An update for kernel is now available for Red Hat Enterprise Linux 6.5 AdvancedUpdate Support.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A use-after-free vulnerability was found in the kernels socket recvmmsgsubsystem.

This may allow remote attackers to corrupt memory and may allowexecution of arbitrary code.

This corruption takes place during the errorhandling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
kernel-2.6.32-431.77.1.el6.src.rpm
    MD5: 3a075adc874ed1cad0cf0ad293f1eaafSHA-256: 32664ccccd3c3ffd4bfff6d46386b3b59509c6c05c021c14629c9eb89c4178d4
 
x86_64:
kernel-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: ce35a58f0e130eb4cd9124faefcc26dcSHA-256: 854c61388182c9587b1f5b7bbb4ac3b977a50042ed693bb335c60b829e7e73ec
kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm
    MD5: 24c3931b1dc05ce406574b72dac495aaSHA-256: 33c775d3f08737045d3cbfbe4aaad5e6d16bf632ae2fdc1185803203f1bd5610
kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: d2b71233bb4f7ded6ab582ea23053b55SHA-256: 2eb9804522ed1c767ef8a5bc6283fb41b2cbb2f05776cca308946b6ff3b7dcc3
kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 73b31b2381434d06793a29905edae217SHA-256: 0d53247daa69e80b6e2080e84f26d19822350b37394ad6c4eca3a79845385f8f
kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 1a825d636b4685776752377f6f0592f3SHA-256: 64a3b1fa8490a2589a61b366263d1c2751a1da652c83857f7256e56352a4b5ac
kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 3e3f43ea080c524915e164cc1b2bfcd1SHA-256: 87a2657b8aa64a62ccc6bd659b00e5210d20c72018e94b4c7daa6e7c098ae8e2
kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 21d52ee9fc0f6cf9093603b65bba9fc3SHA-256: ad69bf3aeb18e4ed69624caef0457a0e7891ff079c5d5562dfa12f6c2db55a72
kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 1b56ac1536479b3b21bb8ceb358c2a6eSHA-256: 985bb49475cdda19ad18963459320b46032d0b54d18359188527b129568483fe
kernel-doc-2.6.32-431.77.1.el6.noarch.rpm
    MD5: 902fa70945d6ee804637aa6b4fabd827SHA-256: 4b8823dffbed724a313d3b5ccdc3a9c1e31e808630510b7ae9e082b839ac1f9c
kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm
    MD5: b5b625bed3d9ccff8877db801bf06842SHA-256: db85c531b17efcf7464a668af2c62541b47476a7ab7f50c44fa99de5539d2b4b
kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 16c7bc26d080ef3356c566baebd84266SHA-256: c3be05b0752b9c0cd20f48c458153238ebf2cb7603de60f68cedb4c56b9803ff
perf-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 852c878b96af18015a7fcd03e2244bd2SHA-256: 72e2d6f1f775c9676ef7646f08bed60e0967e9986968e0fad05bb8958be45016
perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 83b12ed00d14fcb76d6e352b2a037c53SHA-256: 1447ee24b3d19c413f48790b88000a3efc6fa45f566303eab3b8c0a77da29cf3
python-perf-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: d71a6a415842069a557a165234fe646cSHA-256: 73748b9e04ac1f8cca30997d8025ca150a2bd3e614feb4b4e9e1b98fd23e2929
python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 0405c7c80e61feccb72207cf153eab44SHA-256: fc92d5f09bea883e484292e5b1ba6f1b149f4c2c9dcd4f5519a219b7a7931a39
 
Red Hat Enterprise Linux Server TUS (v. 6.5)

SRPMS:
kernel-2.6.32-431.77.1.el6.src.rpm
    MD5: 3a075adc874ed1cad0cf0ad293f1eaafSHA-256: 32664ccccd3c3ffd4bfff6d46386b3b59509c6c05c021c14629c9eb89c4178d4
 
x86_64:
kernel-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: ce35a58f0e130eb4cd9124faefcc26dcSHA-256: 854c61388182c9587b1f5b7bbb4ac3b977a50042ed693bb335c60b829e7e73ec
kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm
    MD5: 24c3931b1dc05ce406574b72dac495aaSHA-256: 33c775d3f08737045d3cbfbe4aaad5e6d16bf632ae2fdc1185803203f1bd5610
kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: d2b71233bb4f7ded6ab582ea23053b55SHA-256: 2eb9804522ed1c767ef8a5bc6283fb41b2cbb2f05776cca308946b6ff3b7dcc3
kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 73b31b2381434d06793a29905edae217SHA-256: 0d53247daa69e80b6e2080e84f26d19822350b37394ad6c4eca3a79845385f8f
kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 1a825d636b4685776752377f6f0592f3SHA-256: 64a3b1fa8490a2589a61b366263d1c2751a1da652c83857f7256e56352a4b5ac
kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 3e3f43ea080c524915e164cc1b2bfcd1SHA-256: 87a2657b8aa64a62ccc6bd659b00e5210d20c72018e94b4c7daa6e7c098ae8e2
kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 21d52ee9fc0f6cf9093603b65bba9fc3SHA-256: ad69bf3aeb18e4ed69624caef0457a0e7891ff079c5d5562dfa12f6c2db55a72
kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 1b56ac1536479b3b21bb8ceb358c2a6eSHA-256: 985bb49475cdda19ad18963459320b46032d0b54d18359188527b129568483fe
kernel-doc-2.6.32-431.77.1.el6.noarch.rpm
    MD5: 902fa70945d6ee804637aa6b4fabd827SHA-256: 4b8823dffbed724a313d3b5ccdc3a9c1e31e808630510b7ae9e082b839ac1f9c
kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm
    MD5: b5b625bed3d9ccff8877db801bf06842SHA-256: db85c531b17efcf7464a668af2c62541b47476a7ab7f50c44fa99de5539d2b4b
kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 16c7bc26d080ef3356c566baebd84266SHA-256: c3be05b0752b9c0cd20f48c458153238ebf2cb7603de60f68cedb4c56b9803ff
perf-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 852c878b96af18015a7fcd03e2244bd2SHA-256: 72e2d6f1f775c9676ef7646f08bed60e0967e9986968e0fad05bb8958be45016
perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 83b12ed00d14fcb76d6e352b2a037c53SHA-256: 1447ee24b3d19c413f48790b88000a3efc6fa45f566303eab3b8c0a77da29cf3
python-perf-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: d71a6a415842069a557a165234fe646cSHA-256: 73748b9e04ac1f8cca30997d8025ca150a2bd3e614feb4b4e9e1b98fd23e2929
python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm
    MD5: 0405c7c80e61feccb72207cf153eab44SHA-256: fc92d5f09bea883e484292e5b1ba6f1b149f4c2c9dcd4f5519a219b7a7931a39
 
(The unlinked packages above are only available from the Red Hat Network)

1382268 – CVE-2016-7117 kernel: Use-after-free in the recvmmsg exit path

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply