Oval Definition:oval:com.redhat.rhsa:def:20151211
Revision Date:2015-07-07Version:601
Title:RHSA-2015:1211: kernel security and bug fix update (Important)
Description:The kernel packages contain the Linux kernel, the core of any Linuxoperating system.
  • It was found that the Linux kernel's implementation of vectored pipe readand write functionality did not take into account the I/O vectors that werealready processed when retrying after a failed atomic access operation,potentially resulting in memory corruption due to an I/O vector arrayoverrun. A local, unprivileged user could use this flaw to crash the systemor, potentially, escalate their privileges on the system. (CVE-2015-1805,Important)The security impact of this issue was discovered by Red Hat.This update also fixes the following bugs:
  • The backlog data could previously not be consumed when theaudit_log_start() function was running even if audit_log_start() called thewait_for_auditd() function to consume it. As only auditd could consume thebacklog data, audit_log_start() terminated unexpectedly. Consequently, thesystem became unresponsive until the backlog timeout was up. With thisupdate, audit_log_start() no longer terminates and the system shuts downand reboots gracefully in a timely manner. (BZ#1140489)
  • Direct I/O writes extending a parallel file could previously race toupdate the size of the file. If the writes executed in the out-of-ordermanner, the file size could move backwards and push a previously completedwrite beyond EOF, causing it to be lost. With this update, file sizeupdates are always executed in appropriate order, thus fixing this bug.(BZ#1218497)All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2015-1805
    RHSA-2015:1211-00
    Platform(s):Red Hat Enterprise Linux 6.4 AUS - Server Only
    Product(s):
    Definition Synopsis
  • Release Information
  • Red Hat Enterprise Linux 6 Client is installed
  • OR Red Hat Enterprise Linux 6 Server is installed
  • OR Red Hat Enterprise Linux 6 Workstation is installed
  • OR Red Hat Enterprise Linux 6 ComputeNode is installed
  • AND Package Information
  • kernel is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-bootwrapper is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-bootwrapper is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-debug is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-debug is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-debug-devel is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-debug-devel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-devel is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-doc is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-doc is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-firmware is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-firmware is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-headers is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-headers is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-kdump is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-kdump is signed with Red Hat redhatrelease2 key
  • OR
  • kernel-kdump-devel is earlier than 0:2.6.32-358.62.1.el6
  • AND kernel-kdump-devel is signed with Red Hat redhatrelease2 key
  • OR
  • perf is earlier than 0:2.6.32-358.62.1.el6
  • AND perf is signed with Red Hat redhatrelease2 key
  • OR
  • python-perf is earlier than 0:2.6.32-358.62.1.el6
  • AND python-perf is signed with Red Hat redhatrelease2 key
  • BACK