6.6

CVE-2017-7273

The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version4.0
LinuxLinux Kernel Version4.0.0
LinuxLinux Kernel Version4.0.2
LinuxLinux Kernel Version4.0.3
LinuxLinux Kernel Version4.0.4
LinuxLinux Kernel Version4.0.5
LinuxLinux Kernel Version4.0.6
LinuxLinux Kernel Version4.0.7
LinuxLinux Kernel Version4.0.8
LinuxLinux Kernel Version4.0.9
LinuxLinux Kernel Version4.1.0
LinuxLinux Kernel Version4.1.2
LinuxLinux Kernel Version4.1.3
LinuxLinux Kernel Version4.1.4
LinuxLinux Kernel Version4.1.5
LinuxLinux Kernel Version4.1.6
LinuxLinux Kernel Version4.1.7
LinuxLinux Kernel Version4.1.8
LinuxLinux Kernel Version4.1.9
LinuxLinux Kernel Version4.1.10
LinuxLinux Kernel Version4.1.11
LinuxLinux Kernel Version4.1.12
LinuxLinux Kernel Version4.1.13
LinuxLinux Kernel Version4.1.14
LinuxLinux Kernel Version4.1.15
LinuxLinux Kernel Version4.1.16
LinuxLinux Kernel Version4.1.17
LinuxLinux Kernel Version4.1.18
LinuxLinux Kernel Version4.1.19
LinuxLinux Kernel Version4.1.20
LinuxLinux Kernel Version4.1.21
LinuxLinux Kernel Version4.1.22
LinuxLinux Kernel Version4.1.23
LinuxLinux Kernel Version4.1.33
LinuxLinux Kernel Version4.2.0
LinuxLinux Kernel Version4.2.1
LinuxLinux Kernel Version4.2.2
LinuxLinux Kernel Version4.2.3
LinuxLinux Kernel Version4.2.4
LinuxLinux Kernel Version4.2.5
LinuxLinux Kernel Version4.2.7
LinuxLinux Kernel Version4.2.8
LinuxLinux Kernel Version4.3 Updaterc7
LinuxLinux Kernel Version4.3.0
LinuxLinux Kernel Version4.3.1
LinuxLinux Kernel Version4.3.2
LinuxLinux Kernel Version4.3.3
LinuxLinux Kernel Version4.3.5
LinuxLinux Kernel Version4.3.6
LinuxLinux Kernel Version4.4 Updaterc8
LinuxLinux Kernel Version4.4.0
LinuxLinux Kernel Version4.4.1
LinuxLinux Kernel Version4.4.2
LinuxLinux Kernel Version4.4.3
LinuxLinux Kernel Version4.4.4
LinuxLinux Kernel Version4.4.5
LinuxLinux Kernel Version4.4.6
LinuxLinux Kernel Version4.4.7
LinuxLinux Kernel Version4.4.8
LinuxLinux Kernel Version4.4.9
LinuxLinux Kernel Version4.4.22
LinuxLinux Kernel Version4.4.23
LinuxLinux Kernel Version4.4.24
LinuxLinux Kernel Version4.4.25
LinuxLinux Kernel Version4.4.26
LinuxLinux Kernel Version4.4.27
LinuxLinux Kernel Version4.4.28
LinuxLinux Kernel Version4.4.32
LinuxLinux Kernel Version4.5.0
LinuxLinux Kernel Version4.5.0 Updaterc7
LinuxLinux Kernel Version4.5.1
LinuxLinux Kernel Version4.5.2
LinuxLinux Kernel Version4.5.3
LinuxLinux Kernel Version4.5.4
LinuxLinux Kernel Version4.5.5
LinuxLinux Kernel Version4.5.7
LinuxLinux Kernel Version4.6
LinuxLinux Kernel Version4.6.2
LinuxLinux Kernel Version4.6.3
LinuxLinux Kernel Version4.6.4
LinuxLinux Kernel Version4.6.5
LinuxLinux Kernel Version4.6.6
LinuxLinux Kernel Version4.6.7
LinuxLinux Kernel Version4.7
LinuxLinux Kernel Version4.7 Updaterc6
LinuxLinux Kernel Version4.7.4
LinuxLinux Kernel Version4.7.6
LinuxLinux Kernel Version4.8
LinuxLinux Kernel Version4.8.1
LinuxLinux Kernel Version4.8.2
LinuxLinux Kernel Version4.8.3
LinuxLinux Kernel Version4.8.4
LinuxLinux Kernel Version4.8.5
LinuxLinux Kernel Version4.8.6
LinuxLinux Kernel Version4.8.7
LinuxLinux Kernel Version4.8.8
LinuxLinux Kernel Version4.8.9
LinuxLinux Kernel Version4.8.10
LinuxLinux Kernel Version4.8.11
LinuxLinux Kernel Version4.8.12
LinuxLinux Kernel Version4.8.14
LinuxLinux Kernel Version4.8.16
LinuxLinux Kernel Version4.8.17
LinuxLinux Kernel Version4.9.1
LinuxLinux Kernel Version4.9.2
LinuxLinux Kernel Version4.9.3
LinuxLinux Kernel Version4.10
LinuxLinux Kernel Version4.10.1
LinuxLinux Kernel Version4.10.2
LinuxLinux Kernel Version4.10.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.29
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.6 0.7 5.9
CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P