First published: Fri Jul 31 2015(Updated: )
In the md driver (drivers/md/md.c) of the Linux kernel it’s possible to request a bitmap file for a device using get_bitmap_file(), which uses kmalloc(). When bitmap is disabled, only the first byte of the buffer is initialized to zero, and then the whole buffer is copied in user space. It's possible to read up to 4095 bytes of kernel space memory from user space. This results in local kernel information leak. Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4">http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4</a> CVE assignment: <a href="http://seclists.org/oss-sec/2015/q3/235">http://seclists.org/oss-sec/2015/q3/235</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.1.5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-5697.
The severity of CVE-2015-5697 is low.
The affected software for CVE-2015-5697 includes the Linux kernel versions before 4.1.6.
A local user can exploit CVE-2015-5697 by making a GET_BITMAP_FILE ioctl call to obtain sensitive information from kernel memory.
Yes, the remedy for CVE-2015-5697 is to update the Linux kernel to version 4.1.6 or later.