First published: Tue Dec 15 2015(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br><li> It was found that the x86 ISA (Instruction Set Architecture) is prone to</li> a denial of service attack inside a virtualized environment in the form of<br>an infinite loop in the microcode due to the way (sequential) delivering of<br>benign exceptions such as #AC (alignment check exception) and #DB (debug<br>exception) is handled. A privileged user inside a guest could use these<br>flaws to create denial of service conditions on the host kernel.<br>(CVE-2015-5307, CVE-2015-8104, Important)<br>Red Hat would like to thank Ben Serebrin of Google Inc. for reporting the<br>CVE-2015-5307 issue.<br>This update also fixes the following bugs:<br><li> With an IPv6 address on a bond and a slave failover, Unsolicited Neighbor</li> Advertisement (UNA) was previously sent using the link global IPv6 address<br>as source address. The underlying source code has been patched, and, after<br>the failover in bonding, UNA is sent using both the corresponding link IPv6<br>address and global IPv6 address of bond0 and bond0.vlan. (BZ#1258479)<br><li> Previously, Human Interface Device (HID) would run a report on an</li> unaligned buffer, which could cause a page fault interrupt and an oops when<br>the end of the report was read. This update fixes this bug by padding the<br>end of the report with extra bytes, so the reading of the report never<br>crosses a page boundary. As a result, a page fault and subsequent oops no<br>longer occur. (BZ#1268201)<br>All kernel users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. The system must be<br>rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-abi-whitelists | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-debug | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-debug-devel | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-debuginfo | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-devel | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-doc | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-firmware | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/kernel-headers | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/perf | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/perf-debuginfo | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/python-perf | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-431.68.1.el6 | 2.6.32-431.68.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.