An update for kernel is now available for Red Hat Enterprise Linux 6.5 AdvancedUpdate Support.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* Two flaws were found in the way the Linux kernel’s networking implementationhandled UDP packets with incorrect checksum values. A remote attacker couldpotentially use these flaws to trigger an infinite loop in the kernel, resultingin a denial of service on the system, or cause a denial of service inapplications using the edge triggered epoll functionality. (CVE-2015-5364,CVE-2015-5366, Important)Bug Fix(es):* At a process or thread exit, when the Linux kernel undoes any SysV semaphoreoperations done previously (ones done using semop with the SEM_UNDO flag), therewas a possible race condition with another process or thread removing the samesemaphore set where the operations occurred, leading to a possible use ofin-kernel-freed memory and then to possible unpredictable behavior. This bugcould be noticed with software which uses IPC SysV semaphores, such as IBM DB2,which could in certain cases have some of its processes or utilities getincorrectly stalled in an IPC semaphore operation or system call after the racecondition happened. A patch has been provided to fix this bug, and the kernelnow behaves as expected in the aforementioned scenario. (BZ#1326343)
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
kernel-2.6.32-431.72.1.el6.src.rpm
    MD5: f28da237a23f9520e8251d80ae208537SHA-256: 954a57290ea973008a7bc007366f1e8a516190e19099954012a1f7661ed19ad1
 
x86_64:
kernel-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: f0054fed510687f9e6aa926af52f0488SHA-256: 9f876aaed9f96415006e6b743ed52beac7e06e4b5c455ba0a7ee6dc204ced54b
kernel-abi-whitelists-2.6.32-431.72.1.el6.noarch.rpm
    MD5: 6f3a7a6a57405f05b27c44c53f25d551SHA-256: a3cb2e50f6d0423d71426ee58224d6271f4c98b94006fb204ec7b55037eb104e
kernel-debug-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 3827e6723733e6bba857a8f9b372e225SHA-256: 98d7201511cca63b4af1488826f1752dde254084d085bc019e5f71432d69af33
kernel-debug-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 94452c7fc65adf66e204f7abf4bcb38bSHA-256: 47f0d642797ac6628c27856afa4c56c762eecaf2898389b3a46c80e265b9427f
kernel-debug-devel-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 9a15e4d7895802d740445b1aadd960f3SHA-256: 44d45d59c0495aa0f41aea892e74dfe584d58bac0b9c14e42aed9f13d31599db
kernel-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: ee373a2ed32951725214a4a9efd662afSHA-256: 1b026f11c2b8ef7b726e58d3d3c0c72ed809731feacc51950aa40be691cccb89
kernel-debuginfo-common-x86_64-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 454d2b368e3835bb70b2d6abebb5be44SHA-256: 4fd14a7928a41ed22cc3f5d47a9364858c928324a30cfed25a4b37ebc5a57774
kernel-devel-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 9ef22d950d04c7e73e085fc0c6e080d8SHA-256: 2ff1afabe1e8103368d607c1edc81a8c3b83ae9b314e6566441227abb2616b66
kernel-doc-2.6.32-431.72.1.el6.noarch.rpm
    MD5: 658bab6cc347b34f95a92c726bbc8af7SHA-256: bc92fe0a236fef9a4262c05953c9f585ffc5d5f357b4c72dfd44179608ace560
kernel-firmware-2.6.32-431.72.1.el6.noarch.rpm
    MD5: 7652e10d198707c79db54f57adae21c7SHA-256: b22839b905bfd7df036afadeacd41d9569603192091c0a69731de423f9ccc742
kernel-headers-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 0edc3f06cd4ee842e5bec8336b32457aSHA-256: 321093f0cc5c925aecf4e75e89b563303d641cc434fad0a2f9739296061e118b
perf-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 9f3f3c1b27d90fccfeee162e1ffb1fa2SHA-256: 15505c8a8c667ff1ea4e7409fab01678915a25a64c2f1a44253c254e289e8cdb
perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 02ad9f3e0ab77abb2a9e385839a6ff97SHA-256: c4940315196136b2fafce81ef6c811e6ab016b3ce3b68cabb59cc0996616e0ef
python-perf-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 62b0af59f8d1ef3e1929662b0205645fSHA-256: f8823cb9a4c1d5d1ef80c7ed273a7a9434749347e5f427fa2705fd48325b801b
python-perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm
    MD5: 5e6840dff2586855b286137ceb9ec3e4SHA-256: f4136fd72b83c265e0d1da9389e95f665dd1b4f9566f9bca5f4e2c062fdeee35
 
(The unlinked packages above are only available from the Red Hat Network)

1239029 – CVE-2015-5366 CVE-2015-5364 kernel: net: incorrect processing of checksums in UDP implementation

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply