kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."
References
Configurations
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/102320 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040059 - Third Party Advisory, VDB Entry | |
References | () https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=stretch-security&id=ad775f6ff7eebb93eedc2f592bc974260e7757b0 - Third Party Advisory | |
References | () https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-verifier-fix-states_equal-comparison-of-pointer-and-unknown.patch?h=stretch-security - Third Party Advisory | |
References | () https://usn.ubuntu.com/usn/usn-3523-2/ - | |
References | () https://www.debian.org/security/2017/dsa-4073 - Third Party Advisory |
Information
Published : 2017-12-27 17:08
Updated : 2025-04-20 01:37
NVD link : CVE-2017-17864
Mitre link : CVE-2017-17864
CVE.ORG link : CVE-2017-17864
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor