CVE-2016-5828
Kernel: powerpc: tm: crash via exec system call on PPC
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.
La función start_thread en arch/powerpc/kernel/process.c en el kernel de Linux hasta la versión 4.6.3 en plataformas powerpc no maneja adecuadamente el estado transaccional, lo que permite a usuarios locales provocar una denegación de servicio (estado de proceso inválido o excepción TM Bad Thing y caída de sistema) o posiblemente tener otro impacto no especificado iniciando y suspendiendo una transacción antes de una llamada de sistema exec.
A vulnerability in the handling of Transactional Memory on powerpc systems was found. An unprivileged local user can crash the kernel by starting a transaction, suspending it, and then calling any of the exec() class system calls.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-06-23 CVE Reserved
- 2016-06-27 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/06/25/7 | Mailing List | |
http://www.securityfocus.com/bid/91415 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://patchwork.ozlabs.org/patch/636776 | 2023-01-17 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html | 2023-01-17 | |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html | 2023-01-17 | |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html | 2023-01-17 | |
http://rhn.redhat.com/errata/RHSA-2016-2574.html | 2023-01-17 | |
http://www.debian.org/security/2016/dsa-3616 | 2023-01-17 | |
http://www.ubuntu.com/usn/USN-3070-1 | 2023-01-17 | |
http://www.ubuntu.com/usn/USN-3070-2 | 2023-01-17 | |
http://www.ubuntu.com/usn/USN-3070-3 | 2023-01-17 | |
http://www.ubuntu.com/usn/USN-3070-4 | 2023-01-17 | |
http://www.ubuntu.com/usn/USN-3071-1 | 2023-01-17 | |
http://www.ubuntu.com/usn/USN-3071-2 | 2023-01-17 | |
https://access.redhat.com/security/cve/CVE-2016-5828 | 2016-11-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1349917 | 2016-11-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.9 < 3.10.103 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.9 < 3.10.103" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.11 < 3.14.74 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.11 < 3.14.74" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.15 < 3.16.37 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.15 < 3.16.37" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.17 < 3.18.37 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.17 < 3.18.37" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.19 < 4.1.28 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.19 < 4.1.28" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.2 < 4.4.16 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.2 < 4.4.16" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.6 < 4.6.5 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.6 < 4.6.5" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Real Time Extension Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" | 12 Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" and version "12" | sp1 |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | esm |
Affected
|