Race condition in the sclpctlioctlsccb function in drivers/s390/char/sclpctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6130.json"
[
{
"id": "CVE-2016-6130-34afb906",
"signature_type": "Function",
"digest": {
"function_hash": "271562142280342356265370925013695016021",
"length": 778.0
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@532c34b5fbf1687df63b3fcd5b2846312ac943c6",
"target": {
"function": "sclp_ctl_ioctl_sccb",
"file": "drivers/s390/char/sclp_ctl.c"
},
"deprecated": false
},
{
"id": "CVE-2016-6130-7c10f845",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"299194958488216794979708161845333204078",
"217507869179565281415718534340902604747",
"270828563322740885181282803596041911765",
"84626633997863117701026076886770289144",
"102384627181467795405960846857598525979",
"136259848957021444249109752393122205991",
"97506330926375974432662482575548904177",
"21224044092969189039433556325765356256",
"271863629469941739918162900629297180842",
"53347784529371262483649879391526966306",
"13205496951025255346109801355262105755",
"95262650059502681971644817121681626479",
"202967269409760571850150377803147607592",
"163866336002476161438535931155047359859",
"23064218018753967674939751647627288449"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@532c34b5fbf1687df63b3fcd5b2846312ac943c6",
"target": {
"file": "drivers/s390/char/sclp_ctl.c"
},
"deprecated": false
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6130.json"
[
{
"id": "CVE-2016-6130-c2579047",
"signature_type": "Function",
"digest": {
"function_hash": "271562142280342356265370925013695016021",
"length": 778.0
},
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6",
"target": {
"function": "sclp_ctl_ioctl_sccb",
"file": "drivers/s390/char/sclp_ctl.c"
},
"deprecated": false
},
{
"id": "CVE-2016-6130-ee15b80d",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"299194958488216794979708161845333204078",
"217507869179565281415718534340902604747",
"270828563322740885181282803596041911765",
"84626633997863117701026076886770289144",
"102384627181467795405960846857598525979",
"136259848957021444249109752393122205991",
"97506330926375974432662482575548904177",
"21224044092969189039433556325765356256",
"271863629469941739918162900629297180842",
"53347784529371262483649879391526966306",
"13205496951025255346109801355262105755",
"95262650059502681971644817121681626479",
"202967269409760571850150377803147607592",
"163866336002476161438535931155047359859",
"23064218018753967674939751647627288449"
]
},
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6",
"target": {
"file": "drivers/s390/char/sclp_ctl.c"
},
"deprecated": false
}
]