An update for kernel is now available for Red Hat Enterprise Linux 5.9 LongLife.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A race condition was found in the way the Linux kernel’s memory subsystemhandled the copy-on-write (COW) breakage of private read-only memory mappings.An unprivileged, local user could use this flaw to gain write access tootherwise read-only memory mappings and thus increase their privileges on thesystem. (CVE-2016-5195, Important)Red Hat would like to thank Phil Oester for reporting this issue.
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
kernel-2.6.18-348.32.1.el5.src.rpm
    MD5: 46c733ccf704146a388a225adbf2cc7dSHA-256: 806095572c869b20637405330c3da9661a980f1eb7fa6c03fa725a79e7f700f2
 
IA-32:
kernel-2.6.18-348.32.1.el5.i686.rpm
    MD5: 09a2f165ea14abf8c4728fe00a452263SHA-256: 8729752ac83a45fcf896924696aad416fa832507316d559c4e5ccab4ac1cb299
kernel-PAE-2.6.18-348.32.1.el5.i686.rpm
    MD5: 0839dd2e8055758c6d24daf2039b37d0SHA-256: 0d057e451f158690390016a90c9adda31a387c37452ac04421520d247c21c404
kernel-PAE-debuginfo-2.6.18-348.32.1.el5.i686.rpm
    MD5: ce3ea5f2ade19bc33230b6a4032247f1SHA-256: 01bdf265f0a266b7c5f43c1411ac06dac2f85b7c5793b4cc98d59ea2cdedeca0
kernel-PAE-devel-2.6.18-348.32.1.el5.i686.rpm
    MD5: 377e59cd2662166c887ca39e66a688caSHA-256: 18cfe762db6b4810dfb3f7c4a328dfcc273a0537e0da60c1c480abccb09cc3cd
kernel-debug-2.6.18-348.32.1.el5.i686.rpm
    MD5: f268468a8a3cfb9ff3cbddbfa57bfe8aSHA-256: 6744034d2f3dd32875e223209f1fd97377e395f9f882adc6aaf4b0b43c80c5c5
kernel-debug-debuginfo-2.6.18-348.32.1.el5.i686.rpm
    MD5: 0dc50dc80ae43e1536ca295f0c57bbf5SHA-256: 7e79830066423141c00dad21d2102e4e9eabb22e8c988f54d63636e85cee8ea2
kernel-debug-devel-2.6.18-348.32.1.el5.i686.rpm
    MD5: 7160433a00a4082ae8f4b6644242098bSHA-256: 194b7382c14daad0ec867185e8f519c9f8f72dfb0fa75c571382c04032a9b580
kernel-debuginfo-2.6.18-348.32.1.el5.i686.rpm
    MD5: b0bf4110d284ee15c0a6b1a68144075fSHA-256: eeefdd41a77c78c6ed51d42effaf6b57dbb1babd6c68946b48819d7a6ae71a4d
kernel-debuginfo-common-2.6.18-348.32.1.el5.i686.rpm
    MD5: 17428c50059253cd46b9c06b59ed7ab1SHA-256: e9e9a277d8d72dc0be0bc82aea9b103c6364bdd0c0d47f702b175e640755ffc5
kernel-devel-2.6.18-348.32.1.el5.i686.rpm
    MD5: 31211c1f17b08364d05e8d5b706fe175SHA-256: edf3847d740ca209b30a190867162dd04ddd66a386fb851a645ba3677165cb56
kernel-doc-2.6.18-348.32.1.el5.noarch.rpm
    MD5: e5baac15f61a017aafb7ce4aa76c2ff2SHA-256: cf542fb28132b39dcb54b191cbd1b66158a01466bab963b4d3fc97dfb4d62b98
kernel-headers-2.6.18-348.32.1.el5.i386.rpm
    MD5: 7c61467694112ca916a94e33d781cbeeSHA-256: 013704678f270ee226060f419a0bd3d4995e829b114ffd769ab99f90252c1c05
kernel-xen-2.6.18-348.32.1.el5.i686.rpm
    MD5: 2a6a77ff569195c4013851118e3a2cd5SHA-256: b45e1dd02a7553212c585b4b9f107ce1d879b82a3351ef2775b85f4a49601cf0
kernel-xen-debuginfo-2.6.18-348.32.1.el5.i686.rpm
    MD5: f57dcc64fd8831a592fe8f36d3fd4643SHA-256: 75b8dc0d7923fa25c9e14d8e1efffc5b4f1b79ecbf388d9417df6c7ede7585aa
kernel-xen-devel-2.6.18-348.32.1.el5.i686.rpm
    MD5: 4e7a5fe54da6cc4bf9fface4dac49cd1SHA-256: 408ae5e1e005da5d918dbd5f6f65bb728480466afecda46765cbf041811e45f7
 
