First published: Tue Feb 02 2016(Updated: )
It was found that the fix for <a href="https://access.redhat.com/security/cve/CVE-2015-1805">CVE-2015-1805</a> incorrectly kept buffer offset and buffer length in sync on failed atomic read, potentially resulting in pipe buffer state corruption. A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user-space. Upstream Linux kernel is not affected by this flaw as it was introduced by the Red Hat Enterprise Linux only fix for <a href="https://access.redhat.com/security/cve/CVE-2015-1805">CVE-2015-1805</a>. Acknowledgements: The security impact of this issue was discovered by Red Hat.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | ||
Google Android | <=6.0.1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2016-0774.
CVE-2016-0774 has a severity level of medium.
The linux package before version 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before version 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 are affected by CVE-2016-0774.
To fix CVE-2016-0774 on Ubuntu, update the linux package to version 3.2.0-102.142 (for precise) or 3.13.0-86.130 (for trusty).
To fix CVE-2016-0774 on Debian, update the linux package to a version that includes the fix, such as 4.19.249-2, 4.19.289-2, 5.10.178-3, 5.10.191-1, 6.1.38-1, 6.1.52-1, or 6.5.3-1.