Oval Definition:oval:com.redhat.rhsa:def:20151977
Revision Date:2015-11-03Version:637
Title:RHSA-2015:1977: kernel-rt security, bug fix, and enhancement update (Moderate)
Description:The kernel packages contain the Linux kernel, the core of any Linux operating system.

  • A flaw was found in the way the Linux kernel's VFS subsystem handled file system locks. A local, unprivileged user could use this flaw to trigger a deadlock in the kernel, causing a denial of service on the system. (CVE-2014-8559, Moderate)

  • A buffer overflow flaw was found in the way the Linux kernel's virtio-net subsystem handled certain fraglists when the GRO (Generic Receive Offload) functionality was enabled in a bridged network configuration. An attacker on the local network could potentially use this flaw to crash the system, or, although unlikely, elevate their privileges on the system. (CVE-2015-5156, Moderate)

    The CVE-2015-5156 issue was discovered by Jason Wang of Red Hat.

    The kernel-rt packages have been upgraded to version 3.10.0-229.20.1, which provides a number of bug fixes and enhancements over the previous version, including:

    Unexpected completion is detected on Intel Ethernet x540

    Divide by zero error in intel_pstate_timer_func() [ inline s64 div_s64_rem() ]

    NFS Recover from stateid-type error on SETATTR

    pNFS RHEL 7.1 Data Server connection remains after umount due to lseg refcount leak

    Race during NFS v4.0 recovery and standard IO.

    Fix ip6t_SYNPROXY for namespaces and connection delay

    synproxy window size and sequence number behaviour causes long connection delay

    Crash in kmem_cache_alloc() during disk stress testing (using ipr)

    xfs: sync/backport to upstream v4.1

    iscsi_session recovery_tmo revert back to default when a path becomes active

    read from MD raid1 can fail if read from resync target fails

    backport scsi-mq

    unable to handle kernel paging request at 0000000000237037 [zswap]

    (BZ#1266915)

    All kernel-rt users are advised to upgrade to these updated packages, which correct these issues and add this enhancement. The system must be rebooted for this update to take effect.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2014-8559
    CVE-2015-5156
    RHSA-2015:1977
    RHSA-2015:1977-00
    RHSA-2015:1977-01
    Platform(s):Red Hat Enterprise Linux 7
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • kernel-rt earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1 is currently running
  • OR kernel-rt earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1 is set to boot up on next boot
  • AND
  • kernel-rt is earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1
  • AND kernel-rt is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug is earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1
  • AND kernel-rt-debug is signed with Red Hat redhatrelease2 key
  • kernel-rt-debug-devel is earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1
  • AND kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-devel is earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1
  • AND kernel-rt-devel is signed with Red Hat redhatrelease2 key
  • kernel-rt-doc is earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1
  • AND kernel-rt-doc is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace is earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1
  • AND kernel-rt-trace is signed with Red Hat redhatrelease2 key
  • kernel-rt-trace-devel is earlier than 0:3.10.0-229.20.1.rt56.141.14.el7_1
  • AND kernel-rt-trace-devel is signed with Red Hat redhatrelease2 key
  • BACK