SCIENTIFIC-LINUX-ERRATA Archives

January 2016

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 25 Jan 2016 22:19:42 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (39 lines)
Synopsis:          Important: kernel security update
Advisory ID:       SLSA-2016:0064-1
Issue Date:        2016-01-25
CVE Numbers:       CVE-2016-0728
--

* A use-after-free flaw was found in the way the Linux kernel's key
management subsystem handled keyring object reference counting in certain
error path of the join_session_keyring() function. A local, unprivileged
user could use this flaw to escalate their privileges on the system.
(CVE-2016-0728, Important)

The system must be rebooted for this update to take effect.
--

SL7
  x86_64
    kernel-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debug-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-devel-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-headers-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-tools-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-327.4.5.el7.x86_64.rpm
    perf-3.10.0-327.4.5.el7.x86_64.rpm
    perf-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    python-perf-3.10.0-327.4.5.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-327.4.5.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-327.4.5.el7.noarch.rpm
    kernel-doc-3.10.0-327.4.5.el7.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2