CVE-2016-2550

The Linux kernel before 4.5 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by leveraging incorrect tracking of descriptor ownership and sending each descriptor over a UNIX socket before closing it. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-4312.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=415e3d3e90ce9e18727e8843ae343eda5a58fad6 Vendor Advisory
http://www.debian.org/security/2016/dsa-3503
http://www.openwall.com/lists/oss-security/2016/02/23/2
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.ubuntu.com/usn/USN-2946-1
http://www.ubuntu.com/usn/USN-2946-2
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2949-1
https://bugzilla.redhat.com/show_bug.cgi?id=1311517
https://github.com/torvalds/linux/commit/415e3d3e90ce9e18727e8843ae343eda5a58fad6 Patch Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=415e3d3e90ce9e18727e8843ae343eda5a58fad6 Vendor Advisory
http://www.debian.org/security/2016/dsa-3503
http://www.openwall.com/lists/oss-security/2016/02/23/2
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.ubuntu.com/usn/USN-2946-1
http://www.ubuntu.com/usn/USN-2946-2
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2949-1
https://bugzilla.redhat.com/show_bug.cgi?id=1311517
https://github.com/torvalds/linux/commit/415e3d3e90ce9e18727e8843ae343eda5a58fad6 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=415e3d3e90ce9e18727e8843ae343eda5a58fad6 - Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=415e3d3e90ce9e18727e8843ae343eda5a58fad6 - Vendor Advisory
References () http://www.debian.org/security/2016/dsa-3503 - () http://www.debian.org/security/2016/dsa-3503 -
References () http://www.openwall.com/lists/oss-security/2016/02/23/2 - () http://www.openwall.com/lists/oss-security/2016/02/23/2 -
References () http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - () http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -
References () http://www.ubuntu.com/usn/USN-2946-1 - () http://www.ubuntu.com/usn/USN-2946-1 -
References () http://www.ubuntu.com/usn/USN-2946-2 - () http://www.ubuntu.com/usn/USN-2946-2 -
References () http://www.ubuntu.com/usn/USN-2947-1 - () http://www.ubuntu.com/usn/USN-2947-1 -
References () http://www.ubuntu.com/usn/USN-2947-2 - () http://www.ubuntu.com/usn/USN-2947-2 -
References () http://www.ubuntu.com/usn/USN-2947-3 - () http://www.ubuntu.com/usn/USN-2947-3 -
References () http://www.ubuntu.com/usn/USN-2948-1 - () http://www.ubuntu.com/usn/USN-2948-1 -
References () http://www.ubuntu.com/usn/USN-2948-2 - () http://www.ubuntu.com/usn/USN-2948-2 -
References () http://www.ubuntu.com/usn/USN-2949-1 - () http://www.ubuntu.com/usn/USN-2949-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1311517 - () https://bugzilla.redhat.com/show_bug.cgi?id=1311517 -
References () https://github.com/torvalds/linux/commit/415e3d3e90ce9e18727e8843ae343eda5a58fad6 - Patch, Vendor Advisory () https://github.com/torvalds/linux/commit/415e3d3e90ce9e18727e8843ae343eda5a58fad6 - Patch, Vendor Advisory

Information

Published : 2016-04-27 17:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2550

Mitre link : CVE-2016-2550

CVE.ORG link : CVE-2016-2550


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-399

Resource Management Errors