IA-64:
kernel-2.6.18-348.32.1.el5.ia64.rpm
    MD5: 780b88d15ae41843f0e6bbb0daef4a96SHA-256: eee08f95edf5855f6d85a9a50466bb68d3041efde7932770f9aa90a5e969a645
kernel-debug-2.6.18-348.32.1.el5.ia64.rpm
    MD5: 4079a917b6e983289f0a55926447d7e5SHA-256: b23e830220ba83c9885be080e1ecaaee37de1c60ed63d961915190b73eb21beb
kernel-debug-debuginfo-2.6.18-348.32.1.el5.ia64.rpm
    MD5: a08b225f677dadb2946e4d81e8106582SHA-256: aa1da5607abc8610cb3e7f46eafed5f5df3b2834d0afcf406818b1cc87056abd
kernel-debug-devel-2.6.18-348.32.1.el5.ia64.rpm
    MD5: 79956d1d0a18ef829c3eae54a8fea402SHA-256: 391a48ff1703182c7d913f478b5986ea5ac05799d0f09793d490158c0ce12b1d
kernel-debuginfo-2.6.18-348.32.1.el5.ia64.rpm
    MD5: 249ecd36a92f6901610e98a1bb827370SHA-256: d613e2169f8262f390fc54a03df5493d9c4c983dbdda9bf5faaeef499662587f
kernel-debuginfo-common-2.6.18-348.32.1.el5.ia64.rpm
    MD5: 7b4a06b4b856d439677a6172b3e1ac26SHA-256: d7517529ed5f5b697d6624c2bac422bb6b62a947ca02f2d7b9f94ec4f83fb7a1
kernel-devel-2.6.18-348.32.1.el5.ia64.rpm
    MD5: 85d6170c515b64fad359abbc7000f9f0SHA-256: 5f869fa71c6871d5c0d1dac0d479e5e75e6251e88f7d8f5d38583e3352e63160
kernel-doc-2.6.18-348.32.1.el5.noarch.rpm
    MD5: e5baac15f61a017aafb7ce4aa76c2ff2SHA-256: cf542fb28132b39dcb54b191cbd1b66158a01466bab963b4d3fc97dfb4d62b98
kernel-headers-2.6.18-348.32.1.el5.ia64.rpm
    MD5: 052bc82a238e79e92883b97ff5f676c4SHA-256: 2388f9ae05026990281e7b4e26b71b65b3052d989d304ec7cd3d4afb894ffd20
kernel-xen-2.6.18-348.32.1.el5.ia64.rpm
    MD5: d9e39a904f4fa2e2e86a800efcfa1f52SHA-256: 8d6c6642f0dab6bae829f2a206ec0776d7496527f3e88e3a50574a829ddb9248
kernel-xen-debuginfo-2.6.18-348.32.1.el5.ia64.rpm
    MD5: 1cccfd39ca019ce04975dcd534942137SHA-256: 516fcd8a840c67a3662b7b9ba61b402c3d70b4a28d307662c0b05d3e38c03ad2
kernel-xen-devel-2.6.18-348.32.1.el5.ia64.rpm
    MD5: a589f39269740786988c76fed23d05d5SHA-256: 9b3354e17a2121f81d75e953c6901450932c8be5f94570884538a948f3fac17e
 
x86_64:
kernel-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: 58bb8b43ce863d010bab8ec6bb98a9d4SHA-256: be2ffe2510fcbbb39135c93f81b677cca4c13277db76f4931169b63ba1ceb701
kernel-debug-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: fa65613ab7133915a39b155b3a751623SHA-256: 241184b17220281825d339bfde47565456ea787a429fade043ac57658ff49cb4
kernel-debug-debuginfo-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: 41d471e189e70ff280a981ae2e5253f8SHA-256: fa53ce184a018b919a7c7d2329fe1e956a3b0686fe5f365cfe969e3a8565d99e
kernel-debug-devel-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: fec3c3366bc7df6cac101e51c24e9eb6SHA-256: ea449486094d7ebb97bbc9548931adbfeb101e0a133eb249bdf084f9e6ebdf92
kernel-debuginfo-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: f2219ffca6404224298be984ef5aee34SHA-256: 7190942ddba8c1b3a1a2bdf37246c15f55f8a28b9c3cbb732b237a29a38b20f3
kernel-debuginfo-common-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: ee17cbd581e258d00650dc1abacabc10SHA-256: 48ff45567d6822168f10b113715d52887c847d3ffff2fe68688704ecf1df85dc
kernel-devel-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: e84afeabaa176ddaaed7761329009e22SHA-256: f915b70231aeb88942d4a8d6c68b6762606bc92d66b1ced0f4aeadb78f36a79b
kernel-doc-2.6.18-348.32.1.el5.noarch.rpm
    MD5: e5baac15f61a017aafb7ce4aa76c2ff2SHA-256: cf542fb28132b39dcb54b191cbd1b66158a01466bab963b4d3fc97dfb4d62b98
kernel-headers-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: 4fe96c1164dcddf48d68f10e41a06e5dSHA-256: 71065e406f21203fb9a979a2d2e95213dcd419e6016e0a4fda3a69ee2b838416
kernel-xen-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: 4262d826989924b203c6fdb721459943SHA-256: b7fa14243f0ed4627f81908bddd475586284cda30803aa2c31d9f7d7a00c0354
kernel-xen-debuginfo-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: 1923dc7d1dc1950c8e7444a9e3bb0cabSHA-256: 7b23f4208e762dc253ba87b34f496e5747eeba6dce2b3087453b4575d81ee014
kernel-xen-devel-2.6.18-348.32.1.el5.x86_64.rpm
    MD5: f3c3b1929109a45ffde92534dd0a3ca3SHA-256: b8ea62b4d1c979946ab5c622d9795521ab3a2f954f899b3aff84c0ee06ce7638
 
(The unlinked packages above are only available from the Red Hat Network)

1384344 – CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply