vulnerability
F5 Networks: K43650115 (CVE-2016-0723): Linux kernel vulnerability CVE-2016-0723
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:N/C:P/I:N/A:C) | Feb 7, 2016 | Feb 16, 2017 | Feb 1, 2018 |
Severity
6
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:C)
Published
Feb 7, 2016
Added
Feb 16, 2017
Modified
Feb 1, 2018
Description
Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
Solution
f5-big-ip-upgrade-latest
References
- URL-https://support.f5.com/csp/article/K43650115
- SUSE-SUSE-SU-2016:0911
- SUSE-SUSE-SU-2016:1102
- SUSE-SUSE-SU-2016:1764
- SUSE-SUSE-SU-2016:2074
- DEBIAN-DLA-412-1
- DEBIAN-DSA-3448
- DEBIAN-DSA-3503
- BID-82950
- SECTRACK-1035695
- UBUNTU-USN-2929-1
- UBUNTU-USN-2929-2
- UBUNTU-USN-2930-1
- UBUNTU-USN-2930-2
- UBUNTU-USN-2930-3
- UBUNTU-USN-2932-1
- UBUNTU-USN-2948-1
- UBUNTU-USN-2948-2
- UBUNTU-USN-2967-1
- UBUNTU-USN-2967-2
- NVD-CVE-2016-0723

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.