Bug 1497745 (CVE-2017-14954) - CVE-2017-14954 kernel: Info leak in kernel_waitid()
Summary: CVE-2017-14954 kernel: Info leak in kernel_waitid()
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2017-14954
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1497747
Blocks: 1497757
TreeView+ depends on / blocked
 
Reported: 2017-10-02 14:55 UTC by Adam Mariš
Modified: 2021-02-17 01:27 UTC (History)
47 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases. This can allow local users to obtain sensitive information and bypass the KASLR protection mechanism via a crafted system call.
Clone Of:
Environment:
Last Closed: 2017-10-11 14:34:13 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2017-10-02 14:55:48 UTC
The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted system call.

Upstream patch:

https://github.com/torvalds/linux/commit/6c85501f2fabcfc4fc6ed976543d252c4eaf4be9

Reproducer:

https://grsecurity.net/~spender/exploits/wait_for_kaslr_to_be_effective.c

Comment 1 Adam Mariš 2017-10-02 14:56:55 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1497747]

Comment 4 Vladis Dronov 2017-10-11 14:34:13 UTC
Statement:

This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2 as the code with the flaw is not present in the products listed.


Note You need to log in before you can comment on or make changes to this bug.