First published: Sun Feb 14 2016(Updated: )
A flaw was found in the USB-MIDI Linux kernel driver: a double-free error could be triggered for the 'umidi' object. An attacker with physical access to the system could use this flaw to escalate their privileges.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-696.el6 | 0:2.6.32-696.el6 |
redhat/kernel-rt | <0:3.10.0-514.rt56.420.el7 | 0:3.10.0-514.rt56.420.el7 |
redhat/kernel | <0:3.10.0-514.el7 | 0:3.10.0-514.el7 |
Linux kernel | <=4.4.8 | |
SUSE Linux Enterprise Real Time Extension | =12-sp1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.17-1 6.12.19-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-2384 is a double free vulnerability in the USB-MIDI Linux kernel driver that allows attackers to cause a denial of service or have other unspecified impact.
CVE-2016-2384 has a high severity rating (7 out of 10).
CVE-2016-2384 affects Linux kernel versions before 4.5.
To fix the CVE-2016-2384 vulnerability, update your Linux kernel to version 4.5 or later.
You can find more information about CVE-2016-2384 at the following references: [Link 1](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07d86ca93db7e5cdf4743564d98292042ec21af7), [Link 2](https://lkml.org/lkml/2016/2/13/11), [Link 3](http://seclists.org/oss-sec/2016/q1/331).