CVE-2016-5243

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5d2be1422e02ccd697ccfcd45c85b4a26e6178e2

http://www.debian.org/security/2016/dsa-3607

http://www.openwall.com/lists/oss-security/2016/06/03/4

http://www.securityfocus.com/bid/91334

http://www.ubuntu.com/usn/USN-3049-1

http://www.ubuntu.com/usn/USN-3050-1

http://www.ubuntu.com/usn/USN-3051-1

http://www.ubuntu.com/usn/USN-3052-1

http://www.ubuntu.com/usn/USN-3053-1

http://www.ubuntu.com/usn/USN-3054-1

http://www.ubuntu.com/usn/USN-3055-1

http://www.ubuntu.com/usn/USN-3056-1

http://www.ubuntu.com/usn/USN-3057-1

https://bugzilla.redhat.com/show_bug.cgi?id=1343335

https://github.com/torvalds/linux/commit/5d2be1422e02ccd697ccfcd45c85b4a26e6178e2

https://patchwork.ozlabs.org/patch/629100/

Details

Source: MITRE

Published: 2016-06-27

Updated: 2016-11-28

Type: CWE-200

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 4.6.3 (inclusive)

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
125301EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1508)NessusHuawei Local Security Checks
high
103354SUSE SLES11 Security Update : kernel (SUSE-SU-2017:2525-1) (Stack Clash)NessusSuSE Local Security Checks
critical
100320SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2017:1360-1)NessusSuSE Local Security Checks
critical
100214SUSE SLES11 Security Update : kernel (SUSE-SU-2017:1301-1)NessusSuSE Local Security Checks
high
100150SUSE SLES12 Security Update : kernel (SUSE-SU-2017:1247-1)NessusSuSE Local Security Checks
critical
92867Ubuntu 16.04 LTS : linux-snapdragon vulnerabilities (USN-3057-1)NessusUbuntu Local Security Checks
high
92866Ubuntu 16.04 LTS : linux-raspi2 vulnerabilities (USN-3056-1)NessusUbuntu Local Security Checks
high
92865Ubuntu 16.04 LTS : linux vulnerabilities (USN-3055-1)NessusUbuntu Local Security Checks
high
92864Ubuntu 14.04 LTS : linux-lts-xenial vulnerabilities (USN-3054-1)NessusUbuntu Local Security Checks
high
92863Ubuntu 14.04 LTS : linux-lts-vivid vulnerabilities (USN-3053-1)NessusUbuntu Local Security Checks
high
92862Ubuntu 14.04 LTS : linux vulnerabilities (USN-3052-1)NessusUbuntu Local Security Checks
medium
92861Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-3051-1)NessusUbuntu Local Security Checks
medium
92860Ubuntu 12.04 LTS : linux vulnerabilities (USN-3049-1)NessusUbuntu Local Security Checks
high
92661Amazon Linux AMI : kernel (ALAS-2016-726)NessusAmazon Linux Local Security Checks
high
92184Fedora 24 : kernel (2016-e0f3fcd7df)NessusFedora Local Security Checks
high
92121Fedora 23 : kernel (2016-80edb9d511)NessusFedora Local Security Checks
high
92085Fedora 22 : kernel (2016-3daf782dfa)NessusFedora Local Security Checks
high
91886Debian DSA-3607-1 : linux - security updateNessusDebian Local Security Checks
critical
91687Debian DLA-516-1 : linux security updateNessusDebian Local Security Checks
critical