#VU3824 Information disclosure in Linux kernel and linux_kernel (Debian package)


Published: 2016-07-01 | Updated: 2017-05-16

Vulnerability identifier: #VU3824

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-2117

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system
linux_kernel (Debian package)
Operating systems & Components / Operating system package or component

Vendor: Linux Foundation
Debian

Description
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to an error when checking scatter/gather IO by the atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c. A remote attacker can send a specially crafted packet and view arbitrary files from from kernel memory.

Successful exploitation of the vulnerability results in information disclosure.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 3.16.7-ckt25-2 - 3.16.39-1+deb8u2, 3.8, 3.9, 3.5.1 - 3.5.5, 3.4 - 3.4.32, 3.3 - 3.3.8, 3.2 - 3.2.81-1, 3.1 - 3.1.10, 3.0 - 3.0.68, 3.19, 3.18, 3.14.72, 4.1 - 4.1.38, 4.4.0 - 4.4.68, 4.2.0 - 4.2.8, 4.3.1 - 4.3.6, 4.5.0 - 4.5.2

linux_kernel (Debian package): 3.2.78-1 - 3.16.36-1+deb8u1


External links
http://marc.info/?l=linux-kernel&m=142153722930533&w=2


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability