First published: Wed Feb 24 2016(Updated: )
A slave timer instance might be still accessible in a racy way while operating the master instance as it lacks of locking. Since the master operation is mostly protected with timer->lock, we should cope with it while changing the slave instance, too. Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b5a663aa426f4884c71cd8580adae73f33570f0d">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b5a663aa426f4884c71cd8580adae73f33570f0d</a> External references: <a href="http://marc.info/?l=linux-kernel&m=145269654327048">http://marc.info/?l=linux-kernel&m=145269654327048</a> <a href="https://gist.githubusercontent.com/dvyukov/e833610757b098956b50/raw/d819cd13b466e4adbe3dd825ee481e4512e77633/gistfile1.txt">https://gist.githubusercontent.com/dvyukov/e833610757b098956b50/raw/d819cd13b466e4adbe3dd825ee481e4512e77633/gistfile1.txt</a> CVE-ID request and assignment: <a href="http://seclists.org/oss-sec/2016/q1/133">http://seclists.org/oss-sec/2016/q1/133</a> <a href="http://seclists.org/oss-sec/2016/q1/410">http://seclists.org/oss-sec/2016/q1/410</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2016-2547.
The severity level of CVE-2016-2547 is medium with a value of 4.
The affected software versions are Linux kernel versions before 4.4.1.
This vulnerability can be exploited by local users through a crafted ioctl call, which can lead to a denial of service, race condition, use-after-free, and system crash.
Yes, a fix is available in Linux kernel version 4.4.1 and later.