Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 642312 (CVE-2017-16996) - kernel: memory corruption caused by BPF verifier bugs can allow for arbitrary code execution (CVE-2017-16996)
Summary: kernel: memory corruption caused by BPF verifier bugs can allow for arbitrary...
Status: RESOLVED FIXED
Alias: CVE-2017-16996
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal critical (vote)
Assignee: Gentoo Kernel Security
URL: http://seclists.org/oss-sec/2017/q4/429
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-12-26 12:59 UTC by Thomas Deutschmann (RETIRED)
Modified: 2022-03-26 01:51 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Deutschmann (RETIRED) gentoo-dev 2017-12-26 12:59:28 UTC
Linux kernel built with the eBPF bpf(2) system call(CONFIG_BPF_SYSCALL) support
is vulnerable to an arbitrary memory r/w access issue. It could occur if a user supplied a malicious BPF program which results calculations error in eBPF verifier module.

An unprivileged user could use this flaw to escalate their privileges on a system.

Upstream patch
--------------
  -> https://git.kernel.org/linus/3db9128fcf02dcaafa3860a69a8a55d5529b6e30

References:
-----------
  -> http://seclists.org/oss-sec/2017/q4/429
  -> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16996
  -> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16996
  -> https://bugs.chromium.org/p/project-zero/issues/detail?id=1454

Mitigation:
-----------
  # echo 1 > /proc/sys/kernel/unprivileged_bpf_disabled
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-26 01:51:46 UTC
Bug introduced in 4.14, patch in 4.14.9. ALl done!