An update for kernel-rt is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The kernel-rt packages provide the Real Time Linux Kernel, which enablesfine-tuning for systems with extremely high determinism requirements.Security Fix(es):* A race condition was found in the way the Linux kernel’s memory subsystemhandled the copy-on-write (COW) breakage of private read-only memory mappings.An unprivileged, local user could use this flaw to gain write access tootherwise read-only memory mappings and thus increase their privileges on thesystem. (CVE-2016-5195, Important)* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR VirtualeXtensible Local Area Network(CONFIG_VXLAN) with Transparent EthernetBridging(TEB) GRO support, is vulnerable to a stack overflow issue. It couldoccur while receiving large packets via GRO path; As an unlimited recursioncould unfold in both VLAN and TEB modules, leading to a stack corruption in thekernel. (CVE-2016-7039, Important)Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux for Real Time (v. 7)

SRPMS:
kernel-rt-3.10.0-327.36.3.rt56.238.el7.src.rpm
    MD5: 664e3cedc7456fa7428688bce17381e3SHA-256: 68d19b7135d23561ff1a1dc04277f275e44f743e4876a26a6fae97eff3d6e979
 
x86_64:
kernel-rt-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: 6d95a04ac77d08c1cf4ef5dd92e21e28SHA-256: 4aafab94d925bd89e8fd7f54f79010ce585f3756d80c3210ad02e1faa569b6b3
kernel-rt-debug-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: 75c9e070a1240de7675809e1e1be4ed2SHA-256: fed14cb4c6591c46b107661c03682d57f821a95fb9dd1520710d1d8206c300dc
kernel-rt-debug-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: 127af832fd7ea97c088c5710a66d203eSHA-256: 97b8b4625283999ced962197b5279858d8d7f311fb765700b2d8b970d7196ee6
kernel-rt-debug-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: 9cefd8a6c06cbb3238ce1f9496d45f2bSHA-256: a7720b5457f7a8910d793a2ddbcb34ce254fe4418b0dc79c8873d3acbdf96703
kernel-rt-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: da214c55326dab9f52d88abac6cfa6b6SHA-256: 4916aca5ad0692993c9c17f4bb8c707f9f4e7c13b667a1d4aa00610ff78fa7aa
kernel-rt-debuginfo-common-x86_64-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: 07884e23728c93f2a0a2d1d0eb6b5b24SHA-256: e2e40b8a1dd033672de7d1040b35f5e1f21124b5e4dbccf766580859ab75af45
kernel-rt-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: e09c87bbea49d2be12bc9add1de5a2d8SHA-256: ada26ded9e97636121340e3339a47be1d3b6893360017789ae390de13aea9472
kernel-rt-doc-3.10.0-327.36.3.rt56.238.el7.noarch.rpm
    MD5: 06af700f44c6dae7081f35671acc621dSHA-256: 50e2eef8eecd83f20ba624b35a422d5960f562197bc20b81f5fa7f84f4da7145
kernel-rt-trace-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: 1c13e91dfda39b97a84d835027ed4d78SHA-256: b7f04a092c7be636a18c4096460e92bf7eef05f83dbbdb19e41b7b9e8636b8be
kernel-rt-trace-debuginfo-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: 8f106b1f4df3f17a81545174f529a912SHA-256: 4dba8287bacb5f181fc9d6cb4fc76590601bd9e9ed59219460a18900f0305952
kernel-rt-trace-devel-3.10.0-327.36.3.rt56.238.el7.x86_64.rpm
    MD5: 28fc30d8c3a55c9f7fa7621849ef4361SHA-256: bcaa27a0b90d0a343e25773879ced2047153d78cc2a58a2264d9c8a90ec5b8d4
 
(The unlinked packages above are only available from the Red Hat Network)

1375944 – CVE-2016-7039 kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash1384344 – CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply