MGASA-2016-0032

Source
https://advisories.mageia.org/MGASA-2016-0032.html
Import Source
https://advisories.mageia.org/MGASA-2016-0032.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0032
Related
Published
2016-01-21T06:09:50Z
Modified
2016-01-21T06:03:17Z
Summary
Updated kernel-tmb packages fix security vulnerability
Details

Perception Point Research Team found a reference leak in keyring in joinsessionkeyring() that can be exploited to successfully escalate privileges from a local user to root (CVE-2016-0728).

Other fixes in this kernel update: - netfilter: nfnatredirect: add missing NULL pointer check

References
Credits

Affected packages

Mageia:5 / kernel-tmb

Package

Name
kernel-tmb
Purl
pkg:rpm/mageia/kernel-tmb?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.15-2.mga5

Ecosystem specific

{
    "section": "core"
}