CVE-2016-4951NULL Pointer Dereference in Kernel

Severity
7.8HIGHNVD
EPSS
0.1%
top 70.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 23
Latest updateMay 13

Description

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDlinux/linux_kernel3.194.1.28+2
Debianlinux/linux_kernel< 4.5.5-1+3

Also affects: Ubuntu Linux 14.04, 15.10, 16.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-6wx6-p39m-8v66: The tipc_nl_publ_dump function in net/tipc/socket2022-05-13
OSV
CVE-2016-4951: The tipc_nl_publ_dump function in net/tipc/socket2016-05-23
CVEList
CVE-2016-4951: The tipc_nl_publ_dump function in net/tipc/socket2016-05-23

📋Vendor Advisories

8
Ubuntu
Linux kernel (Wily HWE) vulnerabilities2016-06-27
Ubuntu
Linux kernel (Vivid HWE) vulnerabilities2016-06-27
Ubuntu
Linux kernel (Qualcomm Snapdragon) vulnerabilities2016-06-27
Ubuntu
Linux kernel vulnerabilities2016-06-27
Ubuntu
Linux kernel (Xenial HWE) vulnerabilities2016-06-27

💬Community

2
Bugzilla
CVE-2016-4951 kernel: Null pointer dereference in tipc_nl_publ_dump [fedora-all]2016-05-23
Bugzilla
CVE-2016-4951 kernel: Null pointer dereference in tipc_nl_publ_dump2016-05-23
CVE-2016-4951 — NULL Pointer Dereference in Kernel | cvebase