5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
Linux kernel is vulnerable to denial of service(DoS) attacks. The vulnerability exists in the ip6_find_1stfragopt function in net/ipv6/output_core.c. A remote attacker could cause integer overflows by leveraging the ability to open a raw socket which results in application crash.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6399f1fae4ec29fab5ec76070435555e256ca3a6
www.debian.org/security/2017/dsa-3927
www.debian.org/security/2017/dsa-3945
www.securityfocus.com/bid/99953
access.redhat.com/errata/RHSA-2017:2918
access.redhat.com/errata/RHSA-2017:2930
access.redhat.com/errata/RHSA-2017:2931
access.redhat.com/errata/RHSA-2018:0169
access.redhat.com/security/cve/CVE-2017-7542
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1473649
bugzilla.redhat.com/show_bug.cgi?id=1489085
github.com/torvalds/linux/commit/6399f1fae4ec29fab5ec76070435555e256ca3a6
help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
usn.ubuntu.com/3583-1/
usn.ubuntu.com/3583-2/
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C