This update only contains this 2 fixes compared to the 4.1.15-1 released in MGASA-2016-0015 so testing is fast...just ensure it installs and boots Advisory (also added to svn) Perception Point Research Team found a reference leak in keyring in join_session_keyring() that can be exploited to successfully escalate privileges from a local user to root (CVE-2016-0728). Other fixes in this kernel update: - netfilter: nf_nat_redirect: add missing NULL pointer check SRPM: kernel-tmb-4.1.15-2.mga5.src.rpm i586: kernel-tmb-desktop-4.1.15-2.mga5-1-1.mga5.i586.rpm kernel-tmb-desktop-devel-4.1.15-2.mga5-1-1.mga5.i586.rpm kernel-tmb-desktop-devel-latest-4.1.15-2.mga5.i586.rpm kernel-tmb-desktop-latest-4.1.15-2.mga5.i586.rpm kernel-tmb-source-4.1.15-2.mga5-1-1.mga5.noarch.rpm kernel-tmb-source-latest-4.1.15-2.mga5.noarch.rpm x86_64: kernel-tmb-desktop-4.1.15-2.mga5-1-1.mga5.x86_64.rpm kernel-tmb-desktop-devel-4.1.15-2.mga5-1-1.mga5.x86_64.rpm kernel-tmb-desktop-devel-latest-4.1.15-2.mga5.x86_64.rpm kernel-tmb-desktop-latest-4.1.15-2.mga5.x86_64.rpm kernel-tmb-source-4.1.15-2.mga5-1-1.mga5.noarch.rpm kernel-tmb-source-latest-4.1.15-2.mga5.noarch.rpm Reproducible: Steps to Reproduce:
Priority: Normal => HighWhiteboard: (none) => advisory
Keywords: (none) => validated_updateWhiteboard: advisory => advisory MGA5-64-OK MGA5-32-OKCC: (none) => davidwhodgins, sysadmin-bugs
Testing complete on i586/x86_64, real and vb.
An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0032.html
Status: NEW => RESOLVEDResolution: (none) => FIXED