This problem did not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. This issue is not planned to be corrected in future updates for Red Hat Enterprise Linux 5.
This issue is rated low as exploiting it requires physical (to plug in specially prepared usb disk) or root (to mount specially prepared filesystem) access to the system. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
|Red Hat Enterprise Linux 6 (kernel)||RHSA-2016:0855||2016-05-10|
Affected Packages State
|Red Hat Enterprise MRG 2||realtime-kernel||Not affected|
|Red Hat Enterprise Linux 7||kernel-rt||Not affected|
|Red Hat Enterprise Linux 7||kernel||Not affected|
|Red Hat Enterprise Linux 5||kernel||Will not fix|