Synopsis:          Important: kernel security update
Advisory ID:       SLSA-2016:0064-1
Issue Date:        2016-01-25
CVE Numbers:       CVE-2016-0728
--

* A use-after-free flaw was found in the way the Linux kernel's key
management subsystem handled keyring object reference counting in certain
error path of the join_session_keyring() function. A local, unprivileged
user could use this flaw to escalate their privileges on the system.
(CVE-2016-0728, Important)

The system must be rebooted for this update to take effect.
--

SL7
  x86_64
    kernel-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debug-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-devel-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-headers-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-tools-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-327.4.5.el7.x86_64.rpm
    perf-3.10.0-327.4.5.el7.x86_64.rpm
    perf-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    python-perf-3.10.0-327.4.5.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-327.4.5.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-327.4.5.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-327.4.5.el7.noarch.rpm
    kernel-doc-3.10.0-327.4.5.el7.noarch.rpm

- Scientific Linux Development Team