The tipcnlcompatlinkdump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5243.json"
[
{
"signature_type": "Function",
"target": {
"file": "net/tipc/netlink_compat.c",
"function": "tipc_nl_compat_link_dump"
},
"deprecated": false,
"id": "CVE-2016-5243-733761bd",
"signature_version": "v1",
"digest": {
"function_hash": "141709085333620225996601810467490078626",
"length": 545.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@5d2be1422e02ccd697ccfcd45c85b4a26e6178e2"
},
{
"signature_type": "Line",
"target": {
"file": "net/tipc/netlink_compat.c"
},
"deprecated": false,
"id": "CVE-2016-5243-87900069",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"298263857487128987504783616333294234021",
"150280924960835922420369959159097273822",
"199549416099821038580835182410588172227",
"67472603179867385552224983305692385989"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@5d2be1422e02ccd697ccfcd45c85b4a26e6178e2"
}
]