Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4486

Опубликовано: 23 мая 2016
Источник: debian

Описание

The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.5.4-1package

Примечания

  • https://git.kernel.org/linus/5f8e44741f9f216e33736ea4ec65ca9ac03036e6

Связанные уязвимости

CVSS3: 3.3
ubuntu
больше 9 лет назад

The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

redhat
почти 10 лет назад

The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

CVSS3: 3.3
nvd
больше 9 лет назад

The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

CVSS3: 3.3
github
больше 3 лет назад

The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

suse-cvrf
больше 9 лет назад

Security update for the Linux Kernel