7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.008 Low
EPSS
Percentile
81.7%
The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux
kernel through 4.9.9 allows attackers to cause a denial of service (system
crash) via (1) an application that makes crafted system calls or possibly
(2) IPv4 traffic with invalid IP options.
Author | Note |
---|---|
sbeattie | upstream commit references d826eb14ecef as the break point, but Nicholas Leudkteβs cve references f84af32cbca70a3c6d30463dc08c7984af11c277. The latter predates the former, and there is early dropping of the dst added there. even before the conversion in d826eb14ecef. |
tyhicks | In upstream 4.14, 61a1030 reverts the fix because 91ed1e6 removes the the usage of the SKB dst from __ip_options_echo(). So, an alternative fix for this CVE is 91ed1e6. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | linux | <Β 3.13.0-132.181 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | <Β 4.4.0-75.96 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | <Β 4.4.0-1016.25 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-gke | <Β 4.4.0-1012.12 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | <Β 4.10.0-27.30~16.04.2 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-edge | <Β 4.18.0-8.9~18.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe-edge | <Β 4.10.0-27.30~16.04.2 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | <Β 4.4.0-75.96~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-raspi2 | <Β 4.4.0-1054.61 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-snapdragon | <Β 4.4.0-1057.61 | UNKNOWN |
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644
www.openwall.com/lists/oss-security/2017/02/12/3
bugzilla.redhat.com/show_bug.cgi?id=1421638
github.com/torvalds/linux/commit/34b2cef20f19c87999fff3da4071e66937db9644
launchpad.net/bugs/cve/CVE-2017-5970
nvd.nist.gov/vuln/detail/CVE-2017-5970
patchwork.ozlabs.org/patch/724136/
security-tracker.debian.org/tracker/CVE-2017-5970
ubuntu.com/security/notices/USN-3265-1
ubuntu.com/security/notices/USN-3265-2
ubuntu.com/security/notices/USN-3361-1
ubuntu.com/security/notices/USN-3422-1
ubuntu.com/security/notices/USN-3422-2
www.cve.org/CVERecord?id=CVE-2017-5970
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.008 Low
EPSS
Percentile
81.7%