5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
The kernel packages contain the Linux kernel, the core of any Linux operating system. * A use-after-free flaw was found in the way the Linux kernelโs key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2016-0728, Important) Red Hat would like to thank the Perception Point research team for reporting this issue. All kernel-rt users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. The system must be rebooted for this update to take effect.
rhn.redhat.com/errata/RHSA-2015-0864.html
rhn.redhat.com/errata/RHSA-2015-2152.html
rhn.redhat.com/errata/RHSA-2015-2411.html
rhn.redhat.com/errata/RHSA-2016-0068.html
www.securityfocus.com/bid/74293
access.redhat.com/errata/RHSA-2015:0864
access.redhat.com/errata/RHSA-2015:2152
access.redhat.com/errata/RHSA-2015:2411
access.redhat.com/errata/RHSA-2016:0068
access.redhat.com/security/cve/CVE-2013-7421
access.redhat.com/security/cve/CVE-2014-8171
access.redhat.com/security/cve/CVE-2014-9644
access.redhat.com/security/cve/CVE-2015-2925
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1198109
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C