#VU91365 Information disclosure in Linux kernel


Published: 2024-06-08

Vulnerability identifier: #VU91365

Vulnerability risk: Low

CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26697

CWE-ID: CWE-200

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the nilfs_prepare_segment_for_recovery(), nilfs_recovery_copy_block() and nilfs_recover_dsync_blocks() functions in fs/nilfs2/recovery.c. A local user can gain access to sensitive information.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65
http://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba
http://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa
http://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5
http://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3
http://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d
http://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9
http://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability