Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:1190 - Security Advisory
Issued:
2015-06-25
Updated:
2015-06-25

RHSA-2015:1190 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 5.6 Long Life.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • It was found that the Linux kernel's implementation of vectored pipe read

and write functionality did not take into account the I/O vectors that were
already processed when retrying after a failed atomic access operation,
potentially resulting in memory corruption due to an I/O vector array
overrun. A local, unprivileged user could use this flaw to crash the system
or, potentially, escalate their privileges on the system. (CVE-2015-1805,
Important)

The security impact of this issue was discovered by Red Hat.

This update also fixes the following bug:

  • Previously, the signal delivery paths did not clear the TS_USEDFPU flag,

which could cause problems in the switch_to() function and lead to
floating-point unit (FPU) corruption. With this update, TS_USEDFPU is
cleared as expected, and FPU is no longer under threat of corruption.
(BZ#1214237)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386

Fixes

  • BZ - 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption

CVEs

  • CVE-2015-1805

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.56.1.el5.src.rpm SHA-256: 5bf20a68f11a5a9641720f2cda0dc8a2ddbc6b4a1a0ed0424f209ecb670c3f2c
x86_64
kernel-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 57cb9869de7ccb9525d3b642dab8b5ccd3725cb62f888e71b398f790753e3bd9
kernel-debug-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 4737e27557f6a5c22173e695cd636d203a18be9f244781fcd95b2406a69ac64e
kernel-debug-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: fdabb981d88e4f8c46733488bcf0f7ad470b938d29f1294bc6a091086a7e3fe5
kernel-debug-devel-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: cc63d69f6d0ddb3e4b81e32615451f3bdbb2880c94c9d07b6c0e7f292e19cdf2
kernel-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 6b63efa04db975566913f32b5bda61f9282e5cd13c7c4fc45e2d1fcbe5547ebf
kernel-debuginfo-common-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 17dc4597b81a26bafeafb11db70a16bd7daa153e682beba70b4859c523c1fe68
kernel-devel-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: fead6a716a04da1675126891949b17d3e184914596e877b4fac3139c6d1728d8
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm SHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: bbc7069ec83f1c8e6fd09d8d1200dfd176b903e451a6302be60dd353dbd25bed
kernel-xen-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: ca2d55807a06535fb34af6d62a07ea69c4b8e524856ff4ed6b1ded3d824c720e
kernel-xen-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 48af75b116f8b88e38d894bd964d5f25886df0fcd02e2ce419d89cfb3e1a2135
kernel-xen-devel-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 230f9cf1aab926d69a43f09b34cae0069ab1a168235e350e27ce7f63ca828f28
ia64
kernel-2.6.18-238.56.1.el5.ia64.rpm SHA-256: f518cdc9f089ee98d3ade3868c3a7315ac8dc9897113edcc3200151bb26a56c3
kernel-debug-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 4fced25b74f3791c9086f6b51045a5c890cb7f02701183e3413bc065f7062c9e
kernel-debug-debuginfo-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 1f88dae112cef03eed9a811da21fc0ec2dbc174c004fd57076ac3d78c515f2e9
kernel-debug-devel-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 32ec184beb1eed57ecc8311aaafba3b159d3e5906a40dfa040f7a378b4a1795c
kernel-debuginfo-2.6.18-238.56.1.el5.ia64.rpm SHA-256: e58fd73481db3a61f0c0c8285f92a35194444b5d194ec92d852c00ed58cc6e4c
kernel-debuginfo-common-2.6.18-238.56.1.el5.ia64.rpm SHA-256: d13d380791260021395d810200c4c76377c023ce53fffc3a6e1c9da327646423
kernel-devel-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 2592b39154be0448bb3c02e8c3a4fd653c25d8315cb1b088ab6d347e2061f190
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm SHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 3a77b6ae0a8b2b0cd3858bf0e061cc91fd685c6a4435fc78f82c67c01dd8a2d9
kernel-xen-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 30b976c91146a1bd005acb0135b749d7e1207fdab9f995ed7319d7a5b978e7f2
kernel-xen-debuginfo-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 3a925634040f12e6dc7f8ff50d9b53c16e4ad3216453e060ae8f8fa8c4eaeaed
kernel-xen-devel-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 74abc660581a38c0553353ae69070e28e1b055999183d77a9788c0f730b0051c
i386
kernel-2.6.18-238.56.1.el5.i686.rpm SHA-256: 0174ac866a764c3d499844411d45ab7c5eb13b02044e4718c27bd6809c224493
kernel-PAE-2.6.18-238.56.1.el5.i686.rpm SHA-256: 78b8e3ce3322918874817060cf550ad991878f8c55a0f3617075d01f8bde8323
kernel-PAE-debuginfo-2.6.18-238.56.1.el5.i686.rpm SHA-256: ec817440939446477f67a4f5de8461dda270449e640fe5ec74b5e98e11d8d9bb
kernel-PAE-devel-2.6.18-238.56.1.el5.i686.rpm SHA-256: e5f48deaa9463f7c31814346580ed7f79632195a4a84e20354c871f3c80adbbd
kernel-debug-2.6.18-238.56.1.el5.i686.rpm SHA-256: cf9bad56b79a0f10452ff7cb4f89a1badb8239e663b2259618b9c41eebd2188a
kernel-debug-debuginfo-2.6.18-238.56.1.el5.i686.rpm SHA-256: f6f27b0ade14ae17d733d47aa7af7b184b9a91041a13bded0119e584308c39ea
kernel-debug-devel-2.6.18-238.56.1.el5.i686.rpm SHA-256: 6486dba811ed0109636517bf40ba01e0549972cd52e531a205e57c059689dcea
kernel-debuginfo-2.6.18-238.56.1.el5.i686.rpm SHA-256: 797aa50b7afc7977b1510b9f7d1bcaa8b3273ce96254084c5ccda399331f6d78
kernel-debuginfo-common-2.6.18-238.56.1.el5.i686.rpm SHA-256: 14dd1eff0a0d2a77c66af97e5b90033aa8d0c03fb430591b7fa1ccc1902689bb
kernel-devel-2.6.18-238.56.1.el5.i686.rpm SHA-256: fa80db5d6db361fffe3d12600ed737c81a1e49ff655aeca4134b14fa3747baa6
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm SHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.i386.rpm SHA-256: 10cab296f2a47fda5777861320983101f523f67cd8e03c0a0992d2b754671548
kernel-xen-2.6.18-238.56.1.el5.i686.rpm SHA-256: f0d4ef5ae5212011c3959e8d5ebbc599ffdba3d3fb5b90c2015e87069d9fa6b6
kernel-xen-debuginfo-2.6.18-238.56.1.el5.i686.rpm SHA-256: 64047b695c7da90c217496e398237a06539f46ae43b2a81c4888e50c0a7b8167
kernel-xen-devel-2.6.18-238.56.1.el5.i686.rpm SHA-256: 63e0a493fd8b0897a803f13e80ecb6349a93c30efd6be568f8f45fc6bb14d5f1

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility