Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17864

Опубликовано: 27 дек. 2017
Источник: debian
EPSS Низкий

Описание

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.14.7-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

EPSS

Процентиль: 25%
0.00086
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 8 лет назад

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

CVSS3: 6.2
redhat
около 8 лет назад

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

CVSS3: 3.3
nvd
около 8 лет назад

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

CVSS3: 3.3
github
больше 3 лет назад

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

suse-cvrf
почти 8 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 25%
0.00086
Низкий