Vulnerabilities > Linux > Linux Kernel > 4.14.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-12-27 | CVE-2017-17857 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations. | 7.8 |
2017-12-27 | CVE-2017-17856 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement. | 7.8 |
2017-12-27 | CVE-2017-17855 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars. | 7.8 |
2017-12-27 | CVE-2017-17854 | Integer Overflow or Wraparound vulnerability in multiple products kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic. | 7.8 |
2017-12-27 | CVE-2017-17853 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations. | 7.8 |
2017-12-27 | CVE-2017-17852 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops. | 7.8 |
2017-12-27 | CVE-2017-16996 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling. | 7.8 |
2017-12-27 | CVE-2017-16995 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension. | 7.8 |
2017-12-20 | CVE-2017-17807 | Missing Authorization vulnerability in Linux Kernel The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c. | 3.3 |
2017-12-20 | CVE-2017-17806 | Out-of-bounds Write vulnerability in multiple products The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization. | 7.8 |