{"id":208,"date":"2016-01-20T11:14:04","date_gmt":"2016-01-20T09:14:04","guid":{"rendered":"https:\/\/www.nonamehosts.com\/blog\/?p=208"},"modified":"2020-02-19T23:45:04","modified_gmt":"2020-02-19T21:45:04","slug":"patch-vulnerability-cve20160728","status":"publish","type":"post","link":"https:\/\/www.nonamehosts.com\/blog\/security\/patch-vulnerability-cve20160728\/","title":{"rendered":"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728"},"content":{"rendered":"<p style=\"text-align: justify;\">Very serious security problem has been found in the Linux kernel. Local privilege escalation vulnerability has existed since 2012. This bug affects millions of Android or Linux applications to escalate privileges. Any server or desktop (32 or 64 bit) with Linux Kernel version 3.8+ is vulnerable. How do I fix this problem?<\/p>\n<p><!--more--><\/p>\n<h3 style=\"text-align: justify;\">What is CVE-2016-0728 bug?<\/h3>\n<p style=\"text-align: justify;\">As per the original research post:<\/p>\n<p style=\"text-align: justify;\">CVE-2016-0728 is caused by a reference leak in the keyrings facility. Before we dive into the details, let\u2019s cover some background required to understand the bug. It can successfully escalates privileges from a local user to root.<\/p>\n<p style=\"text-align: justify;\">A list of affected Linux distros<\/p>\n<p style=\"text-align: justify;\">Is my Linux distro version affected by CVE-2016-0728? The &#8220;Possible use-after-free vulnerability in keyring facility, CVE-2016-0728&#8221; are as follows:<\/p>\n<p style=\"text-align: justify;\">Red Hat Enterprise Linux 7<br \/>\nCentOS Linux 7<br \/>\nScientific Linux 7<br \/>\nDebian Linux stable 8.x (jessie)<br \/>\nDebian Linux testing 9.x (stretch)<br \/>\nSUSE Linux Enterprise Desktop 12<br \/>\nSUSE Linux Enterprise Desktop 12 SP1<br \/>\nSUSE Linux Enterprise Server 12<br \/>\nSUSE Linux Enterprise Server 12 SP1<br \/>\nSUSE Linux Enterprise Workstation Extension 12<br \/>\nSUSE Linux Enterprise Workstation Extension 12 SP1<br \/>\nUbuntu Linux 14.04 LTS (Trusty Tahr)<br \/>\nUbuntu Linux 15.04 (Vivid Vervet)<br \/>\nUbuntu Linux 15.10 (Wily Werewolf)<br \/>\nOpensuse Linux LEAP and version 13.2<\/p>\n<h3 style=\"text-align: justify;\">How do I fix CVE-2016-0728 on Linux?<\/h3>\n<p style=\"text-align: justify;\">Type the commands as per your Linux distro. You need to reboot the box. Before you apply patch, note down your current kernel version:<\/p>\n<pre class=\"lang:sh decode:true\"># uname -a\nLinux test.server.com 3.10.0-123.20.1.el7.x86_64 #1 SMP Thu Jan 29 18:05:33 UTC 2015 x86_64 x86_64 x86_64 GNU\/Linux\n# uname -mrs\nLinux 3.10.0-123.20.1.el7.x86_64 x86_64\n<\/pre>\n<h3>On Debian\/Ubuntu:<\/h3>\n<pre class=\"lang:sh decode:true \"># apt-get update &amp;&amp; apt-get upgrade &amp;&amp; apt-get dist-upgrade\n<\/pre>\n<p>After update is finished reboot the server.<\/p>\n<h3>On RHEL\/Centos 7:<\/h3>\n<p>Run following command as soon as package to fix this vulnerability is&nbsp;released. More details at <a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2016-0728\" target=\"_blank\" rel=\"noopener noreferrer\">Redhat page<\/a>.<\/p>\n<pre class=\"lang:sh decode:true \"># yum update<\/pre>\n<p>Reboot server when update is completed.<\/p>\n<h3>Verification:<\/h3>\n<p>In order to check if patching is successful please compare your kernel version with the one before.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Very serious security problem has been found in the Linux kernel. Local privilege escalation vulnerability has existed since 2012. This bug affects millions of Android or Linux applications to escalate privileges. Any server or desktop (32 or 64 bit) with Linux Kernel version 3.8+ is vulnerable. How do I fix this problem?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[26,64,68,94,113],"class_list":["post-208","post","type-post","status-publish","format-standard","hentry","category-security","category-tutorials","tag-cve-2016-0728","tag-kernel","tag-linux","tag-patch","tag-security"],"_links":{"self":[{"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/posts\/208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/comments?post=208"}],"version-history":[{"count":1,"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/posts\/208\/revisions"}],"predecessor-version":[{"id":413,"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/posts\/208\/revisions\/413"}],"wp:attachment":[{"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/media?parent=208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/categories?post=208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nonamehosts.com\/blog\/wp-json\/wp\/v2\/tags?post=208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}