SB2017030216 - Red Hat Enterprise Linux 7 update for kernel-aarch64 



SB2017030216 - Red Hat Enterprise Linux 7 update for kernel-aarch64

Published: March 2, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017030216
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: CVE-2016-5195)

The vulnerability allows a  local user to obtain elevated privileges on the target system.
The weakness is due to race condition in the kernel memory subsystem in the management of copy-on-write operations on read-only memory mappings that lets attackers to overwrite kernel memory and gain kernel-level privileges.
Successful exploitation of the vulnerability results in gaining of root privileges on the vulnerable system.

Note: the vulnerability was being actively exploited.

2) Resource exhaustion (CVE-ID: CVE-2016-7039)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the IP stack due to stack consumption. A remote attacker can trigger use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, and cause the service to crash.

Remediation

Install update from vendor's website.