Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7042

Опубликовано: 16 окт. 2016
Источник: debian

Описание

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.7.8-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1373966

  • https://bugzilla.redhat.com/show_bug.cgi?id=1373499

  • https://git.kernel.org/linus/03dab869b7b239c4e013ec82aea22e181e441cfc

Связанные уязвимости

CVSS3: 6.2
ubuntu
больше 8 лет назад

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.

CVSS3: 5.5
redhat
больше 8 лет назад

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.

CVSS3: 6.2
nvd
больше 8 лет назад

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.

CVSS3: 6.2
github
около 3 лет назад

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.

oracle-oval
больше 8 лет назад

ELSA-2017-3510: Unbreakable Enterprise kernel security update (IMPORTANT)