implementation did not</li> properly handle socket unhashing during spurious disconnects, which could<br>lead to a use-after-free flaw. On x86-64 architecture systems, a local user<br>able to create ping sockets could use this flaw to crash the system.<br>On non-x86-64 architecture systems, a local user able to create ping<br>sockets could use this flaw to escalate their privileges on the system.<br>(CVE-2015-3636, Moderate)<br><li> An integer overflow flaw was found in the way the Linux kernel randomized</li> the stack for processes on certain 64-bit architecture systems, such as<br>x86-64, causing the stack entropy to be reduced by four. (CVE-2015-1593,<br>Low)<br><li> A flaw was found in the way the Linux kernel's 32-bit emulation</li> implementation handled forking or closing of a task with an 'int80' entry.<br>A local user could potentially use this flaw to escalate their privileges<br>on the system. (CVE-2015-2830, Low)<br><li> It was found that the Linux kernel's TCP/IP protocol suite implementation</li> for IPv6 allowed the Hop Limit value to be set to a smaller value than the<br>default one. An attacker on a local network could use this flaw to prevent<br>systems on that network from sending or receiving network packets.<br>(CVE-2015-2922, Low)<br>These updated kernel packages also include numerous bug fixes and one<br>enhancement. Space precludes documenting all of these changes in this<br>advisory. For information on the most significant of these changes, users<br>are directed to the following article on the Red Hat Customer Portal:<br><a href="https://access.redhat.com/articles/1506133" target="_blank">https://access.redhat.com/articles/1506133</a> All kernel users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues and add this<br>enhancement. The system must be rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-abi-whitelists | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debug | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debug-devel | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-devel | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-doc | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-firmware | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-headers | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/perf | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/perf-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/python-perf | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/python-perf-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debug | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debug-devel | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-devel | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-headers | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/perf | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/perf-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/python-perf | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/python-perf-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-kdump | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-kdump-devel | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-bootwrapper | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-504.30.3.el6 | 2.6.32-504.30.3.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.