If the vulnerability is exploited in the context of a user with administrator rights, it may be possible for the attacker to gain full control of the system.

This vulnerability affects the following Linux hardware platforms:

Red Hat Enterprise Linux (RHEL) 6.5, 7, and SuSE Linux Enterprise Server (SLES) 12 and 13.

Possible Symptoms of an Attack

An attacker may remotely exploit this vulnerability to cause memory overwriting on a victim’s system.

Mitigation

End-users should follow these steps to mitigate this vulnerability:

Upgrade the kernel to the latest version.

Apply the appropriate security patch for the kernel.

Reduce the privilege of the user to a minimum, if possible.

Apply the appropriate security patches for the Linux kernel.

Disable unneeded services and disable the execution of unnecessary application in the Linux system.

Red Hat Enterprise Linux (RHEL) 6.5

, 7, and SuSE Linux Enterprise Server (SLES) 12 and 13

If the vulnerability is exploited in the context of a user with administrator rights, it may be possible for the attacker to gain full control of the system.

This vulnerability affects the following Linux hardware platforms:

Red Hat Enterprise Linux (RHEL) 6.5, 7, and SuSE Linux Enterprise Server (SLES) 12 and 13.

Timeline

Published on: 10/14/2022 16:15:00 UTC
Last modified on: 10/18/2022 17:22:00 UTC

References