Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:1814 - Security Advisory
Issued:
2016-09-06
Updated:
2016-09-06

RHSA-2016:1814 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important)
  • It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)

Red Hat would like to thank Jann Horn for reporting CVE-2016-4565 and Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting CVE-2016-5696.

Bug Fix(es):

  • After upgrading the kernel, CPU load average increased compared to the prior kernel version due to the modification of the scheduler. The provided patchset makes the calculation algorithm of this load average roll back to the status of the previous system version thus resulting in relatively lower values in the same system load. (BZ#1343010)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 6.5 x86_64
  • Red Hat Enterprise Linux Server - TUS 6.5 x86_64

Fixes

  • BZ - 1310570 - CVE-2016-4565 kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko
  • BZ - 1354708 - CVE-2016-5696 kernel: challenge ACK counter information disclosure.

CVEs

  • CVE-2016-4565
  • CVE-2016-5696

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 6.5

SRPM
kernel-2.6.32-431.73.2.el6.src.rpm SHA-256: c9a369a1f868f13dbdcc6cb7793a990ee8009cb30f7256d33afe0f0ee291ab8b
x86_64
kernel-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 8c997d4e764db9351d075c1bf7ddd2f53fd58edab5453410a0db98b7ef43fd04
kernel-abi-whitelists-2.6.32-431.73.2.el6.noarch.rpm SHA-256: 83d4a626ad990b567709005c4ed68d4e34704b2e3468a2fa16a9b09fa872d5cd
kernel-debug-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 99fce47d13d06d5fb47f168a1b8d453aedf5d7d7e079df242035c4cbe5dc5847
kernel-debug-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 60deaace0b1aa6b9397e3496b35e06d0609ec40584971c93f04a234b7bbfd4b1
kernel-debug-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 60deaace0b1aa6b9397e3496b35e06d0609ec40584971c93f04a234b7bbfd4b1
kernel-debug-devel-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: a288c7138c72a14f80c8eeeffa8aa55eab6f439c4e717cb095261adaeaddc5e0
kernel-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 147fc874fb460f04f1275714467594af6e9d72aac90eb1cd545cb8ab24856756
kernel-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 147fc874fb460f04f1275714467594af6e9d72aac90eb1cd545cb8ab24856756
kernel-debuginfo-common-x86_64-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 0e83a9da4b58e17c1f2ae1a2771e85f847dfe8ae3faac8dae6c6d5c87e26353c
kernel-debuginfo-common-x86_64-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 0e83a9da4b58e17c1f2ae1a2771e85f847dfe8ae3faac8dae6c6d5c87e26353c
kernel-devel-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 00e411b356ef07be0129c97eb173f331639527f4963121ac8c500b242ebba37e
kernel-doc-2.6.32-431.73.2.el6.noarch.rpm SHA-256: a5fe6778ac59784c17b814713715d37d9cbc51078f09d66f2698f16e4cdc011c
kernel-firmware-2.6.32-431.73.2.el6.noarch.rpm SHA-256: 70a4d75567beabecfdbee11e1375e0f667e2276093ff99b205ee5ed666be5a29
kernel-headers-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: d559b2a02923531e0019c3e3f04a0cea2124c3b081cc126115d9e1bbb03c9ad8
perf-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 435965e8d6abf336a5c5c55e8328bdcf619aefc64acfbcceacb4a0946fe679f7
perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 693e4f7f25af56eef968c6572d686c80b1ee51b96b13ba7d90c147bbceafc984
perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 693e4f7f25af56eef968c6572d686c80b1ee51b96b13ba7d90c147bbceafc984
python-perf-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: fe7ec75d8b751632ad1d5509be4f58b1d393d2df8c590af8cf0fdf0e5baef39f
python-perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 4968935356bc748aa440ed86f4d59cc8f0172c71e8828fa71c9e102438e4ed3c
python-perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 4968935356bc748aa440ed86f4d59cc8f0172c71e8828fa71c9e102438e4ed3c

Red Hat Enterprise Linux Server - TUS 6.5

SRPM
kernel-2.6.32-431.73.2.el6.src.rpm SHA-256: c9a369a1f868f13dbdcc6cb7793a990ee8009cb30f7256d33afe0f0ee291ab8b
x86_64
kernel-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 8c997d4e764db9351d075c1bf7ddd2f53fd58edab5453410a0db98b7ef43fd04
kernel-abi-whitelists-2.6.32-431.73.2.el6.noarch.rpm SHA-256: 83d4a626ad990b567709005c4ed68d4e34704b2e3468a2fa16a9b09fa872d5cd
kernel-debug-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 99fce47d13d06d5fb47f168a1b8d453aedf5d7d7e079df242035c4cbe5dc5847
kernel-debug-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 60deaace0b1aa6b9397e3496b35e06d0609ec40584971c93f04a234b7bbfd4b1
kernel-debug-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 60deaace0b1aa6b9397e3496b35e06d0609ec40584971c93f04a234b7bbfd4b1
kernel-debug-devel-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: a288c7138c72a14f80c8eeeffa8aa55eab6f439c4e717cb095261adaeaddc5e0
kernel-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 147fc874fb460f04f1275714467594af6e9d72aac90eb1cd545cb8ab24856756
kernel-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 147fc874fb460f04f1275714467594af6e9d72aac90eb1cd545cb8ab24856756
kernel-debuginfo-common-x86_64-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 0e83a9da4b58e17c1f2ae1a2771e85f847dfe8ae3faac8dae6c6d5c87e26353c
kernel-debuginfo-common-x86_64-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 0e83a9da4b58e17c1f2ae1a2771e85f847dfe8ae3faac8dae6c6d5c87e26353c
kernel-devel-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 00e411b356ef07be0129c97eb173f331639527f4963121ac8c500b242ebba37e
kernel-doc-2.6.32-431.73.2.el6.noarch.rpm SHA-256: a5fe6778ac59784c17b814713715d37d9cbc51078f09d66f2698f16e4cdc011c
kernel-firmware-2.6.32-431.73.2.el6.noarch.rpm SHA-256: 70a4d75567beabecfdbee11e1375e0f667e2276093ff99b205ee5ed666be5a29
kernel-headers-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: d559b2a02923531e0019c3e3f04a0cea2124c3b081cc126115d9e1bbb03c9ad8
perf-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 435965e8d6abf336a5c5c55e8328bdcf619aefc64acfbcceacb4a0946fe679f7
perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 693e4f7f25af56eef968c6572d686c80b1ee51b96b13ba7d90c147bbceafc984
perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 693e4f7f25af56eef968c6572d686c80b1ee51b96b13ba7d90c147bbceafc984
python-perf-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: fe7ec75d8b751632ad1d5509be4f58b1d393d2df8c590af8cf0fdf0e5baef39f
python-perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 4968935356bc748aa440ed86f4d59cc8f0172c71e8828fa71c9e102438e4ed3c
python-perf-debuginfo-2.6.32-431.73.2.el6.x86_64.rpm SHA-256: 4968935356bc748aa440ed86f4d59cc8f0172c71e8828fa71c9e102438e4ed3c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility