CVE-2016-5828

Severity
7.8HIGH
EPSS
0.1%
top 74.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 27
Latest updateMay 14

Description

The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDlinux/linux_kernel3.93.10.103+6
Debianlinux< 4.6.3-1+3

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 16.04

Patches

🔴Vulnerability Details

4
GHSA
GHSA-64c3-3r62-5c6c: The start_thread function in arch/powerpc/kernel/process2022-05-14
CVEList
CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process2016-06-27
OSV
CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process2016-06-27
Kernel
powerpc/tm: Always reclaim in start_thread() for exec() class syscalls2016-06-17

📋Vendor Advisories

8
Ubuntu
Linux kernel (Raspberry Pi 2) vulnerabilities2016-08-30
Ubuntu
Linux kernel (Qualcomm Snapdragon) vulnerabilities2016-08-30
Ubuntu
Linux kernel (Xenial HWE) vulnerabilities2016-08-30
Ubuntu
Linux kernel vulnerabilities2016-08-29
Ubuntu
Linux kernel vulnerabilities2016-08-29

💬Community

2
Bugzilla
CVE-2016-5828 Kernel: powerpc: tm: crash via exec system call on PPC [fedora-all]2016-07-28
Bugzilla
CVE-2016-5828 Kernel: powerpc: tm: crash via exec system call on PPC2016-06-24
CVE-2016-5828 (HIGH CVSS 7.8) | The start_thread function in arch/p | cvebase.io