Description
The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.
References (6)
Core 6
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/1c109fabbd51863475cd12ac206bdd249aee35af
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1c109fabbd51863475cd12ac206bdd249aee35af
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/11/04/4
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1391908
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/94144
Release Notes x_refsource_confirm
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5
Scores
CVSS v3
5.5
EPSS
0.0007
EPSS Percentile
21.2%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (1)
linux/linux_kernel
< 4.7.4
Published
Nov 28, 2016
Tracked Since
Feb 18, 2026