Oval Definition:oval:com.redhat.rhsa:def:20150727
Revision Date:2015-03-26Version:646
Title:RHSA-2015:0727: kernel-rt security and bug fix update (Important)
Description:The kernel-rt packages contain the Linux kernel, the core of any Linux operating system.

  • It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the (u)verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-8159, Important)

  • A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-1421, Important)

    Red Hat would like to thank Mellanox for reporting the CVE-2014-8159 issue. The CVE-2015-1421 issue was discovered by Sun Baoliang of Red Hat.

    The kernel-rt packages have been upgraded to version 3.10.0-229.1.2, which provides a number of bug fixes over the previous version, including:

    - The kdump service could become unresponsive due to a deadlock in the kernel call ioapic_lock.

    - Attempt to make metadata changes such as creating a thin device or snapshot thin device did not error out cleanly.

  • (BZ#1203359)

    All kernel-rt users are advised to upgrade to these updated packages, which correct these issues. The system must be rebooted for this update to take effect.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2014-8159
    CVE-2015-1421
    RHSA-2015:0727
    RHSA-2015:0727-00
    RHSA-2015:0727-02
    Platform(s):Red Hat Enterprise Linux 7
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • kernel-rt earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1 is currently running
  • OR kernel-rt earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1 is set to boot up on next boot
  • AND
  • kernel-rt is earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1
  • AND kernel-rt is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug is earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1
  • AND kernel-rt-debug is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-devel is earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1
  • AND kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-devel is earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1
  • AND kernel-rt-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-doc is earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1
  • AND kernel-rt-doc is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace is earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1
  • AND kernel-rt-trace is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace-devel is earlier than 0:3.10.0-229.1.2.rt56.141.2.el7_1
  • AND kernel-rt-trace-devel is signed with Red Hat redhatrelease2 key
  • BACK