kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-verifier-fix-states_equal-comparison-of-pointer-and-unknown.patch?h=stretch-security | third party advisory |
https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=stretch-security&id=ad775f6ff7eebb93eedc2f592bc974260e7757b0 | third party advisory |
http://www.securitytracker.com/id/1040059 | vdb entry third party advisory |
http://www.securityfocus.com/bid/102320 | vdb entry third party advisory |
https://www.debian.org/security/2017/dsa-4073 | third party advisory vendor advisory |
https://usn.ubuntu.com/usn/usn-3523-2/ | vendor advisory |