File: root - text - article - 2016 - 06 - CVE-2016-4581.txt
Tags: 安全, security, | English | Home Page | Category: Computing | 879 Views, 24849 Search Bots | 175 Words
| Browse | Archive
![Subscribe to Feed Burner Subscribe to Feed Burner](/images/form/rss.gif)
Tags: 安全, security, | English | Home Page | Category: Computing | 879 Views, 24849 Search Bots | 175 Words
![Subscribe to Feed Burner Subscribe to Feed Burner](/images/form/rss.gif)
New Vulnerabilities (CVE-2016-4581) have been detected in CentOS/RHEL/CloudLinux 7
Distributions have yet to patch CVE-2016-4581 in CentOS/RHEL/CloudLinux 7 kernels and the vulnerability is already known to be used in attacks against hosting providers to crash servers.
About the vulnerability:
fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.
What can I do:
If you are a QuickHostUK Managed Hosting customer this has already been patched. If you are not a QuickHostUK Managed Hosting customer please ensure you have also taken the appropriate actions to secure your own servers.
Alternatively, we can handle this for you with our adhoc management scheme, which for this occurrence would be £10 /month per server and would cover all future security patches automatically.
Please contact us if you wish to utilise this service or if you have any questions.
Tags: 安全, security, | English | Home Page | Cateogry: Computing | 879 Views, 24849 Search Bots | 175 Words Distributions have yet to patch CVE-2016-4581 in CentOS/RHEL/CloudLinux 7 kernels and the vulnerability is already known to be used in attacks against hosting providers to crash servers.
About the vulnerability:
fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.
What can I do:
If you are a QuickHostUK Managed Hosting customer this has already been patched. If you are not a QuickHostUK Managed Hosting customer please ensure you have also taken the appropriate actions to secure your own servers.
Alternatively, we can handle this for you with our adhoc management scheme, which for this occurrence would be £10 /month per server and would cover all future security patches automatically.
Please contact us if you wish to utilise this service or if you have any questions.
![Subscribe to Feed Burner Subscribe to Feed Burner](/images/form/rss.gif)
Related Articles
- Daily Interview Problem: Word Ordering in a Different Alphabetical Order
- Daily Interview Problem: Group Words that are Anagrams
- Algorithm Interview Question: Nth Fibonacci Number
- Plus One
- [Daily Problem] Longest Palindromic Substring
- Daily Interview Problem: Contiguous Subarray with Maximum Sum
- Consecutive Ones
- Algorithm Interview: Lowest Common Ancestor of 2 Nodes in Binary Tree
- Two Tricks of Delphi
- Daily Interview Problem: Get all Values at a Certain Height in a Binary Tree
©2006~2024 SteakOverCooked - 0.02481 Seconds(s) - 714.125 KB/s - 14 Online
Memory: 494.48 KB
18:54:01 up 13 days, 18:33, 2 users, load average: 0.98, 0.86, 0.73 - Server PHP Version: 7.4.33
How to Cook a Perfect Steak? | <meta name="robots" content="noindex, follow" />
![](/images/top.jpg)
18:54:01 up 13 days, 18:33, 2 users, load average: 0.98, 0.86, 0.73 - Server PHP Version: 7.4.33
Read & Write - Normal - Mini - Post - All Comments - Statistics
Be the first one to comment this page !