<ruby id="bdb3f"></ruby>

    <p id="bdb3f"><cite id="bdb3f"></cite></p>

      <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
        <p id="bdb3f"><cite id="bdb3f"></cite></p>

          <pre id="bdb3f"></pre>
          <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

          <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
          <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

          <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                <ruby id="bdb3f"></ruby>

                企業??AI智能體構建引擎,智能編排和調試,一鍵部署,支持知識庫和私有化部署方案 廣告
                # RHSA-2018:2748: kernel security and bug fix update ## 基本信息 >漏洞分類: 權限提升 標題: Linux內核create_elf_tables()函數整數溢出漏洞導致本地提權 CVSS分值: 7.8 CVSS: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 披露時間: 2018-09-25 CVEID: CVE-2018-14634 簡介: Linux內核的create_elf_tables函數中存在一個整數溢出缺陷,能訪問SUID可執行文件的低權限的本地用戶可通過利用此缺陷進行權限提升。內核2.6.x/3.10.x/4.14.x 受影響。 由于利用該漏洞需要大量內存空間,32位的操作系統不受此漏洞影響。小于32GB內存的操作系統幾乎不會受到此漏洞影響。 RHEL 5 附帶的內核不受此漏洞影響。 緩解措施: -- RHEL系操作系統 1) 將以下代碼存為mitigation.stp function clamp_stack_rlim_cur:long () %{ struct rlimit *rlim = current->signal->rlim; ## 修復命令 ``` yum update kernel yum update kernel-headers yum update kernel-tools yum update kernel-tools-libs yum update python-perf ```
                  <ruby id="bdb3f"></ruby>

                  <p id="bdb3f"><cite id="bdb3f"></cite></p>

                    <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
                      <p id="bdb3f"><cite id="bdb3f"></cite></p>

                        <pre id="bdb3f"></pre>
                        <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

                        <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
                        <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

                        <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                              <ruby id="bdb3f"></ruby>

                              哎呀哎呀视频在线观看