CVE-2017-17805
- EPSS 0.03%
- Veröffentlicht 20.12.2017 23:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service ...
CVE-2017-17806
- EPSS 0.01%
- Veröffentlicht 20.12.2017 23:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HAS...
CVE-2017-17807
- EPSS 0.06%
- Veröffentlicht 20.12.2017 23:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system ca...
CVE-2017-17741
- EPSS 0.06%
- Veröffentlicht 18.12.2017 08:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
- EPSS 0.08%
- Veröffentlicht 16.12.2017 01:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.
CVE-2017-17558
- EPSS 0.07%
- Veröffentlicht 12.12.2017 15:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allow...
CVE-2017-1000407
- EPSS 0.46%
- Veröffentlicht 11.12.2017 21:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
CVE-2017-1000410
- EPSS 1.92%
- Veröffentlicht 07.12.2017 19:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned...
CVE-2017-15121
- EPSS 0.07%
- Veröffentlicht 07.12.2017 02:29:13
- Zuletzt bearbeitet 13.05.2026 00:24:29
A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.
CVE-2017-17448
- EPSS 0.07%
- Veröffentlicht 07.12.2017 00:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data ...