zEitEr
Super Moderator
Hello,
In January 19th 2016 a vulnerability was discovered in the Linux kernel used by many servers worldwide. This vulnerability allowed an regular user to escalate privileges.
Red Hat has been made aware of a vulnerability affecting the kernel that ships with Red Hat Enterprise Linux 7 kernel and derivatives. This vulnerability CVE-2016-0728 could allow for arbitrary code execution and a skilled attacker could use it to escalate their privileges on the system. The attacker must be able to run custom code on the account, in the most common configuration this requires them to have a login and shell account on the target system.
[TABLE="width: 100%"]
[TR]
[TD]Red Hat Enterprise Linux 4[/TD]
[TD]Not affected[/TD]
[/TR]
[TR]
[TD]Red Hat Enterprise Linux 5[/TD]
[TD]Not affected[/TD]
[/TR]
[TR]
[TD]Red Hat Enterprise Linux 6[/TD]
[TD]Not affected[/TD]
[/TR]
[TR]
[TD]Red Hat Enterprise Linux 7[/TD]
[TD]Affected[/TD]
[/TR]
[/TABLE]
More info: https://access.redhat.com/node/2131021
In January 19th 2016 a vulnerability was discovered in the Linux kernel used by many servers worldwide. This vulnerability allowed an regular user to escalate privileges.
Red Hat has been made aware of a vulnerability affecting the kernel that ships with Red Hat Enterprise Linux 7 kernel and derivatives. This vulnerability CVE-2016-0728 could allow for arbitrary code execution and a skilled attacker could use it to escalate their privileges on the system. The attacker must be able to run custom code on the account, in the most common configuration this requires them to have a login and shell account on the target system.
[TABLE="width: 100%"]
[TR]
[TD]Red Hat Enterprise Linux 4[/TD]
[TD]Not affected[/TD]
[/TR]
[TR]
[TD]Red Hat Enterprise Linux 5[/TD]
[TD]Not affected[/TD]
[/TR]
[TR]
[TD]Red Hat Enterprise Linux 6[/TD]
[TD]Not affected[/TD]
[/TR]
[TR]
[TD]Red Hat Enterprise Linux 7[/TD]
[TD]Affected[/TD]
[/TR]
[/TABLE]
More info: https://access.redhat.com/node/2131021