The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of RedHat Fedora

vulnerability bulletin CVE-2016-5195

Linux kernel: privilege escalation via Copy On Write, Dirty COW

Synthesis of the vulnerability

A local attacker can generate a memory corruption via a Copy On Write on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: SNS, Cisco ATA, Nexus by Cisco, NX-OS, Cisco Prime Access Registrar, Cisco Prime DCNM, Cisco CUCM, Debian, NetWorker, BIG-IP Hardware, TMOS, Fedora, Android OS, HP Operations, HP Switch, Junos Space, NSM Central Manager, NSMXpress, Linux, McAfee Email Gateway, openSUSE, openSUSE Leap, Oracle Communications, Palo Alto Firewall PA***, PAN-OS, HDX, RealPresence Resource Manager, Polycom VBP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, data creation/edition.
Provenance: user shell.
Creation date: 20/10/2016.
Identifiers: 1384344, 494072, c05341463, CERTFR-2016-AVI-353, CERTFR-2016-AVI-356, CERTFR-2016-AVI-357, CERTFR-2016-AVI-370, CERTFR-2017-AVI-001, CERTFR-2017-AVI-012, CERTFR-2017-AVI-022, cisco-sa-20161026-linux, cpujul2018, CVE-2016-5195, Dirty COW, DLA-670-1, DSA-3696-1, ESA-2016-170, FEDORA-2016-c3558808cd, FEDORA-2016-db4b75b352, HPESBGN03742, HPSBHF03682, JSA10770, JSA10774, K10558632, openSUSE-SU-2016:2583-1, openSUSE-SU-2016:2584-1, openSUSE-SU-2016:2625-1, openSUSE-SU-2016:2649-1, PAN-SA-2017-0003, PAN-SA-2017-0013, PAN-SA-2017-0014, PAN-SA-2017-0016, RHSA-2016:2098-01, RHSA-2016:2105-01, RHSA-2016:2106-01, RHSA-2016:2110-01, RHSA-2016:2118-01, RHSA-2016:2120-01, RHSA-2016:2124-01, RHSA-2016:2126-01, RHSA-2016:2127-01, RHSA-2016:2128-01, RHSA-2016:2132-01, RHSA-2016:2133-01, RHSA-2018:0180-01, SB10177, SB10178, SSA:2016-305-01, STORM-2016-006, SUSE-SU-2016:2585-1, SUSE-SU-2016:2592-1, SUSE-SU-2016:2593-1, SUSE-SU-2016:2596-1, SUSE-SU-2016:2614-1, SUSE-SU-2016:3069-1, SUSE-SU-2016:3304-1, USN-3104-1, USN-3104-2, USN-3105-1, USN-3105-2, USN-3106-1, USN-3106-2, USN-3106-3, USN-3106-4, USN-3107-1, USN-3107-2, VIGILANCE-VUL-20923, VU#243144.

Description of the vulnerability

The Linux kernel supports the Copy On Write operation, which is used to copy memory only when it is modified.

However, a local attacker can manipulate the memory, so the COW operation writes in Read Only memory.

A local attacker can therefore generate a memory corruption via a Copy On Write on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2016-7969 CVE-2016-7970 CVE-2016-7972

libass: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of libass.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap.
Severity: 2/4.
Consequences: user access/rights, data reading, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 20/10/2016.
Identifiers: CVE-2016-7969, CVE-2016-7970, CVE-2016-7972, DLA-668-1, FEDORA-2016-282507c3e9, FEDORA-2016-95407a836f, openSUSE-SU-2016:3087-1, VIGILANCE-VUL-20920.

Description of the vulnerability

Several vulnerabilities were announced in libass.

An attacker can force a read at an invalid address via Mode 0/3 Line Wrapping, in order to trigger a denial of service, or to obtain sensitive information. [severity:1/4; CVE-2016-7969]

An attacker can force a read at an invalid address via Gaussian Blur Coefficient, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2016-7970]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-7972]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2016-8670

libgd: buffer overflow via dynamicGetbuf

Synthesis of the vulnerability

An attacker can generate a buffer overflow via dynamicGetbuf of libgd, in order to trigger a denial of service, and possibly to run code.
Impacted products: Mac OS X, Debian, Fedora, openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 19/10/2016.
Identifiers: CVE-2016-8670, DLA-665-1, FEDORA-2016-722c0afc64, FEDORA-2016-e45a7e7b13, HT207483, openSUSE-SU-2016:2606-1, openSUSE-SU-2016:2772-1, openSUSE-SU-2016:2831-1, openSUSE-SU-2016:2837-1, SUSE-SU-2016:2460-2, SUSE-SU-2016:2668-1, SUSE-SU-2016:2683-1, SUSE-SU-2016:2683-2, SUSE-SU-2016:2766-1, USN-3117-1, VIGILANCE-VUL-20915.

