Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2015:1190 - Security Advisory
Issued:
2015-06-25
Updated:
2015-06-25

RHSA-2015:1190 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 5.6 Long Life.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • It was found that the Linux kernel's implementation of vectored pipe read

and write functionality did not take into account the I/O vectors that were
already processed when retrying after a failed atomic access operation,
potentially resulting in memory corruption due to an I/O vector array
overrun. A local, unprivileged user could use this flaw to crash the system
or, potentially, escalate their privileges on the system. (CVE-2015-1805,
Important)

The security impact of this issue was discovered by Red Hat.

This update also fixes the following bug:

  • Previously, the signal delivery paths did not clear the TS_USEDFPU flag,

which could cause problems in the switch_to() function and lead to
floating-point unit (FPU) corruption. With this update, TS_USEDFPU is
cleared as expected, and FPU is no longer under threat of corruption.
(BZ#1214237)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386

Fixes

  • BZ - 1202855 - CVE-2015-1805 kernel: pipe: iovec overrun leading to memory corruption

CVEs

  • CVE-2015-1805

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.56.1.el5.src.rpm SHA-256: 5bf20a68f11a5a9641720f2cda0dc8a2ddbc6b4a1a0ed0424f209ecb670c3f2c
x86_64
kernel-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 57cb9869de7ccb9525d3b642dab8b5ccd3725cb62f888e71b398f790753e3bd9
kernel-debug-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 4737e27557f6a5c22173e695cd636d203a18be9f244781fcd95b2406a69ac64e
kernel-debug-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: fdabb981d88e4f8c46733488bcf0f7ad470b938d29f1294bc6a091086a7e3fe5
kernel-debug-devel-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: cc63d69f6d0ddb3e4b81e32615451f3bdbb2880c94c9d07b6c0e7f292e19cdf2
kernel-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 6b63efa04db975566913f32b5bda61f9282e5cd13c7c4fc45e2d1fcbe5547ebf
kernel-debuginfo-common-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 17dc4597b81a26bafeafb11db70a16bd7daa153e682beba70b4859c523c1fe68
kernel-devel-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: fead6a716a04da1675126891949b17d3e184914596e877b4fac3139c6d1728d8
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm SHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: bbc7069ec83f1c8e6fd09d8d1200dfd176b903e451a6302be60dd353dbd25bed
kernel-xen-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: ca2d55807a06535fb34af6d62a07ea69c4b8e524856ff4ed6b1ded3d824c720e
kernel-xen-debuginfo-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 48af75b116f8b88e38d894bd964d5f25886df0fcd02e2ce419d89cfb3e1a2135
kernel-xen-devel-2.6.18-238.56.1.el5.x86_64.rpm SHA-256: 230f9cf1aab926d69a43f09b34cae0069ab1a168235e350e27ce7f63ca828f28
ia64
kernel-2.6.18-238.56.1.el5.ia64.rpm SHA-256: f518cdc9f089ee98d3ade3868c3a7315ac8dc9897113edcc3200151bb26a56c3
kernel-debug-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 4fced25b74f3791c9086f6b51045a5c890cb7f02701183e3413bc065f7062c9e
kernel-debug-debuginfo-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 1f88dae112cef03eed9a811da21fc0ec2dbc174c004fd57076ac3d78c515f2e9
kernel-debug-devel-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 32ec184beb1eed57ecc8311aaafba3b159d3e5906a40dfa040f7a378b4a1795c
kernel-debuginfo-2.6.18-238.56.1.el5.ia64.rpm SHA-256: e58fd73481db3a61f0c0c8285f92a35194444b5d194ec92d852c00ed58cc6e4c
kernel-debuginfo-common-2.6.18-238.56.1.el5.ia64.rpm SHA-256: d13d380791260021395d810200c4c76377c023ce53fffc3a6e1c9da327646423
kernel-devel-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 2592b39154be0448bb3c02e8c3a4fd653c25d8315cb1b088ab6d347e2061f190
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm SHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 3a77b6ae0a8b2b0cd3858bf0e061cc91fd685c6a4435fc78f82c67c01dd8a2d9
kernel-xen-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 30b976c91146a1bd005acb0135b749d7e1207fdab9f995ed7319d7a5b978e7f2
kernel-xen-debuginfo-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 3a925634040f12e6dc7f8ff50d9b53c16e4ad3216453e060ae8f8fa8c4eaeaed
kernel-xen-devel-2.6.18-238.56.1.el5.ia64.rpm SHA-256: 74abc660581a38c0553353ae69070e28e1b055999183d77a9788c0f730b0051c
i386
kernel-2.6.18-238.56.1.el5.i686.rpm SHA-256: 0174ac866a764c3d499844411d45ab7c5eb13b02044e4718c27bd6809c224493
kernel-PAE-2.6.18-238.56.1.el5.i686.rpm SHA-256: 78b8e3ce3322918874817060cf550ad991878f8c55a0f3617075d01f8bde8323
kernel-PAE-debuginfo-2.6.18-238.56.1.el5.i686.rpm SHA-256: ec817440939446477f67a4f5de8461dda270449e640fe5ec74b5e98e11d8d9bb
kernel-PAE-devel-2.6.18-238.56.1.el5.i686.rpm SHA-256: e5f48deaa9463f7c31814346580ed7f79632195a4a84e20354c871f3c80adbbd
kernel-debug-2.6.18-238.56.1.el5.i686.rpm SHA-256: cf9bad56b79a0f10452ff7cb4f89a1badb8239e663b2259618b9c41eebd2188a
kernel-debug-debuginfo-2.6.18-238.56.1.el5.i686.rpm SHA-256: f6f27b0ade14ae17d733d47aa7af7b184b9a91041a13bded0119e584308c39ea
kernel-debug-devel-2.6.18-238.56.1.el5.i686.rpm SHA-256: 6486dba811ed0109636517bf40ba01e0549972cd52e531a205e57c059689dcea
kernel-debuginfo-2.6.18-238.56.1.el5.i686.rpm SHA-256: 797aa50b7afc7977b1510b9f7d1bcaa8b3273ce96254084c5ccda399331f6d78
kernel-debuginfo-common-2.6.18-238.56.1.el5.i686.rpm SHA-256: 14dd1eff0a0d2a77c66af97e5b90033aa8d0c03fb430591b7fa1ccc1902689bb
kernel-devel-2.6.18-238.56.1.el5.i686.rpm SHA-256: fa80db5d6db361fffe3d12600ed737c81a1e49ff655aeca4134b14fa3747baa6
kernel-doc-2.6.18-238.56.1.el5.noarch.rpm SHA-256: 75941331cc802312d10c3de304b5668acc3cab1a83f7e209f7887e65a4d9e38f
kernel-headers-2.6.18-238.56.1.el5.i386.rpm SHA-256: 10cab296f2a47fda5777861320983101f523f67cd8e03c0a0992d2b754671548
kernel-xen-2.6.18-238.56.1.el5.i686.rpm SHA-256: f0d4ef5ae5212011c3959e8d5ebbc599ffdba3d3fb5b90c2015e87069d9fa6b6
kernel-xen-debuginfo-2.6.18-238.56.1.el5.i686.rpm SHA-256: 64047b695c7da90c217496e398237a06539f46ae43b2a81c4888e50c0a7b8167
kernel-xen-devel-2.6.18-238.56.1.el5.i686.rpm SHA-256: 63e0a493fd8b0897a803f13e80ecb6349a93c30efd6be568f8f45fc6bb14d5f1

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter