[RHSA-2016:0065] kernel-rt security update

Severity Important
Affected Packages 7
CVEs 1

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A use-after-free flaw was found in the way the Linux kernel's key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2016-0728, Important)

Red Hat would like to thank the Perception Point research team for
reporting this issue.

All kernel-rt users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. The system must be
rebooted for this update to take effect.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/kernel-rt?arch=x86_64&distro=redhat-7.2 redhat kernel-rt < 3.10.0-327.4.5.rt56.206.el7_2 redhat-7.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-trace?arch=x86_64&distro=redhat-7.2 redhat kernel-rt-trace < 3.10.0-327.4.5.rt56.206.el7_2 redhat-7.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-trace-devel?arch=x86_64&distro=redhat-7.2 redhat kernel-rt-trace-devel < 3.10.0-327.4.5.rt56.206.el7_2 redhat-7.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-doc?distro=redhat-7.2 redhat kernel-rt-doc < 3.10.0-327.4.5.rt56.206.el7_2 redhat-7.2
Affected pkg:rpm/redhat/kernel-rt-devel?arch=x86_64&distro=redhat-7.2 redhat kernel-rt-devel < 3.10.0-327.4.5.rt56.206.el7_2 redhat-7.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-debug?arch=x86_64&distro=redhat-7.2 redhat kernel-rt-debug < 3.10.0-327.4.5.rt56.206.el7_2 redhat-7.2 x86_64
Affected pkg:rpm/redhat/kernel-rt-debug-devel?arch=x86_64&distro=redhat-7.2 redhat kernel-rt-debug-devel < 3.10.0-327.4.5.rt56.206.el7_2 redhat-7.2 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...