Source: linux Severity: critical Tags: security newcomer Justification: root security hole
Dear Maintainer, A local root privilege escalation exploit (no CVE currently available) for Linux >=4.4 was reported in: https://bugs.chromium.org/p/project-zero/issues/detail?id=808 As far as I can tell, the bug does not yet appear in the Debian Security Tracker. ----- The upstream fix can be found in that same link, or more directly at: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7 Other relevant links: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-NNN1.html Thanks. -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 4.5.0-1-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)