SB2017030216 - Red Hat Enterprise Linux 7 update for kernel-aarch64
Published: March 2, 2017 Updated: April 24, 2025
Security Bulletin ID
SB2017030216
Severity
Medium
Patch available
YES
Number of vulnerabilities
2
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: CVE-2016-5195)
The vulnerability allows a local user to obtain elevated privileges on the target system.The weakness is due to race condition in the kernel memory subsystem in the management of copy-on-write operations on read-only memory mappings that lets attackers to overwrite kernel memory and gain kernel-level privileges.
Successful exploitation of the vulnerability results in gaining of root privileges on the vulnerable system.
Note: the vulnerability was being actively exploited.
2) Resource exhaustion (CVE-ID: CVE-2016-7039)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the IP stack due to stack consumption. A remote attacker can trigger use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, and cause the service to crash.
Remediation
Install update from vendor's website.