6.3
CVSSv3

CVE-2016-5728

Published: 27/06/2016 Updated: 28/11/2016
CVSS v2 Base Score: 5.4 | Impact Score: 7.8 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.3 | Impact Score: 5.2 | Exploitability Score: 1
VMScore: 481
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:C

Vulnerability Summary

Race condition in the vop_ioctl function in drivers/misc/mic/vop/vop_vringh.c in the MIC VOP driver in the Linux kernel prior to 4.6.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (memory corruption and system crash) by changing a certain header, aka a "double fetch" vulnerability.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 8.0

linux linux kernel

Vendor Advisories

Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Race condition vulnerability was found in drivers/misc/mic/vop/vop_vringhc in the MIC VOP driver in the Linux kernel before 461 MIC VOP driver does two successive reads from user space to read a variable length data structure Local user can obtain sensitive information from kernel memory or can cause DoS by corrupting kernel memory if the data ...