First published: Mon Apr 10 2017(Updated: )
Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. Advisory: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-7616">https://nvd.nist.gov/vuln/detail/CVE-2017-7616</a> Detailed analysis: <a href="https://grsecurity.net/the_infoleak_that_mostly_wasnt.php">https://grsecurity.net/the_infoleak_that_mostly_wasnt.php</a> Upstream patch: <a href="https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62">https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.10.9 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-7616.
The severity of CVE-2017-7616 is medium.
CVE-2017-7616 affects Linux kernel versions up to 4.10.9.
Local users can exploit CVE-2017-7616 to obtain sensitive information from uninitialized stack data.
Yes, updating the Linux kernel to version 4.11 or higher will address the CVE-2017-7616 vulnerability.