Multiple Kernel Versions Null Pointer Dereference Local DoS

Medium Log Correlation Engine Plugin ID 802008


The specific kernel version that the system is running is vulnerable to a null pointer dereference which may result in a denial of service.


Linux Kernel contains a NULL pointer dereference flaw in the tipc_nl_publ_dump() function in net/tipc/socket.c that is triggered when parsing nested attributes. This may allow a local attacker to crash the system.


Currently, there are no known workarounds or upgrades to correct this issue. However, a patch has been committed to the source code repository (e.g. GIT, CVS, SVN) that addresses this vulnerability. Until it is incorporated into the next release of the software, manually patching an existing installation is the only known available solution. Check the vendor links in the references section for more information.

See Also

Plugin Details

Severity: Medium

ID: 802008

File Name: 802008.prm

Published: 2016/07/14

Risk Information

Risk Factor: Medium


Base Score: 4.9

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Vulnerability Publication Date: 2016/05/14

Reference Information

CVE: CVE-2016-4951