Vulnerability Details : CVE-2016-2383
The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.
Products affected by CVE-2016-2383
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.5.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-2383
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-2383
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
References for CVE-2016-2383
-
https://bugzilla.redhat.com/show_bug.cgi?id=1308452
1308452 – (CVE-2016-2383) CVE-2016-2383 kernel: incorrect branch fixups for eBPG allow arbitrary readIssue Tracking;Third Party Advisory
-
https://github.com/torvalds/linux/commit/a1b14d27ed0965838350f1377ff97c93ee383492
bpf: fix branch offset adjustment on backjumps after patching ctx exp… · torvalds/linux@a1b14d2 · GitHubPatch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
[security-announce] openSUSE-SU-2016:1008-1: important: Security updateThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2947-3
USN-2947-3: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/02/14/1
oss-security - CVE Request: Linux: Incorrect branch fixups for eBPF allow arbitrary readMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2947-2
USN-2947-2: Linux kernel (Wily HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2947-1
USN-2947-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1b14d27ed0965838350f1377ff97c93ee383492
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
Jump to