First published: Wed Sep 07 2016(Updated: )
It was found that when gcc stack protector is turned on, proc_keys_show() can cause a panic due to stack corruption. This happens because xbuf[] is not big enough to hold a 64-bit timeout rendered as weeks. Product bug: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED INSUFFICIENT_DATA - CVE-2016-7042 kernel: kernel panic due to stack corruption detected while reading /proc/keys after few operations with kernel keys [fedora-all]" href="show_bug.cgi?id=1373499">https://bugzilla.redhat.com/show_bug.cgi?id=1373499</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-696.el6 | 0:2.6.32-696.el6 |
redhat/kernel-rt | <0:3.10.0-693.rt56.617.el7 | 0:3.10.0-693.rt56.617.el7 |
redhat/kernel | <0:3.10.0-693.el7 | 0:3.10.0-693.el7 |
redhat/kernel-rt | <1:3.10.0-693.2.1.rt56.585.el6 | 1:3.10.0-693.2.1.rt56.585.el6 |
Linux Linux kernel | <=4.8.2 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-7042 is a vulnerability in the Linux kernel that allows local users to cause a denial of service (stack memory corruption and panic).
The severity of CVE-2016-7042 is high with a CVSS score of 5.5.
Versions 3.2.0-115.157, 3.13.0-101.148, 4.4.0-47.68, 4.8.0-27.29, and 4.9~ of the Linux kernel for Ubuntu are affected by CVE-2016-7042.
To fix CVE-2016-7042, update your Linux kernel to version 3.2.0-115.157, 3.13.0-101.148, 4.4.0-47.68, 4.8.0-27.29, or 4.9~.
More information about CVE-2016-7042 can be found at the following links: [link1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1373499), [link2](https://access.redhat.com/support/policy/updates/errata/), [link3](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1200212&action=diff).