Basic search

K
ubuntucveUbuntu.comUB:CVE-2017-1000111
HistoryAug 10, 2017 - 12:00 a.m.

CVE-2017-1000111

2017-08-1000:00:00
ubuntu.com
ubuntu.com
22

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

24.7%

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is
analogous to previously disclosed CVE-2016-8655. In both cases, a socket
option that changes socket state may race with safety checks in
packet_set_ring. Previously with PACKET_VERSION. This time with
PACKET_RESERVE. The solution is similar: lock the socket for the update.
This issue may be exploitable, we did not investigate further. As this
issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process
namespace. But note that with user namespaces enabled, any process can
create a namespace in which it has CAP_NET_RAW.

Notes

Author Note
sbeattie fix subject “net-packet: fix race in packet_set_ring on PACKET_RESERVE”
smb While working on the embargoed CVE we decided that Precise cannot be exploited due to the missing user namespace support.
Rows per page:
1-10 of 131

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

24.7%

Related for UB:CVE-2017-1000111