7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
The kernel-rt package is vulnerable to denial of service(DoS). The attack exists because of a use-after-free flaw in the way the Linux kernel’s Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. allowing a local privileged user to trigger the attack.
rhn.redhat.com/errata/RHSA-2017-0293.html
rhn.redhat.com/errata/RHSA-2017-0294.html
rhn.redhat.com/errata/RHSA-2017-0295.html
rhn.redhat.com/errata/RHSA-2017-0316.html
rhn.redhat.com/errata/RHSA-2017-0323.html
rhn.redhat.com/errata/RHSA-2017-0324.html
rhn.redhat.com/errata/RHSA-2017-0345.html
rhn.redhat.com/errata/RHSA-2017-0346.html
rhn.redhat.com/errata/RHSA-2017-0347.html
rhn.redhat.com/errata/RHSA-2017-0365.html
rhn.redhat.com/errata/RHSA-2017-0366.html
rhn.redhat.com/errata/RHSA-2017-0403.html
rhn.redhat.com/errata/RHSA-2017-0501.html
www.debian.org/security/2017/dsa-3791
www.openwall.com/lists/oss-security/2017/02/22/3
www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
www.securityfocus.com/bid/96310
www.securitytracker.com/id/1037876
access.redhat.com/errata/RHSA-2017:0295
access.redhat.com/errata/RHSA-2017:0932
access.redhat.com/errata/RHSA-2017:1209
access.redhat.com/security/updates/classification/#important
github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4
source.android.com/security/bulletin/2017-07-01
www.exploit-db.com/exploits/41457/
www.exploit-db.com/exploits/41458/
www.tenable.com/security/tns-2017-07
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C