7.8

CVE-2017-1000111

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 2.6.27 < 3.2.92
LinuxLinux Kernel Version >= 3.3 < 3.10.108
LinuxLinux Kernel Version >= 3.11 < 3.16.47
LinuxLinux Kernel Version >= 3.17 < 3.18.65
LinuxLinux Kernel Version >= 3.19 < 4.1.44
LinuxLinux Kernel Version >= 4.2 < 4.4.82
LinuxLinux Kernel Version >= 4.5 < 4.9.43
LinuxLinux Kernel Version >= 4.10 < 4.12.7
RedhatEnterprise Linux Version5.0
RedhatEnterprise Linux Version6.0
RedhatEnterprise Linux Version7.0
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.1% 0.245
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.