Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6197

Опубликовано: 06 авг. 2016
Источник: debian
EPSS Низкий

Описание

fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.6.1-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • https://git.kernel.org/linus/11f3710417d026ea2f4fcf362d866342c5274185 (v4.6-rc1)

EPSS

Процентиль: 10%
0.00036
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.

CVSS3: 5.5
redhat
почти 9 лет назад

fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.

CVSS3: 5.5
nvd
почти 9 лет назад

fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.

CVSS3: 5.5
github
около 3 лет назад

fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.

oracle-oval
почти 9 лет назад

ELSA-2016-3587: kernel-uek security update (IMPORTANT)

EPSS

Процентиль: 10%
0.00036
Низкий