[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#823603: linux: [Local root exploit] Use after free via double-fdput in bpf



Source: linux
Severity: critical
Tags: security newcomer
Justification: root security hole

Dear Maintainer,

A local root privilege escalation exploit (no CVE currently available) for Linux >=4.4 was reported in:

https://bugs.chromium.org/p/project-zero/issues/detail?id=808

As far as I can tell, the bug does not yet appear in the Debian Security Tracker.

-----

The upstream fix can be found in that same link, or more directly at:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7

Other relevant links:

https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-NNN1.html

Thanks.


-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.5.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)


Reply to: