New on LowEndTalk? Please Register and read our Community Rules.
CVE-2016-5195 - Kernel local privilege escalation (exploited)
Hi all,
Just noticed this:
https://access.redhat.com/security/vulnerabilities/2706661
Looks like anyone with local access can get root. Exploits are in the wild.
Upon further checking, doesn't look like this can be used to break out of an OpenVZ container or KVM guest as access to host's /proc/self/mem is required. However, anyone within a shared hosting setup (cPanel etc) could be affected.
Mitigation (not ideal, but works):
https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13
Comments
Some days old - Should not affect Cloudlinux or RHEL 5/6 (but 7). I think kernelcare patched my Cloudlinux 7.
Why am i not even surprised this exploit exists...
Didn't we have that already...
ok...? Should i now rather ask why they did that or why CentOS has it likely writeable then?
Details
Proof of concept