An update for kernel is now available for Red Hat Enterprise Linux 6.5 AdvancedUpdate Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A race condition was found in the way the Linux kernel’s memory subsystemhandled the copy-on-write (COW) breakage of private read-only memory mappings.An unprivileged, local user could use this flaw to gain write access tootherwise read-only memory mappings and thus increase their privileges on thesystem. (CVE-2016-5195, Important)Red Hat would like to thank Phil Oester for reporting this issue.
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
kernel-2.6.32-431.75.1.el6.src.rpm
    MD5: edba754caaec90e496ca9ef396b02ea3SHA-256: 4b35d0288f342f23483a93c1b090b4dff167dda0397e7f25dd2dd3df8f1bf1ab
 
x86_64:
kernel-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: 6de5e2452dd18c9a5f8a8184efc49119SHA-256: 65e577365a051395455626be1a37715d2467cc29e17f368ef81cc27318cb16cf
kernel-abi-whitelists-2.6.32-431.75.1.el6.noarch.rpm
    MD5: 90cb19d33f74d2e7dd450dd403bd6453SHA-256: a391cd157d904b05523d2d2cb6dca9dc74bec1f41d02ded6567a63863ba0efb8
kernel-debug-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: 441de0d0bafa2c4efcfecbf5601e1f67SHA-256: a2909e078b23fd65e10797ba4a9ed609bad4e337fd969718602c2784b1510252
kernel-debug-debuginfo-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: da52771986d7d299c8a92849961dd6c6SHA-256: b7a8626051c58fd56330e91ee67bdf7bda89add1e2d42d331430e063d4cd2742
kernel-debug-devel-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: 13fdcf1df535fd98318c04b462a8e2ccSHA-256: b3571c0130c820149c6764eff2410e1c7c5a10af4533f566c9400bd262adf38f
kernel-debuginfo-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: 92763442590724a9288d860dd17f1f07SHA-256: d90696286d53f2d97050687049e5fe177f92e2e79fc8bd59e795abc73ef05310
kernel-debuginfo-common-x86_64-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: c69f09e84d609ba8428b6261da63c2b8SHA-256: 89e64bd5c858a3359819896c8591dab1103455c4989192faf4b0548f545a9df5
kernel-devel-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: 06a070f2759a0a5f8841b14c4d306e6eSHA-256: 30718b41b1484603baaa11782391c9b344b94bb0feb2d97d5edc3fa3a2efbc96
kernel-doc-2.6.32-431.75.1.el6.noarch.rpm
    MD5: 48fb2dd2a25a7f81f9351e0bcd98456eSHA-256: b5d1e9b8a9484e45a84dd84cfd39b560f0bcad8254535f023299141aa626b2dd
kernel-firmware-2.6.32-431.75.1.el6.noarch.rpm
    MD5: 36ffdf8e9f87f86dd13020fbe5327a1eSHA-256: f9b21785ab2a0cde98e525d506a53d9880b126eacf618523bea182f52cbd3f95
kernel-headers-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: 396bd7a5cbe7daa7dc09bbb6c072f3a1SHA-256: 0f370792909fe23839ccba9bfa0f74350d9d2a29706a4642d0bf34ae9f479186
perf-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: 4233b5fd500ab24bc1636a7da65fe674SHA-256: f383b969169cf9f790f4b9e6d43660b51fcf50b9bd587852346f6b689dd5ff4b
perf-debuginfo-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: ba5038521cd66c91164b6065e8b49b44SHA-256: af2541645fb5c12dc57db5830afb882bf7bb0bc36b4a4e7e0ea1a2ea53ef4951
python-perf-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: ff8fcd7da3a198975f6814ccbc395111SHA-256: ba679b61fb2dfb3e41fa4d50a67065f984ca9dd0b765b5399178e3d83454706a
python-perf-debuginfo-2.6.32-431.75.1.el6.x86_64.rpm
    MD5: 0ebdfab10008aa7ac8ef09bc94ec4a64SHA-256: b4213d5e9900c0d146659f09a6c540988252e3a82d625d13b8814a6e46562c36
 
(The unlinked packages above are only available from the Red Hat Network)

1384344 – CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply