Issue metadata
Sign in to add a comment
|
CVE-2017-16996 CrOS: Vulnerability reported in Linux kernel |
||||||||||||||||||||||
Issue descriptionVOMIT (go/vomit) has received an external vulnerability report for the Linux kernel. Advisory: CVE-2017-16996 Details: http://vomit.googleplex.com/advisory?id=CVE/CVE-2017-16996 CVSS severity score: 7.2/10.0 Description: kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling. This bug was filed by http://go/vomit Please contact us at vomit-team@google.com if you need any assistance.
,
Jan 10 2018
Upstream 0c17d1d2c61936401f4702e1846e2c19b200f958 ("bpf: fix incorrect tracking of register size truncation"). Already fixed in both chromeos-4.4 and chromeos-4.14.
,
Jan 10 2018
,
Jan 11 2018
Correction: Lakitu has BPF_VERIFIER enabled, and the problem is not fixed in chromeos-4.4. However, chromeos-4.4 is not affected since hte problem was introduced with commit b03c9f9fdc37 ("bpf/verifier: track signed and unsigned min/max values") which is not in this release.
|
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by groeck@chromium.org
, Jan 10 2018Labels: M-65 Security_Severity-High Security_Impact-None Pri-2
Owner: groeck@chromium.org
Status: ExternalDependency (was: Untriaged)