Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17863

Опубликовано: 27 дек. 2017
Источник: debian
EPSS Низкий

Описание

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.14.7-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • https://www.spinics.net/lists/stable/msg206985.html

EPSS

Процентиль: 26%
0.00093
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.

CVSS3: 6.2
redhat
около 8 лет назад

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.

CVSS3: 7.8
nvd
около 8 лет назад

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.

CVSS3: 7.8
github
больше 3 лет назад

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.

EPSS

Процентиль: 26%
0.00093
Низкий