Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2017:2444 - Security Advisory
Issued:
2017-08-08
Updated:
2017-08-08

RHSA-2017:2444 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel-rt security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel-rt is now available for Red Hat Enterprise MRG 2.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

  • A use-after-free flaw was found in the Linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature. A local user could use this flaw to escalate their privileges or crash the system. (CVE-2016-10200, Important)
  • A flaw was found that can be triggered in keyring_search_iterator in keyring.c if type->match is NULL. A local user could use this flaw to crash the system or, potentially, escalate their privileges. (CVE-2017-2647, Important)
  • The lrw_crypt() function in 'crypto/lrw.c' in the Linux kernel before 4.5 allows local users to cause a system crash and a denial of service by the NULL pointer dereference via accept(2) system call for AF_ALG socket without calling setkey() first to set a cipher key. (CVE-2015-8970, Moderate)

Red Hat would like to thank Igor Redko (Virtuozzo) and Andrey Ryabinin (Virtuozzo) for reporting CVE-2017-2647 and Igor Redko (Virtuozzo) and Vasily Averin (Virtuozzo) for reporting CVE-2015-8970.

Bug Fix(es):

  • Writing model-specific register (MSR) registers during intel_idle initialization could previously cause exceptions. Consequently, a kernel panic occurred during this initialization. The function call to write to the MSR with

exception handling was modified to use wrmsrl_safe() instead of wrmsrl(). In this scenario, the kernel no longer panics. (BZ#1447438)

  • The ixgbe driver was using incorrect bitwise operations on received PTP flags. Consequently, systems that were using the ixgbe driver could not synchronize time using PTP. The provided patch corrected the bitwise operations on received PTP flags allowing these system to correctly synchronize time using PTP. (BZ#1469795) (BZ#1451821)

The kernel-rt packages have been upgraded to version 3.10.0-514.rt56.230,
which provides a number of security and bug fixes over the previous
version. (BZ#1463427)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • MRG Realtime 2 x86_64

Fixes

  • BZ - 1386286 - CVE-2015-8970 kernel: crypto: GPF in lrw_crypt caused by null-deref
  • BZ - 1428353 - CVE-2017-2647 kernel: Null pointer dereference in search_keyring
  • BZ - 1430347 - CVE-2016-10200 kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature
  • BZ - 1437675 - ftrace: pull upstream commits for correct selftest operation
  • BZ - 1463427 - update the MRG 2.5.z 3.10 kernel-rt sources

CVEs

  • CVE-2015-8970
  • CVE-2016-10200
  • CVE-2017-2647

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

MRG Realtime 2

SRPM
kernel-rt-3.10.0-514.rt56.231.el6rt.src.rpm SHA-256: 501cde5cfd6f0c20a409ad666a60c571f40284dae1cbf8935eafbaddf87f02ee
x86_64
kernel-rt-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: 26399fc781542416cb4453a324ce0e620a8a081dd3f57ecf5ae54c313932e915
kernel-rt-debug-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: a39261c9c0f1567cb496c9187ef9e4fba1533fbee9923ac542ff8910f6a0117e
kernel-rt-debug-debuginfo-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: b5fd90f0ff851039ba92e56090576e928fdff3ae2ac8ee1cc92d80bd4659de13
kernel-rt-debug-devel-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: b44bcc2f7ac57a31682413051ffef6fa6e310ecbe7e5ffdf938eb462502194f9
kernel-rt-debuginfo-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: 37f603a59e5bd6920c1742aaa05d8e329a87762ca277d7fcd2c3a8975fd95b16
kernel-rt-debuginfo-common-x86_64-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: 749e04a3fa152c6661eb3cf7f22716469688f0590adba46729ff4c42f030d8e6
kernel-rt-devel-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: 08f7a10911447bce9cd7db3c9054ff7627f5b813e83a86719bde46e728da7f68
kernel-rt-doc-3.10.0-514.rt56.231.el6rt.noarch.rpm SHA-256: 3a32238980da9b1d296ee768bb89086961ac46aafbc33dafc070731903486cde
kernel-rt-firmware-3.10.0-514.rt56.231.el6rt.noarch.rpm SHA-256: 42c976dd6a51631fb3b44030e08b11cba4b9675a6677f353ccca460045d43b9a
kernel-rt-trace-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: d967cab83a3a08ac8d73a9ad49f5a9685b128834f38ca2b461969084449106e4
kernel-rt-trace-debuginfo-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: 8322e6697dee56cb94304e107da4d2826f777dfafe0ee6a1b46b033b9e579d3d
kernel-rt-trace-devel-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: cbcba264e7414abb14af04a1b1b34bc0914de8ac799d979c6e9e54d3313b45a8
kernel-rt-vanilla-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: 7e0fc6c9524ae5171956c1c83d7ccec416d64726071256a01d5030dab0a761d3
kernel-rt-vanilla-debuginfo-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: b1db5a0812a2fad896019cdfd9735dd6bfcf0bbbb0e6034a9a32fe1354509a6e
kernel-rt-vanilla-devel-3.10.0-514.rt56.231.el6rt.x86_64.rpm SHA-256: 0d629397e7e7415fd3a40831ee8a0bce9788420d77d8b3e9edc15cf311020695

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility