Permissions, privileges, and access controls in Linux kernel - CVE-2016-6786
Published: December 28, 2016 / Updated: June 7, 2023
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to permissions, privileges, and access controls error within the put_ctx(), __perf_event_disable(), raw_spin_unlock_irq(), perf_event_enable(), perf_event_refresh(), perf_remove_from_owner(), perf_event_read_group(), perf_read(), perf_poll(), perf_event_for_each_child(), perf_event_for_each(), perf_event_set_output(), perf_ioctl(), perf_compat_ioctl(), perf_event_task_enable(), mutex_lock_double(), syscall_define5() and perf_pmu_migrate_context() functions in kernel/events/core.c. A local user can execute arbitrary code.
How to mitigate CVE-2016-6786
Sources
- https://github.com/torvalds/linux/commit/f63a8daa5812afef4f06c962351687e1ff9ccb2b
- https://bugzilla.redhat.com/show_bug.cgi?id=1403842
- http://source.android.com/security/bulletin/2016-12-01.html
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f63a8daa5812afef4f06c962351687e1ff9ccb2b
- http://www.securityfocus.com/bid/94679
- http://www.debian.org/security/2017/dsa-3791