CVE-2016-6516
low-risk
Published 2016-08-06
Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a "double fetch" vulnerability.
Do I need to act?
-
0.52% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.4/10
High
LOCAL
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (10)
Release Notes
http://www.openwall.com/lists/oss-security/2016/07/31/6
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1362457
Release Notes
http://www.openwall.com/lists/oss-security/2016/07/31/6
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1362457
26
/ 100
low-risk
Severity
19/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal