Vulnerability Description
The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 12.04 |
| Linux | Linux Kernel | <= 4.6 |
| Novell | Suse Linux Enterprise Software Development Kit | 11.0 |
| Novell | Suse Linux Enterprise Debuginfo | 11.0 |
| Novell | Suse Linux Enterprise Desktop | 12.0 |
| Novell | Suse Linux Enterprise Live Patching | 12.0 |
| Novell | Suse Linux Enterprise Module For Public Cloud | 12.0 |
| Novell | Suse Linux Enterprise Real Time Extension | 12.0 |
| Novell | Suse Linux Enterprise Server | 11.0 |
| Novell | Suse Linux Enterprise Workstation Extension | 12.0 |
| Fedoraproject | Fedora | 24 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=681fefVendor Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184414.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://www.debian.org/security/2016/dsa-3607
- http://www.openwall.com/lists/oss-security/2016/05/04/2
- http://www.securityfocus.com/bid/90029
- http://www.ubuntu.com/usn/USN-3016-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3016-2Third Party Advisory
FAQ
What is CVE-2016-4482?
CVE-2016-4482 is a vulnerability with a CVSS score of 6.2 (MEDIUM). The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from ke...
How severe is CVE-2016-4482?
CVE-2016-4482 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4482?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Linux Linux Kernel, Novell Suse Linux Enterprise Software Development Kit, Novell Suse Linux Enterprise Debuginfo, Novell Suse Linux Enterprise Desktop.