First published: Fri Jun 16 2017(Updated: )
Last updated 25 October 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=2.6.23<3.2.91 | |
Linux Linux kernel | >=3.3<3.10.108 | |
Linux Linux kernel | >=3.11<3.16.46 | |
Linux Linux kernel | >=3.17<3.18.59 | |
Linux Linux kernel | >=3.19<4.1.43 | |
Linux Linux kernel | >=4.2<4.4.75 | |
Linux Linux kernel | >=4.5<4.9.35 | |
Linux Linux kernel | >=4.10<4.11.8 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-1000365 is low.
Linux Kernel versions 3.13.0-126.175, 4.4.0-89.112, 4.10.0-30.34, and newer versions are affected by CVE-2017-1000365.
CVE-2017-1000365 bypasses the size restriction by not taking the argument and environment pointers into account.
The CWE ID of CVE-2017-1000365 is CWE-20.
You can find more information about CVE-2017-1000365 at the following references: [link1], [link2], [link3].