#VU12315 Information disclosure in Linux kernel


Published: 2018-04-30 | Updated: 2018-05-01

Vulnerability identifier: #VU12315

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15537

CWE-ID: CWE-200

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The weakness exists in the x86/fpu (Floating Point Unit) subsystem due to incorrect handling of attempts to set reserved bits in the xstate header via the ptrace() or rt_sigreturn() system call when a processor supports the xsave feature but not the xsaves feature. A local attacker can read the FPU registers of other processes on the system, related to arch/x86/kernel/fpu/regset.c and arch/x86/kernel/fpu/signal.c.

Mitigation
Update to version 4.13.5.

Vulnerable software versions

Linux kernel: 4.13 - 4.13.4


External links
http://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=814fb7bb7db5433757d76f...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability