A cross-boundary flaw was discovered in the Linux kernel software raid driver. The driver accessed a disabled bitmap where only the first byte of the buffer was initialized to zero. This meant that the rest of the request (up to 4095 bytes) was left and copied into user space. An attacker could use this flaw to read private information from user space that would not otherwise have been accessible.
Find out more about CVE-2015-5697 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and realtime and may be addressed in a future update.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 1.9 |
---|---|
Base Metrics | AV:L/AC:M/Au:N/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | realtime-kernel | Will not fix |
Red Hat Enterprise Linux 7 | kernel | Will not fix |
Red Hat Enterprise Linux 7 | kernel-rt | Will not fix |
Red Hat Enterprise Linux 6 | kernel | Will not fix |
Red Hat Enterprise Linux 5 | kernel | Will not fix |
Red Hat Enterprise Linux 4 | kernel | Not affected |