Oval Definition:oval:com.redhat.rhsa:def:20150803
Revision Date:2015-04-14Version:601
Title:RHSA-2015:0803: kernel security and bug fix update (Important)
Description:The kernel packages contain the Linux kernel, the core of any Linuxoperating system.
  • It was found that the Linux kernel's Infiniband subsystem did notproperly sanitize input parameters while registering memory regions fromuser space via the (u)verbs API. A local user with access to a/dev/infiniband/uverbsX device could use this flaw to crash the system or,potentially, escalate their privileges on the system. (CVE-2014-8159,Important)
  • An integer overflow flaw was found in the way the Linux kernel's FrameBuffer device implementation mapped kernel memory to user space via themmap syscall. A local user able to access a frame buffer device file(/dev/fb*) could possibly use this flaw to escalate their privileges on thesystem. (CVE-2013-2596, Important)
  • It was found that the parse_rock_ridge_inode_internal() function of theLinux kernel's ISOFS implementation did not correctly check relocateddirectories when processing Rock Ridge child link (CL) tags. An attackerwith physical access to the system could use a specially crafted ISO imageto crash the system or, potentially, escalate their privileges on thesystem. (CVE-2014-5471, CVE-2014-5472, Low)Red Hat would like to thank Mellanox for reporting the CVE-2014-8159 issue.This update also fixes the following bugs:
  • The kernel could sometimes panic due to a possible division by zero inthe kernel scheduler. This bug has been fixed by defining a new div64_ul()division function and correcting the affected calculation in theproc_sched_show_task() function. (BZ#1199898)
  • When repeating a Coordinated Universal Time (UTC) value during a leapsecond (when the UTC time should be 23:59:60), the International AtomicTime (TAI) timescale previously stopped as the kernel NTP code incrementedthe TAI offset one second too late. A patch has been provided, which fixesthe bug by incrementing the offset during the leap second itself. Now, thecorrect TAI is set during the leap second. (BZ#1201672)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2013-2596
    CVE-2014-5471
    CVE-2014-5472
    CVE-2014-8159
    RHSA-2015:0803-00
    Platform(s):Red Hat Enterprise Linux 6.4 AUS - Server Only
    Product(s):
    Definition Synopsis
  • Release Information
  • Red Hat Enterprise Linux 6 Client is installed
  • OR Red Hat Enterprise Linux 6 Server is installed
  • OR Red Hat Enterprise Linux 6 Workstation is installed
  • OR Red Hat Enterprise Linux 6 ComputeNode is installed
  • AND Package Information
  • kernel is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-bootwrapper is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-bootwrapper is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-debug is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-debug is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-debug-devel is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-debug-devel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-devel is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-doc is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-doc is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-firmware is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-firmware is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-headers is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-headers is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-kdump is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-kdump is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-kdump-devel is earlier than 0:2.6.32-358.59.1.el6
  • AND kernel-kdump-devel is signed with Red Hat redhatrelease2 key
  • OR
  • perf is earlier than 0:2.6.32-358.59.1.el6
  • AND perf is signed with Red Hat redhatrelease2 key
  • OR
  • python-perf is earlier than 0:2.6.32-358.59.1.el6
  • AND python-perf is signed with Red Hat redhatrelease2 key
  • BACK