Description of the vulnerability

An attacker can generate a buffer overflow via dynamicGetbuf of libgd, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-6911

libgd: out-of-bounds memory reading via gdImageCreateFromTiffPtr

Synthesis of the vulnerability

An attacker can force a read at an invalid address via gdImageCreateFromTiffPtr of libgd, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 19/10/2016.
Identifiers: CVE-2016-6911, DLA-665-1, FEDORA-2016-722c0afc64, FEDORA-2016-e45a7e7b13, openSUSE-SU-2016:2606-1, openSUSE-SU-2016:2772-1, openSUSE-SU-2016:2831-1, openSUSE-SU-2016:2837-1, SUSE-SU-2016:2460-2, SUSE-SU-2016:2668-1, SUSE-SU-2016:2683-1, SUSE-SU-2016:2683-2, SUSE-SU-2016:2766-1, USN-3117-1, VIGILANCE-VUL-20914.

Description of the vulnerability

An attacker can force a read at an invalid address via gdImageCreateFromTiffPtr of libgd, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-8860

Tor: denial of service

Synthesis of the vulnerability

An attacker can generate a fatal error of Tor, in order to trigger a denial of service.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap.
Severity: 1/4.
Consequences: denial of service on service, denial of service on client.
Provenance: internet server.
Creation date: 19/10/2016.
Identifiers: CVE-2016-8860, DLA-663-1, DSA-3694-1, FEDORA-2016-3b6393acdd, FEDORA-2016-59316cf667, openSUSE-SU-2016:2603-1, VIGILANCE-VUL-20913.

Description of the vulnerability

An attacker can generate a fatal error of Tor, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 20912

WebKitGTK+: vulnerability

Synthesis of the vulnerability

A vulnerability of WebKitGTK+ was announced.
Impacted products: Fedora.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 19/10/2016.
Identifiers: FEDORA-2016-f4b5897686, VIGILANCE-VUL-20912.

Description of the vulnerability

A vulnerability of WebKitGTK+ was announced.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-8568 CVE-2016-8569

libgit2: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of libgit2.
Impacted products: Fedora, openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: data reading, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 19/10/2016.
Identifiers: CVE-2016-8568, CVE-2016-8569, FEDORA-2016-2b27b075ee, FEDORA-2016-616a35205b, FEDORA-2016-bc51f4636f, openSUSE-SU-2016:3097-1, openSUSE-SU-2017:0184-1, openSUSE-SU-2017:0195-1, openSUSE-SU-2017:0208-1, VIGILANCE-VUL-20911.

Description of the vulnerability

Several vulnerabilities were announced in libgit2.

An attacker can force a read at an invalid address via Object Files, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2016-8568]

An attacker can force a read at an invalid address via Object Files, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2016-8569]
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2016-8605 CVE-2016-8606

GUILE: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of GUILE.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 19/10/2016.
Identifiers: CVE-2016-8605, CVE-2016-8606, DLA-666-1, FEDORA-2016-34209c3a8e, FEDORA-2016-6dd3bc37c3, FEDORA-2016-990e2012ea, FEDORA-2016-a47bf58beb, openSUSE-SU-2016:2643-1, openSUSE-SU-2016:2645-1, openSUSE-SU-2016:2647-1, openSUSE-SU-2017:0482-1, VIGILANCE-VUL-20910.

Description of the vulnerability

Several vulnerabilities were announced in GUILE.

