The kernel packages contain the Linux kernel, the core of any Linux operating system. * A use-after-free flaw was found in the way the Linux kernelโs key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2016-0728, Important) Red Hat would like to thank the Perception Point research team for reporting this issue. All kernel-rt users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. The system must be rebooted for this update to take effect.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.html
lists.opensuse.org/opensuse-security-announce/2016-02/msg00012.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
rhn.redhat.com/errata/RHSA-2016-0064.html
rhn.redhat.com/errata/RHSA-2016-0065.html
rhn.redhat.com/errata/RHSA-2016-0068.html
source.android.com/security/bulletin/2016-03-01.html
www.debian.org/security/2016/dsa-3448
www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
www.openwall.com/lists/oss-security/2016/01/19/2
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.securityfocus.com/bid/81054
www.securitytracker.com/id/1034701
www.ubuntu.com/usn/USN-2870-1
www.ubuntu.com/usn/USN-2870-2
www.ubuntu.com/usn/USN-2871-1
www.ubuntu.com/usn/USN-2871-2
www.ubuntu.com/usn/USN-2872-1
www.ubuntu.com/usn/USN-2872-2
www.ubuntu.com/usn/USN-2872-3
www.ubuntu.com/usn/USN-2873-1
access.redhat.com/errata/RHSA-2016:0064
access.redhat.com/errata/RHSA-2016:0065
access.redhat.com/errata/RHSA-2016:0068
access.redhat.com/errata/RHSA-2016:0103
access.redhat.com/node/2131021
access.redhat.com/security/cve/CVE-2013-7421
access.redhat.com/security/cve/CVE-2014-8171
access.redhat.com/security/cve/CVE-2014-9644
access.redhat.com/security/cve/CVE-2015-2925
access.redhat.com/security/cve/CVE-2016-0728
access.redhat.com/security/updates/classification/#important
bto.bluecoat.com/security-advisory/sa112
bugzilla.redhat.com/show_bug.cgi?id=1297475
github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05018265
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
security.netapp.com/advisory/ntap-20160211-0001/
www.exploit-db.com/exploits/39277/