Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:23410
[Eng]
Version
5
Class
patch
ALTXid
156310
Language
Russian
Severity
Critical
Title
Обновление DLA-516-1 -- обновление безопасности для linux
Description
This update fixes the CVEs.
Family
unix
Platform
Debian GNU/kFreeBSD 7
Debian GNU/Linux 7
Product
linux
Reference
VENDOR: DLA-516-1
VENDOR: DLA-516-1
Id:
DLA-516-1
Reference:
https://lists.debian.org/debian-lts-announce/2016/debian-lts-announce-201606/msg00018.html
CVE: CVE-2016-0821
CVE: CVE-2016-0821
Id:
CVE-2016-0821
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821
Comment
: The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE:
908 ()
References:
http://source.android.com/security/bulletin/2016-03-01.html (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8a5e5e02fc83aaf67053ab53b359af08c6c49aaf (CONFIRM)
[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam (MLIST)
https://github.com/torvalds/linux/commit/8a5e5e02fc83aaf67053ab53b359af08c6c49aaf (CONFIRM)
84260 (BID)
DSA-3607 (DEBIAN)
USN-2968-1 (UBUNTU)
USN-2969-1 (UBUNTU)
USN-2971-1 (UBUNTU)
USN-2967-1 (UBUNTU)
USN-2967-2 (UBUNTU)
USN-2971-2 (UBUNTU)
USN-2970-1 (UBUNTU)
USN-2971-3 (UBUNTU)
USN-2968-2 (UBUNTU)
CVE: CVE-2016-1583
CVE: CVE-2016-1583
Id:
CVE-2016-1583
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583
Comment
: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://github.com/torvalds/linux/commit/2f36db71009304b3f0b95afacd8eba1f9f046b87 (CONFIRM)
https://github.com/torvalds/linux/commit/f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1344721 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5364c150aa645b3d7daa21b5c0b9feaa1c9cd6d (CONFIRM)
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3 (CONFIRM)
[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ (MLIST)
https://bugs.chromium.org/p/project-zero/issues/detail?id=836 (MISC)
[oss-security] 20160610 [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ (MLIST)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
USN-3002-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3003-1 (UBUNTU)
39992 (EXPLOIT-DB)
http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html (MISC)
USN-3005-1 (UBUNTU)
USN-3006-1 (UBUNTU)
USN-2999-1 (UBUNTU)
SUSE-SU-2016:1596 (SUSE)
USN-3007-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
USN-3008-1 (UBUNTU)
SUSE-SU-2016:1937 (SUSE)
SUSE-SU-2016:1995 (SUSE)
SUSE-SU-2016:2000 (SUSE)
SUSE-SU-2016:2002 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1961 (SUSE)
91157 (BID)
SUSE-SU-2016:2014 (SUSE)
SUSE-SU-2016:2006 (SUSE)
SUSE-SU-2016:2007 (SUSE)
SUSE-SU-2016:1985 (SUSE)
SUSE-SU-2016:2010 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
SUSE-SU-2016:1994 (SUSE)
SUSE-SU-2016:2005 (SUSE)
SUSE-SU-2016:2105 (SUSE)
SUSE-SU-2016:2009 (SUSE)
1036763 (SECTRACK)
RHSA-2017:2760 (REDHAT)
RHSA-2016:2766 (REDHAT)
RHSA-2016:2124 (REDHAT)
https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b (MISC)
CVE: CVE-2016-2184
CVE: CVE-2016-2184
Id:
CVE-2016-2184
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184
Comment
: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f886ca12765d20124bd06291c82951fd49a33be (CONFIRM)
https://github.com/torvalds/linux/commit/0f886ca12765d20124bd06291c82951fd49a33be (CONFIRM)
20160310 oss-2016-17: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes (multiple free) on invalid USB device descriptors (snd-usb-audio driver) (BUGTRAQ)
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 (CONFIRM)
20160310 oss-2016-16: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (snd-usb-audio driver) (BUGTRAQ)
20160314 Re: oss-2016-17: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes (multiple free) on invalid USB device descriptors (snd-usb-audio driver) (BUGTRAQ)
https://bugzilla.redhat.com/show_bug.cgi?id=1317012 (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1707 (SUSE)
SUSE-SU-2016:1764 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:2074 (SUSE)
