Hide Forgot
A vulnerability was found in the Linux kernel. The pointer to the netlink socket attribute is not checked, which could cause a null pointer dereference when parsing the nested attributes in function tipc_nl_publ_dump. This allows local users to cause a DoS. References: http://lists.openwall.net/netdev/2016/05/14/28 http://lists.openwall.net/netdev/2016/05/16/26 CVE-ID request and assignment: http://seclists.org/oss-sec/2016/q2/385 http://seclists.org/oss-sec/2016/q2/386 Introduced by: https://github.com/torvalds/linux/commit/1a1a143daf84db95dd7212086042004a3abb7bc2 Upstream fix: https://github.com/torvalds/linux/commit/45e093ae2830cd1264677d47ff9a95a71f5d9f9c
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1338626]
kernel-4.4.11-200.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
kernel-4.5.6-200.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2, as there is no code which introduced the flaw in the products listed.
kernel-4.5.6-300.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.