{"id":"CVE-2017-1000407","details":"The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.","modified":"2026-04-16T06:15:26.723950885Z","published":"2017-12-11T21:29:00.297Z","related":["SUSE-SU-2018:3746-1","SUSE-SU-2018:3869-1","SUSE-SU-2019:1289-1","SUSE-SU-2019:13937-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3583-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3619-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4073"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/cve-2017-1000407"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3617-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4082"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3617-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3632-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0676"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1170"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3583-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3619-1/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102038"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/12/04/2"},{"type":"FIX","url":"https://www.spinics.net/lists/kvm/msg159809.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"2.6.32"},{"fixed":"4.15"}]},{"events":[{"introduced":"0"},{"last_affected":"4.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-1000407.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}]}