First published: Mon Nov 07 2016(Updated: )
A flaw was found in the Linux kernels implementation of seq_file where an local attacker could create a situation in which an attacker could manipulate memory in which the function pointer to put() could be used for malicious purposes. This could lead to memory corruption and possible privledged escalation. There are no exploits available for this flaw at this time. Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84">https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84</a>
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.84 | |
Linux Linux kernel | >=3.3<3.10.103 | |
Linux Linux kernel | >=3.11<3.12.63 | |
Linux Linux kernel | >=3.13<3.14.76 | |
Linux Linux kernel | >=3.15<3.16.39 | |
Linux Linux kernel | >=3.17<3.18.40 | |
Linux Linux kernel | >=3.19<4.1.31 | |
Linux Linux kernel | >=4.2<4.4.18 | |
Linux Linux kernel | >=4.5<4.6.7 | |
Linux Linux kernel | >=4.7<4.7.1 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7910 is a use-after-free vulnerability in the Linux kernel before version 4.7.1 that allows local users to gain privileges.
The vulnerability can be exploited by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
CVE-2016-7910 is considered critical with a severity value of 9.
The vulnerability affects Linux kernel versions before 4.7.1.
To fix the vulnerability, update the Linux kernel to version 4.7.1 or later.