7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
Linux kernel is vulnerable to out-of-bounds reads. This is because the IPv6 fragmentation implementation in the Linux kernel does not consider that the nexthdr field may be associated with an invalid option. Local users could cause a denial of service or possibly have unspecified other impact via crafted socket and send system calls.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2423496af35d94a87156b063ea5cedffc10a70a1
www.debian.org/security/2017/dsa-3886
www.securityfocus.com/bid/98577
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/index.html
access.redhat.com/errata/RHSA-2017:1842
access.redhat.com/errata/RHSA-2017:2077
access.redhat.com/errata/RHSA-2017:2669
access.redhat.com/errata/RHSA-2018:0169
access.redhat.com/security/cve/CVE-2016-10741
access.redhat.com/security/cve/CVE-2017-2584
access.redhat.com/security/cve/CVE-2017-5551
access.redhat.com/security/cve/CVE-2017-7495
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1377840
bugzilla.redhat.com/show_bug.cgi?id=1378172
bugzilla.redhat.com/show_bug.cgi?id=1389215
bugzilla.redhat.com/show_bug.cgi?id=1400188
bugzilla.redhat.com/show_bug.cgi?id=1414052
bugzilla.redhat.com/show_bug.cgi?id=1421801
bugzilla.redhat.com/show_bug.cgi?id=1421810
bugzilla.redhat.com/show_bug.cgi?id=1425780
bugzilla.redhat.com/show_bug.cgi?id=1426661
bugzilla.redhat.com/show_bug.cgi?id=1427626
bugzilla.redhat.com/show_bug.cgi?id=1427647
bugzilla.redhat.com/show_bug.cgi?id=1427991
bugzilla.redhat.com/show_bug.cgi?id=1428890
bugzilla.redhat.com/show_bug.cgi?id=1428943
bugzilla.redhat.com/show_bug.cgi?id=1429610
bugzilla.redhat.com/show_bug.cgi?id=1429640
bugzilla.redhat.com/show_bug.cgi?id=1429951
bugzilla.redhat.com/show_bug.cgi?id=1429977
bugzilla.redhat.com/show_bug.cgi?id=1430023
bugzilla.redhat.com/show_bug.cgi?id=1430038
bugzilla.redhat.com/show_bug.cgi?id=1430074
bugzilla.redhat.com/show_bug.cgi?id=1430353
bugzilla.redhat.com/show_bug.cgi?id=1430926
bugzilla.redhat.com/show_bug.cgi?id=1430946
bugzilla.redhat.com/show_bug.cgi?id=1431104
bugzilla.redhat.com/show_bug.cgi?id=1432118
bugzilla.redhat.com/show_bug.cgi?id=1434616
bugzilla.redhat.com/show_bug.cgi?id=1438512
bugzilla.redhat.com/show_bug.cgi?id=1441552
bugzilla.redhat.com/show_bug.cgi?id=1452240
bugzilla.redhat.com/show_bug.cgi?id=1459056
github.com/torvalds/linux/commit/2423496af35d94a87156b063ea5cedffc10a70a1
help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
patchwork.ozlabs.org/patch/763117/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C