7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.005 Low
EPSS
Percentile
76.4%
The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before
4.5.5 does not initialize a certain data structure, which allows attackers
to obtain sensitive information from kernel stack memory by reading a
message.
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 12.04 | noarch | linux | < 3.2.0-104.145 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < 3.13.0-87.133 | UNKNOWN |
ubuntu | 15.10 | noarch | linux | < 4.2.0-38.45 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-24.43 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-armadaxp | < 3.2.0-1667.92 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-trusty | < 3.13.0-88.135~precise1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-utopic | < 3.16.0-73.95~14.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-vivid | < 3.19.0-61.69~14.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-wily | < 4.2.0-38.45~14.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | < 4.4.0-24.43~14.04.1 | UNKNOWN |
www.openwall.com/lists/oss-security/2016/05/05/1
git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=b8670c09f37bdf2847cc44f36511a53afc6161fd
launchpad.net/bugs/cve/CVE-2016-4485
nvd.nist.gov/vuln/detail/CVE-2016-4485
security-tracker.debian.org/tracker/CVE-2016-4485
ubuntu.com/security/notices/USN-2989-1
ubuntu.com/security/notices/USN-2996-1
ubuntu.com/security/notices/USN-2997-1
ubuntu.com/security/notices/USN-2998-1
ubuntu.com/security/notices/USN-3000-1
ubuntu.com/security/notices/USN-3001-1
ubuntu.com/security/notices/USN-3002-1
ubuntu.com/security/notices/USN-3003-1
ubuntu.com/security/notices/USN-3004-1
ubuntu.com/security/notices/USN-3005-1
ubuntu.com/security/notices/USN-3006-1
ubuntu.com/security/notices/USN-3007-1
www.cve.org/CVERecord?id=CVE-2016-4485
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.005 Low
EPSS
Percentile
76.4%