CVE-2016-4913

The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3607 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/05/18/3 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/18/5 Mailing List Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
http://www.securityfocus.com/bid/90730 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3016-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-4 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3019-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3020-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-2 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1337528 Issue Tracking Third Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*

History

12 Sep 2023, 14:45

Type Values Removed Values Added
CPE cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:* cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*

17 Jan 2023, 21:17

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2016/05/18/3 - Patch (MLIST) http://www.openwall.com/lists/oss-security/2016/05/18/3 - Mailing List, Patch, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:3083 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2016/dsa-3607 - (DEBIAN) http://www.debian.org/security/2016/dsa-3607 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/90730 - (BID) http://www.securityfocus.com/bid/90730 - Third Party Advisory, VDB Entry
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:3096 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory
References (CONFIRM) http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 - (CONFIRM) http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 - Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2016/05/18/5 - Patch (MLIST) http://www.openwall.com/lists/oss-security/2016/05/18/5 - Mailing List, Patch, Third Party Advisory

Information

Published : 2016-05-23 10:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-4913

Mitre link : CVE-2016-4913

CVE.ORG link : CVE-2016-4913


JSON object : View

Products Affected

novell

  • suse_linux_enterprise_server
  • suse_linux_enterprise_debuginfo
  • suse_linux_enterprise_software_development_kit

linux

  • linux_kernel

oracle

  • linux

canonical

  • ubuntu_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor