The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
References
Link | Resource |
---|---|
https://twitter.com/danieljiang0415/status/845116665184497664 | Third Party Advisory |
https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893 | Issue Tracking Patch Third Party Advisory |
https://github.com/danieljiang0415/android_kernel_crash_poc | Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893 | Issue Tracking Patch Third Party Advisory |
http://openwall.com/lists/oss-security/2017/04/04/8 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/97407 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/42135/ | |
https://access.redhat.com/errata/RHSA-2017:2669 | |
https://access.redhat.com/errata/RHSA-2017:2077 | |
https://access.redhat.com/errata/RHSA-2017:1842 | |
https://access.redhat.com/errata/RHSA-2018:1854 | |
https://usn.ubuntu.com/3754-1/ |
Configurations
Information
Published : 2017-04-04 23:59
Updated : 2023-02-12 15:29
NVD link : CVE-2017-2671
Mitre link : CVE-2017-2671
JSON object : View
CWE
Products Affected
linux
- linux_kernel