An update for kernel is now available for Red Hat Enterprise Linux 6.2 AdvancedUpdate Support.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A race condition was found in the way the Linux kernel’s memory subsystemhandled the copy-on-write (COW) breakage of private read-only memory mappings.An unprivileged, local user could use this flaw to gain write access tootherwise read-only memory mappings and thus increase their privileges on thesystem. (CVE-2016-5195, Important)Red Hat would like to thank Phil Oester for reporting this issue.Bug Fix(es):* Previously, the BUG_ON() signal appeared in the fs_clear_inode() functionwhere the nfs_have_writebacks() function reported a positive value fornfs_inode->npages.

As a consequence, a kernel panic occurred.

The provided patchperforms a serialization by holding the inode i_lock over the check ofPagePrivate and locking the request, which fixes this bug. (BZ#1365157)
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
kernel-2.6.32-220.68.1.el6.src.rpm
    MD5: 6a3a16be8cba6f98a373b915d845c855SHA-256: fb2e8ec87ab08eb8301328cef92e228ef7d9c51c3cfcad5515e2952817e21b00
 
x86_64:
kernel-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: 89bec9235df877f3a062fd32032a4229SHA-256: b2e623d7519b951f9fd2978d2c1b00da319f9631d995f136b17a1fb4c85a0983
kernel-debug-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: a908364bb6c2cea9817b71edc7668ccbSHA-256: 0004f0f90d10949cb270dbc798ead01b98b0070d1fdd519f9db55047fe3c07ae
kernel-debug-debuginfo-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: ec2debf197b2c5b19807586b11b509f1SHA-256: d2a733b6bf9c00a19d2e84c53a78b025edb024ea51c70df84b99d2853a47ad1d
kernel-debug-devel-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: 7fcf9055f1487d0a41fd9fd89c7cd3cfSHA-256: c98b2deda7cddf4498e5683f39574ae4b6065d93b816b0d3c5f3cf68f4a2be08
kernel-debuginfo-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: 4900ddb2f9f19502a24b0bcd2bb5266bSHA-256: eabdf20c4113982bec83ef26eeaf7afe37d2294c5cfefeecd938a6dd2845bf2c
kernel-debuginfo-common-x86_64-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: 243c70b9e90986f6d008ea8511d2991fSHA-256: 561ccdceb8d82fe711d074ce3f6ed00c11dc19773797752105fd330f0e84e2d1
kernel-devel-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: a5b88d045137207bd988315d729b785cSHA-256: b1c70194ac8d9ca2ee7a2382c8fa51c051f5d016ad381d293435d58427f5de82
kernel-doc-2.6.32-220.68.1.el6.noarch.rpm
    MD5: b0478eb10097b936a11258517ec429a0SHA-256: dd619d5397959c36a83fa8e0016d3e9f027856f9e5620057d1e89629b6a01c80
kernel-firmware-2.6.32-220.68.1.el6.noarch.rpm
    MD5: 1e403d746c368ae54963cee1f944f776SHA-256: e6578cd66eb679489c5e92c4b2a5eda60b1e55007a919d64853b2b060d38ad7a
kernel-headers-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: 3d1c73cc45af3c54ea088df297097d61SHA-256: 2eddabc769c00eb45223b15333c0fcabbffc5cfa6dc5ae3497e8f532b7d98a5f
perf-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: f19b8c54a7e946030d307f337139fc02SHA-256: 92ae701a6c4e094bcf9eddb25219871896f7733ab09baa2204ab75a3c94597f9
perf-debuginfo-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: 52c81947feedc6d55f37cef4faa8344dSHA-256: 046cc7bf4cae0313ea7b9b7998d0d6dff0e1d20c1ecc91a0eb08d8d4556b0b51
python-perf-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: e111c5d3cb3cc2e93a10b1b07bb66d4dSHA-256: 84570415c7e6d30fd009c1e066578aa124a749ab70b67942a350ca1a701144c1
python-perf-debuginfo-2.6.32-220.68.1.el6.x86_64.rpm
    MD5: 2ee5937960326175d6266adefcdbf050SHA-256: 45cb57dbff1e4280ff89ab0537df505ae75e5837ed1ccf9bbeb033fbca6d613d
 
(The unlinked packages above are only available from the Red Hat Network)

1384344 – CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply