Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:1225 - Security Advisory
Issued:
2016-06-14
Updated:
2016-06-14

RHSA-2016:1225 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. (CVE-2015-5364, CVE-2015-5366, Important)

Bug Fix(es):

  • At a process or thread exit, when the Linux kernel undoes any SysV semaphore operations done previously (ones done using semop with the SEM_UNDO flag), there was a possible race condition with another process or thread removing the same semaphore set where the operations occurred, leading to a possible use of in-kernel-freed memory and then to possible unpredictable behavior. This bug could be noticed with software which uses IPC SysV semaphores, such as IBM DB2, which could in certain cases have some of its processes or utilities get incorrectly stalled in an IPC semaphore operation or system call after the race condition happened. A patch has been provided to fix this bug, and the kernel now behaves as expected in the aforementioned scenario. (BZ#1326343)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 6.5 x86_64
  • Red Hat Enterprise Linux Server - TUS 6.5 x86_64

Fixes

  • BZ - 1239029 - CVE-2015-5366 CVE-2015-5364 kernel: net: incorrect processing of checksums in UDP implementation

CVEs

  • CVE-2015-5364
  • CVE-2015-5366

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 6.5

SRPM
kernel-2.6.32-431.72.1.el6.src.rpm SHA-256: 954a57290ea973008a7bc007366f1e8a516190e19099954012a1f7661ed19ad1
x86_64
kernel-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 9f876aaed9f96415006e6b743ed52beac7e06e4b5c455ba0a7ee6dc204ced54b
kernel-abi-whitelists-2.6.32-431.72.1.el6.noarch.rpm SHA-256: a3cb2e50f6d0423d71426ee58224d6271f4c98b94006fb204ec7b55037eb104e
kernel-debug-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 98d7201511cca63b4af1488826f1752dde254084d085bc019e5f71432d69af33
kernel-debug-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 47f0d642797ac6628c27856afa4c56c762eecaf2898389b3a46c80e265b9427f
kernel-debug-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 47f0d642797ac6628c27856afa4c56c762eecaf2898389b3a46c80e265b9427f
kernel-debug-devel-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 44d45d59c0495aa0f41aea892e74dfe584d58bac0b9c14e42aed9f13d31599db
kernel-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 1b026f11c2b8ef7b726e58d3d3c0c72ed809731feacc51950aa40be691cccb89
kernel-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 1b026f11c2b8ef7b726e58d3d3c0c72ed809731feacc51950aa40be691cccb89
kernel-debuginfo-common-x86_64-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 4fd14a7928a41ed22cc3f5d47a9364858c928324a30cfed25a4b37ebc5a57774
kernel-debuginfo-common-x86_64-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 4fd14a7928a41ed22cc3f5d47a9364858c928324a30cfed25a4b37ebc5a57774
kernel-devel-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 2ff1afabe1e8103368d607c1edc81a8c3b83ae9b314e6566441227abb2616b66
kernel-doc-2.6.32-431.72.1.el6.noarch.rpm SHA-256: bc92fe0a236fef9a4262c05953c9f585ffc5d5f357b4c72dfd44179608ace560
kernel-firmware-2.6.32-431.72.1.el6.noarch.rpm SHA-256: b22839b905bfd7df036afadeacd41d9569603192091c0a69731de423f9ccc742
kernel-headers-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 321093f0cc5c925aecf4e75e89b563303d641cc434fad0a2f9739296061e118b
perf-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 15505c8a8c667ff1ea4e7409fab01678915a25a64c2f1a44253c254e289e8cdb
perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: c4940315196136b2fafce81ef6c811e6ab016b3ce3b68cabb59cc0996616e0ef
perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: c4940315196136b2fafce81ef6c811e6ab016b3ce3b68cabb59cc0996616e0ef
python-perf-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: f8823cb9a4c1d5d1ef80c7ed273a7a9434749347e5f427fa2705fd48325b801b
python-perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: f4136fd72b83c265e0d1da9389e95f665dd1b4f9566f9bca5f4e2c062fdeee35
python-perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: f4136fd72b83c265e0d1da9389e95f665dd1b4f9566f9bca5f4e2c062fdeee35

Red Hat Enterprise Linux Server - TUS 6.5

SRPM
kernel-2.6.32-431.72.1.el6.src.rpm SHA-256: 954a57290ea973008a7bc007366f1e8a516190e19099954012a1f7661ed19ad1
x86_64
kernel-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 9f876aaed9f96415006e6b743ed52beac7e06e4b5c455ba0a7ee6dc204ced54b
kernel-abi-whitelists-2.6.32-431.72.1.el6.noarch.rpm SHA-256: a3cb2e50f6d0423d71426ee58224d6271f4c98b94006fb204ec7b55037eb104e
kernel-debug-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 98d7201511cca63b4af1488826f1752dde254084d085bc019e5f71432d69af33
kernel-debug-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 47f0d642797ac6628c27856afa4c56c762eecaf2898389b3a46c80e265b9427f
kernel-debug-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 47f0d642797ac6628c27856afa4c56c762eecaf2898389b3a46c80e265b9427f
kernel-debug-devel-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 44d45d59c0495aa0f41aea892e74dfe584d58bac0b9c14e42aed9f13d31599db
kernel-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 1b026f11c2b8ef7b726e58d3d3c0c72ed809731feacc51950aa40be691cccb89
kernel-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 1b026f11c2b8ef7b726e58d3d3c0c72ed809731feacc51950aa40be691cccb89
kernel-debuginfo-common-x86_64-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 4fd14a7928a41ed22cc3f5d47a9364858c928324a30cfed25a4b37ebc5a57774
kernel-debuginfo-common-x86_64-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 4fd14a7928a41ed22cc3f5d47a9364858c928324a30cfed25a4b37ebc5a57774
kernel-devel-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 2ff1afabe1e8103368d607c1edc81a8c3b83ae9b314e6566441227abb2616b66
kernel-doc-2.6.32-431.72.1.el6.noarch.rpm SHA-256: bc92fe0a236fef9a4262c05953c9f585ffc5d5f357b4c72dfd44179608ace560
kernel-firmware-2.6.32-431.72.1.el6.noarch.rpm SHA-256: b22839b905bfd7df036afadeacd41d9569603192091c0a69731de423f9ccc742
kernel-headers-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 321093f0cc5c925aecf4e75e89b563303d641cc434fad0a2f9739296061e118b
perf-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: 15505c8a8c667ff1ea4e7409fab01678915a25a64c2f1a44253c254e289e8cdb
perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: c4940315196136b2fafce81ef6c811e6ab016b3ce3b68cabb59cc0996616e0ef
perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: c4940315196136b2fafce81ef6c811e6ab016b3ce3b68cabb59cc0996616e0ef
python-perf-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: f8823cb9a4c1d5d1ef80c7ed273a7a9434749347e5f427fa2705fd48325b801b
python-perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: f4136fd72b83c265e0d1da9389e95f665dd1b4f9566f9bca5f4e2c062fdeee35
python-perf-debuginfo-2.6.32-431.72.1.el6.x86_64.rpm SHA-256: f4136fd72b83c265e0d1da9389e95f665dd1b4f9566f9bca5f4e2c062fdeee35

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility