Note:
This project will be discontinued after December 13, 2021. [more]
2017-01-05
The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file.
Products | Linux_kernel |
Type | Integer Overflow or Wraparound (CWE-190) |
First patch |
https://github.com/torvalds/linux/commit/59643d1535eb220668692a5359de22545af579f6 |
Patches | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59643d1535eb220668692a5359de22545af579f6 |
Relevant file/s | ./kernel/trace/ring_buffer.c (modified, +4, -5) |
Links |
• http://www.securityfocus.com/bid/95278
• http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.1 • https://source.android.com/security/bulletin/2017-01-01.html |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: