Vulnerabilidad en la función rds_inc_info_copy en net/rds/recv.c en el kernel de Linux (CVE-2016-5244)
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-200
Revelación de información
Fecha de publicación:
27/06/2016
Última modificación:
12/04/2025
Descripción
La función rds_inc_info_copy en net/rds/recv.c en el kernel de Linux hasta la versión 4.6.3 no inicializa un cierto miembro de estructura, lo que permite a atacantes remotos obtener información sensible de la memoria de pila del kernel leyendo un mensaje RDS.
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:* | ||
| cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:opensuse_leap:42.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* | ||
| cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4116def2337991b39919f3b448326e21c40e0dbb
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://www.debian.org/security/2016/dsa-3607
- http://www.openwall.com/lists/oss-security/2016/06/03/5
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/91021
- http://www.securitytracker.com/id/1041895
- http://www.ubuntu.com/usn/USN-3070-1
- http://www.ubuntu.com/usn/USN-3070-2
- http://www.ubuntu.com/usn/USN-3070-3
- http://www.ubuntu.com/usn/USN-3070-4
- http://www.ubuntu.com/usn/USN-3071-1
- http://www.ubuntu.com/usn/USN-3071-2
- http://www.ubuntu.com/usn/USN-3072-1
- http://www.ubuntu.com/usn/USN-3072-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1343337
- https://github.com/torvalds/linux/commit/4116def2337991b39919f3b448326e21c40e0dbb
- https://patchwork.ozlabs.org/patch/629110/
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4116def2337991b39919f3b448326e21c40e0dbb
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://www.debian.org/security/2016/dsa-3607
- http://www.openwall.com/lists/oss-security/2016/06/03/5
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/91021
- http://www.securitytracker.com/id/1041895
- http://www.ubuntu.com/usn/USN-3070-1
- http://www.ubuntu.com/usn/USN-3070-2
- http://www.ubuntu.com/usn/USN-3070-3
- http://www.ubuntu.com/usn/USN-3070-4
- http://www.ubuntu.com/usn/USN-3071-1
- http://www.ubuntu.com/usn/USN-3071-2
- http://www.ubuntu.com/usn/USN-3072-1
- http://www.ubuntu.com/usn/USN-3072-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1343337
- https://github.com/torvalds/linux/commit/4116def2337991b39919f3b448326e21c40e0dbb
- https://patchwork.ozlabs.org/patch/629110/



