Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
This category represents one of the phyla in the Seven Pernicious Kingdoms vulnerability classification. It includes weaknesses that occur when an application does not properly handle errors that occur during processing. According to the authors of the Seven Pernicious Kingdoms, "Errors and error handling represent a class of API. Errors related to error handling are so common that they deserve a special kingdom of their own. As with 'API Abuse,' there are two ways to introduce an error-related security vulnerability: the most common one is handling errors poorly (or not at all). The second is producing errors that either give out too much information (to possible attackers) or are difficult to handle."
Link | Tags |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62 | third party advisory patch |
https://source.android.com/security/bulletin/2017-09-01 | |
https://access.redhat.com/errata/RHSA-2018:1854 | vendor advisory |
http://www.securitytracker.com/id/1038503 | vdb entry |
https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62 | third party advisory patch |
https://access.redhat.com/errata/RHSA-2017:2077 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:1842 | vendor advisory |
http://www.securityfocus.com/bid/97527 | vdb entry third party advisory |