CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Ubuntu Security Notification for Linux-lts-vivid Vulnerabilities——漏洞银行丨0DAY BANK

2016年8月16日 1989点热度 0人点赞 0条评论

漏洞信息

A missing permission check when settings ACLs was discovered in nfsd.

It was discovered that the keyring implementation in the Linux kernel did not ensure a data structure was initialized before referencing it after an error condition occurred.

A use-after-free existed in the percpu allocator in the Linux kernel.

An information leak in the netlink implementation of the Linux kernel.

漏洞危害

A local user could exploit this flaw to gain access to any file by setting an ACL. (CVE-2016-1237)

A local attacker could use this to cause a denial of service (system crash). (CVE-2016-4470)

A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-4794)

A local attacker could use this to obtain sensitive information from kernel memory. (CVE-2016-5243)

解决方案

Refer to Ubuntu advisory USN-3053-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3053-1: 14.04 (Kylin) on src (linux-image-3.19.0-66-lowlatency)

USN-3053-1: 14.04 (Kylin) on src (linux-image-3.19.0-66-powerpc64-emb)

USN-3053-1: 14.04 (Kylin) on src (linux-image-3.19.0-66-generic-lpae)

USN-3053-1: 14.04 (Kylin) on src (linux-image-3.19.0-66-generic)

USN-3053-1: 14.04 (Kylin) on src (linux-image-3.19.0-66-powerpc64-smp)

USN-3053-1: 14.04 (Kylin) on src (linux-image-3.19.0-66-powerpc-e500mc)

USN-3053-1: 14.04 (Kylin) on src (linux-image-3.19.0-66-powerpc-smp)

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me