drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.12 - Release Notes, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/04/16/4 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/97997 - Third Party Advisory, VDB Entry | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c4baad50297d84bde1a7ad45e50c73adae4a2192 - Patch, Vendor Advisory | |
References | () https://github.com/torvalds/linux/commit/c4baad50297d84bde1a7ad45e50c73adae4a2192 - Patch, Third Party Advisory |
24 Feb 2023, 15:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:* |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
References | (CONFIRM) https://github.com/torvalds/linux/commit/c4baad50297d84bde1a7ad45e50c73adae4a2192 - Patch, Third Party Advisory | |
References | (CONFIRM) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c4baad50297d84bde1a7ad45e50c73adae4a2192 - Patch, Vendor Advisory | |
CWE | CWE-787 |
Information
Published : 2017-04-23 05:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-8067
Mitre link : CVE-2017-8067
CVE.ORG link : CVE-2017-8067
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write