Race condition in the ec_device_ioctl_xcmd function in drivers/platform/chrome/cros_ec_dev.c in the Linux kernel before 4.7 allows local users to cause a denial of service (out-of-bounds array access) by changing a certain size value, aka a "double fetch" vulnerability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1353490 | Issue Tracking |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096cdc6f52225835ff503f987a0d68ef770bb78e | Issue Tracking Patch |
https://bugzilla.kernel.org/show_bug.cgi?id=120131 | Issue Tracking |
http://seclists.org/bugtraq/2016/Jul/20 | Third Party Advisory VDB Entry |
https://github.com/torvalds/linux/commit/096cdc6f52225835ff503f987a0d68ef770bb78e | Issue Tracking Patch |
http://www.securityfocus.com/bid/91553 |
Configurations
Information
Published : 2016-08-06 13:59
Updated : 2016-11-28 12:30
NVD link : CVE-2016-6156
Mitre link : CVE-2016-6156
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
linux
- linux_kernel