CVE-2017-17864 log
Source |
|
Severity | Medium |
Remote | No |
Type | Information disclosure |
Description | It has been discovered that kernel/bpf/verifier.c in the Linux kernel before 4.14.9 and 4.9.73 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak." |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-574 | linux-hardened | 4.14.7.a-1 | 4.14.11.a-1 | High | Fixed | FS#56832 |
AVG-571 | linux-zen | 4.14.7-1 | 4.14.11-1 | High | Fixed | FS#56832 |
AVG-561 | linux-lts | 4.9.68-1 | 4.9.74-1 | High | Fixed | |
AVG-552 | linux | 4.14.7-1 | 4.14.11-1 | High | Fixed | FS#56832 |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
05 Jan 2018 | ASA-201801-4 | AVG-574 | linux-hardened | High | multiple issues |
05 Jan 2018 | ASA-201801-3 | AVG-571 | linux-zen | High | multiple issues |
05 Jan 2018 | ASA-201801-2 | AVG-561 | linux-lts | High | multiple issues |
05 Jan 2018 | ASA-201801-1 | AVG-552 | linux | High | multiple issues |
Notes |
---|
Workaround by disabling unprivileged bpf: sysctl -w kernel.unprivileged_bpf_disabled=1 |