Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:1564 - Security Advisory
Issued:
2015-08-05
Updated:
2015-08-05

RHSA-2015:1564 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel-rt security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel-rt packages that fix three security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise MRG
2.5.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.

  • An integer overflow flaw was found in the way the Linux kernel's

netfilter connection tracking implementation loaded extensions. An attacker
on a local network could potentially send a sequence of specially crafted
packets that would initiate the loading of a large number of extensions,
causing the targeted system in that network to crash. (CVE-2014-9715,
Moderate)

  • It was found that the Linux kernel's ping socket implementation did not

properly handle socket unhashing during spurious disconnects, which could
lead to a use-after-free flaw. On x86-64 architecture systems, a local user
able to create ping sockets could use this flaw to crash the system.
On non-x86-64 architecture systems, a local user able to create ping
sockets could use this flaw to escalate their privileges on the system.
(CVE-2015-3636, Moderate)

  • It was found that the Linux kernel's TCP/IP protocol suite implementation

for IPv6 allowed the Hop Limit value to be set to a smaller value than the
default one. An attacker on a local network could use this flaw to prevent
systems on that network from sending or receiving network packets.
(CVE-2015-2922, Low)

Red Hat would like to thank Nathan Hoad for reporting the CVE-2014-9715
issue.

This update provides a build of the kernel-rt package for Red Hat
Enterprise MRG 2.5 that is layered on Red Hat Enterprise Linux 6, and fixes
the following issues:

  • drbg: Add stdrng alias and increase priority
  • seqiv / eseqiv / chainiv: Move IV seeding into init function
  • ipv4: kABI fix for 0bbf87d backport
  • ipv4: Convert ipv4.ip_local_port_range to be per netns
  • libceph: tcp_nodelay support
  • ipr: Increase default adapter init stage change timeout
  • fix use-after-free bug in usb_hcd_unlink_urb()
  • libceph: fix double __remove_osd() problem
  • ext4: fix data corruption caused by unwritten and delayed extents
  • sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT
  • nfs: Fixing lease renewal (Benjamin Coddington)
  • control hard lockup detection default
  • Fix print-once on enable
  • watchdog: update watchdog_thresh properly and watchdog attributes

atomically

  • module: Call module notifier on failure after complete_formation()

(BZ#1230403)

This update also fixes the following bugs:

  • Non-standard usage of the functions write_seqcount_{begin,end}() were

used in NFSv4, which caused the realtime code to try to sleep while locks
were held and produced the "scheduling while atomic" messages. The code was
modified to use the functions __write_seqcount_{begin,end}() that do not
hold any locks removing the message and allowing correct execution.
(BZ#1225642)

  • Dracut in Red Hat Enterprise Linux 6 has a dependency on a module called

scsi_wait_scan that no longer exists on 3.x kernels. This caused the system
to display misleading messages at start-up when the obsoleted
scsi_wait_scan module was not found. To address this issue, MRG Realtime
provides a dummy scsi_wait_scan module so that the requirements for the
initramfs created by dracut are met and the boot messages are no longer
displayed. (BZ#1230403)

All kernel-rt users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements. The system must be
rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • MRG Realtime 2 x86_64

Fixes

  • BZ - 1203712 - CVE-2015-2922 kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements.
  • BZ - 1208684 - CVE-2014-9715 kernel: netfilter connection tracking extensions denial of service
  • BZ - 1218074 - CVE-2015-3636 kernel: ping sockets: use-after-free leading to local privilege escalation
  • BZ - 1230403 - RFE: update the 3.10 kernel-rt sources

CVEs

  • CVE-2015-2922
  • CVE-2015-3636
  • CVE-2014-9715

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

MRG Realtime 2

SRPM
kernel-rt-3.10.0-229.rt56.158.el6rt.src.rpm SHA-256: 142d6b951b3812efd9f64d2ef6b65f16e5819d8dc4db1d6789f1b8e6a4250f86
x86_64
kernel-rt-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 3021940207a1817fb4f80a5065a296c37b537d5974cb7c6f8652eaaab99b7dfd
kernel-rt-debug-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: a8a4c60aa0238dd007110b11c35f11a6435a6ee116a7b17f2537e7b99b4d2919
kernel-rt-debug-debuginfo-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 4667bf5b2096d223fa19be4a4d73c3e3eabd151a4cb498d103a8c63b5a81017b
kernel-rt-debug-devel-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 4deb3443a1ff0d6f1bb0322ccdf7698c1b392cdaf95aec3bf7be715d232f25aa
kernel-rt-debuginfo-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 84bccee71c8c3aced6e602f5abf07b4f4cfb5076597a8d3fd0b3ff3f18d0c33d
kernel-rt-debuginfo-common-x86_64-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 9d7d31d390417b827c78c789ea2f908df0d05ce281fad3d663bcf3aa68e0c988
kernel-rt-devel-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 4065a2c24af305aede8dc7f445571cd9c4811ed5afc4bc57b8e2c43721760c65
kernel-rt-doc-3.10.0-229.rt56.158.el6rt.noarch.rpm SHA-256: a301e38b3e1275583908580b9794ee032e3b2423d2307b5b24e6bbb1ef85e859
kernel-rt-firmware-3.10.0-229.rt56.158.el6rt.noarch.rpm SHA-256: 1d6b5e1bfa9ba44c4a44e5390705c0851e2212621f4c9b8ed441f855b97d83f0
kernel-rt-trace-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 7c5e1de1f0c73401fddd3c1e493639a417bfd0e8f65aeb0010709c63dbd3da7e
kernel-rt-trace-debuginfo-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: a886f195aaa595deb1c593f84c5019a83e3782d1453dad1a69fd7d635d9623a0
kernel-rt-trace-devel-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 9c89228e7889ada96f1e217e51d8e04576e1a63c53a04cab20a6059e46231022
kernel-rt-vanilla-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: c98b8b709b43421d2a3fecabca2e7d64f604a6a919fd9ee4017a5a854050296f
kernel-rt-vanilla-debuginfo-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 891dbf8574b394de906e1403b55c0f7ba96998bd43992e96ec295e9de5476a82
kernel-rt-vanilla-devel-3.10.0-229.rt56.158.el6rt.x86_64.rpm SHA-256: 7113d571e71b4c2dd2ec89ad3a8d999d9e5698e660384476f1a796843572bfa6

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility