Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2016:2127 - Security Advisory
Issued:
2016-10-31
Updated:
2016-10-31

RHSA-2016:2127 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 5.6 Long
Life.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

  • A race condition was found in the way the Linux kernel's memory subsystem

handled the copy-on-write (COW) breakage of private read-only memory mappings.
An unprivileged, local user could use this flaw to gain write access to
otherwise read-only memory mappings and thus increase their privileges on the
system. (CVE-2016-5195, Important)

Red Hat would like to thank Phil Oester for reporting this issue.

Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 5.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.6 ia64
  • Red Hat Enterprise Linux Server - AUS 5.6 i386

Fixes

  • BZ - 1384344 - CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

CVEs

  • CVE-2016-5195

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/2706661
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 5.6

SRPM
kernel-2.6.18-238.57.1.el5.src.rpm SHA-256: 8b40aed3fbcfe8201aaaa138fd9e4893a4ff33daa1f7a893b63efa3732d42d34
x86_64
kernel-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: 81961c1287b7fb9a5ffca7f1689d6a999dc7cecbd8b7b069a9bc87bdf514dc75
kernel-debug-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: c635307d6ec0e11721b4fad260da9a8cf65dba5c9c4eaf57c91a4864ddec6d94
kernel-debug-debuginfo-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: 3fe03d7d611f5fb0d1da33f8b058bc7d971c4775c15045fc848a879ebf34060a
kernel-debug-devel-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: 45542a3a92a1fee2fb3d5c34ca6616985fdde22de2f36017814f9485fa7079ae
kernel-debuginfo-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: 7901bbd319ecc7aaf5f3439dcf728d9373961853c80deaef92d6e84e6951ca03
kernel-debuginfo-common-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: 96035662b221eec79868354cf7daf7ede34a974d611528c4f1ad32e1978fa478
kernel-devel-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: f3667472bb31819d57e1dd60d3fe77e8f429ae596c6623a94fdf4d16c8935dd2
kernel-doc-2.6.18-238.57.1.el5.noarch.rpm SHA-256: ef4113cf29cabb5be1e6fce0b44247422b3082e02a88f6be9b37e21566baba66
kernel-headers-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: 05aaa55cb8e9ca11a65eca7feb9fafe5527600e3a285ba9762ea5082d133eb4b
kernel-xen-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: 3f52c75d7c912035ad648057cf35a28f6c5fa4ae501bdbc1f7cf19220b0dab25
kernel-xen-debuginfo-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: 60148acb359350a5dc0baed8875cb5fc90762ecdaf0a795b6ed7de1302bfe07f
kernel-xen-devel-2.6.18-238.57.1.el5.x86_64.rpm SHA-256: f2f6a9fc8921e5584874ef3dce15493aa21ad4ed2c584034c723b76d4a720832
ia64
kernel-2.6.18-238.57.1.el5.ia64.rpm SHA-256: a70ce437d801d294abd92f09ddc7c89948c1bf592f66a0082f196b41fe15ce51
kernel-debug-2.6.18-238.57.1.el5.ia64.rpm SHA-256: 3540962f59a7f5235f1c123154b4645d709a5a954d6350614080f7288cf213e1
kernel-debug-debuginfo-2.6.18-238.57.1.el5.ia64.rpm SHA-256: 3a3543bbf53308b57a17db57927579aaa686fbaaba11127817d70ca7e9eecfd7
kernel-debug-devel-2.6.18-238.57.1.el5.ia64.rpm SHA-256: 59e870ead61f16d57a199089049c0938d4d8ba8715d0a84ffe294fd98d22acae
kernel-debuginfo-2.6.18-238.57.1.el5.ia64.rpm SHA-256: 8c1d95f51b8ec29b188fd24f256742cca31cc047fdc6d70188ad87e6b3ba4059
kernel-debuginfo-common-2.6.18-238.57.1.el5.ia64.rpm SHA-256: 75a30f02132a975781c0a2b19e7963481499c55ccad180688d9c33eb9950e0e9
kernel-devel-2.6.18-238.57.1.el5.ia64.rpm SHA-256: b39c0182a59aeab4daa10c9a8c240484e395b4b3c6b877e5f98108c8a310cc4d
kernel-doc-2.6.18-238.57.1.el5.noarch.rpm SHA-256: ef4113cf29cabb5be1e6fce0b44247422b3082e02a88f6be9b37e21566baba66
kernel-headers-2.6.18-238.57.1.el5.ia64.rpm SHA-256: 16456aab0be148e405d424acdd5722b2fe3bdf9c0fd313839e2ce8dbd789604c
kernel-xen-2.6.18-238.57.1.el5.ia64.rpm SHA-256: 36312ef497b71ea52800fa1a584fd40a80bb8ad3a4c54a79f66316f1215ba4a6
kernel-xen-debuginfo-2.6.18-238.57.1.el5.ia64.rpm SHA-256: b3f622c1f97212002b9ece98a6477e356d3a2e119f076c5cfe3b8f6fc3cdb8d4
kernel-xen-devel-2.6.18-238.57.1.el5.ia64.rpm SHA-256: 0f5f7cc5225df08991f3d9e843227daae6088464e128860fd33dd0d4fa5c6a2f
i386
kernel-2.6.18-238.57.1.el5.i686.rpm SHA-256: eb9ad2b23d9d6db4e6d84688f4027823435a6bbfe2d844e54b7b3d8d0cef5be8
kernel-PAE-2.6.18-238.57.1.el5.i686.rpm SHA-256: 12316574fc2cd47d36823b61b4aa193679ace3b8bc7dbc5154a238d81f41f751
kernel-PAE-debuginfo-2.6.18-238.57.1.el5.i686.rpm SHA-256: 9e0988c27991fde87017a4e3404bf58235d948128ddefad5450e5c0163496312
kernel-PAE-devel-2.6.18-238.57.1.el5.i686.rpm SHA-256: ab288a91f3775d2a23cd3d22ae9de550b06cefd940955b480ffc98746056eb44
kernel-debug-2.6.18-238.57.1.el5.i686.rpm SHA-256: 6d4f5a6ad7671b7f1786504396daf0f66387fc2d56b1075ec8fd81ee3693536a
kernel-debug-debuginfo-2.6.18-238.57.1.el5.i686.rpm SHA-256: 5cf6e82ea205c080df50b77122a52bfcfb9d17263f9a0f7c77758ee185272824
kernel-debug-devel-2.6.18-238.57.1.el5.i686.rpm SHA-256: 1565243db5b9d2b4f067a1965c6eeb2832b99af6f9a6ebc8b5b5dceb33cf18f4
kernel-debuginfo-2.6.18-238.57.1.el5.i686.rpm SHA-256: d9ae9bb1f82cc15024ba3da2f978e4c4391359257a107e6fe2d39743d3ea32d1
kernel-debuginfo-common-2.6.18-238.57.1.el5.i686.rpm SHA-256: b20b5203252a63b260277062fb9c0263b3d4bcc6068cf6396f149951e3a87f5f
kernel-devel-2.6.18-238.57.1.el5.i686.rpm SHA-256: 9edd0c82dba0519aaf6ee5d65319942762cc8f422d62e651a8ab1362b6b438ad
kernel-doc-2.6.18-238.57.1.el5.noarch.rpm SHA-256: ef4113cf29cabb5be1e6fce0b44247422b3082e02a88f6be9b37e21566baba66
kernel-headers-2.6.18-238.57.1.el5.i386.rpm SHA-256: 3a0a6891305eebde674d9fe997ca77656f9de3215806ea567ce0e98e130460cf
kernel-xen-2.6.18-238.57.1.el5.i686.rpm SHA-256: 6465c2c5d6daf31cfd5a8fb66ba79c1613c89273f05dc504af3087d0b94ba444
kernel-xen-debuginfo-2.6.18-238.57.1.el5.i686.rpm SHA-256: c85b95eac40143382a8403c5f2ab3cafee5b017ca63885c257a1ee755dab4492
kernel-xen-devel-2.6.18-238.57.1.el5.i686.rpm SHA-256: a111e8d8884aacd47f9c68f2b07c34ebffa3ef71669a4f9def362f4bb626a3e2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter