CVE-2016-5728
Ubuntu Security Notice USN-3071-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in the vop_ioctl function in drivers/misc/mic/vop/vop_vringh.c in the MIC VOP driver in the Linux kernel before 4.6.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (memory corruption and system crash) by changing a certain header, aka a "double fetch" vulnerability.
Condición de carrera en la función vop_ioctl en drivers/misc/mic/vop/vop_vringh.c en el controlador MIC VOP en el kernel de Linux en versiones anteriores a 4.6.1 permite a usuarios locales obtener información sensible desde la memoria del kernel o causar una denegación de servicio (corrupción de memoria y caída del sistema) cambiando cierta cabecera, también conocida como vulnerabilidad "double fetch".
Kangjie Lu discovered an information leak in the Reliable Datagram Sockets implementation in the Linux kernel. A local attacker could use this to obtain potentially sensitive information from kernel memory. Yue Cao et al discovered a flaw in the TCP implementation's handling of challenge acks in the Linux kernel. A remote attacker could use this to cause a denial of service or inject content into an TCP stream. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-06-21 CVE Reserved
- 2016-06-27 CVE Published
- 2024-08-06 CVE Updated
- 2025-07-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.1 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/538802/30/0/threaded | Mailing List | |
https://bugzilla.kernel.org/show_bug.cgi?id=116651 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9bf292bfca94694a721449e3fd752493856710f6 | 2016-11-28 | |
http://www.debian.org/security/2016/dsa-3616 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3070-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3070-2 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3070-3 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3070-4 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3071-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3071-2 | 2016-11-28 | |
https://github.com/torvalds/linux/commit/9bf292bfca94694a721449e3fd752493856710f6 | 2016-11-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.6 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.6" | - |
Affected
|