The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45e093ae2830cd1264677d47ff9a95a71f5d9f9c - Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html - Mailing List, Third Party Advisory | |
References | () http://lists.openwall.net/netdev/2016/05/14/28 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/21/2 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3016-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3016-2 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3016-3 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3016-4 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3017-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3017-2 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3017-3 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3020-1 - Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/45e093ae2830cd1264677d47ff9a95a71f5d9f9c - Vendor Advisory |
Information
Published : 2016-05-23 10:59
Updated : 2024-11-21 02:53
NVD link : CVE-2016-4951
Mitre link : CVE-2016-4951
CVE.ORG link : CVE-2016-4951
JSON object : View
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel
oracle
- linux
CWE