CVE-2016-5243
Ubuntu Security Notice USN-3049-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
La función tipc_nl_compat_link_dump en net/tipc/netlink_compat.c en el kernel de Linux hasta la versión 4.6.3 no copia adecuadamente una cierta cadena, lo que permite a usuarios locales obtener información sensible de la memoria de pila del kernel leyendo un mensaje Netlink.
Ben Hawkes discovered an integer overflow in the Linux netfilter implementation. On systems running 32 bit kernels, a local unprivileged attacker could use this to cause a denial of service or possibly execute arbitrary code with administrative privileges. It was discovered that the keyring implementation in the Linux kernel did not ensure a data structure was initialized before referencing it after an error condition occurred. A local attacker could use this to cause a deni al of service. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-06-03 CVE Reserved
- 2016-06-27 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/06/03/4 | Mailing List |
|
http://www.securityfocus.com/bid/91334 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=1343335 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://patchwork.ozlabs.org/patch/629100 | 2016-11-28 |
URL | Date | SRC |
---|---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5d2be1422e02ccd697ccfcd45c85b4a26e6178e2 | 2016-11-28 | |
http://www.debian.org/security/2016/dsa-3607 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3049-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3050-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3051-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3052-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3053-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3054-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3055-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3056-1 | 2016-11-28 | |
http://www.ubuntu.com/usn/USN-3057-1 | 2016-11-28 | |
https://github.com/torvalds/linux/commit/5d2be1422e02ccd697ccfcd45c85b4a26e6178e2 | 2016-11-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.6.3 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.6.3" | - |
Affected
|