SB2016041235 - Red Hat Enterprise Linux 6 update for kernel



SB2016041235 - Red Hat Enterprise Linux 6 update for kernel

Published: April 12, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016041235
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Memory leak (CVE-ID: CVE-2016-0774)

The vulnerability allows a local attacker to cause DoS condition or gain elevated privileges on the target system.

The weakness exists in the (1) pipe_read and (2) pipe_write implementations in fs/pipe.c due to improper consideration of the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls. A local attacker can trigger memory leak, cause the service to crash or gain root privileges.

2) Input validation error (CVE-ID: CVE-2015-1805)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."


Remediation

Install update from vendor's website.