First published: Wed Feb 24 2016(Updated: )
ALSA sequencer code has an open race between the timer setup ioctl and the close of the client. This was triggered by syzkaller fuzzer, and a use-after-free was caught there as a result. Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3567eb6af614dac436c4b16a8d426f9faed639b3">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3567eb6af614dac436c4b16a8d426f9faed639b3</a> External references: <a href="http://www.spinics.net/lists/alsa-devel/msg45102.html">http://www.spinics.net/lists/alsa-devel/msg45102.html</a> <a href="https://lkml.org/lkml/2016/1/12/465">https://lkml.org/lkml/2016/1/12/465</a> CVE-ID request and assignment: <a href="http://seclists.org/oss-sec/2016/q1/133">http://seclists.org/oss-sec/2016/q1/133</a> <a href="http://seclists.org/oss-sec/2016/q1/410">http://seclists.org/oss-sec/2016/q1/410</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2016-2544.
The severity of CVE-2016-2544 is low.
The affected software for CVE-2016-2544 is Linux kernel versions before 4.4.1.
The vulnerability CVE-2016-2544 can be exploited by local users to cause a denial of service by making an ioctl call at a certain time.
Yes, the vulnerability CVE-2016-2544 can be fixed by updating to Linux kernel version 4.4.1 or later.