Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-5243

Опубликовано: 27 июн. 2016
Источник: debian
EPSS Низкий

Описание

The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.6.2-1package

Примечания

  • Fixed by: https://github.com/torvalds/linux/commit/5d2be1422e02ccd697ccfcd45c85b4a26e6178e2

EPSS

Процентиль: 13%
0.00043
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 9 лет назад

The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

redhat
больше 9 лет назад

The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

CVSS3: 5.5
nvd
больше 9 лет назад

The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

CVSS3: 5.5
github
больше 3 лет назад

The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.

suse-cvrf
больше 8 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 13%
0.00043
Низкий