SB2016062705 - Buffer overflow in Debian Linux



SB2016062705 - Buffer overflow in Debian Linux

Published: June 27, 2016 Updated: August 9, 2020

Security Bulletin ID SB2016062705
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Buffer overflow (CVE-ID: CVE-2016-5728)

The vulnerability allows a local authenticated user to #BASIC_IMPACT#.

Race condition in the vop_ioctl function in drivers/misc/mic/vop/vop_vringh.c in the MIC VOP driver in the Linux kernel before 4.6.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (memory corruption and system crash) by changing a certain header, aka a "double fetch" vulnerability.


Remediation

Install update from vendor's website.