Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1497745 - (CVE-2017-14954) CVE-2017-14954 kernel: Info leak in kernel_waitid()
CVE-2017-14954 kernel: Info leak in kernel_waitid()
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170929,reported=2...
: Security
Depends On: 1497747
Blocks: 1497757
  Show dependency treegraph
 
Reported: 2017-10-02 10:55 EDT by Adam Mariš
Modified: 2017-10-12 08:41 EDT (History)
47 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases. This can allow local users to obtain sensitive information and bypass the KASLR protection mechanism via a crafted system call.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-10-11 10:34:13 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2017-10-02 10:55:48 EDT
The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted system call.

Upstream patch:

https://github.com/torvalds/linux/commit/6c85501f2fabcfc4fc6ed976543d252c4eaf4be9

Reproducer:

https://grsecurity.net/~spender/exploits/wait_for_kaslr_to_be_effective.c
Comment 1 Adam Mariš 2017-10-02 10:56:55 EDT
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1497747]
Comment 4 Vladis Dronov 2017-10-11 10:34:13 EDT
Statement:

This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2 as the code with the flaw is not present in the products listed.

Note You need to log in before you can comment on or make changes to this bug.