CVE-2016-4805
Summary
| CVE | CVE-2016-4805 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-05-23 10:59:00 UTC |
| Updated | 2023-01-17 21:18:00 UTC |
| Description | Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions. |
Risk And Classification
Problem Types: CWE-416
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| kernel/git/torvalds/linux.git - Linux kernel source tree | CONFIRM | git.kernel.org | Patch |
| ppp: take reference on channels netns · torvalds/linux@1f461dc · GitHub | CONFIRM | github.com | Patch |
| Linux kernel 'ppp_generic.c' Use After Free Denial of Service Vulnerability | BID | www.securityfocus.com | |
| [security-announce] SUSE-SU-2016:1937-1: important: Security update for | SUSE | lists.opensuse.org | Mailing List, Release Notes |
| [security-announce] openSUSE-SU-2016:1641-1: important: Security update | SUSE | lists.opensuse.org | |
| Oracle Linux Bulletin - July 2016 | CONFIRM | www.oracle.com | Third Party Advisory |
| [security-announce] SUSE-SU-2016:1985-1: important: Security update for | SUSE | lists.opensuse.org | |
| Google Android Multiple Flaws Let Remote Users Deny Service and Execute Arbitrary Code and Let Applications Obtain Potentially Sensitive Information and Gain Elevated Privileges - SecurityTracker | SECTRACK | www.securitytracker.com | |
| USN-3021-2: Linux kernel (OMAP4) vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | Third Party Advisory |
| oss-security - Re: CVE Requests: Linux: use-after-free issue for ppp channel | MLIST | www.openwall.com | Mailing List, Patch |
| www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2 | CONFIRM | www.kernel.org | Mailing List |
| USN-3021-1: Linux kernel vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | Third Party Advisory |
| [security-announce] SUSE-SU-2016:1672-1: important: Security update for | SUSE | lists.opensuse.org | Mailing List, Release Notes |
| Debian -- Security Information -- DSA-3607-1 linux | DEBIAN | www.debian.org | |
| Oracle VM Server for x86 Bulletin - October 2016 | CONFIRM | www.oracle.com | |
| 1335803 – (CVE-2016-4805) CVE-2016-4805 kernel: Use after free vulnerability in ppp_unregister_channel | CONFIRM | bugzilla.redhat.com | Issue Tracking |
| [security-announce] SUSE-SU-2016:1690-1: important: Security update for | SUSE | lists.opensuse.org | Mailing List, Release Notes |
| [security-announce] SUSE-SU-2016:2105-1: important: Security update for | SUSE | lists.opensuse.org | |
| [security-announce] openSUSE-SU-2016:2184-1: important: Security update | SUSE | lists.opensuse.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.