Revision Date: | 2016-06-27 | Version: | 1 | Title: | CVE-2016-5244 on Ubuntu 14.04 LTS (trusty) - medium. | Description: | The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message. Kangjie Lu discovered an information leak in the Reliable Datagram Sockets (RDS) implementation in the Linux kernel. A local attacker could use this to obtain potentially sensitive information from kernel memory.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2016-5244
| Platform(s): | Ubuntu 14.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 14.04 LTS (trusty) is installed. AND Package Information
The 'linux' package in trusty was vulnerable but has been fixed (note: '3.13.0-95.142').
OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected (note: '4.4.0-1002.2').
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR The 'linux-lts-vivid' package in trusty was vulnerable but has been fixed (note: '3.19.0-68.76~14.04.1').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR The 'linux-lts-xenial' package in trusty was vulnerable but has been fixed (note: '4.4.0-36.55~14.04.1').
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
|
|