UBUNTU-CVE-2017-17863

Source
https://ubuntu.com/security/CVE-2017-17863
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-17863.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2017-17863
Related
Published
2017-12-27T00:00:00Z
Modified
2025-01-13T10:21:30Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.

References

Affected packages

Ubuntu:Pro:16.04:LTS / linux-flo

Package

Name
linux-flo
Purl
pkg:deb/ubuntu/linux-flo@3.4.0-5.23?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.4.0-5.19
3.4.0-5.22
3.4.0-5.23

Ecosystem specific

{
    "ubuntu_priority": "high"
}

Ubuntu:Pro:16.04:LTS / linux-mako

Package

Name
linux-mako
Purl
pkg:deb/ubuntu/linux-mako@3.4.0-7.44?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.4.0-7.39
3.4.0-7.40
3.4.0-7.41
3.4.0-7.44

Ecosystem specific

{
    "ubuntu_priority": "high"
}