[kernel-sec-discuss] r5806 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Thu Dec 21 21:14:32 UTC 2017


Author: carnil
Date: 2017-12-21 21:14:31 +0000 (Thu, 21 Dec 2017)
New Revision: 5806

Modified:
   active/CVE-2017-16995
   active/CVE-2017-16996
Log:
Add more references for CVE-2017-1699{5,6}

Modified: active/CVE-2017-16995
===================================================================
--- active/CVE-2017-16995	2017-12-21 16:40:09 UTC (rev 5805)
+++ active/CVE-2017-16995	2017-12-21 21:14:31 UTC (rev 5806)
@@ -1,10 +1,10 @@
 Description: bpf: fix incorrect sign extension in check_alu_op()
 References:
  https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f
+ http://www.openwall.com/lists/oss-security/2017/12/21/2
+ https://github.com/brl/grlh/blob/master/get-rekt-linux-hardened.c
 Notes:
  carnil> Intorduced in 4.9-rc1 with 484611357c19f9e19ef742ebef4505a07d243cc9
- carnil> Starting with v4.14, this is exploitable by unprivileged users as
- carnil> long as the unprivileged_bpf_disabled sysctl isn't set.
 Bugs:
 upstream: needed
 4.9-upstream-stable: needed

Modified: active/CVE-2017-16996
===================================================================
--- active/CVE-2017-16996	2017-12-21 16:40:09 UTC (rev 5805)
+++ active/CVE-2017-16996	2017-12-21 21:14:31 UTC (rev 5806)
@@ -1,6 +1,7 @@
 Description: bpf: fix incorrect tracking of register size truncation
 References:
  https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0c17d1d2c61936401f4702e1846e2c19b200f958
+ http://www.openwall.com/lists/oss-security/2017/12/21/2
 Notes:
  carnil> Introduced in 4.14-rc1 with b03c9f9fdc37dab81ea04d5dacdc5995d4c224c2
 Bugs:




More information about the kernel-sec-discuss mailing list