Race condition in the ec_device_ioctl_xcmd function in drivers/platform/chrome/cros_ec_dev.c in the Linux kernel before 4.7 allows local users to cause a denial of service (out-of-bounds array access) by changing a certain size value, aka a "double fetch" vulnerability.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096cdc6f52225835ff503f987a0d68ef770bb78e | issue tracking patch |
https://bugzilla.kernel.org/show_bug.cgi?id=120131 | issue tracking |
https://github.com/torvalds/linux/commit/096cdc6f52225835ff503f987a0d68ef770bb78e | issue tracking patch |
http://www.securityfocus.com/bid/91553 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1353490 | issue tracking |
http://seclists.org/bugtraq/2016/Jul/20 | mailing list vdb entry third party advisory |