[arch-security] [ASA-201601-20] linux: privilege escalation
anthraxx at archlinux.org
Wed Jan 20 12:12:10 UTC 2016
Arch Linux Security Advisory ASA-201601-20
Date : 2016-01-20
CVE-ID : CVE-2016-0728
Package : linux
Type : privilege escalation
Remote : No
Link : https://wiki.archlinux.org/index.php/CVE
The package linux before version 4.3.3-3 is vulnerable to local
Upgrade to 4.3.3-3.
# pacman -Syu "linux>=4.3.3-3"
The problem has been fixed upstream but no release is available yet.
It was reported that possible use-after-free vulnerability in keyring
facility, possibly leading to local privilege escalation, was found.
Function join_session_keyring in security/keys/process_keys.c holds a
reference to the requested keyring, but if that keyring is the same as
the one being currently used by the process, the kernel wouldn't
decrease keyring->usage before returning to userspace. The usage field
can be possibly overflowed causing use-after-free on the keyring object.
A local attacker is able to make use of this vulnerability to elevate
privileges and gain root access to the underlying system.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security