Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6130

Опубликовано: 03 июл. 2016
Источник: debian
EPSS Низкий

Описание

Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.6.1-1package
linuxnot-affectedwheezypackage

Примечания

  • Fixed by: https://git.kernel.org/linus/532c34b5fbf1687df63b3fcd5b2846312ac943c6

EPSS

Процентиль: 19%
0.0006
Низкий

Связанные уязвимости

CVSS3: 4.7
ubuntu
больше 9 лет назад

Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.

CVSS3: 2.2
redhat
почти 10 лет назад

Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.

CVSS3: 4.7
nvd
больше 9 лет назад

Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.

CVSS3: 4.7
github
больше 3 лет назад

Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.

suse-cvrf
около 9 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 19%
0.0006
Низкий