7.8

CVE-2016-4913

The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.

Data is provided by the National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version12.04 SwEditionlts
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version15.10
CanonicalUbuntu Linux Version16.04 SwEditionlts
LinuxLinux Kernel Version < 3.2.81
LinuxLinux Kernel Version >= 3.3 < 3.10.102
LinuxLinux Kernel Version >= 3.11 < 3.12.60
LinuxLinux Kernel Version >= 3.13 < 3.14.70
LinuxLinux Kernel Version >= 3.15 < 3.16.36
LinuxLinux Kernel Version >= 3.17 < 3.18.34
LinuxLinux Kernel Version >= 3.19 < 4.1.25
LinuxLinux Kernel Version >= 4.2 < 4.4.11
LinuxLinux Kernel Version >= 4.5 < 4.5.5
OracleLinux Version6
NovellSuse Linux Enterprise Debuginfo Version11.0 Updatesp4
NovellSuse Linux Enterprise Server Version11.0 Updateextra
NovellSuse Linux Enterprise Server Version11.0 Updatesp4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.1% 0.292
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

http://www.openwall.com/lists/oss-security/2016/05/18/3
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2016/05/18/5
Patch
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/90730
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1337528
Third Party Advisory
VDB Entry
Issue Tracking