CVE-2016-5195

Impact:
Important
Public Date:
2016-10-19
IAVA:
2016-A-0306
Bugzilla:
1384344: CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage
A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.

Find out more about CVE-2016-5195 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.

Shipping versions of Fedora are affected and Fedora is aware of this flaw.

For additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661

CVSS v2 metrics

Base Score 6.9
Base Metrics AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

CVSS v3 metrics

CVSS3 Base Score 7.8
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Extended Update Support 7.1 (kernel) RHSA-2016:2118 2016-10-26
Red Hat Enterprise Linux 5 (kernel) RHSA-2016:2124 2016-10-28
Red Hat Enterprise Linux Advanced Update Support 6.2 (kernel) RHSA-2016:2132 2016-11-01
Red Hat Enterprise Linux Advanced Update Support 6.4 (kernel) RHSA-2016:2133 2016-11-01
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) RHSA-2016:2110 2016-10-26
Red Hat Enterprise Linux Extended Update Support 6.7 (kernel) RHSA-2016:2106 2016-10-26
Red Hat Enterprise Linux 6 (kernel) RHSA-2016:2105 2016-10-26
Red Hat Enterprise Linux Long Life (v. 5.9 server) (kernel) RHSA-2016:2126 2016-10-31
Red Hat Enterprise Linux Server TUS (v. 6.5) (kernel) RHSA-2016:2120 2016-10-27
Red Hat Enterprise Linux Long Life (v. 5.6 server) (kernel) RHSA-2016:2127 2016-10-31
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2016:2107 2016-10-26
Red Hat Enterprise Linux Extended Update Support 6.6 (kernel) RHSA-2016:2128 2016-10-31
Red Hat Enterprise Linux 7 (kernel-aarch64) RHSA-2017:0372 2017-03-02
Red Hat Enterprise Linux Advanced Update Support 6.5 (kernel) RHSA-2016:2120 2016-10-27
Red Hat Enterprise Linux 7 (kernel) RHSA-2016:2098 2016-10-24

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Affected
Red Hat Enterprise Linux 4 kernel Not affected

Acknowledgements

Red Hat would like to thank Phil Oester for reporting this issue.

Mitigation

Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.

Last Modified