Information exposure in Linux kernel - CVE-2016-5244
Published: June 27, 2016 / Updated: April 22, 2019
Vulnerability identifier: #VU92458
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-5244
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to information exposure error within the rds_inc_info_copy() function in net/rds/recv.c. A remote non-authenticated attacker can gain access to sensitive information.
How to mitigate CVE-2016-5244
Install update from vendor's repository.
Sources
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4116def2337991b39919f3b448326e21c40e0dbb
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://www.debian.org/security/2016/dsa-3607
- http://www.openwall.com/lists/oss-security/2016/06/03/5
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/91021
- http://www.securitytracker.com/id/1041895
- http://www.ubuntu.com/usn/USN-3070-1
- http://www.ubuntu.com/usn/USN-3070-2
- http://www.ubuntu.com/usn/USN-3070-3
- http://www.ubuntu.com/usn/USN-3070-4
- http://www.ubuntu.com/usn/USN-3071-1
- http://www.ubuntu.com/usn/USN-3071-2
- http://www.ubuntu.com/usn/USN-3072-1
- http://www.ubuntu.com/usn/USN-3072-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1343337
- https://github.com/torvalds/linux/commit/4116def2337991b39919f3b448326e21c40e0dbb
- https://patchwork.ozlabs.org/patch/629110/