CVE-2016-6828

MEDIUM

Linux Kernel < 4.7.4 - Use After Free

Title source: rule

Description

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

Exploits (1)

exploitdb WORKING POC
by Marco Grassi · cdoslinux
https://www.exploit-db.com/exploits/40731

Scores

CVSS v3 5.5
EPSS 0.0010
EPSS Percentile 26.5%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-416
Status published
Products (1)
linux/linux_kernel < 4.7.4
Published Oct 16, 2016
Tracked Since Feb 18, 2026