Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-5195 |
CWE-ID | CWE-362 |
Exploitation vector | Local |
Public exploit | This vulnerability is being exploited in the wild. |
Vulnerable software Subscribe |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for IBM z Systems - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux Server - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux EUS Compute Node Operating systems & Components / Operating system kernel (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor |
Red Hat Inc. |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU1039
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2016-5195
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to obtain elevated privileges on the target system.
The weakness is due to race condition in the kernel memory subsystem in the management of copy-on-write operations on read-only memory mappings that lets attackers to overwrite kernel memory and gain kernel-level privileges.
Successful exploitation of the vulnerability results in gaining of root privileges on the vulnerable system.
Note: the vulnerability was being actively exploited.
Install updates from vendor's website.
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 6.7
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 6.7
Red Hat Enterprise Linux Server - Extended Update Support: 6.7
kernel (Red Hat package): 2.6.32-71.7.1.el6 - 2.6.32-573.35.1.el6
Red Hat Enterprise Linux EUS Compute Node: 6.7
:
http://access.redhat.com/errata/RHSA-2016:2106
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?