Memory Corruption Vulnerability in Linux Kernel's check_stack_boundary Function

Memory Corruption Vulnerability in Linux Kernel's check_stack_boundary Function

CVE-2017-17857 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.

Learn more about our Cis Benchmark Audit For Distribution Independent Linux.