Description
The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.
References (3)
Core 3
Core References
Mailing List, Third Party Advisory x_refsource_misc
http://www.openwall.com/lists/oss-security/2017/12/21/2
Vendor Advisory x_refsource_misc
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea25f914dc164c8d56b36147ecc86bc65f83c469
Patch, Third Party Advisory x_refsource_misc
https://github.com/torvalds/linux/commit/ea25f914dc164c8d56b36147ecc86bc65f83c469
Scores
CVSS v3
7.8
EPSS
0.0013
EPSS Percentile
32.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-119
Status
published
Products (2)
debian/debian_linux
9.0
linux/linux_kernel
4.14 - 4.14.9
Published
Dec 27, 2017
Tracked Since
Feb 18, 2026