前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >Red Hat安全公告—2016年11月

Red Hat安全公告—2016年11月

作者头像
嘉为蓝鲸
发布2018-12-21 10:38:52
5740
发布2018-12-21 10:38:52
举报

在2016年10月份至2016年11月份Red hat CVE漏洞库发布了7个“重要”“严重”等级的安全漏洞,针对出现的安全漏洞,发布了对应的Bugzilla。安全公告每月更新一次,旨在查找解决严重的漏洞问题。


2016年11月新的安全漏洞

以下是所有安全漏洞的内容,供您参考。

CVE名称

等级

影响组件

发布时间

CVE-2016-7054

Important

openssl、openssl098e、openssl097a

2016/11/10

CVE-2016-8864

Important

bind、bind97

2016/11/1

CVE-2016-8705

Important

memcached

2016/10/31

CVE-2016-8704

Important

memcached

2016/10/31

CVE-2016-5875

Important

libtiff、compat-libtiff3

2016/10/25

CVE-2016-2848

Important

bind、bind97

2016/10/20

CVE-2016-5195

Important

kernel

2016/10/19

关于这些新发布的所有安全漏洞,可在以下页面中找到详细信息:

https://access.redhat.com/security/cve/

备注:需使用您的Red Hat账号登录,方可查看全部安全漏洞详细信息。


安全漏洞详细信息

公告标识 CVE-2016-7054

标题

CVE-2016-7054

描述

The MITRE CVE dictionary describes this issue as:

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Find out more about CVE-2016-7054 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 5 ( openssl )

Red Hat Enterprise Linux 6 ( openssl )

Red Hat Enterprise Linux 7 ( openssl )

Bugzilla

1393920: CVE-2016-7054 openssl: Corrupting larger payloads when using ChaCha20/Poly1305 ciphersuites leads to DoS.

详细信息

https://access.redhat.com/security/cve/cve-2016-7054

公告标识 CVE-2016-8864

标题

CVE-2016-8864

描述

A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

Find out more about CVE-2016-8864 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 7 (bind)

Red Hat Enterprise Linux 5 (bind)

Red Hat Enterprise Linux 5 (bind97)

Red Hat Enterprise Linux 6 (bind)

Bugzilla

1389652: CVE-2016-8864 bind: assertion failure while handling responses containing a DNAME answer

详细信息

https://access.redhat.com/security/cve/cve-2016-8864

公告标识 CVE-2016-8705

标题

CVE-2016-8705

描述

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the memcached binary protocol. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code.

Find out more about CVE-2016-8705 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 7 ( memcached )

Red Hat Enterprise Linux 6 ( memcached )

Bugzilla

1390511: CVE-2016-8705 memcached: Server update remote code execution

详细信息

https://access.redhat.com/security/cve/cve-2016-8705

公告标识 CVE-2016-8704

标题

CVE-2016-8704

描述

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the memcached binary protocol. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code.

Find out more about CVE-2016-8704 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 7 ( memcached )

Red Hat Enterprise Linux 6 ( memcached )

Bugzilla

1390510: CVE-2016-8704 memcached: Server append/prepend remote code execution

详细信息

https://access.redhat.com/security/cve/cve-2016-8704

公告标识 CVE-2016-5875

标题

CVE-2016-5875

描述

The MITRE CVE dictionary describes this issue as:

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Find out more about CVE-2016-5875 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 7 (compat-libtiff3 )

Red Hat Enterprise Linux 7 ( libtiff )

Red Hat Enterprise Linux 6 (libtiff )

Red Hat Enterprise Linux 5 (libtiff )

Bugzilla

1389228: CVE-2016-5875 libtiff: PixarLogDecode Heap Buffer Overflow

详细信息

https://access.redhat.com/security/cve/cve-2016-5875

公告标识 CVE-2016-2848

标题

CVE-2016-2848

描述

A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet.

Find out more about CVE-2016-2848 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 7 ( bind )

Bugzilla

1385450: CVE-2016-2848 bind: assertion failure triggered by a packet with malformed options

详细信息

https://access.redhat.com/security/cve/cve-2016-2848

公告标识 CVE-2016-5195

标题

CVE-2016-5195

描述

A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.

Find out more about CVE-2016-5195 from the MITRE CVE dictionary dictionary and NIST NVD..

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 7 (kernel )

Red Hat Enterprise Linux 6 ( kernel )

Red Hat Enterprise Linux 5 ( kernel )

Bugzilla

1384344: CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

详细信息

https://access.redhat.com/security/cve/cve-2016-5195

注意和免责声明

关于信息的一致性:

如果Redhat CVE漏洞库网站上的安全公告内容和本文中的内容不一致,请以网站上的安全公告内容为准。

本文参与 腾讯云自媒体分享计划,分享自微信公众号。
原始发表:2016-11-17,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 嘉为科技 微信公众号,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体分享计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档