CVE-2016-6828
MEDIUMLinux Kernel < 4.7.4 - Use After Free
Title source: ruleDescription
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
Exploits (1)
References (12)
Scores
CVSS v3
5.5
EPSS
0.0010
EPSS Percentile
26.5%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-416
Status
published
Products (1)
linux/linux_kernel
< 4.7.4
Published
Oct 16, 2016
Tracked Since
Feb 18, 2026