New issue
Advanced search Search tips

Issue 891667 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Closed: Oct 3
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 3
Type: Bug-Security



Sign in to add a comment

CVE-2017-18344 CrOS: Vulnerability reported in Linux kernel

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Oct 3

Issue description

VOMIT (go/vomit) has received an external vulnerability report for the Linux kernel. 

Advisory: CVE-2017-18344
  Details: http://vomit.googleplex.com/advisory?id=CVE/CVE-2017-18344
  CVSS severity score: 2.1/10.0
  Description:

The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).



This bug was filed by http://go/vomit
Please contact us at vomit-team@google.com if you need any assistance.

 
Cc: groeck@chromium.org wonderfly@google.com
Labels: Security_Severity-Low Security_Impact-None Pri-3
Owner: zsm@chromium.org
Status: WontFix (was: Untriaged)
Upstream commit is cef31d9af9("posix-timer: Properly check sigevent->sigev_notify"). This commit is present in v4.14, v4.4, v3.18. Older kernels do not have this commit.

CONFIG_CHECKPOINT_RESTORE is not set in any of the older kernels, so marking this as WontFix.
Cc: mikewu@google.com

Sign in to add a comment