An attacker can bypass access restrictions via umask, in order to read or alter data. [severity:2/4; CVE-2016-8605]

An attacker can bypass access restrictions via REPL Server, in order to read or alter data. [severity:2/4; CVE-2016-8606]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2016-5542 CVE-2016-5554 CVE-2016-5556

Oracle Java: vulnerabilities of October 2016

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Oracle Java.
Impacted products: Debian, Avamar, Fedora, AIX, Domino, Notes, IRAD, QRadar SIEM, Tivoli Storage Manager, Tivoli System Automation, WebSphere AS Traditional, IBM WebSphere ESB, WebSphere MQ, Junos Space, SnapManager, Java OpenJDK, openSUSE, openSUSE Leap, Java Oracle, JavaFX, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights, data reading, data creation/edition, data deletion, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 7.
Creation date: 19/10/2016.
Identifiers: 1993440, 1994049, 1994123, 1994478, 1997764, 1999054, 1999395, 1999474, 1999478, 1999479, 1999488, 1999532, 2000212, 2000544, 2000904, 2000988, 2000990, 2001608, 2002331, 2002479, 2002537, 2003145, 2004036, 491108, CERTFR-2016-AVI-349, CERTFR-2017-AVI-012, cpuoct2016, CVE-2016-5542, CVE-2016-5554, CVE-2016-5556, CVE-2016-5568, CVE-2016-5573, CVE-2016-5582, CVE-2016-5597, DLA-704-1, DSA-3707-1, ESA-2016-137, FEDORA-2016-73054cfeeb, JSA10770, NTAP-20161019-0001, openSUSE-SU-2016:2862-1, openSUSE-SU-2016:2900-1, openSUSE-SU-2016:2985-1, openSUSE-SU-2016:2990-1, openSUSE-SU-2016:3088-1, RHSA-2016:2079-01, RHSA-2016:2088-01, RHSA-2016:2089-01, RHSA-2016:2090-01, RHSA-2016:2136-01, RHSA-2016:2137-01, RHSA-2016:2138-01, RHSA-2016:2658-01, RHSA-2016:2659-01, RHSA-2017:0061-01, SUSE-SU-2016:2887-1, SUSE-SU-2016:3010-1, SUSE-SU-2016:3040-1, SUSE-SU-2016:3041-1, SUSE-SU-2016:3043-1, SUSE-SU-2016:3068-1, SUSE-SU-2016:3078-1, USN-3121-1, USN-3130-1, USN-3154-1, VIGILANCE-VUL-20906, ZDI-16-571.

Description of the vulnerability

Several vulnerabilities were announced in Oracle Java.

An attacker can use a vulnerability via 2D, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2016-5556]

An attacker can use a vulnerability via AWT, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2016-5568, ZDI-16-571]

An attacker can use a vulnerability via Hotspot, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2016-5582]

An attacker can use a vulnerability via Hotspot, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2016-5573]

An attacker can use a vulnerability via Networking, in order to obtain information. [severity:2/4; CVE-2016-5597]

An attacker can use a vulnerability via JMX, in order to alter information. [severity:2/4; CVE-2016-5554]

An attacker can use a vulnerability via Libraries, in order to alter information. [severity:1/4; CVE-2016-5542]
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-3492 CVE-2016-3495 CVE-2016-5507

Oracle MySQL: vulnerabilities of October 2016

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Oracle MySQL.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, MariaDB ~ precise, MySQL Community, MySQL Enterprise, openSUSE, openSUSE Leap, Solaris, Percona Server, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Ubuntu.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on service.
Provenance: user account.
Number of vulnerabilities in this bulletin: 29.
Creation date: 18/10/2016.
Revision date: 19/10/2016.
Identifiers: bulletinapr2017, CERTFR-2016-AVI-351, cpuoct2016, CVE-2016-3492, CVE-2016-3495, CVE-2016-5507, CVE-2016-5584, CVE-2016-5598, CVE-2016-5609, CVE-2016-5612, CVE-2016-5616-REJECT, CVE-2016-5617-REJECT, CVE-2016-5624, CVE-2016-5625, CVE-2016-5626, CVE-2016-5627, CVE-2016-5628, CVE-2016-5629, CVE-2016-5630, CVE-2016-5631, CVE-2016-5632, CVE-2016-5633, CVE-2016-5634, CVE-2016-5635, CVE-2016-6663, CVE-2016-6664, CVE-2016-7440, CVE-2016-8283, CVE-2016-8284, CVE-2016-8286, CVE-2016-8287, CVE-2016-8288, CVE-2016-8289, CVE-2016-8290, DLA-708-1, DSA-3706-1, DSA-3711-1, FEDORA-2016-9b83c6862d, FEDORA-2016-c7e60a9fd4, K73828041, openSUSE-SU-2016:2746-1, openSUSE-SU-2016:2769-1, openSUSE-SU-2016:2788-1, openSUSE-SU-2016:3025-1, openSUSE-SU-2016:3028-1, RHSA-2016:2130-01, RHSA-2016:2131-01, RHSA-2016:2595-02, RHSA-2016:2749-01, RHSA-2016:2927-01, RHSA-2016:2928-01, RHSA-2017:0184-01, RHSA-2017:2192-01, SSA:2016-305-03, SUSE-SU-2016:2780-1, SUSE-SU-2016:2932-1, SUSE-SU-2016:2933-1, USN-3109-1, VIGILANCE-VUL-20891.

