The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
17 Jan 2023, 21:17
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - Third Party Advisory | |
References | (CONFIRM) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45e093ae2830cd1264677d47ff9a95a71f5d9f9c - Vendor Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html - Mailing List, Third Party Advisory | |
References | (MLIST) http://lists.openwall.net/netdev/2016/05/14/28 - Mailing List, Patch, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2016/05/21/2 - Mailing List, Third Party Advisory |
Information
Published : 2016-05-23 10:59
Updated : 2023-12-10 11:46
NVD link : CVE-2016-4951
Mitre link : CVE-2016-4951
CVE.ORG link : CVE-2016-4951
JSON object : View
Products Affected
canonical
- ubuntu_linux
oracle
- linux
linux
- linux_kernel
CWE