An update for kernel is now available for Red Hat Enterprise Linux 5.6 LongLife.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A race condition was found in the way the Linux kernel’s memory subsystemhandled the copy-on-write (COW) breakage of private read-only memory mappings.An unprivileged, local user could use this flaw to gain write access tootherwise read-only memory mappings and thus increase their privileges on thesystem. (CVE-2016-5195, Important)Red Hat would like to thank Phil Oester for reporting this issue.
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
kernel-2.6.18-238.57.1.el5.src.rpm
    MD5: 6a534cd4ee88b45df767d37adadad1bbSHA-256: 8b40aed3fbcfe8201aaaa138fd9e4893a4ff33daa1f7a893b63efa3732d42d34
 
IA-32:
kernel-2.6.18-238.57.1.el5.i686.rpm
    MD5: a70ba66f61f7d8d62d33cde2568c031aSHA-256: eb9ad2b23d9d6db4e6d84688f4027823435a6bbfe2d844e54b7b3d8d0cef5be8
kernel-PAE-2.6.18-238.57.1.el5.i686.rpm
    MD5: 2c06bc9564afdff80cec1dd918fbdb22SHA-256: 12316574fc2cd47d36823b61b4aa193679ace3b8bc7dbc5154a238d81f41f751
kernel-PAE-debuginfo-2.6.18-238.57.1.el5.i686.rpm
    MD5: 486f43d1a6dd8b2af21a8eb506441670SHA-256: 9e0988c27991fde87017a4e3404bf58235d948128ddefad5450e5c0163496312
kernel-PAE-devel-2.6.18-238.57.1.el5.i686.rpm
    MD5: 5f7018b9873e5aba2e41a5d0bd9f6facSHA-256: ab288a91f3775d2a23cd3d22ae9de550b06cefd940955b480ffc98746056eb44
kernel-debug-2.6.18-238.57.1.el5.i686.rpm
    MD5: dfe5abafc6f2ed4f1f96b39a3f5a0abbSHA-256: 6d4f5a6ad7671b7f1786504396daf0f66387fc2d56b1075ec8fd81ee3693536a
kernel-debug-debuginfo-2.6.18-238.57.1.el5.i686.rpm
    MD5: 54a41ec0b6fae7cc21710a583e462b99SHA-256: 5cf6e82ea205c080df50b77122a52bfcfb9d17263f9a0f7c77758ee185272824
kernel-debug-devel-2.6.18-238.57.1.el5.i686.rpm
    MD5: 682a26bdbcf6b1b7ecdeda23c642cd14SHA-256: 1565243db5b9d2b4f067a1965c6eeb2832b99af6f9a6ebc8b5b5dceb33cf18f4
kernel-debuginfo-2.6.18-238.57.1.el5.i686.rpm
    MD5: f650094c8c5899c1624a5ba9710008afSHA-256: d9ae9bb1f82cc15024ba3da2f978e4c4391359257a107e6fe2d39743d3ea32d1
kernel-debuginfo-common-2.6.18-238.57.1.el5.i686.rpm
    MD5: 0103ac2fc5bbddbdcd3e3da0e43ef494SHA-256: b20b5203252a63b260277062fb9c0263b3d4bcc6068cf6396f149951e3a87f5f
kernel-devel-2.6.18-238.57.1.el5.i686.rpm
    MD5: d127541de40a4260069ed2eccda6584bSHA-256: 9edd0c82dba0519aaf6ee5d65319942762cc8f422d62e651a8ab1362b6b438ad
kernel-doc-2.6.18-238.57.1.el5.noarch.rpm
    MD5: d09cb0d3b02acb536a1b9445119201b0SHA-256: ef4113cf29cabb5be1e6fce0b44247422b3082e02a88f6be9b37e21566baba66
kernel-headers-2.6.18-238.57.1.el5.i386.rpm
    MD5: 6a8afbc48909d2bf1c2714fcc0b96393SHA-256: 3a0a6891305eebde674d9fe997ca77656f9de3215806ea567ce0e98e130460cf
kernel-xen-2.6.18-238.57.1.el5.i686.rpm
    MD5: 21f8cc86f4ad275dcbd462549acb7613SHA-256: 6465c2c5d6daf31cfd5a8fb66ba79c1613c89273f05dc504af3087d0b94ba444
kernel-xen-debuginfo-2.6.18-238.57.1.el5.i686.rpm
    MD5: d188ea37847f86c7ffc13047b09daefeSHA-256: c85b95eac40143382a8403c5f2ab3cafee5b017ca63885c257a1ee755dab4492
kernel-xen-devel-2.6.18-238.57.1.el5.i686.rpm
    MD5: 252b3aa81ea9733451c10c63860665cbSHA-256: a111e8d8884aacd47f9c68f2b07c34ebffa3ef71669a4f9def362f4bb626a3e2
 
