- Issued:
- 2016-09-14
- Updated:
- 2016-09-14
RHSA-2016:1883 - Security Advisory
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
The kernel-rt packages have been upgraded to version 3.10.0-327.rt56.197, which provides a number of bug fixes over the previous version. (BZ#1366059)
Security Fix(es):
- A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important)
- A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important)
- An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- MRG Realtime 2 x86_64
Fixes
- BZ - 1317383 - CVE-2016-3134 kernel: netfilter: missing bounds check in ipt_entry structure
- BZ - 1349722 - CVE-2016-4997 kernel: compat IPT_SO_SET_REPLACE setsockopt
- BZ - 1349886 - CVE-2016-4998 kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt
- BZ - 1366059 - update the MRG 2.5.z 3.10 kernel-rt sources
MRG Realtime 2
SRPM | |
---|---|
kernel-rt-3.10.0-327.rt56.197.el6rt.src.rpm | SHA-256: 14d1f5bb5272e990f7c6a67105bad112bc5bd6240b02d809d008632e447676af |
x86_64 | |
kernel-rt-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: 32690d1f7a3d28fd55fe412abfda5eeb647d535faa00cc124f008976e233a3d0 |
kernel-rt-debug-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: d42b0b92e1180fe6d77c3b0d122f971a9a6ae9a8ff6168ad4ab542d710eb17bb |
kernel-rt-debug-debuginfo-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: 23aa8c5a95604d69786347a5fff5c8b796b4bdfe65ad8c952c746c9f571ad13b |
kernel-rt-debug-devel-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: 2da96d64a65697f3222cc4693f25f959492d324ca8a895d2b579e9b021cc42d2 |
kernel-rt-debuginfo-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: 0409b1a0cabea74e85749d21670b5708f8bb1467e44be7e4cf27f8163cadf8a4 |
kernel-rt-debuginfo-common-x86_64-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: 618cfe5a0e00f5f269e0badd3338740a66948e730a4d933a2ee372f7b51c3ab8 |
kernel-rt-devel-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: f6522ba09435268995abbdb7cdcc16dc7fefdde10a55d9c7e0f1f50c93ccee6e |
kernel-rt-doc-3.10.0-327.rt56.197.el6rt.noarch.rpm | SHA-256: 040f625da7de8c122261d50883f3e322d2e30080f14f41e4ad3bb810a2ca6368 |
kernel-rt-firmware-3.10.0-327.rt56.197.el6rt.noarch.rpm | SHA-256: feb854aae224906334b2d6c2244582e568a4ecb32e212a6f240237c6586953dc |
kernel-rt-trace-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: 6b9314c03b57b9a4dcbf2a8836cc76f286f786c53287657960a69a32c9becc79 |
kernel-rt-trace-debuginfo-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: d18ea200fb288c9a3d434483f46cff059830583add1968730e19b6d5d8361015 |
kernel-rt-trace-devel-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: 5609ed4d4d322f04fda6ef520ea6c731f63fc5bbb49a9de45b3ea07147ff3ae7 |
kernel-rt-vanilla-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: db82648d133c7ff2d257fdda2e4faf0b73a3a446aa8059238b04360b5f372f2c |
kernel-rt-vanilla-debuginfo-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: ebe215113e5593440f134d797ae0739a542955849b6873f425b84e2ad3956f0e |
kernel-rt-vanilla-devel-3.10.0-327.rt56.197.el6rt.x86_64.rpm | SHA-256: b507209e32990ba151d3a86d598b45d8b2ab3418a9043a3c7b5920e81808b857 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.