漏洞类别:Ubuntu
漏洞等级:
漏洞信息
It was discovered that shared bind mounts in a mount namespace exponentially added entries without restriction to the Linux kernel's mount table.
It was discovered that a race condition existed in the procfs environ_read function in the Linux kernel, leading to an integer underflow.
漏洞危害
A local attacker could use this to cause a denial of service (system crash). (CVE-2016-6213)
A local attacker could use this to expose sensitive information (kernel memory). (CVE-2016-7916)
解决方案
Refer to Ubuntu advisory USN-3160-1 for affected packages and patching details, or update with your package manager.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
USN-3160-1: 14.04 (Kylin) on src (linux-image-3.13.0-106-powerpc-smp)
USN-3160-1: 14.04 (Kylin) on src (linux-image-3.13.0-106-powerpc-e500mc)
USN-3160-1: 14.04 (Kylin) on src (linux-image-lowlatency)
USN-3160-1: 14.04 (Kylin) on src (linux-image-powerpc-e500)
USN-3160-1: 14.04 (Kylin) on src (linux-image-3.13.0-106-lowlatency)
USN-3160-1: 14.04 (Kylin) on src (linux-image-3.13.0-106-powerpc64-emb)
USN-3160-1: 14.04 (Kylin) on src (linux-image-3.13.0-106-generic-lpae)
USN-3160-1: 14.04 (Kylin) on src (linux-image-3.13.0-106-generic)
USN-3160-1: 14.04 (Kylin) on src (linux-image-powerpc-smp)
USN-3160-1: 14.04 (Kylin) on src (linux-image-generic)
USN-3160-1: 14.04 (Kylin) on src (linux-image-powerpc64-smp)
USN-3160-1: 14.04 (Kylin) on src (linux-image-powerpc-e500mc)
USN-3160-1: 14.04 (Kylin) on src (linux-image-3.13.0-106-powerpc64-smp)
USN-3160-1: 14.04 (Kylin) on src (linux-image-3.13.0-106-powerpc-e500)
USN-3160-1: 14.04 (Kylin) on src (linux-image-generic-lpae)
USN-3160-1: 14.04 (Kylin) on src (linux-image-powerpc64-emb)
0day
文章评论