Vulnerability Name:

CVE-2016-6198 (CCN-114867)

Assigned:2016-07-11
Published:2016-07-11
Updated:2019-12-27
Summary:The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c.
CVSS v3 Severity:5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.5 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
4.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.7 Medium (REDHAT CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-284
CWE-362
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2016-6198

Source: CONFIRM
Type: Issue Tracking, Patch
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54d5ca871e72f2bb172ec9323497f01cd5091ec7

Source: CONFIRM
Type: Issue Tracking, Patch
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9409e22acdfc9153f88d9b1ed2bd2a5b34d2d3ca

Source: CCN
Type: RHSA-2016-1847
Important: kernel security, bug fix, and enhancement update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:1847

Source: CCN
Type: RHSA-2016-1875
Important: kernel-rt security and bug fix update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:1875

Source: CCN
Type: RHSA-2016-2574
Important: kernel security, bug fix, and enhancement update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:2574

Source: CCN
Type: RHSA-2016-2584
Important: kernel-rt security, bug fix, and enhancement update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:2584

Source: CCN
Type: oss-sec Mailing List, Mon, 11 Jul 2016 15:18:42 -0400 (EDT)
Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel

Source: CCN
Type: IBM Security Bulletin S1012277 (Storwize V7000 (2076))
Multiple vulnerabilities in Linux Kernel affect IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products

Source: CCN
Type: IBM Security Bulletin 2004744 (QRadar Network Security)
IBM QRadar Network Security is affected by multiple vulnerabilities in Linux Kernel

Source: CCN
Type: IBM Security Bulletin 2010338 (Security Access Manager)
IBM Security Access Manager version 9.0.3.0 appliances are affected by multiple kernel vulnerabilities

Source: CONFIRM
Type: Release Notes
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5

Source: MLIST
Type: Exploit, Mailing List, Third Party Advisory
[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel

Source: CONFIRM
Type: Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

Source: CONFIRM
Type: Vendor Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Source: BID
Type: UNKNOWN
91709

Source: CCN
Type: BID-91709
Linux Kernel Multiple Denial of Service Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1036273

Source: CONFIRM
Type: Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1355654

Source: XF
Type: UNKNOWN
linux-kernel-cve20166198-dos(114867)

Source: CCN
Type: Linux Kernel GIT Repository
vfs: add vfs_select_inode() helper

Source: CONFIRM
Type: Issue Tracking, Patch
https://github.com/torvalds/linux/commit/54d5ca871e72f2bb172ec9323497f01cd5091ec7

Source: CONFIRM
Type: Issue Tracking, Patch
https://github.com/torvalds/linux/commit/9409e22acdfc9153f88d9b1ed2bd2a5b34d2d3ca

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2016-6198

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version <= 4.5.4)

  • Configuration 2:
  • cpe:/o:oracle:linux:6:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:oracle:vm_server:3.4:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/a:redhat:rhel_extras_rt:7:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:4.5:-:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:storwize_v7000_software:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_network_security:5.4:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager_firmware:9.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:8.1.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20162574
    P
    RHSA-2016:2574: kernel security, bug fix, and enhancement update (Important)
    2016-11-03
    oval:com.redhat.rhsa:def:20162584
    P
    RHSA-2016:2584: kernel-rt security, bug fix, and enhancement update (Important)
    2016-11-03
    oval:com.redhat.rhsa:def:20161847
    P
    RHSA-2016:1847: kernel security, bug fix, and enhancement update (Important)
    2016-09-15
    oval:com.redhat.rhsa:def:20161875
    P
    RHSA-2016:1875: kernel-rt security and bug fix update (Important)
    2016-09-15
    oval:com.ubuntu.precise:def:20166198000
    V
    CVE-2016-6198 on Ubuntu 12.04 LTS (precise) - low.
    2016-08-06
    oval:com.ubuntu.bionic:def:201661980000000
    V
    CVE-2016-6198 on Ubuntu 18.04 LTS (bionic) - low.
    2016-08-06
    oval:com.ubuntu.artful:def:20166198000
    V
    CVE-2016-6198 on Ubuntu 17.10 (artful) - low.
    2016-08-06
    oval:com.ubuntu.trusty:def:20166198000
    V
    CVE-2016-6198 on Ubuntu 14.04 LTS (trusty) - low.
    2016-08-06
    oval:com.ubuntu.xenial:def:201661980000000
    V
    CVE-2016-6198 on Ubuntu 16.04 LTS (xenial) - low.
    2016-08-06
    oval:com.ubuntu.bionic:def:20166198000
    V
    CVE-2016-6198 on Ubuntu 18.04 LTS (bionic) - low.
    2016-08-06
    oval:com.ubuntu.xenial:def:20166198000
    V
    CVE-2016-6198 on Ubuntu 16.04 LTS (xenial) - low.
    2016-08-06
    oval:com.ubuntu.disco:def:201661980000000
    V
    CVE-2016-6198 on Ubuntu 19.04 (disco) - low.
    2016-08-06
    oval:com.ubuntu.cosmic:def:20166198000
    V
    CVE-2016-6198 on Ubuntu 18.10 (cosmic) - low.
    2016-08-06
    oval:com.ubuntu.cosmic:def:201661980000000
    V
    CVE-2016-6198 on Ubuntu 18.10 (cosmic) - low.
    2016-08-06
    BACK
    linux linux kernel *
    oracle linux 6
    oracle vm server 3.4
    linux linux kernel 4.5
    ibm storwize v7000 software 6.1
    ibm storwize v7000 software 6.2
    ibm storwize v7000 software 6.3
    ibm storwize v7000 software 6.4
    ibm storwize v7000 software 7.1
    ibm storwize v7000 software 7.2
    ibm storwize v7000 software 7.3
    ibm storwize v7000 software 7.4
    ibm storwize v7000 software 7.5
    ibm storwize v7000 software 7.6
    redhat enterprise linux desktop 7
    redhat enterprise linux hpc node 7
    redhat enterprise linux hpc node eus 7.2
    redhat enterprise linux server 7
    redhat enterprise linux server aus 7.2
    redhat enterprise linux server eus 7.2
    redhat enterprise linux workstation 7
    redhat enterprise linux for real time 7
    ibm storwize v7000 software 7.6.1
    ibm storwize v7000 software 7.7
    redhat enterprise linux server tus 7.2
    ibm storwize v7000 software 7.7.1
    ibm storwize v7000 software 7.8
    ibm storwize v7000 software 7.8.1
    ibm qradar network security 5.4
    ibm security access manager firmware 9.0.3
    ibm storwize v7000 software 8.1
    ibm storwize v7000 software 8.1.1