hshivhare67 / Kernel_v3.0.35

Other
0 stars 0 forks source link

CVE-2016-6828 (Medium) detected in linux-stable-rtv3.8.6 #884

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2016-6828 - Medium Severity Vulnerability

Vulnerable Library - linux-stable-rtv3.8.6

Julia Cartwright's fork of linux-stable-rt.git

Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git

Found in HEAD commit: 22324ae9738f0a1eeb173ff05137c8317c350189

Found in base branch: master

Vulnerable Source Files (1)

Vulnerability Details

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

Publish Date: 2016-10-16

URL: CVE-2016-6828

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-6828

Release Date: 2016-10-16

Fix Resolution: 4.7.5


Step up your Open Source Security Game with Mend here