Security restrictions bypass in Linux kernel - CVE-2016-9604
Published: April 30, 2018 / Updated: May 7, 2018
Vulnerability identifier: #VU12297
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-9604
CWE-ID: CWE-732
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a local attacker to write arbitrary files on the target system.
The weakness exists due to root can gain direct access to an internal keyring, such as '.dns_resolver' or '.builtin_trusted_keys' upstream, by joining it as its session keyring. A local attacker can bypass module signature verification by adding a new public key of its own devising to the keyring.
The weakness exists due to root can gain direct access to an internal keyring, such as '.dns_resolver' or '.builtin_trusted_keys' upstream, by joining it as its session keyring. A local attacker can bypass module signature verification by adding a new public key of its own devising to the keyring.
How to mitigate CVE-2016-9604
Install update from vendor's website.