Race condition in the ec_device_ioctl_xcmd function in drivers/platform/chrome/cros_ec_dev.c in the Linux kernel before 4.7 allows local users to cause a denial of service (out-of-bounds array access) by changing a certain size value, aka a "double fetch" vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1353490 | Issue Tracking | 
| http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096cdc6f52225835ff503f987a0d68ef770bb78e | Issue Tracking Patch | 
| https://bugzilla.kernel.org/show_bug.cgi?id=120131 | Issue Tracking | 
| http://seclists.org/bugtraq/2016/Jul/20 | Third Party Advisory VDB Entry | 
| https://github.com/torvalds/linux/commit/096cdc6f52225835ff503f987a0d68ef770bb78e | Issue Tracking Patch | 
| http://www.securityfocus.com/bid/91553 | 
Configurations
                    Information
                Published : 2016-08-06 13:59
Updated : 2016-11-28 12:30
NVD link : CVE-2016-6156
Mitre link : CVE-2016-6156
JSON object : View
CWE
                
                    
                        
                        CWE-362
                        
            Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
                linux
- linux_kernel
 


