kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.
[
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@bb7f0f989ca7de1153bd128a40a71709e339fa03",
"digest": {
"function_hash": "297049020411751566929074818203934106251",
"length": 4213.0
},
"target": {
"file": "kernel/bpf/verifier.c",
"function": "adjust_scalar_min_max_vals"
},
"id": "CVE-2017-17854-4624a8a9",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@bb7f0f989ca7de1153bd128a40a71709e339fa03",
"digest": {
"function_hash": "25297261137849435867112041776326875517",
"length": 4243.0
},
"target": {
"file": "kernel/bpf/verifier.c",
"function": "adjust_ptr_min_max_vals"
},
"id": "CVE-2017-17854-d905442c",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@bb7f0f989ca7de1153bd128a40a71709e339fa03",
"digest": {
"threshold": 0.9,
"line_hashes": [
"137126876006139000487873135703658789921",
"122498244565537579970421324151437462676",
"24098686306953093500402656621660559655",
"16091322277093438905175884234180123051",
"325838271922980744780437862700424731497",
"34032435457714538535488359781388386397",
"58578887914267500403690196021408460669",
"312222596226405789126451832514648511228",
"167784475953879936966169768921112348039",
"70875042190053791967733002238551829908",
"201491054112617584738736166404031074558",
"336794172834446309967225236408400074783"
]
},
"target": {
"file": "kernel/bpf/verifier.c"
},
"id": "CVE-2017-17854-de157183",
"deprecated": false,
"signature_version": "v1"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-17854.json"
[
{
"signature_type": "Function",
"source": "https://github.com/torvalds/linux/commit/bb7f0f989ca7de1153bd128a40a71709e339fa03",
"digest": {
"function_hash": "297049020411751566929074818203934106251",
"length": 4213.0
},
"target": {
"file": "kernel/bpf/verifier.c",
"function": "adjust_scalar_min_max_vals"
},
"id": "CVE-2017-17854-15d02a23",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"source": "https://github.com/torvalds/linux/commit/bb7f0f989ca7de1153bd128a40a71709e339fa03",
"digest": {
"function_hash": "25297261137849435867112041776326875517",
"length": 4243.0
},
"target": {
"file": "kernel/bpf/verifier.c",
"function": "adjust_ptr_min_max_vals"
},
"id": "CVE-2017-17854-f1653d08",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"source": "https://github.com/torvalds/linux/commit/bb7f0f989ca7de1153bd128a40a71709e339fa03",
"digest": {
"threshold": 0.9,
"line_hashes": [
"137126876006139000487873135703658789921",
"122498244565537579970421324151437462676",
"24098686306953093500402656621660559655",
"16091322277093438905175884234180123051",
"325838271922980744780437862700424731497",
"34032435457714538535488359781388386397",
"58578887914267500403690196021408460669",
"312222596226405789126451832514648511228",
"167784475953879936966169768921112348039",
"70875042190053791967733002238551829908",
"201491054112617584738736166404031074558",
"336794172834446309967225236408400074783"
]
},
"target": {
"file": "kernel/bpf/verifier.c"
},
"id": "CVE-2017-17854-fe902fee",
"deprecated": false,
"signature_version": "v1"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-17854.json"