5.5
CVSSv3

CVE-2016-6197

Published: 06/08/2016 Updated: 27/12/2019
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 437
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel prior to 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle linux 6

linux linux kernel

oracle vm server 3.4

Vendor Advisories

Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
It was found that the unlink and rename functionality in overlayfs did not verify the upper dentry for staleness A local, unprivileged user could use the rename syscall on overlayfs on top of xfs to panic or crash the system ...