Vulnerability Name: | CVE-2016-8650 (CCN-119408) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-11-15 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2016-11-15 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-12 | ||||||||||||||||||||||||||||||||||||||||
Summary: | The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-8650 Source: CCN Type: Linux Kernel GIT Repository mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] Source: secalert@redhat.com Type: Issue Tracking, Patch, Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Mailing List secalert@redhat.com Source: CCN Type: IBM Security Bulletin T1024825 (PowerKVM) Vulnerabilities in the Linux Kernel affect PowerKVM Source: CCN Type: IBM Security Bulletin T1025779 (PowerKVM) Vulnerabilities in the Linux kernel affect PowerKVM Source: CCN Type: IBM Security Bulletin 2008854 (QRadar Network Security) IBM QRadar Network Security is affected by vulnerabilities in Linux kernel Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: CCN Type: BID-94532 Linux Kernel CVE-2016-8650 Null Pointer Deference Local Denial of Service Vulnerability Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: Issue Tracking secalert@redhat.com Source: XF Type: UNKNOWN linux-kernel-cve20168650-dos(119408) Source: secalert@redhat.com Type: Issue Tracking, Patch, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-8650 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |