First published: Tue May 24 2016(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux operating system.<br>Security Fix(es):<br><li> Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important)</li> Bug Fix(es):<br><li> In anon_vma data structure, the degree counts number of child anon_vmas and of VMAs that point to this anon_vma. In the unlink_anon_vma() function, when its list is empty, anon_vma is going to be freed whether the external refcount is zero or not, so the parent's degree should be decremented. However, failure to decrement the degree triggered a BUG_ON() signal in unlink_anon_vma(). The provided patch fixes this bug, and the degree is now decremented as expected. (BZ#1326027)</li> Enhancement(s):<br><li> The ixgbe NIC driver has been upgraded to upstream version 4.2.1, which provides a number of bug fixes and enhancements over the previous version. Notably:</li> NULL pointer crashes related to VLAN support have been fixed<br>Two more devices from the Intel X550 Ethernet controller family are now supported: IDs 15AC and 15AD<br>Several PHY-related problems have been addressed: link disruptions and link flapping<br>Added PHY-related support for Intel X550<br>System performance has been improved<br>(BZ#1315702)
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-abi-whitelists | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debug | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debug-devel | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debug-devel | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-devel | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-doc | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-firmware | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-headers | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/perf | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/perf-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/perf-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/python-perf | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debug | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-devel | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-headers | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/perf | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/python-perf | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-kdump | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-504.49.1.el6 | 2.6.32-504.49.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.