Description of the vulnerability

Several vulnerabilities were announced in Oracle MySQL.

An attacker can use a vulnerability via Server: Error Handling, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2016-5617-REJECT, CVE-2016-6664]

An attacker can use a vulnerability via Server: MyISAM, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2016-5616-REJECT, CVE-2016-6663]

An attacker can use a vulnerability via Server: Packaging, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2016-5625]

An attacker can use a vulnerability via Server: DML, in order to trigger a denial of service. [severity:2/4; CVE-2016-5609]

An attacker can use a vulnerability via Server: DML, in order to trigger a denial of service. [severity:2/4; CVE-2016-5612]

An attacker can use a vulnerability via Server: DML, in order to trigger a denial of service. [severity:2/4; CVE-2016-5624]

An attacker can use a vulnerability via Server: GIS, in order to trigger a denial of service. [severity:2/4; CVE-2016-5626]

An attacker can use a vulnerability via Server: Optimizer, in order to trigger a denial of service. [severity:2/4; CVE-2016-5627]

An attacker can use a vulnerability via Server: Optimizer, in order to trigger a denial of service. [severity:2/4; CVE-2016-3492]

An attacker can use a vulnerability via Connector/Python, in order to obtain information, to alter information, or to trigger a denial of service. [severity:2/4; CVE-2016-5598]

An attacker can use a vulnerability via Server: Security: Encryption, in order to obtain information. [severity:2/4; CVE-2016-7440]

An attacker can use a vulnerability via Server: DML, in order to trigger a denial of service. [severity:2/4; CVE-2016-5628]

An attacker can use a vulnerability via Server: Federated, in order to trigger a denial of service. [severity:2/4; CVE-2016-5629]

An attacker can use a vulnerability via Server: InnoDB, in order to trigger a denial of service. [severity:2/4; CVE-2016-3495]

An attacker can use a vulnerability via Server: InnoDB, in order to trigger a denial of service. [severity:2/4; CVE-2016-5630]

An attacker can use a vulnerability via Server: InnoDB, in order to trigger a denial of service. [severity:2/4; CVE-2016-5507]

An attacker can use a vulnerability via Server: Memcached, in order to trigger a denial of service. [severity:2/4; CVE-2016-5631]

An attacker can use a vulnerability via Server: Optimizer, in order to trigger a denial of service. [severity:2/4; CVE-2016-5632]

An attacker can use a vulnerability via Server: Performance Schema, in order to trigger a denial of service. [severity:2/4; CVE-2016-5633]

An attacker can use a vulnerability via Server: RBR, in order to trigger a denial of service. [severity:2/4; CVE-2016-5634]

An attacker can use a vulnerability via Server: Security: Audit, in order to trigger a denial of service. [severity:2/4; CVE-2016-5635]

An attacker can use a vulnerability via Server: InnoDB, in order to alter information, or to trigger a denial of service. [severity:2/4; CVE-2016-8289]

An attacker can use a vulnerability via Server: Replication, in order to trigger a denial of service. [severity:2/4; CVE-2016-8287]

An attacker can use a vulnerability via Server: Performance Schema, in order to trigger a denial of service. [severity:2/4; CVE-2016-8290]

An attacker can use a vulnerability via Server: Security: Encryption, in order to obtain information. [severity:2/4; CVE-2016-5584]

An attacker can use a vulnerability via Server: Types, in order to trigger a denial of service. [severity:2/4; CVE-2016-8283]

An attacker can use a vulnerability via Server: InnoDB Plugin, in order to alter information. [severity:1/4; CVE-2016-8288]

An attacker can use a vulnerability via Server: Security: Privileges, in order to obtain information. [severity:1/4; CVE-2016-8286]

An attacker can use a vulnerability via Server: Replication, in order to trigger a denial of service. [severity:1/4; CVE-2016-8284]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about RedHat Fedora: