| Severity |
|
| Remote |
|
| Type |
|
| Description |
| + |
It has been discovered that kernel/bpf/verifier.c in the Linux kernel before 4.14.9 and 4.9.72 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact. |
|
| References |
| + |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1454 |
| + |
http://www.openwall.com/lists/oss-security/2017/12/21/2 |
| + |
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=d75d3ee237cee9068022117e059b64bbab617f3d |
| + |
https://git.kernel.org/linus/de31796c052e47c99b1bb342bc70aa826733e862 |
|
| Notes |
| + |
Workaround by disabling unprivileged bpf: |
| + |
sysctl -w kernel.unprivileged_bpf_disabled=1 |
|