Vulnerability Description
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.27, < 3.2.92 |
| Redhat | Enterprise Linux | 5.0 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.4 |
| Redhat | Enterprise Linux Server Eus | 7.4 |
| Redhat | Enterprise Linux Server Tus | 7.4 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3981Third Party Advisory
- http://www.securityfocus.com/bid/100267Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039132Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2918Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2930Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2931Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3200Third Party Advisory
- https://access.redhat.com/security/cve/cve-2017-1000111Third Party Advisory
- http://www.debian.org/security/2017/dsa-3981Third Party Advisory
- http://www.securityfocus.com/bid/100267Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039132Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:2918Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2930Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2931Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:3200Third Party Advisory
FAQ
What is CVE-2017-1000111?
CVE-2017-1000111 is a vulnerability with a CVSS score of 7.8 (HIGH). Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety ...
How severe is CVE-2017-1000111?
CVE-2017-1000111 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000111?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.