https://source.android.com/security/bulletin/2016-11-01.html (CONFIRM)
84340 (BID)
openSUSE-SU-2016:1008 (SUSE)
USN-2969-1 (UBUNTU)
USN-2971-1 (UBUNTU)
USN-2971-3 (UBUNTU)
USN-2968-1 (UBUNTU)
USN-2971-2 (UBUNTU)
USN-2970-1 (UBUNTU)
USN-2968-2 (UBUNTU)
SUSE-SU-2016:1019 (SUSE)
39555 (EXPLOIT-DB)
CVE: CVE-2016-2185
CVE: CVE-2016-2185
Id:
CVE-2016-2185
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185
Comment
: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1283362 (CONFIRM)
https://github.com/torvalds/linux/commit/950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1283363 (CONFIRM)
20160315 Re: oss-2016-18: Multiple Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (ati_remote2 driver) (BUGTRAQ)
https://bugzilla.redhat.com/show_bug.cgi?id=1317014 (CONFIRM)
20160310 oss-2016-18: Multiple Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (ati_remote2 driver) (BUGTRAQ)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1707 (SUSE)
SUSE-SU-2016:1764 (SUSE)
DSA-3607 (DEBIAN)
84341 (BID)
SUSE-SU-2016:2074 (SUSE)
USN-2969-1 (UBUNTU)
USN-2971-1 (UBUNTU)
USN-2971-3 (UBUNTU)
openSUSE-SU-2016:1382 (SUSE)
USN-2968-1 (UBUNTU)
USN-2971-2 (UBUNTU)
USN-2970-1 (UBUNTU)
USN-2968-2 (UBUNTU)
CVE: CVE-2016-2186
CVE: CVE-2016-2186
Id:
CVE-2016-2186
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186
Comment
: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c6ba456711687b794dcf285856fc14e2c76074f (CONFIRM)
20160310 oss-2016-13: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (powermate driver) (BUGTRAQ)
https://bugzilla.redhat.com/show_bug.cgi?id=1317015 (CONFIRM)
20160315 Re: oss-2016-13: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (powermate driver) (BUGTRAQ)
https://github.com/torvalds/linux/commit/9c6ba456711687b794dcf285856fc14e2c76074f (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1707 (SUSE)
SUSE-SU-2016:1764 (SUSE)
84337 (BID)
DSA-3607 (DEBIAN)
SUSE-SU-2016:2074 (SUSE)
openSUSE-SU-2016:1382 (SUSE)
USN-2968-1 (UBUNTU)
USN-2969-1 (UBUNTU)
USN-2971-1 (UBUNTU)
USN-2971-2 (UBUNTU)
USN-2970-1 (UBUNTU)
USN-2971-3 (UBUNTU)
USN-2968-2 (UBUNTU)
CVE: CVE-2016-2187
CVE: CVE-2016-2187
Id:
CVE-2016-2187
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187
Comment
: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=162f98dea487206d9ab79fc12ed64700667a894d (CONFIRM)
https://github.com/torvalds/linux/commit/162f98dea487206d9ab79fc12ed64700667a894d (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1317017 (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3002-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-2989-1 (UBUNTU)
USN-3005-1 (UBUNTU)
USN-3007-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
USN-3006-1 (UBUNTU)
DSA-3607 (DEBIAN)
85425 (BID)
SUSE-SU-2016:1985 (SUSE)
CVE: CVE-2016-3134
CVE: CVE-2016-3134
Id:
CVE-2016-3134
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134
Comment
: The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.4
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
SUSE-SU-2016:1690 ()
https://github.com/torvalds/linux/commit/54d83fc74aa9ec72794373cb47432c5f7fb1a309 ()
https://code.google.com/p/google-security-research/issues/detail?id=758 ()
SUSE-SU-2016:2010 ()
USN-2930-1 ()
SUSE-SU-2016:1696 ()
https://bugzilla.redhat.com/show_bug.cgi?id=1317383 ()
SUSE-SU-2016:1994 ()
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html ()
SUSE-SU-2016:1961 ()
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html ()
USN-2930-2 ()
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54d83fc74aa9ec72794373cb47432c5f7fb1a309 ()
SUSE-SU-2016:2001 ()
SUSE-SU-2016:1985 ()
RHSA-2016:1847 ()
SUSE-SU-2016:2006 ()
USN-3049-1 ()
RHSA-2016:1875 ()
SUSE-SU-2016:2014 ()
openSUSE-SU-2016:1641 ()
SUSE-SU-2016:1764 ()
USN-2930-3 ()
DSA-3607 ()
1036763 ()
SUSE-SU-2016:1672 ()
SUSE-SU-2016:2009 ()
USN-2929-1 ()
USN-2932-1 ()
USN-3050-1 ()
SUSE-SU-2016:2005 ()
SUSE-SU-2016:2007 ()
SUSE-SU-2016:2074 ()
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html ()
