{"id":"UBUNTU-CVE-2017-17863","details":"kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.","modified":"2026-02-04T03:02:27.870450Z","published":"2017-12-27T00:00:00Z","withdrawn":"2025-06-23T15:53:03Z","related":["CVE-2017-17863","USN-3523-1","USN-3523-2","USN-3523-3"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17863"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2017/12/24/1"},{"type":"REPORT","url":"https://www.spinics.net/lists/stable/msg206985.html"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-3523-1"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-3523-2"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-3523-3"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-17863"}],"affected":[{"package":{"name":"linux-flo","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-flo@3.4.0-5.23?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.4.0-5.19","3.4.0-5.22","3.4.0-5.23"],"ecosystem_specific":{"ubuntu_priority":"high"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-17863.json"}},{"package":{"name":"linux-mako","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-mako@3.4.0-7.44?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.4.0-7.39","3.4.0-7.40","3.4.0-7.41","3.4.0-7.44"],"ecosystem_specific":{"ubuntu_priority":"high"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-17863.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}