Vulnerability identifier: #VU3824
Vulnerability risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
linux_kernel (Debian package)
Operating systems & Components /
Operating system package or component
Vendor:
Linux Foundation
Debian
Description
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to an error when checking scatter/gather IO by the atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c. A remote attacker can send a specially crafted packet and view arbitrary files from from kernel memory.
Successful exploitation of the vulnerability results in information disclosure.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: 3.16.7-ckt25-2 - 3.16.39-1+deb8u2, 3.8, 3.9, 3.5.1 - 3.5.5, 3.4 - 3.4.32, 3.3 - 3.3.8, 3.2 - 3.2.81-1, 3.1 - 3.1.10, 3.0 - 3.0.68, 3.19, 3.18, 3.14.72, 4.1 - 4.1.38, 4.4.0 - 4.4.68, 4.2.0 - 4.2.8, 4.3.1 - 4.3.6, 4.5.0 - 4.5.2
linux_kernel (Debian package): 3.2.78-1 - 3.16.36-1+deb8u1
External links
http://marc.info/?l=linux-kernel&m=142153722930533&w=2
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.