CVE-2016-4913

The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3607 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/05/18/3 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/18/5 Mailing List Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
http://www.securityfocus.com/bid/90730 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3016-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-4 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3019-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3020-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-2 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1337528 Issue Tracking Third Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6 Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3607 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/05/18/3 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/18/5 Mailing List Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
http://www.securityfocus.com/bid/90730 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3016-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-4 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3019-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3020-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-2 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1337528 Issue Tracking Third Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6 - Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6 - Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html - Mailing List, Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3607 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3607 - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 - Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2016/05/18/3 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/05/18/3 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/05/18/5 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/05/18/5 - Mailing List, Patch, Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - Third Party Advisory
References () http://www.securityfocus.com/bid/90730 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/90730 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-3016-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3016-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3016-2 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3016-2 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3016-3 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3016-3 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3016-4 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3016-4 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3017-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3017-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3017-2 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3017-2 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3017-3 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3017-3 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3018-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3018-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3018-2 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3018-2 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3019-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3019-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3020-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3020-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3021-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3021-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-3021-2 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3021-2 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1337528 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1337528 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6 - Vendor Advisory () https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6 - Vendor Advisory

12 Sep 2023, 14:45

Type Values Removed Values Added
CPE cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:* cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*

Information

Published : 2016-05-23 10:59

Updated : 2024-11-21 02:53


NVD link : CVE-2016-4913

Mitre link : CVE-2016-4913

CVE.ORG link : CVE-2016-4913


JSON object : View

Products Affected

novell

  • suse_linux_enterprise_software_development_kit
  • suse_linux_enterprise_debuginfo
  • suse_linux_enterprise_server

oracle

  • linux

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor