First published: Tue Jun 07 2016(Updated: )
A vulnerability was found in the Linux kernel in function rds_inc_info_copy of file net/rds/recv.c. The last field "flags" of object "minfo" is not initialized. Copying this object out may leak kernel stack data. Assign 0 to it to avoid leak. Upstream bug: <a href="https://patchwork.ozlabs.org/patch/629110/">https://patchwork.ozlabs.org/patch/629110/</a> Upstream fix: <a href="https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=4116def2337991b39919f3b448326e21c40e0dbb">https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=4116def2337991b39919f3b448326e21c40e0dbb</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =23 | |
Suse Linux Enterprise Real Time Extension | =11-sp4 | |
Fedoraproject Fedora | =24 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
Suse Linux Enterprise Real Time Extension | =12-sp1 | |
SUSE Linux Enterprise Server | =11-extra | |
Redhat Enterprise Linux | =6.0 | |
Suse Suse Linux Enterprise Software Development Kit | =11-sp4 | |
Suse Linux Enterprise Workstation Extension | =12 | |
Redhat Enterprise Linux | =5 | |
SUSE Linux Enterprise Desktop | =12 | |
Suse Opensuse Leap | =42.1 | |
SUSE Linux Enterprise Server | =11-sp4 | |
Suse Suse Linux Enterprise Software Development Kit | =12 | |
Fedoraproject Fedora | =22 | |
Linux Linux kernel | <=4.6.3 | |
SUSE SUSE Linux Enterprise Server | =12 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5244 is a vulnerability in the Linux kernel that allows remote attackers to obtain sensitive information from kernel stack memory.
CVE-2016-5244 is classified as a low severity vulnerability.
Linux kernel versions through 4.6.3 are affected by CVE-2016-5244.
To fix CVE-2016-5244, update your Linux kernel to version 4.6.4 or higher.
You can find more information about CVE-2016-5244 in the references provided: http://www.openwall.com/lists/oss-security/2016/06/03/5, http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4116def2337991b39919f3b448326e21c40e0dbb, https://bugzilla.redhat.com/show_bug.cgi?id=1343337