Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6213

Опубликовано: 28 дек. 2016
Источник: debian

Описание

fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.8.11-1package
linuxfixed3.16.43-1jessiepackage
linuxno-dsawheezypackage

Примечания

  • https://lkml.org/lkml/2016/8/28/269

  • Fixed by: https://git.kernel.org/linus/d29216842a85c7970c536108e093963f02714498 (v4.9-rc1)

Связанные уязвимости

CVSS3: 4.7
ubuntu
больше 8 лет назад

fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.

CVSS3: 4.7
redhat
почти 9 лет назад

fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.

CVSS3: 4.7
nvd
больше 8 лет назад

fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.

CVSS3: 4.7
github
около 3 лет назад

fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.

oracle-oval
почти 8 лет назад

ELSA-2017-3605: Unbreakable Enterprise kernel security update (IMPORTANT)