Vulnerability Description
The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.19, < 4.1.28 |
| Canonical | Ubuntu Linux | 14.04 |
| Oracle | Linux | 6 |
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45e093Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.htmlMailing ListThird Party Advisory
- http://lists.openwall.net/netdev/2016/05/14/28Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/05/21/2Mailing ListThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.hThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmThird Party Advisory
- http://www.ubuntu.com/usn/USN-3016-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3016-2Third Party Advisory
- http://www.ubuntu.com/usn/USN-3016-3Third Party Advisory
- http://www.ubuntu.com/usn/USN-3016-4Third Party Advisory
- http://www.ubuntu.com/usn/USN-3017-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3017-2Third Party Advisory
- http://www.ubuntu.com/usn/USN-3017-3Third Party Advisory
- http://www.ubuntu.com/usn/USN-3020-1Third Party Advisory
- https://github.com/torvalds/linux/commit/45e093ae2830cd1264677d47ff9a95a71f5d9f9Vendor Advisory
FAQ
What is CVE-2016-4951?
CVE-2016-4951 is a vulnerability with a CVSS score of 7.8 (HIGH). The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference an...
How severe is CVE-2016-4951?
CVE-2016-4951 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4951?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Oracle Linux.