CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-2636 Red Hat Enterprise Linux Local Kernel Privilege Escalation Vulnerability.

2017年4月12日 877点热度 0人点赞 0条评论

漏洞类别:Local

漏洞等级:

漏洞信息

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Race condition in drivers/tty/n_hdlc.c in the Linux kernel allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.

漏洞危害

On successful exploitation it allows an attacker with an account on the local system to potentially elevate privileges.

解决方案

No solution is available till date. All Red Hat customers running affected versions of the kernel are strongly recommended to update the kernel as soon as patches are available. Workaround:
The n_hdlc kernel module will be automatically loaded when an application attempts to use the HDLC line discipline from userspace.
The following command, run as root, will prevent accidental or intentional loading of the module. Red Hat Product Security believes this is a robust method to prevent accidental loading of the module, even by privileged users.

# echo "install n_hdlc /bin/true">> /etc/modprobe.d/disable-n_hdlc.conf

The system will need to be restarted if the n_hdlc modules are already loaded. In most circumstances, the n_hdlc kernel modules will be unable to be unloaded if in use and while any current process using this line discipline is required.

上一篇:CVE-2017-5567

0day

标签: 暂无
最后更新:2017年4月12日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me