[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2016-0774Date: (C)2016-04-28   (M)2018-06-09


The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 6.8CVSS Score : 5.6
Exploit Score: 2.5Exploit Score: 3.9
Impact Score: 4.2Impact Score: 7.8
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: LOWAvailability: COMPLETE
Integrity: NONE 
Availability: HIGH 
  
Reference:
BID-84126
DSA-3503
RHSA-2016:0494
RHSA-2016:0617
SUSE-SU-2016:1031
SUSE-SU-2016:1032
SUSE-SU-2016:1033
SUSE-SU-2016:1034
SUSE-SU-2016:1035
SUSE-SU-2016:1037
SUSE-SU-2016:1038
SUSE-SU-2016:1039
SUSE-SU-2016:1040
SUSE-SU-2016:1041
SUSE-SU-2016:1045
SUSE-SU-2016:1046
USN-2967-1
USN-2967-2
USN-2968-1
USN-2968-2
http://source.android.com/security/bulletin/2016-05-01.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
https://bugzilla.redhat.com/show_bug.cgi?id=1303961
https://security-tracker.debian.org/tracker/CVE-2016-0774

CPE    2
cpe:/o:google:android:6.0.1
cpe:/o:linux:linux_kernel:-
CWE    1
CWE-20
OVAL    11
oval:org.secpod.oval:def:703099
oval:org.secpod.oval:def:703103
oval:org.secpod.oval:def:501788
oval:org.secpod.oval:def:602404
...

© SecPod Technologies