First published: Fri May 13 2016(Updated: )
A use after free vulnerability was found in ppp_unregister_channel function. This is triggered when network namespace is removed while ppp_async channel is still registered in it and ppp_unregister_channel() tries to access its per-netns data in the defunct namespace. An attacker who could control this memory that is being used in the defunct namespace could create a denial of service by spinlocking a CPU. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely. Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89</a> CVE request: <a href="http://seclists.org/oss-sec/2016/q2/319">http://seclists.org/oss-sec/2016/q2/319</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Workstation Extension | =12.0 | |
SUSE Linux Enterprise Module for Public Cloud | =12.0 | |
SUSE Linux Enterprise Server | =11.0-sp4 | |
openSUSE Leap | =42.1 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp4 | |
Red Hat Enterprise Linux | =6.0 | |
Ubuntu | =12.04 | |
Linux Kernel | >=2.6.30<3.2.80 | |
Linux Kernel | >=3.3<3.10.102 | |
Linux Kernel | >=3.11<3.12.59 | |
Linux Kernel | >=3.13<3.14.67 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.18.37 | |
Linux Kernel | >=3.19<4.1.28 | |
Linux Kernel | >=4.2<4.4.8 | |
Linux Kernel | >=4.5<4.5.2 | |
SUSE Linux Enterprise Software Development Kit | =12.0 | |
SUSE Linux Enterprise Workstation Extension | =12.0-sp1 | |
SUSE Linux Enterprise Server | =12.0 | |
SUSE Linux Enterprise Desktop | =12.0-sp1 | |
Red Hat Enterprise Linux | =7.0 | |
Oracle Linux | =6 | |
SUSE Linux Enterprise Real Time Extension | =11.0-sp4 | |
SUSE Linux Enterprise Server | =12.0-sp1 | |
SUSE Linux Enterprise Real Time Extension | =12.0-sp1 | |
SUSE Linux Enterprise Software Development Kit | =12.0-sp1 | |
SUSE Linux Enterprise Live Patching | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4805
The severity level of CVE-2016-4805 is low.
The use-after-free vulnerability can cause a denial of service (memory corruption and system crash) or possibly have other unspecified impacts.
Yes, upgrading to Linux kernel version 4.5.2 or later can fix the vulnerability.
You can find more information about CVE-2016-4805 in the references: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89, http://seclists.org/oss-sec/2016/q2/319, https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1335804.