CERT mailing list archives

Linux Kernel Vulnerability


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Tue, 19 Jan 2016 20:13:47 -0600

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:

Linux Kernel Vulnerability [ https://www.us-cert.gov/ncas/current-activity/2016/01/19/Linux-Kernel-Vulnerability ] 
01/19/2016 07:59 PM EST 
Original release date: January 19, 2016

US-CERT is aware of a Linux kernel vulnerability affecting Linux PCs and servers and Android-based devices. 
Exploitation of this vulnerability may allow an attacker to take control of an affected system.

US-CERT recommends that users and administrators review the Redhat Security Blog [ 
https://access.redhat.com/security/cve/CVE-2016-0728 ] and the Debian Security Bug Tracker [ 
https://security-tracker.debian.org/tracker/CVE-2016-0728 ] for additional details and refer to their Linux or 
Unix-based OS vendors for appropriate patches.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ] 

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: