CVE-2016-2383Out-of-bounds Read in Kernel

CWE-125Out-of-bounds Read13 documents9 sources
Severity
5.5MEDIUMNVD
OSV4.9
EPSS
0.1%
top 75.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 27
Latest updateOct 23

Description

The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel< 4.5.0+1
Debianlinux/linux_kernel< 4.4.2-1+3
debiandebian/linux< linux 4.4.2-1 (bookworm)
NVDopensuse/leap42.1

Also affects: Ubuntu Linux 14.04, 15.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-64fh-798g-3h53: The adjust_branches function in kernel/bpf/verifier2022-05-13
OSV
CVE-2016-2383: The adjust_branches function in kernel/bpf/verifier2016-04-27
OSV
linux-lts-wily vulnerabilities2016-04-06

📋Vendor Advisories

5
Ubuntu
Linux kernel (Wily HWE) vulnerabilities2016-04-06
Ubuntu
Linux kernel vulnerabilities2016-04-06
Ubuntu
Linux kernel (Raspberry Pi 2) vulnerabilities2016-04-06
Red Hat
kernel: incorrect branch fixups for eBPG allow arbitrary read2016-02-14
Debian
CVE-2016-2383: linux - The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before...2016

📄Research Papers

2
arXiv
B-Side: Binary-Level Static System Call Identification2024-10-23
CTF
bpf_badjmp / README2021

💬Community

2
Bugzilla
CVE-2016-2383 kernel: incorrect branch fixups for eBPG allow arbitrary read2016-02-15
Bugzilla
CVE-2016-2383 kernel: incorrect branch fixups for eBPG allow arbitrary read [fedora-all]2016-02-15