Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4794

Опубликовано: 23 мая 2016
Источник: debian
EPSS Низкий

Описание

Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.6.2-2package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • https://git.kernel.org/linus/4f996e234dad488e5d9ba0858bc1bae12eff82c3

  • https://git.kernel.org/linus/6710e594f71ccaad8101bc64321152af7cd9ea28

EPSS

Процентиль: 15%
0.00048
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 9 лет назад

Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.

redhat
около 9 лет назад

Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.

CVSS3: 7.8
nvd
около 9 лет назад

Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.

CVSS3: 7.8
github
около 3 лет назад

Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.

suse-cvrf
почти 9 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 15%
0.00048
Низкий