ID:

CVE-2017-17857 (NVD)

- Vulnerability Info (edit)
2017-12-27

The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.

Products Debian_linux, Linux_kernel
Type Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)
First patch https://github.com/torvalds/linux/commit/ea25f914dc164c8d56b36147ecc86bc65f83c469
Patches http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea25f914dc164c8d56b36147ecc86bc65f83c469
Relevant file/s ./kernel/bpf/verifier.c (modified, +1)
Links http://www.openwall.com/lists/oss-security/2017/12/21/2
Annotation

Note:

This entry has not been annotated yet.

Please consider adding data:

linux - Tree: ea25f914dc

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: