Severity |
|
Remote |
|
Type |
|
Description |
+ |
It has been discovered that kernel/bpf/verifier.c in the Linux kernel before 4.14.9 and 4.9.72 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact. |
|
References |
+ |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1454 |
+ |
http://www.openwall.com/lists/oss-security/2017/12/21/2 |
+ |
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=d75d3ee237cee9068022117e059b64bbab617f3d |
+ |
https://git.kernel.org/linus/de31796c052e47c99b1bb342bc70aa826733e862 |
|
Notes |
+ |
Workaround by disabling unprivileged bpf: |
+ |
sysctl -w kernel.unprivileged_bpf_disabled=1 |
|