First published: Thu Apr 27 2017(Updated: )
Last updated 29 November 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.89 | |
Linux Linux kernel | >=3.3<3.16.44 | |
Linux Linux kernel | >=3.17.0<4.1.40 | |
Linux Linux kernel | >=4.2<4.4.67 | |
Linux Linux kernel | >=4.5.0<4.9.26 | |
Linux Linux kernel | >=4.10<4.10.14 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-7895.
The severity of CVE-2017-7895 is high.
The affected software for CVE-2017-7895 includes Linux kernel versions up to 4.10.13.
Remote attackers can exploit CVE-2017-7895 by triggering pointer-arithmetic errors or causing other unspecified impact via crafted requests.
Yes, there are references available for CVE-2017-7895. You can find them at the following links: [reference 1](http://seclists.org/oss-sec/2017/q2/196), [reference 2](https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309), [reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1446541).