Severity |
|
Remote |
|
Type |
|
Description |
+ |
The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel before 4.14.9 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations. |
|
References |
+ |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1454 |
+ |
http://www.openwall.com/lists/oss-security/2017/12/21/2 |
+ |
https://git.kernel.org/linus/ea25f914dc164c8d56b36147ecc86bc65f83c469 |
|
Notes |
+ |
Workaround by disabling unprivileged bpf: |
+ |
sysctl -w kernel.unprivileged_bpf_disabled=1 |
|