前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >Red Hat安全公告—2016年7月

Red Hat安全公告—2016年7月

作者头像
嘉为蓝鲸
发布2018-12-21 10:43:22
4260
发布2018-12-21 10:43:22
举报
文章被收录于专栏:嘉为蓝鲸的专栏

在2016年6月份至2016年7月份 Red hat CVE漏洞库发布了7个“重要”等级的安全漏洞,针对出现的安全漏洞,发布了对应的Bugzilla。安全公告每月更新一次,旨在查找解决严重的漏洞问题。


2016年7月新的安全漏洞

以下是所有安全公告的内容,供您参考。

CVE名称

等级

影响组件

发布时间

CVE-2016-5320

Important

libtiff

2016/6/15

CVE-2016-4470

Important

kernel、 kernel-rt

2016/6/15

CVE-2016-4989

Important

setroubleshoot

2016/6/21

CVE-2016-4446

Important

setroubleshoot-plugins

2016/6/21

CVE-2016-4444

Important

setroubleshoot-plugins

2016/6/21

CVE-2016-4997

Important

kernel、 kernel-rt

2016/6/24

CVE-2016-5696

Important

kernel、 kernel-rt

2016/7/12

关于这些新发布的所有安全漏洞,可在以下页面中找到详细信息:

https://access.redhat.com/security/cve/

备注:需使用您的Red Hat账号登录,方可查看全部安全漏洞详细信息。


安全漏洞详细信息

公告标识 CVE-2016-5320 ▽

标题

CVE-2016-5320

描述

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Find out more about CVE-2016-5320 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 7 (libtiff)

Red Hat Enterprise Linux 6 (libtiff)

Bugzilla

1346687: CVE-2016-5320 libtiff:Out-of-bounds write in PixarLogDecode()function in tif_pixarlog.c

详细信息

https://access.redhat.com/security/cve/cve-2016-5320

公告标识 CVE-2016-4470 ▽

标题

CVE-2016-4470

描述

A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack.

Find out more about CVE-2016-4470 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 6 ( kernel )

Red Hat Enterprise Linux 7 (kernel)

Red Hat Enterprise Linux 7 (kernel-rt)

Bugzilla

1341716: CVE-2016-4470 kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path

详细信息

https://access.redhat.com/security/cve/cve-2016-4470

公告标识 CVE-2016-4989 ▽

标题

CVE-2016-4989

描述

Shell command injection flaws were found in the way the setroubleshoot executed external commands. A local attacker able to trigger certain SELinux denials could use these flaws to execute arbitrary code with root privileges.

Find out more about CVE-2016-4989 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 6 (setroubleshoot)

Red Hat Enterprise Linux 7 ( setroubleshoot)

Bugzilla

1346461: CVE-2016-4989 setroubleshoot: command injection issues

详细信息

https://access.redhat.com/security/cve/cve-2016-4989

公告标识 CVE-2016-4446 ▽

标题

CVE-2016-4446

描述

A shell command injection flaw was found in the way the setroubleshoot allow_execstack plugin executed external commands. A local attacker able to trigger an execstack SELinux denial could use this flaw to execute arbitrary code with root privileges.

Find out more about CVE-2016-4446 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 6 ( setroubleshoot-plugins)

Red Hat Enterprise Linux 7 ( setroubleshoot-plugins )

Bugzilla

1339250: CVE-2016-4446 setroubleshoot-plugins: insecure commands.getoutput use in the allow_execstack plugin

详细信息

https://access.redhat.com/security/cve/cve-2016-4446

公告标识 CVE-2016-4444 ▽

标题

CVE-2016-4444

描述

A shell command injection flaw was found in the way the setroubleshoot allow_execmod plugin executed external commands. A local attacker able to trigger an execmod SELinux denial could use this flaw to execute arbitrary code with root privileges.

Find out more about CVE-2016-4444 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 6 ( setroubleshoot-plugins)

Red Hat Enterprise Linux 7 ( setroubleshoot-plugins )

Bugzilla

1332644: CVE-2016-4444 setroubleshoot-plugins: insecure commands.getstatusoutput use in the allow_execmod plugin

详细信息

https://access.redhat.com/security/cve/cve-2016-4444

公告标识 CVE-2016-4997 ▽

标题

CVE-2016-4997

描述

A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.

Find out more about CVE-2016-4997 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 6 ( kernel )

Red Hat Enterprise Linux 7 (kernel)

Red Hat Enterprise Linux 7 (kernel-rt)

Bugzilla

1349722: CVE-2016-4997 kernel: compat IPT_SO_SET_REPLACE setsockopt

详细信息

https://access.redhat.com/security/cve/cve-2016-4997

公告标识 CVE-2016-5696 ▽

标题

CVE-2016-5696

描述

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Find out more about CVE-2016-5696 from the MITRE CVE dictionary dictionary and NIST NVD.

最高严重等级

Important

漏洞的影响

Red Hat Enterprise Linux 6 ( kernel )

Red Hat Enterprise Linux 7 (kernel)

Red Hat Enterprise Linux 7 (kernel-rt)

Bugzilla

1354708: CVE-2016-5696 kernel: challenge ACK counter information disclosure.

详细信息

https://access.redhat.com/security/cve/cve-2016-5696

注意和免责声明

关于信息的一致性:

如果Redhat CVE漏洞库网站上的安全公告内容和本文中的内容不一致,请以网站上的安全公告内容为准。

本文参与 腾讯云自媒体同步曝光计划,分享自微信公众号。
原始发表:2016-07-15,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 嘉为科技 微信公众号,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档