SB2019072811 - Buffer overflow in Linux kernel
Published: July 28, 2019 Updated: July 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2016-10764)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In the Linux kernel before 4.9.6, there is an off by one in the drivers/mtd/spi-nor/cadence-quadspi.c cqspi_setup_flash() function. There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the ">" should be ">=" instead.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=193e87143c290ec16838f5368adc0e0bc94eb931
- https://github.com/torvalds/linux/commit/193e87143c290ec16838f5368adc0e0bc94eb931
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
- https://support.f5.com/csp/article/K24444495
- https://support.f5.com/csp/article/K24444495?utm_source=f5support&utm_medium=RSS