Multiple Kernel Versions Null Pointer Dereference Local DoS

medium Log Correlation Engine Plugin ID 802008

Synopsis

The specific kernel version that the system is running is vulnerable to a null pointer dereference which may result in a denial of service.

Description

Linux Kernel contains a NULL pointer dereference flaw in the tipc_nl_publ_dump() function in net/tipc/socket.c that is triggered when parsing nested attributes. This may allow a local attacker to crash the system.

Solution

Currently, there are no known workarounds or upgrades to correct this issue. However, a patch has been committed to the source code repository (e.g. GIT, CVS, SVN) that addresses this vulnerability. Until it is incorporated into the next release of the software, manually patching an existing installation is the only known available solution. Check the vendor links in the references section for more information.

See Also

http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html

http://www.ubuntu.com/usn/usn-3016-1/

http://www.ubuntu.com/usn/usn-3016-2/

http://www.ubuntu.com/usn/usn-3016-3/

http://www.ubuntu.com/usn/usn-3016-4/

http://www.ubuntu.com/usn/usn-3020-1/

http://www.ubuntu.com/usn/usn-3017-3/

http://www.ubuntu.com/usn/usn-3017-2/

http://www.ubuntu.com/usn/usn-3017-1/

http://pivotal.io/security/usn-3020-1

http://seclists.org/oss-sec/2016/q2/385

http://lists.openwall.net/netdev/2016/05/14/28

http://lists.openwall.net/netdev/2016/05/16/26

Plugin Details

Severity: Medium

ID: 802008

Published: 7/14/2016

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Vulnerability Publication Date: 5/14/2016

Reference Information

CVE: CVE-2016-4951