vulnerability
Red Hat: CVE-2016-1583: Important: kernel security and bug fix update (RHSA-2017:2760)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 2016-06-27 | 2016-10-28 | 2021-03-03 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
2016-06-27
Added
2016-10-28
Modified
2021-03-03
Description
The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
Solution
redhat-upgrade-kernel
References
- BID-91157
- DEBIAN-DLA-516-1
- DEBIAN-DSA-3607
- NVD-CVE-2016-1583
- REDHAT-RHSA-2016:2124
- REDHAT-RHSA-2016:2766
- REDHAT-RHSA-2017:2760
- SECTRACK-1036763
- SUSE-SUSE-SU-2016:1596
- SUSE-SUSE-SU-2016:1672
- SUSE-SUSE-SU-2016:1696
- SUSE-SUSE-SU-2016:1937
- SUSE-SUSE-SU-2016:1961
- SUSE-SUSE-SU-2016:1985
- SUSE-SUSE-SU-2016:1994
- SUSE-SUSE-SU-2016:1995
- SUSE-SUSE-SU-2016:2000
- SUSE-SUSE-SU-2016:2002
- SUSE-SUSE-SU-2016:2005
- SUSE-SUSE-SU-2016:2006
- SUSE-SUSE-SU-2016:2007
- SUSE-SUSE-SU-2016:2009
- SUSE-SUSE-SU-2016:2010
- SUSE-SUSE-SU-2016:2014
- SUSE-SUSE-SU-2016:2105
- UBUNTU-USN-2996-1
- UBUNTU-USN-2997-1
- UBUNTU-USN-2998-1
- UBUNTU-USN-2999-1
- UBUNTU-USN-3000-1
- UBUNTU-USN-3001-1
- UBUNTU-USN-3002-1
- UBUNTU-USN-3003-1
- UBUNTU-USN-3004-1
- UBUNTU-USN-3005-1
- UBUNTU-USN-3006-1
- UBUNTU-USN-3007-1
- UBUNTU-USN-3008-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.