An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The kernel-rt packages provide the Real Time Linux Kernel, which enablesfine-tuning for systems with extremely high determinism requirements.Security Fix(es):* A race condition was found in the way the Linux kernel’s memory subsystemhandled the copy-on-write (COW) breakage of private read-only memory mappings.An unprivileged, local user could use this flaw to gain write access tootherwise read-only memory mappings and thus increase their privileges on thesystem. (CVE-2016-5195, Important)* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR VirtualeXtensible Local Area Network(CONFIG_VXLAN) with Transparent EthernetBridging(TEB) GRO support, is vulnerable to a stack overflow issue.
It couldoccur while receiving large packets via GRO path; As an unlimited recursioncould unfold in both VLAN and TEB modules, leading to a stack corruption in thekernel. (CVE-2016-7039, Important)Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6)

SRPMS:
kernel-rt-3.10.0-327.rt56.198.el6rt.src.rpm
    MD5: 04a6ee810c2b3b32068b453b3c03c431SHA-256: c9ce735976335e1d3e6e8b6f408af1826e2956034e498985660ed5eb07675f11
 
x86_64:
kernel-rt-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 24426126d1b92947a4afbcbece1085bcSHA-256: db65f32e5cb6a1ca6e1bd991d79d965ccbd5d5a9e5de25f3902772d628482f29
kernel-rt-debug-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 29415723f9d6ddc2ef0aa1320353ab5dSHA-256: 9cf58db42891717dd360ce2e4451e45da6fe33296d91303f3dfdb0e01733785d
kernel-rt-debug-debuginfo-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 5132e657cb01978365935ce24f04ea7dSHA-256: bb2c73075eaeb6bf5d78b15c78fcc214e3938f9ea387724be69d16135ac44359
kernel-rt-debug-devel-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: f068e1181c722481b5a99dcbc9de3930SHA-256: 02fe5aaca5357a99f8bdf6afeab46bcef82b1f89f3bb1b41a7b1ed05354c790a
kernel-rt-debuginfo-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 77761a4404a8109664a57cb85092d94fSHA-256: ce01aa3ecfdf81a537f90ceefed357afd78abbc34c57884c3fc69ca3dec03af9
kernel-rt-debuginfo-common-x86_64-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 4674e34653878436e7f88690c3c44ed7SHA-256: d403dd9467fb948c9fcf4d61e8cd0433692ff2d0302c8211623c470917b402da
kernel-rt-devel-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 6ee0c08c9d5decf15b12a5ccd156c3e1SHA-256: 1c85b6788f97d7accbdcb4780dd599efe436e97295902068f3eee304507b97e4
kernel-rt-doc-3.10.0-327.rt56.198.el6rt.noarch.rpm
    MD5: cbcddfb3f5e6d73b2cc8c9e4cf36ea46SHA-256: 5dd0a04dd925b3e5c9e8a44dfc04080a68a17b4110eb7b6a1495ea078884b28e
kernel-rt-firmware-3.10.0-327.rt56.198.el6rt.noarch.rpm
    MD5: 2fcf6eab8e7027be643dd988d209534dSHA-256: e0d895bcce475aaeb51f1017258bc953c0a178c3e0ecd133edb4cd3b813bca97
kernel-rt-trace-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 65c0f0af75b0c030f513b4dcef4048c7SHA-256: 511605a36d2e35a9267ed465484ab3dbd196963c74e7e68f76e94657d548f340
kernel-rt-trace-debuginfo-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: bbfbaf3beb1d938c8ab2978f0d2b42a4SHA-256: 17570e80969d23bed754bb27f569c921c98923314ee7d6d4ec092aac5eaa02fc
kernel-rt-trace-devel-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: c5530073d943526e3e376c789fbd4434SHA-256: 0eaa41d23fa143ffc322a7c08b3c77751c1ff034deeb46d805d5f0fef4346c37
kernel-rt-vanilla-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 80b39f891ed5470a324937c0ebe56127SHA-256: 3b7fda2b672ec773b55ede0f37ecb7d8ec8e952410f900ddb1745ac6bc9b9d36
kernel-rt-vanilla-debuginfo-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: 83bf0aefb4c799fea4d3ee03a7b2d7c4SHA-256: 51eac7c8deb3f776060e570ccd2d020164a3027fa235478cc8d5017c5ea91e09
kernel-rt-vanilla-devel-3.10.0-327.rt56.198.el6rt.x86_64.rpm
    MD5: e8d5d1e8f95a5753a173c45ee77fcca6SHA-256: a4e23095352d4e126b5e683854877be2406732862732f9ba6fdcf63d6714acf4
 
(The unlinked packages above are only available from the Red Hat Network)

1375944 – CVE-2016-7039 kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash1384344 – CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply