Headline
CVE-2017-17857: bpf: fix missing error return in check_stack_boundary() · torvalds/linux@ea25f91
The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.
Permalink
Browse files
bpf: fix missing error return in check_stack_boundary()
Prevent indirect stack accesses at non-constant addresses, which would permit reading and corrupting spilled pointers.
Fixes: f1174f7 (“bpf/verifier: rework value tracking”) Signed-off-by: Jann Horn jannh@google.com Signed-off-by: Alexei Starovoitov ast@kernel.org Signed-off-by: Daniel Borkmann daniel@iogearbox.net
- Loading branch information