SUSE-SU-2016:2000 ()
RHSA-2016:1883 ()
SUSE-SU-2016:1995 ()
SUSE-SU-2016:2002 ()
USN-2931-1 ()
USN-2929-2 ()
84305 ()
CVE: CVE-2016-3136
CVE: CVE-2016-3136
Id:
CVE-2016-3136
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
Comment
: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
USN-2971-2 ()
SUSE-SU-2016:1690 ()
SUSE-SU-2016:1696 ()
USN-2970-1 ()
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4e9a0b05257f29cf4b75f3209243ed71614d062e ()
https://bugzilla.redhat.com/show_bug.cgi?id=1283370 ()
USN-2968-1 ()
[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (mct_u232 driver) ()
https://github.com/torvalds/linux/commit/4e9a0b05257f29cf4b75f3209243ed71614d062e ()
USN-2971-3 ()
USN-2997-1 ()
SUSE-SU-2016:1764 ()
USN-3000-1 ()
DSA-3607 ()
39541 ()
USN-2971-1 ()
https://bugzilla.redhat.com/show_bug.cgi?id=1317007 ()
USN-2996-1 ()
USN-2968-2 ()
openSUSE-SU-2016:1382 ()
84299 ()
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 ()
CVE: CVE-2016-3137
CVE: CVE-2016-3137
Id:
CVE-2016-3137
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137
Comment
: drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
USN-2971-2 ()
SUSE-SU-2016:1690 ()
[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver) ()
https://bugzilla.redhat.com/show_bug.cgi?id=1316996 ()
SUSE-SU-2016:1696 ()
USN-2970-1 ()
https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754 ()
84300 ()
USN-2968-1 ()
USN-2971-3 ()
USN-2997-1 ()
SUSE-SU-2016:1764 ()
USN-3000-1 ()
DSA-3607 ()
USN-2971-1 ()
SUSE-SU-2016:1707 ()
USN-2996-1 ()
SUSE-SU-2016:1672 ()
USN-2968-2 ()
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754 ()
openSUSE-SU-2016:1382 ()
SUSE-SU-2016:2074 ()
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 ()
CVE: CVE-2016-3138
CVE: CVE-2016-3138
Id:
CVE-2016-3138
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138
Comment
: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
USN-2971-2 ()
SUSE-SU-2016:1690 ()
SUSE-SU-2016:1696 ()
USN-2970-1 ()
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8835ba4a39cf53f705417b3b3a94eb067673f2c9 ()
USN-2969-1 ()
USN-2968-1 ()
USN-2971-3 ()
USN-2997-1 ()
SUSE-SU-2016:1764 ()
DSA-3607 ()
USN-2971-1 ()
[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cdc_acm driver) ()
SUSE-SU-2016:1707 ()
USN-2996-1 ()
SUSE-SU-2016:1672 ()
USN-2968-2 ()
https://bugzilla.redhat.com/show_bug.cgi?id=1316204 ()
openSUSE-SU-2016:1382 ()
SUSE-SU-2016:2074 ()
https://github.com/torvalds/linux/commit/8835ba4a39cf53f705417b3b3a94eb067673f2c9 ()
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 ()
CVE: CVE-2016-3140
CVE: CVE-2016-3140
Id:
CVE-2016-3140
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
Comment
: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
USN-2971-2 ()
SUSE-SU-2016:1690 ()
39537 ()
SUSE-SU-2016:1696 ()
USN-2970-1 ()
https://bugzilla.redhat.com/show_bug.cgi?id=1316995 ()
USN-2968-1 ()
USN-2971-3 ()
USN-2997-1 ()
SUSE-SU-2016:1764 ()
USN-3000-1 ()
DSA-3607 ()
USN-2971-1 ()
https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f ()
SUSE-SU-2016:1707 ()
USN-2996-1 ()
SUSE-SU-2016:1672 ()
USN-2968-2 ()
openSUSE-SU-2016:1382 ()
SUSE-SU-2016:2074 ()
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f ()
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 ()
84304 ()
[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (digi_acceleport driver) ()
CVE: CVE-2016-3157
CVE: CVE-2016-3157
Id:
CVE-2016-3157
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157
Comment
: The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
http://xenbits.xen.org/xsa/advisory-171.html (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
84594 (BID)
DSA-3607 (DEBIAN)
USN-2968-1 (UBUNTU)
USN-2969-1 (UBUNTU)
USN-2971-1 (UBUNTU)
USN-2971-2 (UBUNTU)
USN-2970-1 (UBUNTU)
USN-2971-3 (UBUNTU)
USN-2968-2 (UBUNTU)
1035308 (SECTRACK)
CVE: CVE-2016-3672
CVE: CVE-2016-3672
Id:
CVE-2016-3672
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672
Comment
