CVE-2016-4486

The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

Published : 2016-05-23 10:59 Updated : 2018-12-20 11:29

2.1
CVSS Score More info
Score 2.1 / 10
2.1
Vendor Product Version URI
Canonical Ubuntu Linux 12.04 cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
Novell Suse Linux Enterprise Debuginfo 11.0 cpe:/o:novell:suse_linux_enterprise_debuginfo:11.0:sp4
Novell Suse Linux Enterprise Server 12.0 cpe:/o:novell:suse_linux_enterprise_server:12.0
Novell Suse Linux Enterprise Server 12.0 cpe:/o:novell:suse_linux_enterprise_server:12.0:sp1
Novell Suse Linux Enterprise Real Time Extension 12.0 cpe:/o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1
Canonical Ubuntu Linux 16.04 cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
Novell Suse Linux Enterprise Server 11.0 cpe:/o:novell:suse_linux_enterprise_server:11.0:extra
Canonical Ubuntu Linux 14.04 cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
Linux Linux Kernel 4.5.4 cpe:/o:linux:linux_kernel:4.5.4
Novell Suse Linux Enterprise Server 11.0 cpe:/o:novell:suse_linux_enterprise_server:11.0:sp4
Novell Suse Linux Enterprise Live Patching 12.0 cpe:/o:novell:suse_linux_enterprise_live_patching:12.0
Novell Suse Linux Enterprise Workstation Extension 12.0 cpe:/o:novell:suse_linux_enterprise_workstation_extension:12.0
Novell Suse Linux Enterprise Module For Public Cloud 12.0 cpe:/o:novell:suse_linux_enterprise_module_for_public_cloud:12.0
Novell Suse Linux Enterprise Software Development Kit 11.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4
Canonical Ubuntu Linux 15.10 cpe:/o:canonical:ubuntu_linux:15.10
Novell Suse Linux Enterprise Workstation Extension 12.0 cpe:/o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1
Novell Suse Linux Enterprise Desktop 12.0 cpe:/o:novell:suse_linux_enterprise_desktop:12.0:sp1
Novell Suse Linux Enterprise Software Development Kit 12.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1
Novell Suse Linux Enterprise Desktop 12.0 cpe:/o:novell:suse_linux_enterprise_desktop:12.0
Novell Suse Linux Enterprise Software Development Kit 12.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0
  1. Canonical (1) Search CVE
    1. Ubuntu Linux (4) Search CVE
      1. 12.04
      2. 16.04
      3. 14.04
      4. 15.10
  2. Novell (8) Search CVE
    1. Suse Linux Enterprise Module For Public Cloud (1) Search CVE
      1. 12.0
    2. Suse Linux Enterprise Real Time Extension (1) Search CVE
      1. 12.0
    3. Suse Linux Enterprise Debuginfo (1) Search CVE
      1. 11.0
    4. Suse Linux Enterprise Software Development Kit (2) Search CVE
      1. 11.0
      2. 12.0
    5. Suse Linux Enterprise Desktop (1) Search CVE
      1. 12.0
    6. Suse Linux Enterprise Server (2) Search CVE
      1. 12.0
      2. 11.0
    7. Suse Linux Enterprise Live Patching (1) Search CVE
      1. 12.0
    8. Suse Linux Enterprise Workstation Extension (1) Search CVE
      1. 12.0
  3. Linux (1) Search CVE
    1. Linux Kernel (1) Search CVE
      1. 4.5.4

CWE

ID Name Description Links
CWE-200 Information Exposure An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information. CVE

References

Source Link
CONFIRM http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
DEBIAN http://www.debian.org/security/2016/dsa-3607
CONFIRM http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
MLIST http://www.openwall.com/lists/oss-security/2016/05/04/27
BID http://www.securityfocus.com/bid/90051
UBUNTU http://www.ubuntu.com/usn/USN-2989-1
UBUNTU http://www.ubuntu.com/usn/USN-2996-1
UBUNTU http://www.ubuntu.com/usn/USN-2997-1
UBUNTU http://www.ubuntu.com/usn/USN-2998-1
UBUNTU http://www.ubuntu.com/usn/USN-3000-1
UBUNTU http://www.ubuntu.com/usn/USN-3001-1
UBUNTU http://www.ubuntu.com/usn/USN-3002-1
UBUNTU http://www.ubuntu.com/usn/USN-3003-1
UBUNTU http://www.ubuntu.com/usn/USN-3004-1
UBUNTU http://www.ubuntu.com/usn/USN-3005-1
UBUNTU http://www.ubuntu.com/usn/USN-3006-1
UBUNTU http://www.ubuntu.com/usn/USN-3007-1
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1333316
CONFIRM https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6
EXPLOIT-DB https://www.exploit-db.com/exploits/46006/

History of changes

Date Event
2018-12-20 11:29
2016-05-23 10:59

New CVE