[kernel-sec-discuss] r5806 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Thu Dec 21 21:14:32 UTC 2017
Author: carnil
Date: 2017-12-21 21:14:31 +0000 (Thu, 21 Dec 2017)
New Revision: 5806
Modified:
active/CVE-2017-16995
active/CVE-2017-16996
Log:
Add more references for CVE-2017-1699{5,6}
Modified: active/CVE-2017-16995
===================================================================
--- active/CVE-2017-16995 2017-12-21 16:40:09 UTC (rev 5805)
+++ active/CVE-2017-16995 2017-12-21 21:14:31 UTC (rev 5806)
@@ -1,10 +1,10 @@
Description: bpf: fix incorrect sign extension in check_alu_op()
References:
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f
+ http://www.openwall.com/lists/oss-security/2017/12/21/2
+ https://github.com/brl/grlh/blob/master/get-rekt-linux-hardened.c
Notes:
carnil> Intorduced in 4.9-rc1 with 484611357c19f9e19ef742ebef4505a07d243cc9
- carnil> Starting with v4.14, this is exploitable by unprivileged users as
- carnil> long as the unprivileged_bpf_disabled sysctl isn't set.
Bugs:
upstream: needed
4.9-upstream-stable: needed
Modified: active/CVE-2017-16996
===================================================================
--- active/CVE-2017-16996 2017-12-21 16:40:09 UTC (rev 5805)
+++ active/CVE-2017-16996 2017-12-21 21:14:31 UTC (rev 5806)
@@ -1,6 +1,7 @@
Description: bpf: fix incorrect tracking of register size truncation
References:
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0c17d1d2c61936401f4702e1846e2c19b200f958
+ http://www.openwall.com/lists/oss-security/2017/12/21/2
Notes:
carnil> Introduced in 4.14-rc1 with b03c9f9fdc37dab81ea04d5dacdc5995d4c224c2
Bugs:
More information about the kernel-sec-discuss
mailing list