CVE-2017-16996

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:17

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c17d1d2c61936401f4702e1846e2c19b200f958 - Issue Tracking, Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c17d1d2c61936401f4702e1846e2c19b200f958 - Issue Tracking, Patch, Vendor Advisory
References () http://openwall.com/lists/oss-security/2017/12/21/2 - Issue Tracking, Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2017/12/21/2 - Issue Tracking, Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/102267 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102267 - Third Party Advisory, VDB Entry
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=1454 - Third Party Advisory () https://bugs.chromium.org/p/project-zero/issues/detail?id=1454 - Third Party Advisory
References () https://github.com/torvalds/linux/commit/0c17d1d2c61936401f4702e1846e2c19b200f958 - Patch, Vendor Advisory () https://github.com/torvalds/linux/commit/0c17d1d2c61936401f4702e1846e2c19b200f958 - Patch, Vendor Advisory

Information

Published : 2017-12-27 17:08

Updated : 2025-04-20 01:37


NVD link : CVE-2017-16996

Mitre link : CVE-2017-16996

CVE.ORG link : CVE-2017-16996


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer