The memory subsystem of the Linux kernel contains a race condition in the way of handling the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could exploit this vulnerability to gain write access to otherwise read-only memory mappings, thus escalating his or her privileges on the system.
OpenSSH contains a memory exhaustion issue during key exchange. An unauthenticated client can increase the memory allocated to each connection on the server to 384 MB, by repeating the KEXINIT process. An attacker can exploit this vulnerability by initiating multiple connections, to exhaust memory resources of the server and therefore lead to a denial of service.
On September 22, 2016, OpenSSL released an update advisory for three branch products to fix multiple vulnerabilities. The versions after update are 1.1.0a, 1.0.2i, and 1.0.1u. However, the security update introduced new vulnerabilities: 1.1.0a introduced CVE-2016-6309, and 1.0.2i introduced CVE-2016-7052.
On April 24, 2016, Fernando from the NULL-LIFE team submits the local heap overflow vulnerability in bcmath.c to the PHP website. For details, visit the following link.
On August 12, 2016, 1n3 disclosed by email an SQL injection vulnerability in jsrpc.php in Zabbix, which can be exploited via the “insert” statement while jsrpc.php is processing the profileIdx2 parameter. This vulnerability is of the same type as the officially announced vulnerability, which is caused by latest.php processing the toggle_ids parameter. The only difference between the two is the location.
2016年4月28日（Thu Apr 28 13:20:13 UTC 2016），OpenSSL官方公告，将会在2016年5月4日（Thu May 3 12:00-15:00 UTC 2016）发布新版本，修复多个关于OpenSSL高级别威胁漏洞。 阅读全文 “OpenSSL技术分析与处理建议” »
2016年4月12日，关于 Microsoft Windows平台和Samba服务软件中存在的一个严重等级的安全漏洞将会被披露，定名为BadLock。 此漏洞由International Samba Core Team成员Stefan Metzmacher发现，并提交给Microsoft和Samba相关的部门。
阅读全文 “BadLock威胁预警通告” »