594
edits
Changes
Created page with "== Changes == Since {{kernel link|rhel5|028stab120.3}}: * Rebase to RHEL5 kernel 2.6.32-417.el5 * A use-after-free vulnerability was found in the kernels socket recvmmsg sub..."
== Changes ==
Since {{kernel link|rhel5|028stab120.3}}:
* Rebase to RHEL5 kernel 2.6.32-417.el5
* A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
* An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system. (CVE-2013-2596, Important)
* It was found that the Xen hypervisor x86 CPU emulator implementation did not correctly handle certain instructions with segment overrides, potentially resulting in a memory corruption. A malicious guest user could use this flaw to read arbitrary data relating to other guests, cause a denial of service on the host, or potentially escalate their privileges on the host. (CVE-2015-2151, Important)
=== See also ===
* {{RHSA-2016-2962}}
* {{RHSA-2016-2124}}
* {{RHBA-2016-1782}}
* {{RHBA-2016-1393}}
* {{RHBA-2016-1024}}
* {{RHSA-2016-0450}}
* {{CVE|2016-7117}}
* {{CVE|2016-1583}}
* {{CVE|2013-2596}}
* {{CVE|2015-2151}}
Since {{kernel link|rhel5|028stab120.3}}:
* Rebase to RHEL5 kernel 2.6.32-417.el5
* A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
* An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system. (CVE-2013-2596, Important)
* It was found that the Xen hypervisor x86 CPU emulator implementation did not correctly handle certain instructions with segment overrides, potentially resulting in a memory corruption. A malicious guest user could use this flaw to read arbitrary data relating to other guests, cause a denial of service on the host, or potentially escalate their privileges on the host. (CVE-2015-2151, Important)
=== See also ===
* {{RHSA-2016-2962}}
* {{RHSA-2016-2124}}
* {{RHBA-2016-1782}}
* {{RHBA-2016-1393}}
* {{RHBA-2016-1024}}
* {{RHSA-2016-0450}}
* {{CVE|2016-7117}}
* {{CVE|2016-1583}}
* {{CVE|2013-2596}}
* {{CVE|2015-2151}}