### [CVE-2018-17972](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. ### POC #### Reference - https://usn.ubuntu.com/3821-1/ - https://usn.ubuntu.com/3821-1/ - https://usn.ubuntu.com/3821-2/ - https://usn.ubuntu.com/3821-2/ #### Github No PoCs found on GitHub currently.