CVE-2017-9074

The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2423496af35d94a87156b063ea5cedffc10a70a1 Patch Vendor Advisory
http://www.debian.org/security/2017/dsa-3886 Third Party Advisory
http://www.securityfocus.com/bid/98577 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1842 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2077 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2669 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0169 Third Party Advisory
https://github.com/torvalds/linux/commit/2423496af35d94a87156b063ea5cedffc10a70a1 Patch Vendor Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://patchwork.ozlabs.org/patch/763117/ Patch Third Party Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2423496af35d94a87156b063ea5cedffc10a70a1 Patch Vendor Advisory
http://www.debian.org/security/2017/dsa-3886 Third Party Advisory
http://www.securityfocus.com/bid/98577 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1842 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2077 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2669 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0169 Third Party Advisory
https://github.com/torvalds/linux/commit/2423496af35d94a87156b063ea5cedffc10a70a1 Patch Vendor Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://patchwork.ozlabs.org/patch/763117/ Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:35

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2423496af35d94a87156b063ea5cedffc10a70a1 - Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2423496af35d94a87156b063ea5cedffc10a70a1 - Patch, Vendor Advisory
References () http://www.debian.org/security/2017/dsa-3886 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3886 - Third Party Advisory
References () http://www.securityfocus.com/bid/98577 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98577 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:1842 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1842 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2077 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2077 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:2669 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:2669 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0169 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0169 - Third Party Advisory
References () https://github.com/torvalds/linux/commit/2423496af35d94a87156b063ea5cedffc10a70a1 - Patch, Vendor Advisory () https://github.com/torvalds/linux/commit/2423496af35d94a87156b063ea5cedffc10a70a1 - Patch, Vendor Advisory
References () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory
References () https://patchwork.ozlabs.org/patch/763117/ - Patch, Third Party Advisory () https://patchwork.ozlabs.org/patch/763117/ - Patch, Third Party Advisory

Information

Published : 2017-05-19 07:29

Updated : 2024-11-21 03:35


NVD link : CVE-2017-9074

Mitre link : CVE-2017-9074

CVE.ORG link : CVE-2017-9074


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read