IA-64:
kernel-2.6.18-238.57.1.el5.ia64.rpm
    MD5: ab5034235b5416587af936d8aceb7e8cSHA-256: a70ce437d801d294abd92f09ddc7c89948c1bf592f66a0082f196b41fe15ce51
kernel-debug-2.6.18-238.57.1.el5.ia64.rpm
    MD5: 1adb797b483e0aa59b1152f7d8893c6fSHA-256: 3540962f59a7f5235f1c123154b4645d709a5a954d6350614080f7288cf213e1
kernel-debug-debuginfo-2.6.18-238.57.1.el5.ia64.rpm
    MD5: 0d24e1677012ad0e0a95a3717652ab93SHA-256: 3a3543bbf53308b57a17db57927579aaa686fbaaba11127817d70ca7e9eecfd7
kernel-debug-devel-2.6.18-238.57.1.el5.ia64.rpm
    MD5: 4858ec50bc9b2dc8f6e03154f2c85f35SHA-256: 59e870ead61f16d57a199089049c0938d4d8ba8715d0a84ffe294fd98d22acae
kernel-debuginfo-2.6.18-238.57.1.el5.ia64.rpm
    MD5: 7f1c50151834e93478f06b5c0f5805daSHA-256: 8c1d95f51b8ec29b188fd24f256742cca31cc047fdc6d70188ad87e6b3ba4059
kernel-debuginfo-common-2.6.18-238.57.1.el5.ia64.rpm
    MD5: e60df07bfc40c3a3ffd1efe3575e5a29SHA-256: 75a30f02132a975781c0a2b19e7963481499c55ccad180688d9c33eb9950e0e9
kernel-devel-2.6.18-238.57.1.el5.ia64.rpm
    MD5: 4e32b68e7b879e4eb18bde899e1da9b6SHA-256: b39c0182a59aeab4daa10c9a8c240484e395b4b3c6b877e5f98108c8a310cc4d
kernel-doc-2.6.18-238.57.1.el5.noarch.rpm
    MD5: d09cb0d3b02acb536a1b9445119201b0SHA-256: ef4113cf29cabb5be1e6fce0b44247422b3082e02a88f6be9b37e21566baba66
kernel-headers-2.6.18-238.57.1.el5.ia64.rpm
    MD5: 11a2f1b56a13d7ba0bbc3e82382de4cdSHA-256: 16456aab0be148e405d424acdd5722b2fe3bdf9c0fd313839e2ce8dbd789604c
kernel-xen-2.6.18-238.57.1.el5.ia64.rpm
    MD5: d763f3963888dfad81f68335aaf896ceSHA-256: 36312ef497b71ea52800fa1a584fd40a80bb8ad3a4c54a79f66316f1215ba4a6
kernel-xen-debuginfo-2.6.18-238.57.1.el5.ia64.rpm
    MD5: dad4ec3c55d59bf92b254b2bd6199ba1SHA-256: b3f622c1f97212002b9ece98a6477e356d3a2e119f076c5cfe3b8f6fc3cdb8d4
kernel-xen-devel-2.6.18-238.57.1.el5.ia64.rpm
    MD5: 15a8a50b7da17c6b7c47831249804d33SHA-256: 0f5f7cc5225df08991f3d9e843227daae6088464e128860fd33dd0d4fa5c6a2f
 
x86_64:
kernel-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: 5519e48de8ef59ab7630d4e01e2dc3e0SHA-256: 81961c1287b7fb9a5ffca7f1689d6a999dc7cecbd8b7b069a9bc87bdf514dc75
kernel-debug-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: 9e30e32be1d7e1cabe3ccd11fc43d1e0SHA-256: c635307d6ec0e11721b4fad260da9a8cf65dba5c9c4eaf57c91a4864ddec6d94
kernel-debug-debuginfo-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: ebd638f85993007ac7f257766e17cdc3SHA-256: 3fe03d7d611f5fb0d1da33f8b058bc7d971c4775c15045fc848a879ebf34060a
kernel-debug-devel-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: fa3513eb020491f2324b9b35aaae056eSHA-256: 45542a3a92a1fee2fb3d5c34ca6616985fdde22de2f36017814f9485fa7079ae
kernel-debuginfo-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: 1ef885990ae87fe2b7cd3a954266b75dSHA-256: 7901bbd319ecc7aaf5f3439dcf728d9373961853c80deaef92d6e84e6951ca03
kernel-debuginfo-common-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: c1042c2698a14d2f698070cd6fb57f1bSHA-256: 96035662b221eec79868354cf7daf7ede34a974d611528c4f1ad32e1978fa478
kernel-devel-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: 3a19205414e7c565204c135fd3ed7c98SHA-256: f3667472bb31819d57e1dd60d3fe77e8f429ae596c6623a94fdf4d16c8935dd2
kernel-doc-2.6.18-238.57.1.el5.noarch.rpm
    MD5: d09cb0d3b02acb536a1b9445119201b0SHA-256: ef4113cf29cabb5be1e6fce0b44247422b3082e02a88f6be9b37e21566baba66
kernel-headers-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: c2d88634f41256f345b5baf996013a20SHA-256: 05aaa55cb8e9ca11a65eca7feb9fafe5527600e3a285ba9762ea5082d133eb4b
kernel-xen-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: eee5f4e6ad32a47fc030b6595aa03847SHA-256: 3f52c75d7c912035ad648057cf35a28f6c5fa4ae501bdbc1f7cf19220b0dab25
kernel-xen-debuginfo-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: 5a3f1b483cb3cf00675928fcb9903194SHA-256: 60148acb359350a5dc0baed8875cb5fc90762ecdaf0a795b6ed7de1302bfe07f
kernel-xen-devel-2.6.18-238.57.1.el5.x86_64.rpm
    MD5: 663dae1034a96baa3dc80900499bba3aSHA-256: f2f6a9fc8921e5584874ef3dce15493aa21ad4ed2c584034c723b76d4a720832
 
(The unlinked packages above are only available from the Red Hat Network)

1384344 – CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply