An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.Red Hat Product Security has rated this update as having a security impactof Important.

A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
The kernel-rt package contain the Linux kernel, the core of any Linuxoperating system.This update provides a build of the kernel-rt package for Red HatEnterprise MRG 2.5 that is layered on Red Hat Enterprise Linux 6, andprovides a number of bug fixes including:* [netdrv] ixgbevf: fix spoofed packets with random MAC and use ether_addr_copyinstead of memcpy* [mm] mmu_notifier: fix memory corruption* [mm] hugetlbfs: optimize when NUMA=n* [mm] optimize put_mems_allowed() usage* [x86] mm: suitable memory should go to ZONE_MOVABLE* [fs] xfs: fix splice/direct-IO deadlock* [acpi] tables: Add acpi_subtable_proc to ACPI table parsers* [acpi] table: Add new function to get table entries* [net] ipv6: Nonlocal bind* [net] ipv4: bind ip_nonlocal_bind to current netns(BZ#1332298)Security Fix(es):* A flaw was found in the way certain interfaces of the Linux kernel’sInfiniband subsystem used write() as bi-directional ioctl() replacement,which could lead to insufficient memory security checks when being invokedusing the splice() system call.

A local unprivileged user on a systemwith either Infiniband hardware present or RDMA Userspace ConnectionManager Access module explicitly loaded, could use this flaw to escalatetheir privileges on the system. (CVE-2016-4565, Important)* A race condition flaw was found in the way the Linux kernel’s SCTPimplementation handled sctp_accept() during the processing of heartbeattimeout events.

A remote attacker could use this flaw to prevent furtherconnections to be accepted by the SCTP server running on the system,resulting in a denial of service. (CVE-2015-8767, Moderate)* A flaw was found in the way the realtime kernel processed speciallycrafted ICMP echo requests.

A remote attacker could use this flaw totrigger a sysrql function based on values in the ICMP packet, allowing themto remotely restart the system. Note that this feature is not enabled bydefault and requires elevated privileges to be configured. (CVE-2016-3707,Moderate)Red Hat would like to thank Jann Horn for reporting CVE-2016-4565.Bug Fix(es):* An oops can occur in the hpsa driver while submitting ioaccel2 commandswhen the phys_disk pointer is NULL (in hpsa_scsi_ioaccel_raid_map).Configuration changes during I/O operations could set the phys_diskpointer to NULL.
In this case, send the command down the RAID path forcorrect processing, avoiding the oops. (BZ#1334260)* A faulty code merge left an extra spin_lock operation in the functionfscache_invalidate_write().

The code has been correctly updated to removethis extra lock operation, which avoids a potential deadlock situationwhen looping through cache pages. (BZ#1327730)
For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6)

SRPMS:
kernel-rt-3.10.0-327.rt56.190.el6rt.src.rpm
    MD5: 0b980a3d19ec5880c7dfdc7101de6bc9SHA-256: 7e4d2b276dd758c4500e966c9832c55dc44bb0776047acf97240e143e122b22e
 
x86_64:
kernel-rt-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 2c12672c93c177fb65e0270ebd5b1a14SHA-256: 6463ca3b1e0c455d079d93023d64c54b94aa02cedb297bcee6cc47c1179604d2
kernel-rt-debug-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 527fa944944d7faf216c2772575907a8SHA-256: 54b1eadb10193af400d05e550d3473d035f2cf3c04bd44f3057ba3ad766ae528
kernel-rt-debug-debuginfo-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 4332ecf5fa4e3e150cc404a8435ce0b2SHA-256: 0334006a711d926fd07a54473fc8f442f20123599510722e07efa319a1df9f80
kernel-rt-debug-devel-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 59e3ea1ea94477ae37f33e7ca66c9174SHA-256: 411deedcc8ed7228812bc7a4f4e1ec86a637533b72122cb7d24888a31057b68b
kernel-rt-debuginfo-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 8236d3650359b482a27d5b79b9faeba7SHA-256: 50dd8a3d877078a3013fcd6dffe8de5441cdd8e4f0eee49bdc0fd3fb46178811
kernel-rt-debuginfo-common-x86_64-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 7a99c7541bc9ee3cd7edbdf59b3a204cSHA-256: f03f266cc8d7fb43635e81093773290cbcf822cb975bc2f82b0c82f02ec25c44
kernel-rt-devel-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 14c051a93684a5ab210c0f106a72c74cSHA-256: 39f7a70ae2246f12933bc8b44ee5c05a00edf66cb2f214ed9c7b73722a1543ab
kernel-rt-doc-3.10.0-327.rt56.190.el6rt.noarch.rpm
    MD5: 4402f6af239b61ece244c601d96b4a5cSHA-256: d11eb2071756bb313adcb4de9b99c918fb8f5acd700b4eff81627bbd65a1fc4c
kernel-rt-firmware-3.10.0-327.rt56.190.el6rt.noarch.rpm
    MD5: 42372ca07919ddfcf52807383708ee17SHA-256: 58483d09b2d52f3936bd0e46cd0ab595d645369d65aaf90fc37b25fe0d43ce9e
kernel-rt-trace-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 7309fab580a65a4e7d011504ae937451SHA-256: 573691624a1150dab71786556d4001d90a9b8e04f1bee40730040420d7bb783c
kernel-rt-trace-debuginfo-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: a37cb2adad3dc9d6a16385dbb7e207f4SHA-256: 61ed93bace3117a06a892e05c387c79d8d28650ea3530f5063bfed18022457fa
kernel-rt-trace-devel-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 5f614951c915f605e0075088bdfc50f3SHA-256: cf54fcb23d83a1d2186aa31d73c1a380598679b24952436c2e89bf5d9499637c
kernel-rt-vanilla-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 2aa40820beb13b40f47e80b769ab07b2SHA-256: 7171adac2b65fb1dba8f99c9342c284265399481acb035505de1fc19801eea55
kernel-rt-vanilla-debuginfo-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: f8d2883872f480f6d9e0a0a51a3234b4SHA-256: e908cbef5acabdf09ec174040ae6f8b7053650e8cafc0156bf89f7c64d2bf9cb
kernel-rt-vanilla-devel-3.10.0-327.rt56.190.el6rt.x86_64.rpm
    MD5: 9bd0c909a812a6e43ab709af441b0ec4SHA-256: 4af000b47e285b18e592189af9c8fe888d99359c372fd7f044a3000853477644
 
(The unlinked packages above are only available from the Red Hat Network)

1297389 – CVE-2015-8767 kernel: SCTP denial of service during timeout1310570 – CVE-2016-4565 kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko1327484 – CVE-2016-3707 kernel-rt: Sending SysRq command via ICMP echo request1327730 – deadlock in fscache code (merge error) [mrg]1332298 – update the MRG 2.5.z 3.10 kernel-rt sources

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply