Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-4700

Опубликовано: 23 июн. 2015
Источник: redhat
CVSS2: 7.2
EPSS Низкий

Описание

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.

A flaw was found in the kernel's implementation of the Berkeley Packet Filter (BPF). A local attacker could craft BPF code to crash the system by creating a situation in which the JIT compiler would fail to correctly optimize the JIT image on the last pass. This would lead to the CPU executing instructions that were not part of the JIT code.

Отчет

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6 as it does not contain the affected code. This does not affect the Red Hat Enterprise MRG 2 as it does not enable the affected code at compile time. This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 7.

Меры по смягчению последствий

This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected. It can be disabled immediately with the command:

echo 0 > /proc/sys/net/core/bpf_jit_enable

Or it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable

start file

net.core.bpf_jit_enable=0

end file

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4kernelNot affected
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise MRG 2realtime-kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2015:178815.09.2015
Red Hat Enterprise Linux 7kernelFixedRHSA-2015:177815.09.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-665
https://bugzilla.redhat.com/show_bug.cgi?id=1233615kernel: Crafted BPF filters may crash kernel during JIT optimisation

EPSS

Процентиль: 24%
0.00075
Низкий

7.2 High

CVSS2

Связанные уязвимости

ubuntu
почти 10 лет назад

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.

nvd
почти 10 лет назад

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.

debian
почти 10 лет назад

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the ...

github
около 3 лет назад

The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.

suse-cvrf
почти 10 лет назад

Live patch for the Linux Kernel

EPSS

Процентиль: 24%
0.00075
Низкий

7.2 High

CVSS2

Уязвимость CVE-2015-4700