First published: Wed Jun 28 2017(Updated: )
Last updated 29 November 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <3.18.71 | |
Linux kernel | >=3.19<4.1.45 | |
Linux kernel | >=4.2<4.4.88 | |
Linux kernel | >=4.5<4.9.50 | |
Linux kernel | >=4.10<4.12.13 | |
Ubuntu Linux | =14.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 | |
Linux Kernel | <3.18.71 | |
Linux Kernel | >=3.19<4.1.45 | |
Linux Kernel | >=4.2<4.4.88 | |
Linux Kernel | >=4.5<4.9.50 | |
Linux Kernel | >=4.10<4.12.13 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-9985.
The severity of CVE-2017-9985 is not specified.
CVE-2017-9985 allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads.
Linux kernel through version 4.11.7 is affected by CVE-2017-9985.
To fix the CVE-2017-9985 vulnerability, update the Linux kernel to version 4.13 or later.