mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
133 lines
3.9 KiB
JSON
133 lines
3.9 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2016-4913",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"url" : "http://www.openwall.com/lists/oss-security/2016/05/18/3"
|
|
},
|
|
{
|
|
"url" : "http://www.openwall.com/lists/oss-security/2016/05/18/5"
|
|
},
|
|
{
|
|
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6"
|
|
},
|
|
{
|
|
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5"
|
|
},
|
|
{
|
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1337528"
|
|
},
|
|
{
|
|
"url" : "https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6"
|
|
},
|
|
{
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
|
|
},
|
|
{
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
|
|
},
|
|
{
|
|
"url" : "http://www.debian.org/security/2016/dsa-3607"
|
|
},
|
|
{
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html"
|
|
},
|
|
{
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3016-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3016-2"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3016-3"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3016-4"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3017-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3017-2"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3017-3"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3018-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3018-2"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3019-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3020-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3021-1"
|
|
},
|
|
{
|
|
"url" : "http://www.ubuntu.com/usn/USN-3021-2"
|
|
},
|
|
{
|
|
"url" : "http://www.securityfocus.com/bid/90730"
|
|
}
|
|
]
|
|
}
|
|
}
|