First published: Fri Nov 11 2016(Updated: )
Ondrej Kozina discovered that the keyring interface in the Linux kernel contained a buffer overflow when displaying timeout events via the /proc/keys interface. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-7042)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.8.0-1018-raspi2 | <4.8.0-1018.21 | 4.8.0-1018.21 |
=16.10 | ||
All of | ||
ubuntu/linux-image-raspi2 | <4.8.0.1018.21 | 4.8.0.1018.21 |
=16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is CVE-2016-7042.
The severity level of the Linux kernel vulnerability is not mentioned in the provided information.
The affected software for this Linux kernel vulnerability is Ubuntu 16.10 with Linux kernel version 4.8.0-1018-raspi2 or 4.8.0.1018.21.
A local attacker can exploit this vulnerability by causing a denial of service (system crash) through the buffer overflow in the keyring interface when displaying timeout events via the /proc/keys interface.
To fix this Linux kernel vulnerability, update the Linux kernel to version 4.8.0-1018.21 or higher.