Bug#823603: linux: [Local root exploit] Use after free via double-fdput in bpf
Source: linux
Severity: critical
Tags: security newcomer
Justification: root security hole
Dear Maintainer,
A local root privilege escalation exploit (no CVE currently available) for Linux >=4.4 was reported in:
https://bugs.chromium.org/p/project-zero/issues/detail?id=808
As far as I can tell, the bug does not yet appear in the Debian Security Tracker.
-----
The upstream fix can be found in that same link, or more directly at:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7
Other relevant links:
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-NNN1.html
Thanks.
-- System Information:
Debian Release: stretch/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 4.5.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Reply to: