First published: Wed Jan 20 2016(Updated: )
Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Linux Kernel | >=3.7<3.12.60 | |
Linux Kernel | >=3.13<3.16.36 | |
Linux Kernel | >=3.17<3.18.54 | |
Linux Kernel | >=3.19<4.4.21 | |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0758 has a high severity rating as it allows local users to potentially gain elevated privileges through crafted ASN.1 data.
To mitigate CVE-2016-0758, update your Linux kernel to version 4.6 or later to address the integer overflow vulnerability.
CVE-2016-0758 affects various systems running Linux kernel versions before 4.6, including certain distributions of Red Hat, Ubuntu, and Google Android.
Exploitation of CVE-2016-0758 could lead to memory corruption, privilege escalation, or local denial of service.
The known attack vector for CVE-2016-0758 involves local users exploiting crafted ASN.1 data.