Multiple Kernel Versions Null Pointer Dereference Local DoS

Medium Log Correlation Engine Plugin ID 802008

Synopsis

The specific kernel version that the system is running is vulnerable to a null pointer dereference which may result in a denial of service.

Description

Linux Kernel contains a NULL pointer dereference flaw in the tipc_nl_publ_dump() function in net/tipc/socket.c that is triggered when parsing nested attributes. This may allow a local attacker to crash the system.

Solution

Currently, there are no known workarounds or upgrades to correct this issue. However, a patch has been committed to the source code repository (e.g. GIT, CVS, SVN) that addresses this vulnerability. Until it is incorporated into the next release of the software, manually patching an existing installation is the only known available solution. Check the vendor links in the references section for more information.

See Also

http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html

http://www.ubuntu.com/usn/usn-3016-1/

http://www.ubuntu.com/usn/usn-3016-2/

http://www.ubuntu.com/usn/usn-3016-3/

http://www.ubuntu.com/usn/usn-3016-4/

http://www.ubuntu.com/usn/usn-3020-1/

http://www.ubuntu.com/usn/usn-3017-3/

http://www.ubuntu.com/usn/usn-3017-2/

http://www.ubuntu.com/usn/usn-3017-1/

http://pivotal.io/security/usn-3020-1

http://seclists.org/oss-sec/2016/q2/385

http://lists.openwall.net/netdev/2016/05/14/28

http://lists.openwall.net/netdev/2016/05/16/26

Plugin Details

Severity: Medium

ID: 802008

File Name: 802008.prm

Published: 2016/07/14

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.9

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Vulnerability Publication Date: 2016/05/14

Reference Information

CVE: CVE-2016-4951