Vulnerability Description
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.2.84 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77da16ExploitPatchVendor Advisory
- http://source.android.com/security/bulletin/2016-11-01.htmlThird Party Advisory
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.1Release Notes
- http://www.securityfocus.com/bid/94135Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:0892Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1297Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1298Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1308Third Party Advisory
- https://github.com/torvalds/linux/commit/77da160530dd1dc94f6ae15a981f24e5f0021e8ExploitPatchVendor Advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77da16ExploitPatchVendor Advisory
- http://source.android.com/security/bulletin/2016-11-01.htmlThird Party Advisory
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.1Release Notes
- http://www.securityfocus.com/bid/94135Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:0892Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:1297Third Party Advisory
FAQ
What is CVE-2016-7910?
CVE-2016-7910 is a vulnerability with a CVSS score of 7.8 (HIGH). Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operat...
How severe is CVE-2016-7910?
CVE-2016-7910 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-7910?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.