CVE-2016-10905

An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.
References
Link Resource
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html Third Party Advisory VDB Entry
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36e4ad0316c017d5b271378ed9a1c9a4b77fab5f Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html Mailing List Vendor Advisory
https://seclists.org/bugtraq/2019/Nov/11 Mailing List Third Party Advisory
https://support.f5.com/csp/article/K31332013 Third Party Advisory VDB Entry
https://support.f5.com/csp/article/K31332013?utm_source=f5support&amp%3Butm_medium=RSS
https://usn.ubuntu.com/4145-1/ VDB Entry Vendor Advisory
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html Third Party Advisory VDB Entry
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36e4ad0316c017d5b271378ed9a1c9a4b77fab5f Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html Mailing List Vendor Advisory
https://seclists.org/bugtraq/2019/Nov/11 Mailing List Third Party Advisory
https://support.f5.com/csp/article/K31332013 Third Party Advisory VDB Entry
https://support.f5.com/csp/article/K31332013?utm_source=f5support&amp%3Butm_medium=RSS
https://usn.ubuntu.com/4145-1/ VDB Entry Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-08-19 02:15

Updated : 2024-11-21 02:45


NVD link : CVE-2016-10905

Mitre link : CVE-2016-10905

CVE.ORG link : CVE-2016-10905


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free