2.1
CVSSv2

CVE-2016-4482

Published: 23/05/2016 Updated: 12/09/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.2 | Impact Score: 3.6 | Exploitability Score: 2.5
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel up to and including 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

linux linux kernel

novell suse linux enterprise module for public cloud 12.0

novell suse linux enterprise server 11.0

novell suse linux enterprise server 12.0

novell suse linux enterprise live patching 12.0

novell suse linux enterprise desktop 12.0

novell suse linux enterprise real time extension 12.0

novell suse linux enterprise workstation extension 12.0

novell suse linux enterprise debuginfo 11.0

novell suse linux enterprise software development kit 11.0

novell suse linux enterprise software development kit 12.0

fedoraproject fedora 24

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2015-7515, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2187, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3140 Ralf Spenneberg of OpenSource Sec ...
The proc_connectinfo() function in 'drivers/usb/core/devioc' in the Linux kernel through 46 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call The stack object 'ci' has a total size of 8 bytes Its last 3 bytes are padding b ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...

References

CWE-200http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=681fef8380eb818c0b845fca5d2ab1dcbab114eehttps://bugzilla.redhat.com/show_bug.cgi?id=1332931http://www.openwall.com/lists/oss-security/2016/05/04/2https://github.com/torvalds/linux/commit/681fef8380eb818c0b845fca5d2ab1dcbab114eehttp://lists.fedoraproject.org/pipermail/package-announce/2016-May/184414.htmlhttp://www.ubuntu.com/usn/USN-3017-2http://www.ubuntu.com/usn/USN-3018-2http://www.ubuntu.com/usn/USN-3016-4http://www.ubuntu.com/usn/USN-3016-1http://www.ubuntu.com/usn/USN-3016-2http://www.ubuntu.com/usn/USN-3016-3http://www.ubuntu.com/usn/USN-3018-1http://www.ubuntu.com/usn/USN-3019-1http://www.ubuntu.com/usn/USN-3017-3http://www.ubuntu.com/usn/USN-3020-1http://www.ubuntu.com/usn/USN-3017-1http://www.ubuntu.com/usn/USN-3021-1http://www.ubuntu.com/usn/USN-3021-2http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.htmlhttp://www.debian.org/security/2016/dsa-3607http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.htmlhttp://www.securityfocus.com/bid/90029http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.htmlhttps://nvd.nist.govhttps://www.debian.org/security/./dsa-3607https://usn.ubuntu.com/3018-2/