First published: Wed Aug 12 2015(Updated: )
The kernel-rt packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> A flaw was found in the kernel's implementation of the Berkeley Packet</li> Filter (BPF). A local attacker could craft BPF code to crash the system by<br>creating a situation in which the JIT compiler would fail to correctly<br>optimize the JIT image on the last pass. This would lead to the CPU<br>executing instructions that were not part of the JIT code. (CVE-2015-4700,<br>Important)<br><li> Two flaws were found in the way the Linux kernel's networking</li> implementation handled UDP packets with incorrect checksum values. A remote<br>attacker could potentially use these flaws to trigger an infinite loop in<br>the kernel, resulting in a denial of service on the system, or cause a<br>denial of service in applications using the edge triggered epoll<br>functionality. (CVE-2015-5364, CVE-2015-5366, Important)<br><li> A flaw was found in the way the Linux kernel's ext4 file system handled</li> the "page size > block size" condition when the fallocate zero range<br>functionality was used. A local attacker could use this flaw to crash the<br>system. (CVE-2015-0275, Moderate)<br><li> It was found that the Linux kernel's keyring implementation would leak</li> memory when adding a key to a keyring via the add_key() function. A local<br>attacker could use this flaw to exhaust all available memory on the system.<br>(CVE-2015-1333, Moderate)<br><li> A race condition flaw was found in the way the Linux kernel's SCTP</li> implementation handled Address Configuration lists when performing Address<br>Configuration Change (ASCONF). A local attacker could use this flaw to<br>crash the system via a race condition triggered by setting certain ASCONF<br>options on a socket. (CVE-2015-3212, Moderate)<br><li> An information leak flaw was found in the way the Linux kernel's Virtual</li> Dynamic Shared Object (vDSO) implementation performed address<br>randomization. A local, unprivileged user could use this flaw to leak<br>kernel memory addresses to user-space. (CVE-2014-9585, Low)<br>Red Hat would like to thank Daniel Borkmann for reporting CVE-2015-4700,<br>and Canonical for reporting the CVE-2015-1333 issue. The CVE-2015-0275<br>issue was discovered by Xiong Zhou of Red Hat, and the CVE-2015-3212 issue<br>was discovered by Ji Jianwen of Red Hat Engineering.<br>The kernel-rt packages have been upgraded to version 3.10.0-229.13.1, which<br>provides a number of bug fixes and enhancements over the previous version,<br>including:<br><li> Fix regression in scsi_send_eh_cmnd()</li> <li> boot hangs at "Console: switching to colour dummy device 80x25"</li> <li> Update tcp stack to 3.17 kernel</li> <li> Missing some code from patch "(...) Fix VGA switcheroo problem related to</li> hotplug"<br><li> ksoftirqd high CPU usage due to stray tasklet from ioatdma driver</li> <li> During Live Partition Mobility (LPM) testing, RHEL 7.1 LPARs will crash</li> in kmem_cache_alloc<br>(BZ#1253809)<br>This update also fixes the following bug:<br><li> The hwlat_detector.ko module samples the clock and records any intervals</li> between reads that exceed a specified threshold. However, the module<br>previously tracked the maximum interval seen for the "inner" interval but<br>did not record when the "outer" interval was greater. A patch has been<br>applied to fix this bug, and hwlat_detector.ko now correctly records if the<br>outer interval is the maximal interval encountered during the run.<br>(BZ#1252365)<br>All kernel-rt users are advised to upgrade to these updated packages, which<br>correct these issues and add these enhancements. The system must be<br>rebooted for this update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-debug | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-debug-debuginfo | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-debug-devel | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-debuginfo | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-devel | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-doc | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-trace | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-trace-debuginfo | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
redhat/kernel-rt-trace-devel | <3.10.0-229.14.1.rt56.141.13.el7_1 | 3.10.0-229.14.1.rt56.141.13.el7_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.