kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102320 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040059 | Third Party Advisory VDB Entry |
https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=stretch-security&id=ad775f6ff7eebb93eedc2f592bc974260e7757b0 | Third Party Advisory |
https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-verifier-fix-states_equal-comparison-of-pointer-and-unknown.patch?h=stretch-security | Third Party Advisory |
https://usn.ubuntu.com/usn/usn-3523-2/ | |
https://www.debian.org/security/2017/dsa-4073 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-12-27 17:08
Updated : 2024-02-04 19:29
NVD link : CVE-2017-17864
Mitre link : CVE-2017-17864
CVE.ORG link : CVE-2017-17864
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor