kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/torvalds/linux/commit/c131187db2d3fa2f8bf32fdf4e9a4ef805168467 | third party advisory |
https://usn.ubuntu.com/3619-2/ | vendor advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c131187db2d3fa2f8bf32fdf4e9a4ef805168467 | vendor advisory |
https://www.spinics.net/lists/stable/msg206984.html | third party advisory patch |
http://www.securityfocus.com/bid/102325 | vdb entry third party advisory |
https://www.debian.org/security/2017/dsa-4073 | third party advisory vendor advisory |
https://usn.ubuntu.com/usn/usn-3523-2/ | vendor advisory |
https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-fix-branch-pruning-logic.patch?h=stretch-security | third party advisory |
https://usn.ubuntu.com/3619-1/ | vendor advisory |
http://www.securitytracker.com/id/1040057 | vdb entry third party advisory |