: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
254 (Security Features)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1324749 (CONFIRM)
https://github.com/torvalds/linux/commit/8b8addf891de8a00e4d39fc32f93f7c5eb8feceb (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b8addf891de8a00e4d39fc32f93f7c5eb8feceb (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3002-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-2989-1 (UBUNTU)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1937 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
85884 (BID)
DSA-3607 (DEBIAN)
SUSE-SU-2016:2105 (SUSE)
http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-dis (MISC)
20160406 CVE-2016-3672 - Unlimiting the stack not longer disables ASLR (FULLDISC)
FEDORA-2016-76706f51a7 (FEDORA)
39669 (EXPLOIT-DB)
http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html (MISC)
1035506 (SECTRACK)
RHSA-2018:1062 (REDHAT)
RHSA-2018:0676 (REDHAT)
20160406 CVE-2016-3672 - Unlimiting the stack not longer disables ASLR (BUGTRAQ)
CVE: CVE-2016-3951
CVE: CVE-2016-3951
Id:
CVE-2016-3951
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951
Comment
: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
CWE-Other ()
References:
https://github.com/torvalds/linux/commit/4d06dd537f95683aba3651098ae288b7cbff8274 (CONFIRM)
https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274 (CONFIRM)
[oss-security] 20160406 Fwd: CVE Request: Linux: usbnet: memory corruption triggered by invalid USB descriptor (MLIST)
[netdev] 20160304 Re: Possible double-free in the usbnet driver (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=1324782 (CONFIRM)
USN-3002-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-2989-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1764 (SUSE)
91028 (BID)
DSA-3607 (DEBIAN)
openSUSE-SU-2016:1382 (SUSE)
1036763 (SECTRACK)
CVE: CVE-2016-3955
CVE: CVE-2016-3955
Id:
CVE-2016-3955
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3955
Comment
: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://github.com/torvalds/linux/commit/b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1328478 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3 (CONFIRM)
[oss-security] 20160419 CVE Request: Linux kernel: remote buffer overflow in usbip (MLIST)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
USN-3002-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-2989-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3003-1 (UBUNTU)
openSUSE-SU-2016:1641 (SUSE)
DSA-3607 (DEBIAN)
86534 (BID)
CVE: CVE-2016-3961
CVE: CVE-2016-3961
Id:
CVE-2016-3961
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3961
Comment
: Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
20 (Improper Input Validation)
References:
1035569 (SECTRACK)
http://xenbits.xen.org/xsa/advisory-174.html (CONFIRM)
http://xenbits.xen.org/xsa/xsa174.patch (CONFIRM)
USN-3002-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-3007-1 (UBUNTU)
USN-3005-1 (UBUNTU)
USN-3006-1 (UBUNTU)
DSA-3607 (DEBIAN)
USN-3050-1 (UBUNTU)
86068 (BID)
USN-3049-1 (UBUNTU)
CVE: CVE-2016-4482
CVE: CVE-2016-4482
Id:
CVE-2016-4482
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
Comment
: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
6.2
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=681fef8380eb818c0b845fca5d2ab1dcbab114ee (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1332931 (CONFIRM)
[oss-security] 20160503 CVE Request: information leak in devio of Linux kernel (MLIST)
https://github.com/torvalds/linux/commit/681fef8380eb818c0b845fca5d2ab1dcbab114ee (CONFIRM)
FEDORA-2016-4ce97823af (FEDORA)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1937 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1985 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
90029 (BID)
SUSE-SU-2016:2105 (SUSE)
CVE: CVE-2016-4485
CVE: CVE-2016-4485
Id:
CVE-2016-4485
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485
Comment
