Vulnerability identifier: #VU91365
Vulnerability risk: Low
CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the nilfs_prepare_segment_for_recovery(), nilfs_recovery_copy_block() and nilfs_recover_dsync_blocks() functions in fs/nilfs2/recovery.c. A local user can gain access to sensitive information.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65
http://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba
http://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa
http://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5
http://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3
http://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d
http://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9
http://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.