Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4951

Опубликовано: 23 мая 2016
Источник: debian
EPSS Низкий

Описание

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.5.5-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • http://lists.openwall.net/netdev/2016/05/14/28

  • Fixed by: https://git.kernel.org/linus/45e093ae2830cd1264677d47ff9a95a71f5d9f9c

  • Introduced by: https://git.kernel.org/linus/1a1a143daf84db95dd7212086042004a3abb7bc2 (v3.19-rc1)

EPSS

Процентиль: 30%
0.00108
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 9 лет назад

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

redhat
около 9 лет назад

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

CVSS3: 7.8
nvd
около 9 лет назад

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

CVSS3: 7.8
github
около 3 лет назад

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

oracle-oval
почти 9 лет назад

ELSA-2016-3596: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 30%
0.00108
Низкий