: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 (CONFIRM)
[oss-security] 20160503 CVE Request: kernel information leak vulnerability in llc module (MLIST)
https://github.com/torvalds/linux/commit/b8670c09f37bdf2847cc44f36511a53afc6161fd (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8670c09f37bdf2847cc44f36511a53afc6161fd (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1333309 (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
USN-3002-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-2989-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3005-1 (UBUNTU)
USN-3007-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
USN-3006-1 (UBUNTU)
openSUSE-SU-2016:1641 (SUSE)
DSA-3607 (DEBIAN)
90015 (BID)
SUSE-SU-2016:1985 (SUSE)
CVE: CVE-2016-4486
CVE: CVE-2016-4486
Id:
CVE-2016-4486
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
Comment
: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE:
200 (Information Exposure)
References:
[oss-security] 20160504 CVE Request: kernel information leak vulnerability in rtnetlink (MLIST)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6 (CONFIRM)
https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1333316 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
USN-3002-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-2989-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3005-1 (UBUNTU)
USN-3007-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
USN-3006-1 (UBUNTU)
SUSE-SU-2016:1937 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:2074 (SUSE)
90051 (BID)
SUSE-SU-2016:1985 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
SUSE-SU-2016:2105 (SUSE)
46006 (EXPLOIT-DB)
CVE: CVE-2016-4565
CVE: CVE-2016-4565
Id:
CVE-2016-4565
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565
Comment
: The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3 (CONFIRM)
[oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface' (MLIST)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1310570 (CONFIRM)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3018-2 (UBUNTU)
RHSA-2016:1341 (REDHAT)
RHSA-2016:1277 (REDHAT)
RHSA-2016:1301 (REDHAT)
USN-3002-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3005-1 (UBUNTU)
USN-3021-2 (UBUNTU)
USN-3007-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1690 (SUSE)
USN-3006-1 (UBUNTU)
SUSE-SU-2016:1937 (SUSE)
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html (CONFIRM)
SUSE-SU-2016:1995 (SUSE)
SUSE-SU-2016:2000 (SUSE)
90301 (BID)
DSA-3607 (DEBIAN)
SUSE-SU-2016:2014 (SUSE)
SUSE-SU-2016:2010 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
SUSE-SU-2016:2001 (SUSE)
SUSE-SU-2016:1994 (SUSE)
RHSA-2016:1617 (REDHAT)
SUSE-SU-2016:2011 (SUSE)
RHSA-2016:1581 (REDHAT)
RHSA-2016:1657 (REDHAT)
SUSE-SU-2016:2002 (SUSE)
SUSE-SU-2016:1961 (SUSE)
SUSE-SU-2016:2006 (SUSE)
RHSA-2016:1489 (REDHAT)
SUSE-SU-2016:2007 (SUSE)
SUSE-SU-2016:1985 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
RHSA-2016:1640 (REDHAT)
SUSE-SU-2016:2003 (SUSE)
SUSE-SU-2016:2005 (SUSE)
SUSE-SU-2016:2105 (SUSE)
RHSA-2016:1814 (REDHAT)
SUSE-SU-2016:2009 (SUSE)
RHSA-2016:1406 (REDHAT)
CVE: CVE-2016-4569
CVE: CVE-2016-4569
Id:
CVE-2016-4569
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569
Comment
: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cec8f96e49d9be372fdb0c3836dcf31ec71e457e (CONFIRM)
https://github.com/torvalds/linux/commit/cec8f96e49d9be372fdb0c3836dcf31ec71e457e (CONFIRM)
[oss-security] 20160509 Re: CVE Request: kernel information leak vulnerability in Linux sound module (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=1334643 (CONFIRM)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1937 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1985 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
90347 (BID)
SUSE-SU-2016:2105 (SUSE)
RHSA-2016:2584 (REDHAT)
RHSA-2016:2574 (REDHAT)
CVE: CVE-2016-4578
CVE: CVE-2016-4578
Id:
CVE-2016-4578
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578
Comment
: sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://github.com/torvalds/linux/commit/9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6 (CONFIRM)
https://github.com/torvalds/linux/commit/e4ec8cc8039a7063e24204299b462bd1383184a5 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1335215 (CONFIRM)
[oss-security] 20160511 Re: CVE Request: alsa: kernel information leak vulnerability in Linux sound/core/timer (MLIST)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4ec8cc8039a7063e24204299b462bd1383184a5 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6 (CONFIRM)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1937 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1985 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
SUSE-SU-2016:2105 (SUSE)
90535 (BID)
RHSA-2016:2584 (REDHAT)
RHSA-2016:2574 (REDHAT)
46529 (EXPLOIT-DB)
CVE: CVE-2016-4580
CVE: CVE-2016-4580
Id:
CVE-2016-4580
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
Comment
: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://github.com/torvalds/linux/commit/79e48650320e6fba48369fccf13fd045315b19b8 (CONFIRM)
[oss-security] 20160510 CVE Request: x25: a kernel infoleak in x25_negotiate_facilities() (MLIST)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79e48650320e6fba48369fccf13fd045315b19b8 (CONFIRM)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
90528 (BID)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1985 (SUSE)
CVE: CVE-2016-4913
CVE: CVE-2016-4913
Id:
CVE-2016-4913
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913
Comment
: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
200 (Information Exposure)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6 (CONFIRM)
[oss-security] 20160518 Re: CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c (MLIST)
https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1337528 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 (CONFIRM)
[oss-security] 20160518 CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c (MLIST)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html (CONFIRM)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1985 (SUSE)
90730 (BID)
RHSA-2018:3096 (REDHAT)
RHSA-2018:3083 (REDHAT)
CVE: CVE-2016-5243
CVE: CVE-2016-5243
Id:
CVE-2016-5243
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5243
Comment
: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5d2be1422e02ccd697ccfcd45c85b4a26e6178e2 (CONFIRM)
https://patchwork.ozlabs.org/patch/629100/ (CONFIRM)
[oss-security] 20160603 Re: CVE Request: tipc: an infoleak in tipc_nl_compat_link_dump (MLIST)
https://github.com/torvalds/linux/commit/5d2be1422e02ccd697ccfcd45c85b4a26e6178e2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1343335 (CONFIRM)
USN-3052-1 (UBUNTU)
91334 (BID)
USN-3056-1 (UBUNTU)
USN-3055-1 (UBUNTU)
DSA-3607 (DEBIAN)
USN-3050-1 (UBUNTU)
USN-3057-1 (UBUNTU)
USN-3049-1 (UBUNTU)
USN-3053-1 (UBUNTU)
USN-3051-1 (UBUNTU)
USN-3054-1 (UBUNTU)
CVE: CVE-2016-5244
CVE: CVE-2016-5244
Id:
CVE-2016-5244
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244
Comment
: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4116def2337991b39919f3b448326e21c40e0dbb (CONFIRM)
https://patchwork.ozlabs.org/patch/629110/ (CONFIRM)
https://github.com/torvalds/linux/commit/4116def2337991b39919f3b448326e21c40e0dbb (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1343337 (CONFIRM)
[oss-security] 20160603 Re: CVE Request: rds: fix an infoleak in rds_inc_info_copy (MLIST)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1937 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
USN-3072-2 (UBUNTU)
USN-3071-1 (UBUNTU)
USN-3072-1 (UBUNTU)
DSA-3607 (DEBIAN)
USN-3070-3 (UBUNTU)
USN-3070-4 (UBUNTU)
91021 (BID)
USN-3070-2 (UBUNTU)
USN-3070-1 (UBUNTU)
SUSE-SU-2016:2105 (SUSE)
SUSE-SU-2016:1985 (SUSE)
USN-3071-2 (UBUNTU)
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html (CONFIRM)
1041895 (SECTRACK)
Content available only for registered users!
ovaldb@altx-soft.com