Oval Definition:oval:com.redhat.rhsa:def:20170372
Revision Date:2017-03-02Version:643
Title:RHSA-2017:0372: kernel-aarch64 security and bug fix update (Important)
Description:The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)

  • Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)

    Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.

    Bug Fix(es):

  • Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108)

  • On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)
  • Family:unixClass:patch
    Status:Reference(s):CVE-2016-5195
    CVE-2016-7039
    CVE-2016-8666
    RHSA-2017:0372
    RHSA-2017:0372-00
    RHSA-2017:0372-01
    RHSA-2017:0372-01
    Platform(s):Red Hat Enterprise Linux 7
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • kernel earlier than 0:4.5.0-15.2.1.el7 is currently running
  • OR kernel earlier than 0:4.5.0-15.2.1.el7 is set to boot up on next boot
  • AND
  • kernel is earlier than 0:4.5.0-15.2.1.el7
  • AND kernel is signed with Red Hat redhatrelease2 key
  • kernel-debug is earlier than 0:4.5.0-15.2.1.el7
  • AND kernel-debug is signed with Red Hat redhatrelease2 key
  • kernel-debug-devel is earlier than 0:4.5.0-15.2.1.el7
  • AND kernel-debug-devel is signed with Red Hat redhatrelease2 key
  • kernel-devel is earlier than 0:4.5.0-15.2.1.el7
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • kernel-headers is earlier than 0:4.5.0-15.2.1.el7
  • AND kernel-headers is signed with Red Hat redhatrelease2 key
  • kernel-tools is earlier than 0:4.5.0-15.2.1.el7
  • AND kernel-tools is signed with Red Hat redhatrelease2 key
  • kernel-tools-libs is earlier than 0:4.5.0-15.2.1.el7
  • AND kernel-tools-libs is signed with Red Hat redhatrelease2 key
  • kernel-tools-libs-devel is earlier than 0:4.5.0-15.2.1.el7
  • AND kernel-tools-libs-devel is signed with Red Hat redhatrelease2 key
  • perf is earlier than 0:4.5.0-15.2.1.el7
  • AND perf is signed with Red Hat redhatrelease2 key
  • python-perf is earlier than 0:4.5.0-15.2.1.el7
  • AND python-perf is signed with Red Hat redhatrelease2 key
  • BACK