[CISCO-SA-20161026-LINUX] Vulnerability in Linux Kernel Affecting Cisco Products: October 2016

Severity Medium
CVEs 1

On October 19, 2016, a new vulnerability related to a race condition in the memory manager of the Linux Kernel was disclosed. This vulnerability could allow unprivileged, local users to gain write access to otherwise read-only memory mappings to increase their privileges on the system.

Cisco has released software updates that address this vulnerability. For information about affected and fixed software releases, consult the Cisco bug IDs in the Vulnerable Products table.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux ["http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"]

Source # ID Name URL
Vunlerability Alert Linux Kernel Memory Subsystem Copy-on-Write Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/viewAlert.x?alertId=49385&typeName=Vulnerability Alert
Snort 40542 https://www.snort.org
Snort 40543 https://www.snort.org
Snort 40560 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Snort 40561 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Snort 40562 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Snort 40563 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Snort 40564 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Snort 40565 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Snort 40566 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Snort 49542 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Snort 49543 https://support.sourcefire.com/supplemental/sf-rules-2016-10-27-seu.html
Cisco CSCvb85490 Cisco Bug ID CSCvb85490 https://bst.cisco.com/quickview/bug/CSCvb85490
Cisco CSCvb85516 Cisco Bug ID CSCvb85516 https://bst.cisco.com/quickview/bug/CSCvb85516
Cisco CSCvb85528 Cisco Bug ID CSCvb85528 https://bst.cisco.com/quickview/bug/CSCvb85528
Cisco CSCvb85529 Cisco Bug ID CSCvb85529 https://bst.cisco.com/quickview/bug/CSCvb85529
Cisco CSCvb85547 Cisco Bug ID CSCvb85547 https://bst.cisco.com/quickview/bug/CSCvb85547
Cisco CSCvb85559 Cisco Bug ID CSCvb85559 https://bst.cisco.com/quickview/bug/CSCvb85559
Cisco CSCvb85564 Cisco Bug ID CSCvb85564 https://bst.cisco.com/quickview/bug/CSCvb85564
Cisco CSCvb85571 Cisco Bug ID CSCvb85571 https://bst.cisco.com/quickview/bug/CSCvb85571
Cisco CSCvb85583 Cisco Bug ID CSCvb85583 https://bst.cisco.com/quickview/bug/CSCvb85583
Cisco CSCvb85587 Cisco Bug ID CSCvb85587 https://bst.cisco.com/quickview/bug/CSCvb85587
Cisco CSCvb85595 Cisco Bug ID CSCvb85595 https://bst.cisco.com/quickview/bug/CSCvb85595
Cisco CSCvb85606 Cisco Bug ID CSCvb85606 https://bst.cisco.com/quickview/bug/CSCvb85606
Cisco CSCvb85607 Cisco Bug ID CSCvb85607 https://bst.cisco.com/quickview/bug/CSCvb85607
Cisco CSCvb85609 Cisco Bug ID CSCvb85609 https://bst.cisco.com/quickview/bug/CSCvb85609
Cisco CSCvb85616 Cisco Bug ID CSCvb85616 https://bst.cisco.com/quickview/bug/CSCvb85616
Cisco CSCvb85633 Cisco Bug ID CSCvb85633 https://bst.cisco.com/quickview/bug/CSCvb85633
Cisco CSCvb85647 Cisco Bug ID CSCvb85647 https://bst.cisco.com/quickview/bug/CSCvb85647
Cisco CSCvb85649 Cisco Bug ID CSCvb85649 https://bst.cisco.com/quickview/bug/CSCvb85649
Cisco CSCvb85679 Cisco Bug ID CSCvb85679 https://bst.cisco.com/quickview/bug/CSCvb85679
Cisco CSCvb85713 Cisco Bug ID CSCvb85713 https://bst.cisco.com/quickview/bug/CSCvb85713
Cisco CSCvb85719 Cisco Bug ID CSCvb85719 https://bst.cisco.com/quickview/bug/CSCvb85719
Cisco CSCvb85723 Cisco Bug ID CSCvb85723 https://bst.cisco.com/quickview/bug/CSCvb85723
Cisco CSCvb85725 Cisco Bug ID CSCvb85725 https://bst.cisco.com/quickview/bug/CSCvb85725
Cisco CSCvb87054 Cisco Bug ID CSCvb87054 https://bst.cisco.com/quickview/bug/CSCvb87054
Cisco CSCvb96355 Cisco Bug ID CSCvb96355 https://bst.cisco.com/quickview/bug/CSCvb96355
Cisco CSAF https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux/csaf/cisco-sa-20161026-linux.json
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...