Note:
This project will be discontinued after December 13, 2021. [more]
2017-12-27
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.
Products | Debian_linux, Linux_kernel |
Type | Improper Input Validation (CWE-20) |
First patch |
https://github.com/torvalds/linux/commit/c131187db2d3fa2f8bf32fdf4e9a4ef805168467 |
Relevant file/s |
• ./include/linux/bpf_verifier.h (modified, +1, -1)
• ./kernel/bpf/verifier.c (modified, +27) |
Links |
• https://usn.ubuntu.com/3619-1/
• http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c131187db2d3fa2f8bf32fdf4e9a4ef805168467 • https://www.debian.org/security/2017/dsa-4073 • https://usn.ubuntu.com/usn/usn-3523-2/ • http://www.securityfocus.com/bid/102325 |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: