Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-6828

Опубликовано: 16 окт. 2016
Источник: nvd
CVSS3: 5.5
CVSS2: 4.9
EPSS Низкий

Описание

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия до 4.7.4 (включая)

EPSS

Процентиль: 31%
0.00111
Низкий

5.5 Medium

CVSS3

4.9 Medium

CVSS2

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 8 лет назад

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

CVSS3: 4.4
redhat
почти 9 лет назад

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

CVSS3: 5.5
debian
больше 8 лет назад

The tcp_check_send_head function in include/net/tcp.h in the Linux ker ...

CVSS3: 5.5
github
около 3 лет назад

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

oracle-oval
больше 8 лет назад

ELSA-2017-0086: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 31%
0.00111
Низкий

5.5 Medium

CVSS3

4.9 Medium

CVSS2

Дефекты

CWE-416