Race condition in the ec_device_ioctl_xcmd function in drivers/platform/chrome/cros_ec_dev.c in the Linux kernel before 4.7 allows local users to cause a denial of service (out-of-bounds array access) by changing a certain size value, aka a "double fetch" vulnerability.
References
Link | Resource |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096cdc6f52225835ff503f987a0d68ef770bb78e | Issue Tracking Patch |
http://seclists.org/bugtraq/2016/Jul/20 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/91553 | |
https://bugzilla.kernel.org/show_bug.cgi?id=120131 | Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=1353490 | Issue Tracking |
https://github.com/torvalds/linux/commit/096cdc6f52225835ff503f987a0d68ef770bb78e | Issue Tracking Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2016-08-06T20:00:00
Updated: 2016-11-25T19:57:01
Reserved: 2016-07-01T00:00:00
Link: CVE-2016-6156
JSON object: View
NVD Information
Status : Modified
Published: 2016-08-06T20:59:08.050
Modified: 2016-11-28T20:30:47.683
Link: CVE-2016-6156
JSON object: View
Redhat Information
No data.
CWE