CVE-2017-9150 PUBLISHED

The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls.

EPSS 0.51% · 66.1th percentile

Risk Scores

EPSS Score
0.51%
66.1th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSlinux-gke4.4.0-1016.16, 4.4.0-1014.14, 4.4.0-1013.13
Ubuntu:16.04:LTSlinux4.4.0-75.96, 4.4.0-72.93, 4.4.0-71.92
Ubuntu:18.04:LTSlinux-oem4.15.0-1093.103, 4.15.0-1009.12, 4.15.0-1008.11
Ubuntu:18.04:LTSlinux-hwe-edge5.0.0-20.21~18.04.1, 5.0.0-19.20~18.04.1, 5.0.0-17.18~18.04.1
Ubuntu:22.04:LTSlinux-realtime5.15.0-1032.35, 0
Ubuntu:22.04:LTSlinux-riscv5.15.0-1008.8, 5.15.0-1007.7, 5.15.0-1006.6
Ubuntu:16.04:LTSlinux-snapdragon4.4.0-1048.52, 4.4.0-1051.55, 4.4.0-1053.57
Ubuntu:20.04:LTSlinux-gke5.4.0-1062.65, 5.4.0-1105.112, 5.4.0-1104.111
Ubuntu:16.04:LTSlinux-aws4.4.0-1020.29, 4.4.0-1018.27, 4.4.0-1017.26
Ubuntu:18.04:LTSlinux-gcp4.15.0-1018.19, 4.15.0-1019.20, 5.0.0-1029.30~18.04.1
Ubuntu:20.04:LTSlinux-raspi25.4.0-1006.6, 5.4.0-1004.4, 5.3.0-1017.19
Ubuntu:16.04:LTSlinux-hwe4.8.0-54.57~16.04.1, 0, 4.8.0-36.36~16.04.1
Ubuntu:14.04:LTSlinux-lts-xenial0, 4.4.0-14.30~14.04.2, 4.4.0-15.31~14.04.1
Ubuntu:22.04:LTSlinux-intel-iot-realtime5.15.0-1073.75, 0
Ubuntu:18.04:LTSlinux-hwe4.18.0-20.21~18.04.1, 4.18.0-18.19~18.04.1, 4.18.0-17.18~18.04.1
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1072.75+cvm1.1, 5.4.0-1074.77+cvm1.1, 5.4.0-1076.79+cvm1.1
Ubuntu:20.04:LTSlinux-riscv5.4.0-30.34, 5.4.0-28.32, 5.4.0-27.31
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:16.04:LTSlinux-raspi24.4.0-1016.22, 4.4.0-1012.16, 4.4.0-1010.13
Ubuntu:18.04:LTSlinux-azure5.0.0-1016.17~18.04.1, 5.0.0-1018.19~18.04.1, 5.0.0-1020.21~18.04.1

Timeline

References

Open in Interactive Console →