The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * A flaw was found in the Linux kernel’s keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important) * The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application. (CVE-2015-8660, Moderate) Red Hat would like to thank Nathan Williams for reporting CVE-2015-8660. The CVE-2016-4470 issue was discovered by David Howells (Red Hat Inc.). The kernel-rt packages have been upgraded to upstream version 3.10.0-327.rt56.194.el6rt, which provides a number of bug fixes over the previous version. (BZ#1343658) This update also fixes the following bugs: * Previously, use of the get/put_cpu_var() function in function refill_stock() from the memcontrol cgroup code lead to a “scheduling while atomic” warning. With this update, refill_stock() uses the get/put_cpu_light() function instead, and the warnings no longer appear. (BZ#1348710) * Prior to this update, if a real time task pinned to a given CPU was taking 100% of the CPU time, then calls to the lru_add_drain_all() function on other CPUs blocked for an undetermined amount of time. This caused latencies and undesired side effects. With this update, lru_add_drain_all() has been changed to drain the LRU pagevecs of remote CPUs. (BZ#1348711)
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38327424b40bcebe2de92d07312c89360ac9229a
lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
rhn.redhat.com/errata/RHSA-2016-1532.html
rhn.redhat.com/errata/RHSA-2016-1539.html
rhn.redhat.com/errata/RHSA-2016-1541.html
rhn.redhat.com/errata/RHSA-2016-1657.html
rhn.redhat.com/errata/RHSA-2016-2006.html
rhn.redhat.com/errata/RHSA-2016-2074.html
rhn.redhat.com/errata/RHSA-2016-2076.html
rhn.redhat.com/errata/RHSA-2016-2128.html
rhn.redhat.com/errata/RHSA-2016-2133.html
www.debian.org/security/2016/dsa-3607
www.openwall.com/lists/oss-security/2016/06/15/11
www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securitytracker.com/id/1036763
www.ubuntu.com/usn/USN-3049-1
www.ubuntu.com/usn/USN-3050-1
www.ubuntu.com/usn/USN-3051-1
www.ubuntu.com/usn/USN-3052-1
www.ubuntu.com/usn/USN-3053-1
www.ubuntu.com/usn/USN-3054-1
www.ubuntu.com/usn/USN-3055-1
www.ubuntu.com/usn/USN-3056-1
www.ubuntu.com/usn/USN-3057-1
access.redhat.com/errata/RHSA-2016:1532
access.redhat.com/errata/RHSA-2016:1539
access.redhat.com/errata/RHSA-2016:1541
access.redhat.com/errata/RHSA-2016:1657
access.redhat.com/errata/RHSA-2016:2006
access.redhat.com/errata/RHSA-2016:2074
access.redhat.com/errata/RHSA-2016:2076
access.redhat.com/errata/RHSA-2016:2128
access.redhat.com/errata/RHSA-2016:2133
access.redhat.com/security/cve/CVE-2016-4470
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1341716
bugzilla.redhat.com/show_bug.cgi?id=1343658
github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a
rhn.redhat.com/errata/RHSA-2016-1532.html