Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2016-9604 CVE-2015-8944 CVE-2016-7097 |
CWE-ID | CWE-732 CWE-200 CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system linux_kernel (Debian package) Operating systems & Components / Operating system package or component |
Vendor |
Linux Foundation Debian |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU12297
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-9604
CWE-ID:
CWE-732 - Incorrect Permission Assignment for Critical Resource
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to write arbitrary files on the target system.
The weakness exists due to root can gain direct access to an internal keyring, such as '.dns_resolver' or '.builtin_trusted_keys' upstream, by joining it as its session keyring. A local attacker can bypass module signature verification by adding a new public key of its own devising to the keyring.
Install update from vendor's website.
Vulnerable software versionsLinux kernel: 4.9
External linksQ & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7693
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2015-8944
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to weak permissions for /proc/iomem used by the ioresources_init function in kernel/resource.c in the Linux kernel. A local attacker can read arbitrary file on the system.
Update to the latest version.
Linux kernel: 4.0.1 - 4.7.0
linux_kernel (Debian package): 4.6.4-1
External linksQ & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5388
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7097
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to the setgid bit being preserved during a setxattr call by the filesystem implementation. A local attacker can leverage the existence of a setgid program to gain group privileges.
Successful exploitation of the vulnerability results in privileges escalation.
Update to version 4.9.6.
Linux kernel: 4.0.1 - 4.8.2
External linkshttp://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.37
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.