kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."
References
Link | Resource |
---|---|
https://www.debian.org/security/2017/dsa-4073 | Third Party Advisory |
https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-verifier-fix-states_equal-comparison-of-pointer-and-unknown.patch?h=stretch-security | Third Party Advisory |
https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=stretch-security&id=ad775f6ff7eebb93eedc2f592bc974260e7757b0 | Third Party Advisory |
http://www.securitytracker.com/id/1040059 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/102320 | Third Party Advisory VDB Entry |
https://usn.ubuntu.com/usn/usn-3523-2/ |
Information
Published : 2017-12-27 09:08
Updated : 2018-01-12 18:29
NVD link : CVE-2017-17864
Mitre link : CVE-2017-17864
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
linux
- linux_kernel