{"id":"CVE-2017-17864","details":"kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"","modified":"2026-04-16T06:19:34.451696894Z","published":"2017-12-27T17:08:20.560Z","related":["SUSE-SU-2018:0383-1","SUSE-SU-2018:0416-1","SUSE-SU-2018:0482-1","SUSE-SU-2018:0986-1","SUSE-SU-2021:3935-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102320"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040059"},{"type":"ADVISORY","url":"https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=stretch-security&id=ad775f6ff7eebb93eedc2f592bc974260e7757b0"},{"type":"ADVISORY","url":"https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-verifier-fix-states_equal-comparison-of-pointer-and-unknown.patch?h=stretch-security"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/usn/usn-3523-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4073"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.14.8"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-17864.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}