The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1423-1 | linux-4.9 new package |
EUVD |
EUVD-2017-9386 | The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation. |
Ubuntu USN |
USN-3696-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3696-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3754-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:13:49.198Z
Reserved: 2018-03-31T00:00:00
Link: CVE-2017-18255
No data.
Status : Modified
Published: 2018-03-31T17:29:00.263
Modified: 2024-11-21T03:19:41.810
Link: CVE-2017-18255
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN