Vulnerability Details : CVE-2016-7118
fs/fcntl.c in the "aufs 3.2.x+setfl-debian" patch in the linux-image package 3.2.0-4 (kernel 3.2.81-1) in Debian wheezy mishandles F_SETFL fcntl calls on directories, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via standard filesystem operations, as demonstrated by scp from an AUFS filesystem.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2016-7118
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7118
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7118
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2016-7118
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7118
-
http://www.securityfocus.com/bid/92697
Linux Kernel 'fs/fcntl.c' Local Denial of Service Vulnerability
-
http://www.openwall.com/lists/oss-security/2016/08/31/3
oss-security - Re: CVE request: Kernel Oops when issuing fcntl on an AUFS directoryMailing List;Third Party Advisory
-
http://seclists.org/oss-sec/2016/q3/395
oss-sec: CVE request: Kernel Oops when issuing fcntl on an AUFS directory
Jump to