Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4951

Опубликовано: 23 мая 2016
Источник: debian
EPSS Низкий

Описание

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.5.5-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • http://lists.openwall.net/netdev/2016/05/14/28

  • Fixed by: https://git.kernel.org/linus/45e093ae2830cd1264677d47ff9a95a71f5d9f9c

  • Introduced by: https://git.kernel.org/linus/1a1a143daf84db95dd7212086042004a3abb7bc2 (v3.19-rc1)

EPSS

Процентиль: 35%
0.00138
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

redhat
больше 9 лет назад

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

CVSS3: 7.8
nvd
больше 9 лет назад

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

CVSS3: 7.8
github
больше 3 лет назад

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

oracle-oval
около 9 лет назад

ELSA-2016-3596: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 35%
0.00138
Низкий