CVE-2016-4913

The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6 Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/05/18/5 Mailing List Patch Third Party Advisory
https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1337528 Issue Tracking Third Party Advisory VDB Entry
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/05/18/3 Mailing List Patch Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-4 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3019-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3020-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-2 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3607 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/90730 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*

Information

Published : 2016-05-23 03:59

Updated : 2023-01-17 13:17


NVD link : CVE-2016-4913

Mitre link : CVE-2016-4913


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

novell

  • suse_linux_enterprise_server
  • suse_linux_enterprise_software_development_kit
  • suse_linux_enterprise_debuginfo

canonical

  • ubuntu_linux

linux

  • linux_kernel

oracle

  • linux